{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:28:10Z","timestamp":1725550090326},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290315"},{"type":"electronic","value":"9783540320791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11557654_64","type":"book-chapter","created":{"date-parts":[[2005,10,4]],"date-time":"2005-10-04T09:59:18Z","timestamp":1128419958000},"page":"549-554","source":"Crossref","is-referenced-by-count":4,"title":["A CRT-Based RSA Countermeasure Against Physical Cryptanalysis"],"prefix":"10.1007","author":[{"given":"ChangKyun","family":"Kim","sequence":"first","affiliation":[]},{"given":"JaeCheol","family":"Ha","sequence":"additional","affiliation":[]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]},{"given":"Sung-Hyun","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"64_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C. Aum\u00fcller","year":"2003","unstructured":"Aum\u00fcller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 260\u2013275. Springer, Heidelberg (2003)"},{"key":"64_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/3-540-36400-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"B. Boer den","year":"2003","unstructured":"den Boer, B., Lemke, K., Wicke, G.: A DPA attack against the modular reduction within a CRT implementation of RSA. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 228\u2013243. Springer, Heidelberg (2003)"},{"key":"64_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: One the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"issue":"4","key":"64_CR4","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"Joye, M., Lenstra, A.K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology\u00a012(4), 241\u2013245 (1999)","journal-title":"Journal of Cryptology"},{"key":"64_CR5","unstructured":"Lenstra, A.K.: Memo on RSA signature generation in the presence of faults (September 1996)"},{"key":"64_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-45664-3_18","volume-title":"Public Key Cryptography","author":"R. Novak","year":"2002","unstructured":"Novak, R.: SPA-based adaptive chosen-ciphertext attack on RSA implementation. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 252\u2013262. Springer, Heidelberg (2002)"},{"key":"64_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-540-24852-1_28","volume-title":"Applied Cryptography and Network Security","author":"K. Okeya","year":"2004","unstructured":"Okeya, K., Takagi, T.: Security analysis of CRT-based cryptosystems. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol.\u00a03089, pp. 383\u2013397. Springer, Heidelberg (2004)"},{"key":"64_CR8","series-title":"Lecture Notes in Computer Science","first-page":"292","volume-title":"CHES 1999","author":"W. Schindler","year":"1999","unstructured":"Schindler, W.: A timing attack against RSA with the Chinese remainder theorem. In: CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"64_CR9","unstructured":"Shamir, A.: How to check modular exponentiation. In: Advances in Cryptology, Konstanz, Germany (1997)"},{"key":"64_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/3-540-45861-1_30","volume-title":"Information Security and Cryptology - ICISC 2001","author":"S.-M. Yen","year":"2002","unstructured":"Yen, S.-M., Kim, S., Lim, S., Moon, S.-J.: RSA speedup with residue number system immune against hardware fault cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 397\u2013413. Springer, Heidelberg (2002)"},{"key":"64_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45067-X_25","volume-title":"Information Security and Privacy","author":"S.M. Yen","year":"2003","unstructured":"Yen, S.M., Moon, S.J., Ha, J.C.: Permanent fault attack on the parameters of RSA with CRT. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 285\u2013296. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","High Performance Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11557654_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,12]],"date-time":"2019-03-12T22:43:57Z","timestamp":1552430637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11557654_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290315","9783540320791"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11557654_64","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}