{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:54:46Z","timestamp":1761807286003},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540462507"},{"type":"electronic","value":"9783540462514"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11889700_5","type":"book-chapter","created":{"date-parts":[[2006,10,9]],"date-time":"2006-10-09T14:13:18Z","timestamp":1160403198000},"page":"53-61","source":"Crossref","is-referenced-by-count":14,"title":["Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection"],"prefix":"10.1007","author":[{"given":"Sung-Ming","family":"Yen","sequence":"first","affiliation":[]},{"given":"Dongryeol","family":"Kim","sequence":"additional","affiliation":[]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT 1997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Bao, F., Deng, R.H., Han, Y., Jeng, A., Narasimbalu, A.D., Ngair, T.: Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults. In: Pre-proceedings of the 1997 Security Protocols Workshop, Paris, France (1997)","DOI":"10.1007\/BFb0028164"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"Joye, M., Quisquater, J.-J., Bao, F., Deng, R.H.: RSA-type signatures in the presence of transient faults. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 155\u2013160. Springer, Heidelberg (1997)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/3-540-63594-7_71","volume-title":"Financial Cryptography","author":"D.P. Maher","year":"1997","unstructured":"Maher, D.P.: Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective. In: FC 1997. LNCS, vol.\u00a01318, pp. 109\u2013121. Springer, Heidelberg (1997)"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"5_CR6","unstructured":"Lenstra, A.K.: Memo on RSA signature generation in the presence of faults (September 1996)"},{"issue":"4","key":"5_CR7","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"Joye, M., Lenstra, A.K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology\u00a012(4), 241\u2013245 (1999)","journal-title":"Journal of Cryptology"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","first-page":"11","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"A. Shamir","year":"1997","unstructured":"Shamir, A.: How to check modular exponentiation. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 11\u201315. Springer, Heidelberg (1997)"},{"key":"5_CR9","unstructured":"Shamir, A.: Method and apparatus for protecting public key schemes from timing and fault attacks. United States Patent 5991415 (November 23, 1999)"},{"issue":"9","key":"5_CR10","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"Yen, S.M., Joye, M.: Checking before output not be enough against fault-based cryptanalysis. IEEE Trans. on Computers\u00a049(9), 967\u2013970 (2000)","journal-title":"IEEE Trans. on Computers"},{"issue":"21","key":"5_CR11","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquater","year":"1982","unstructured":"Quisquater, J.-J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electronics Letters\u00a018(21), 905\u2013907 (1982)","journal-title":"Electronics Letters"},{"key":"5_CR12","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystem. Commun. of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. of ACM"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/3-540-36552-4_26","volume-title":"Information Security and Cryptology - ICISC 2002","author":"S.M. Yen","year":"2003","unstructured":"Yen, S.M., Moon, S.J., Ha, J.C.: Hardware fault attack on RSA with CRT revisited. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol.\u00a02587, pp. 374\u2013388. Springer, Heidelberg (2003)"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C. Aum\u00fcller","year":"2003","unstructured":"Aum\u00fcller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.-P.: Fault attacks on RSA with CRT: Concrete results and practical countermeasures. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 260\u2013275. Springer, Heidelberg (2003)"},{"issue":"4","key":"5_CR16","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/TC.2003.1190587","volume":"52","author":"S.M. Yen","year":"2003","unstructured":"Yen, S.M., Kim, S.J., Lim, S.G., Moon, S.J.: RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis. IEEE Trans. on Computers \u2013 Special issue on CHES\u00a052(4), 461\u2013472 (2003)","journal-title":"IEEE Trans. on Computers \u2013 Special issue on CHES"},{"key":"5_CR17","unstructured":"Giraud, C.: Fault-resistant RSA implementation. In: Proc. of the 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography\u2013FDTC 2005, September 2 (2005)"},{"key":"5_CR18","unstructured":"Ciet, M., Joye, M.: Practical fault countermeasures for Chinese remaindering based RSA. In: Proc. of the 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography\u2013FDTC 2005, September 2 (2005)"}],"container-title":["Lecture Notes in Computer Science","Fault Diagnosis and Tolerance in Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11889700_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:51:38Z","timestamp":1605642698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11889700_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540462507","9783540462514"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/11889700_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}