{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:44Z","timestamp":1764996824823},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004097"},{"type":"electronic","value":"9783540364009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36400-5_20","type":"book-chapter","created":{"date-parts":[[2007,9,2]],"date-time":"2007-09-02T23:59:37Z","timestamp":1188777577000},"page":"260-275","source":"Crossref","is-referenced-by-count":108,"title":["Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures"],"prefix":"10.1007","author":[{"given":"C.","family":"Aum\u00fcller","sequence":"first","affiliation":[]},{"given":"P.","family":"Bier","sequence":"additional","affiliation":[]},{"given":"W.","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"P.","family":"Hofreiter","sequence":"additional","affiliation":[]},{"given":"J.-P.","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,2,17]]},"reference":[{"key":"20_CR1","volume-title":"Security Engineering","author":"R. Anderson","year":"2001","unstructured":"R. Anderson, Security Engineering, John Wiley & Sons, New York, 2001."},{"key":"20_CR2","unstructured":"R. Anderson, M. Kuhn, \u201cTamper Resistance-a cautionary note\u201d, Proc. of 2nd USENIX Workshop on Electronic Commerce, pp. 1\u201311, 1996."},{"key":"20_CR3","series-title":"Lect Notes Comput Sci","first-page":"125","volume-title":"Low cost attacks attacks on tamper resistant devices","author":"R. Anderson","year":"1997","unstructured":"R. Anderson, M. Kuhn, \u201cLow cost attacks attacks on tamper resistant devices\u201d, Proc. of 1997 Security Protocols Workshop, Springer LNCS vol. 1361, pp. 125\u2013136, 1997."},{"issue":"2","key":"20_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"D. Boneh, R. A. DeMillo, R. Lipton, \u201cOn the Importance of Eliminating Errors in Cryptographic Computations\u201d Journal of Cryptology\n                  14(2):101\u2013120, 2001.","journal-title":"Journal of Cryptology"},{"key":"20_CR5","series-title":"Lect Notes Comput Sci","first-page":"115","volume-title":"Breaking public key cryptosystems on tamper resistant dives in the presence of transient faults","author":"F. Bao","year":"1997","unstructured":"F. Bao, R. H. Deng, Y. Han, A. Jeng, A. D. Narasimbalu, T. Ngair, \u201cBreaking public key cryptosystems on tamper resistant dives in the presence of transient faults\u201d, Proc. of 1997 Security Protocols Workshop, Springer LNCS vol. 1361, pp. 115\u2013124, 1997."},{"key":"20_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"The exact security of digital signatures-how to sign with RSA and Rabin","author":"M. Bellare","year":"1996","unstructured":"M. Bellare, P. Rogaway, \u201cThe exact security of digital signatures-how to sign with RSA and Rabin\u201d, Proc. of EUROCRYPTO\u2019 96, Springer LNCS vol. 1070, pp. 399\u2013416, 1996."},{"key":"20_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Differential fault analysis of secret key cryptosystems","author":"E. Biham","year":"1997","unstructured":"E. Biham, A. Shamir, \u201cDifferential fault analysis of secret key cryptosystems\u201d, Proc. of CRYPTO\u2019 97, Springer LNCS vol. 1294, pp. 513\u2013525, 1997."},{"key":"20_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Differential fault attacks on elliptic curve cryptosystems","author":"I. Biehl","year":"2000","unstructured":"I. Biehl, B. Meyer, V. M\u00fcller, \u201cDifferential fault attacks on elliptic curve cryptosystems\u201d, Proc. of CRYPTO\u2019 00, Springer LNCS vol. 1880, pp. 131\u2013146, 2000."},{"key":"20_CR9","unstructured":"J. Bl\u00f6mer, A. May, J.-P. Seifert, personal communication, April 2002."},{"issue":"21","key":"20_CR10","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"C. Couvreur","year":"1982","unstructured":"C. Couvreur, J.-J. Quisquater, \u201cFast decipherment algorithm for RSA public-key cryptosystem\u201d, Electronics Letters\n                  18(21):905\u2013907, 1982.","journal-title":"Electronics Letters"},{"key":"20_CR11","series-title":"Lect Notes Comput Sci","first-page":"136","volume-title":"Note on fast computation of secret RSA exponents","author":"W. Fischer","year":"1982","unstructured":"W. Fischer, J.-P. Seifert, \u201cNote on fast computation of secret RSA exponents\u201d, Proc. of ACISP\u2019 02, Springer LNCS vol. 2384, pp. 136\u2013143, 2002."},{"key":"20_CR12","series-title":"Lect Notes Comput Sci","first-page":"255","volume-title":"Electromagnetic analysis: Concrete results","author":"K. Gandol","year":"1996","unstructured":"K. Gandol., C. Mourtel, F. Olivier, \u201cElectromagnetic analysis: Concrete results\u201d, Proc. of CHES\u2019 01, Springer LNCS vol. 2162, pp. 255\u2013265, 2001."},{"key":"20_CR13","unstructured":"P. Gutmann, \u201cSecure deletion of data from magnetic and solid-state memory\u201d, Proc. of 6th USENIX Security Symposium, pp. 77\u201389, 1997."},{"key":"20_CR14","unstructured":"P. Gutmann, \u201cData Remanence in Semiconductor Devices\u201d, Proc. of 7th USENIX Security Symposium, 1998."},{"issue":"1","key":"20_CR15","first-page":"6","volume":"4","author":"H. Handschuh","year":"1998","unstructured":"H. Handschuh, P. Pailler, \u201cSmart Card Crypto-Coprocessors for Public-Key Cryptography\u201d, CryptoBytes\n                  4(1):6\u201311, 1998.","journal-title":"CryptoBytes"},{"key":"20_CR16","series-title":"Lect Notes Comput Sci","first-page":"372","volume-title":"Smart Card Crypto-Coprocessors for Public-Key Cryptography","author":"H. Handschuh","year":"1998","unstructured":"H. Handschuh, P. Pailler, \u201cSmart Card Crypto-Coprocessors for Public-Key Cryptography\u201d, Proc. of CARDIS\u2019 98, Springer LNCS vol. 1820, pp. 372\u2013379, 1998."},{"key":"20_CR17","unstructured":"International Organization for Standardization, \u201ceISO\/IEC 7816-3: Electronic signals and transmission protocols\u201d, \n                    http:\/\/www.iso.ch\n                    \n                  , 2002."},{"issue":"4","key":"20_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"M. Joye, A. K. Lenstra, J.-J. Quisquater, \u201cChinese remaindering based cryptosystem in the presence of faults\u201d, Journal of Cryptology\n                  12(4):241\u2013245, 1999.","journal-title":"Journal of Cryptology"},{"key":"20_CR19","unstructured":"M. Joye, P. Pailler, S.-M. Yen, \u201cSecure Evaluation of Modular Functions\u201d, Proc. of 2001 International Workshop on Cryptology and Network Security, pp. 227\u2013229, 2001."},{"key":"20_CR20","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"M. Joye, J.-J. Quisquater, F. Bao, R. H. Deng, \u201cRSA-type signatures in the presence of transient faults\u201d, Cryptography and Coding, Springer LNCS vol. 1335, pp. 155\u2013160, 1997."},{"key":"20_CR21","series-title":"Lect Notes Comput Sci","first-page":"17","volume-title":"Observability analysis-detecting when improved cryptosystems fail","author":"M. Joye","year":"2001","unstructured":"M. Joye, J.-J. Quisquater, S. M. Yen, M. Yung, \u201cObservability analysis-detecting when improved cryptosystems fail\u201d, Proc. of CT-RSA Conference 2002, Springer LNCS vol. 2271, pp. 17\u201329, 2002."},{"key":"20_CR22","unstructured":"B. Kaliski, M. J. B. Robshaw, \u201cComments on some new attacks on cryptographic devices\u201d, RSA Laboratories Bulletin\n                  5, July 1997."},{"key":"20_CR23","volume-title":"Seminumerical Algorithms","author":"D. E. Knuth","year":"1999","unstructured":"D. E. Knuth, The Art of Computer Programming, Vol.2: Seminumerical Algorithms, 3rd ed., Addison-Wesley, Reading MA, 1999.","edition":"3rd ed"},{"issue":"7","key":"20_CR24","first-page":"421","volume":"20","author":"O. Kocar","year":"1996","unstructured":"O. Kocar, \u201cHardwaresicherheit von Mikrochips in Chipkarten\u201d, Datenschutz und Datensicherheit\n                  20(7):421\u2013424, 1996.","journal-title":"Datenschutz und Datensicherheit"},{"key":"20_CR25","series-title":"Lect Notes Comput Sci","first-page":"104","volume-title":"Timing attacks on implementations of Diffie-Hellmann, RSA, DSS and other systems","author":"P. Kocher","year":"1997","unstructured":"P. Kocher, \u201cTiming attacks on implementations of Diffie-Hellmann, RSA, DSS and other systems\u201d, Proc. of CYRPTO\u2019 97, Springer LNCS vol. 1109, pp. 104\u2013113, 1997."},{"key":"20_CR26","series-title":"Lect Notes Comput Sci","first-page":"388","volume-title":"Differential Power Analysis","author":"P. Kocher","year":"2001","unstructured":"P. Kocher, J. Jaffe, J. Jun, \u201cDifferential Power Analysis\u201d, Proc. of CYRPTO\u2019 99, Springer LNCS vol. 1666, pp. 388\u2013397, 1999."},{"key":"20_CR27","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/3-540-63594-7_71","volume-title":"Fault induction attacks, tamper resistance, and hostile reverse engineering in perspective","author":"D. P. Maher","year":"1997","unstructured":"D. P. Maher, \u201cFault induction attacks, tamper resistance, and hostile reverse engineering in perspective\u201d, Proc. of Financial Cryptography, Springer LNCS vol. 1318, pp. 109\u2013121, 1997."},{"key":"20_CR28","volume-title":"Handbook of Applied Cryptography","author":"A. J. Menezes","year":"1997","unstructured":"A. J. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997."},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"D. Naccache, D. M'Raihi, \u201cCryptographic smart cards\u201d, IEEE Micro, pp. 14\u201324, 1996.","DOI":"10.1109\/40.502402"},{"issue":"5","key":"20_CR30","doi-asserted-by":"publisher","first-page":"78","DOI":"10.2307\/3980615","volume":"151","author":"I. Petersen","year":"1997","unstructured":"I. Petersen, \u201cChinks in digital armor-Exploiting faults to break smartcard cryptosystems\u201d, Science News\n                  151(5):78\u201379, 1997.","journal-title":"Science News"},{"key":"20_CR31","unstructured":"T. Rosa, \u201cFuture Cryptography: Standards are not enough\u201d, Proc. of Security and Protection of Information 2001, pp. 237\u2013245, 2001."},{"key":"20_CR32","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"R. Rivest, A. Shamir, L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystems\u201d, Comm. of the ACM\n                  21:120\u2013126, 1978.","journal-title":"Comm. of the ACM"},{"key":"20_CR33","series-title":"Lect Notes Comput Sci","first-page":"200","volume-title":"ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards","author":"D. Samyde","year":"2001","unstructured":"D. Samyde, J.-J. Quisquater, \u201cElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards\u201d, Proc. of Int. Conf. on Research in Smart Cards, E-Smart 2001, Springer LNCS vol. 2140, pp. 200\u2013210, 2001."},{"key":"20_CR34","unstructured":"A. Shamir, \u201cMethod and Apparatus for protecting public key schemes from timing and fault attacks\u201d, U.S. Patent Number 5,991,415, November 1999; also presented at the rump session of EUROCRYPT\u201997."},{"key":"20_CR35","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.-M. Yen","year":"2000","unstructured":"S.-M. Yen, M. Joye, \u201cChecking before output may not be enough against fault-based cryptanalysis\u201d, IEEE Trans. on Computers\n                  49:967\u2013970, 2000.","journal-title":"IEEE Trans. on Computers"},{"key":"20_CR36","series-title":"Lect Notes Comput Sci","first-page":"397","volume-title":"RSA Speedup with Residue Number System immune from Hardware fault cryptanalysis","author":"S.-M. Yen","year":"1998","unstructured":"S.-M. Yen, S.-J. Kim, S.-G. Lim, S.-J. Moon, \u201cRSA Speedup with Residue Number System immune from Hardware fault cryptanalysis\u201d, Proc. of the ICISC 2001, Springer LNCS vol. 2288, pp. 397\u2013413, 2001."},{"key":"20_CR37","series-title":"Lect Notes Comput Sci","first-page":"414","volume-title":"A countermeasure against one physical cryptanalysis may benefit another attack","author":"S.-M. Yen","year":"1997","unstructured":"S.-M. Yen, S.-J. Kim, S.-G. Lim, S.-J. Moon, \u201cA countermeasure against one physical cryptanalysis may benefit another attack\u201d, Proc. of the ICISC 2001, Springer LNCS vol. 2288, pp. 414\u2013427, 2001."},{"key":"20_CR38","unstructured":"Y. Zheng, T. Matsumoto, \u201cBreaking real-world implementations of cryptosystems by manipulating their random number generation\u201d, Proc. of the 1997 Symposium on Cryptography and Information Security, 1997."}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36400-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T10:37:18Z","timestamp":1550918238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36400-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004097","9783540364009"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/3-540-36400-5_20","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}