{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:23:40Z","timestamp":1737437020469,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_19","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"244-259","source":"Crossref","is-referenced-by-count":11,"title":["Further Results and Considerations on Side Channel Attacks on RSA"],"prefix":"10.1007","author":[{"given":"Vlast\u00edmil","family":"Kl\u00edma","sequence":"first","affiliation":[]},{"given":"Tom\u00e1\u0161","family":"Rosa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Akkar, M.-L., Bevan, R., Dischamp, P. and Moyart, D}.: Power Analysis, What Is Now Possible..., in Proc. of ASIACRYPT 2000, pp. 489\u2013502, 2000.","DOI":"10.1007\/3-540-44448-3_38"},{"issue":"2","key":"19_CR2","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1137\/0217013","volume":"17","author":"W. Alexi","year":"1988","unstructured":"Alexi, W., Chor, B., Goldreich, O. and Schnorr, C.: RSA and Rabin functions: Certain parts are as hard as the whole, SIAM Journal on Computing, 17(2), pp. 194\u2013209, 1988.","journal-title":"SIAM Journal on Computing"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bao, F., Deng, R.-H., Han, Y., Jeng, A., Narasimhalu, A.-D. and Ngair, T.: Breaking Public Key Cryptosystems on Tamper Resistant Devices in the Presence of Transient Faults, in Proc. of Security Protocols\u2019 97, pp. 115\u2013124, 1997.","DOI":"10.1007\/BFb0028164"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Bellare, M. and Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, October 20, 1995, originally published in Proc. of the First ACM Conference on Computer and Communications Security, ACM, November 1993.","DOI":"10.1145\/168588.168596"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Bleichenbacher, D.: Chosen Ciphertexts Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1, in Proc. of CRYPTO\u2019 98, pp. 1\u201312, 1998.","DOI":"10.1007\/BFb0055716"},{"key":"19_CR6","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"Boneh, D.: Twenty Years of Attacks on the RSA Cryptosystems, Notices of the American Mathematical Society, vol. 46, no. 2, pp. 203\u2013213, 1999.","journal-title":"Notices of the American Mathematical Society"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R. A. and Lipton, R. J.: On the Importance of Checking Cryptographic Protocols for Faults, in Proc. of EUROCRYPT\u2019 97, pp. 37\u201351, 1997.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Chari, S., Jutla, C.-S., Rao, J. and Rohatgi, P.: Towards Sound Approaches to Counteract Power-Analysis Attacks, in Proc. of CRYPTO\u2019 99, pp. 398\u2013411, 1999.","DOI":"10.1007\/3-540-48405-1_26"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Fischlin, R. and Schnorr, C. P.: Stronger Security Proofs for RSA and Rabin Bits, in Proc. of EUROCRYPT\u2019 97, pp. 267\u2013279, 1997.","DOI":"10.1007\/3-540-69053-0_19"},{"key":"19_CR10","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/s001459910008","volume":"13","author":"R. Fischlin","year":"2000","unstructured":"Fischlin, R. and Schnorr, C. P.: Stronger Security Proofs for RSA and Rabin Bits, Journal of Cryptology, Vol. 13, No. 2, pp. 221\u2013244, IACR, 2000.","journal-title":"Journal of Cryptology"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Fujisaki, E., Okamoto, T., Pointcheval, D. and Stern, J.: RSA-OAEP Is Secure under the RSA Assumption, in Proc. of CRYPTO 2001, pp. 260\u2013274, 2001.","DOI":"10.1007\/3-540-44647-8_16"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Gandolfi, K., Mourtel, C. and Olivier, F.: Electromagnetic Analysis: Concrete Results, in Proc. of CHES 2001, pp. 251\u2013261, 2001.","DOI":"10.1007\/3-540-44709-1_21"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"H\u00e5stad, J. and N\u00e4slund M.: The Security of Individual RSA Bits, in Proc. of FOCS\u2019 98, pp. 510\u2013521, 1998.","DOI":"10.1109\/SFCS.1998.743502"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kocher, P., Jaffe, J. and Jun, B.: Differential Power Analysis: Leaking Secrets, in Proc. of CRYPTO\u2019 99, pp. 388\u2013397, 1999.","DOI":"10.1007\/3-540-48405-1_25"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Manger, J.: A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1, in Proc. of CRYPTO 2001, pp. 230\u2013238, 2001.","DOI":"10.1007\/3-540-44647-8_14"},{"key":"19_CR16","unstructured":"Messegers, T.-S., Dabbish, E. A. and Sloan, R. H.: Investigations of Power Analysis Attacks on Smartcards, in Proc. of USENIX Workshop on Smartcard Technology, pp. 151\u2013161, 1999."},{"key":"19_CR17","unstructured":"PKCS#1 v2.1: RSA Cryptography Standard, RSA Labs, DRAFT2, January 5 2001."},{"key":"19_CR18","unstructured":"PKCS#5 v2.0: Password-Based Cryptography Standard, RSA Labs, March 25, 1999."},{"key":"19_CR19","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S.C. Pohlig","year":"1978","unstructured":"Pohlig S.C., Hellman M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory, 24 (1978), 106\u2013110.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"19_CR20","unstructured":"Rao, J.-R and Rohatgi, P.: EMpowering Side-Channel Attacks, preliminary technical report, May 11 2001."},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R., L., Shamir, A. and Adleman L.: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, pp. 120\u2013126, 1978.","DOI":"10.1145\/359340.359342"},{"key":"19_CR22","unstructured":"Shoup, V.: A Proposal for an ISO Standard for Public Key Encryption (version 2.0), September 17, 2001."},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Shoup, V.: OAEP Reconsidered (Extended Abstract), in Proc. of CRYPTO 2001, pp. 239\u2013259, 2001.","DOI":"10.1007\/3-540-44647-8_15"},{"key":"19_CR24","unstructured":"Stinson, D., R.: Cryptography-Theory and Practice, CRC Press, 1995."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T20:24:53Z","timestamp":1737404693000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_19","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}