{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:08:57Z","timestamp":1773670137601,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540004097","type":"print"},{"value":"9783540364009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_18","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"228-243","source":"Crossref","is-referenced-by-count":32,"title":["A DPA Attack against the Modular Reduction within a CRT Implementation of RSA"],"prefix":"10.1007","author":[{"given":"Bert","family":"den Boer","sequence":"first","affiliation":[]},{"given":"Kerstin","family":"Lemke","sequence":"additional","affiliation":[]},{"given":"Guntram","family":"Wicke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"18_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Differential Power Analysis","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun, \u201cDifferential Power Analysis\u201d, in: Proceedings of Advances in Cryptology-CRYPTO\u2019 99, Lecture Notes in Computer Science, Vol. 1666, Springer, Berlin 1999, pp. 388\u2013397"},{"key":"18_CR2","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Power Analysis Attacks of Modular Exponentiation in Smartcards","author":"T. S. Messerges","year":"1999","unstructured":"T. S. Messerges, E. A. Dabbish and R. H. Sloan, \u201cPower Analysis Attacks of Modular Exponentiation in Smartcards\u201d, in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Springer, Lecture Notes in Computer Science, Vol. 1717, Springer, Berlin 1999, pp. 144\u2013157"},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/BFb0055858","volume-title":"Computer Security-ESORICS 98","author":"J. Kelsey","year":"1998","unstructured":"J. Kelsey, B. Schneier, D. Wagner, C. Hall, \u201cSide Channel Cryptanalysis of Product Ciphers\u201d, in: Computer Security-ESORICS 98, Lecture Notes in Computer Science, Vol. 1485, Springer, Berlin 1998, pp. 487\u2013496"},{"key":"18_CR4","unstructured":"T. S. Messerges, E. A. Dabbish, R. H. Sloan, \u201cInvestigations of Power Analysis Attacks on Smartcards\u201d, USENIX Workshop on Smartcard Technology, USENIX Association, 1999, pp. 151\u2013161"},{"key":"18_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45472-1_12","volume-title":"Financial Cryptography 2000","author":"J.-S. Coron","year":"2001","unstructured":"J.-S. Coron, P. Kocher, D. Naccache, \u201cStatistics and Secret Leakage\u201d, in: Financial Cryptography 2000, Lecture Notes in Computer Science, Vol. 1962, Springer, Berlin 2001, pp. 157\u2013173"},{"key":"18_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Using Second-Order Power Analysis to Attack DPA Resistant Software","author":"T. S. Messerges","year":"2000","unstructured":"T. S. Messerges, \u201cUsing Second-Order Power Analysis to Attack DPA Resistant Software\u201d, in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1965, Springer, Berlin 2000, pp. 238\u2013251"},{"key":"18_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1007\/3-540-44499-8_6","volume-title":"Smartly Analyzing the Simplicity nd the Power of Simple Power Analysis on Smartcards","author":"R. Mayer-Sommer","year":"2000","unstructured":"R. Mayer-Sommer, \u201cSmartly Analyzing the Simplicity nd the Power of Simple Power Analysis on Smartcards\u201d, in: Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1965, Springer, Berlin 2000, pp. 78\u201392"},{"key":"18_CR8","series-title":"Lect Notes Comput Sci","first-page":"158","volume-title":"IPA: A New Class of Power Attacks","author":"P. N. Fahn","year":"1999","unstructured":"P. N. Fahn and P. K. Pearson, \u201cIPA: A New Class of Power Attacks\u201d, in Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, Vol. 1717, Springer, Berlin 1999, pp. 158\u2013172"},{"key":"18_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology-Eurocrypt 97","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R. A. DeMillo, R. J. Lipton, \u201cOn the Importance of Checking Cryptographic Protocols for Faults\u201d, in Advances in Cryptology-Eurocrypt 97, Lecture Notes in Computer Science, Vol. 1233, Springer, Berlin 1997, pp. 37\u201351"},{"key":"18_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology-Crypto\u2019 97","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir, \u201cDifferential Fault Analysis of Secret Key Cryptosystems\u201d, in: Advances in Cryptology-Crypto\u2019 97, Lecture Notes in Computer Science, Vol. 1294, Springer, Berlin 1997, pp. 513\u2013525"},{"key":"18_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-Crypto\u2019 96","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, \u201cTiming Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Systems\u201d, in: Advances in Cryptology-Crypto\u2019 96, Lecture Notes in Computer Science, Vol. 1109, Springer, Berlin 1996, pp. 104\u2013113"},{"key":"18_CR12","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P. C. van Oorschot, S. C. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton 1997"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T10:02:45Z","timestamp":1550916165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"value":"0302-9743","type":"print"}],"subject":[],"published":{"date-parts":[[2003]]}}}