{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:24:01Z","timestamp":1743150241212,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_30","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"420-434","source":"Crossref","is-referenced-by-count":12,"title":["Seifert\u2019s RSA Fault Attack: Simplified Analysis and Generalizations"],"prefix":"10.1007","author":[{"given":"James A.","family":"Muir","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proceedings of the IEEE\u00a094, 370\u2013382 (2006)","journal-title":"Proceedings of the IEEE"},{"key":"30_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures: How to sign with RSA and Rabin. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 399\u2013416. Springer, Heidelberg (1996)"},{"key":"30_CR3","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the importance of checking cryptographic protocols for faults. Journal of Cryptology\u00a014, 101\u2013119 (2001)","journal-title":"Journal of Cryptology"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory\u00a031, 469\u2013472 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"key":"30_CR5","unstructured":"Huang, A.: Hacking the Xbox: An Introduction to Reverse Engineering. No Starch Press (2003)"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0304-3975(76)90050-5","volume":"3","author":"D. Knuth","year":"1976","unstructured":"Knuth, D., Trabb Pardo, L.: Analysis of a simple factorization algorithm. Theoretical Computer Science\u00a03, 321\u2013348 (1976)","journal-title":"Theoretical Computer Science"},{"key":"30_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30580-4_3","volume-title":"Public Key Cryptography - PKC 2005","author":"D. Naccache","year":"2005","unstructured":"Naccache, D., Nguyen, P., Tunstall, M., Whelan, C.: Experimenting with faults, lattices and the DSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 16\u201328. Springer, Heidelberg (2005)"},{"key":"30_CR8","doi-asserted-by":"crossref","unstructured":"Seifert, J.: On authenticated computing and RSA-based authentication. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), November 2005, pp. 122\u2013127 (2005)","DOI":"10.1145\/1102120.1102138"},{"key":"30_CR9","unstructured":"Shoup, V.: NTL: A library for doing number theory (version 5.4), \n                    \n                      http:\/\/shoup.net\/ntl\/"},{"key":"30_CR10","unstructured":"Microsoft Xbox, \n                    \n                      http:\/\/www.microsoft.com\/xbox\/"},{"key":"30_CR11","unstructured":"Operation X, \n                    \n                      http:\/\/sourceforge.net\/projects\/opx\/"},{"key":"30_CR12","unstructured":"RSA Challenge Numbers, \n                    \n                      http:\/\/www.rsasecurity.com\/rsalabs\/node.asp?id=2093"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:09:46Z","timestamp":1566763786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11935308_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}