{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:46:45Z","timestamp":1725493605752},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540433194"},{"type":"electronic","value":"9783540458616"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45861-1_30","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T02:40:01Z","timestamp":1193539201000},"page":"397-413","source":"Crossref","is-referenced-by-count":15,"title":["RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Yen","family":"Sung-Ming","sequence":"first","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seongan","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Sangjae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,23]]},"reference":[{"issue":"2","key":"30_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystem,\u201d Commun. of ACM, vol. 21, no. 2, pp. 120\u2013126, 1978.","journal-title":"Commun. of ACM"},{"issue":"4","key":"30_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469\u2013472, 1985.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"30_CR3","unstructured":"R. Anderson and M. Kuhn, \u201cTamper resistance-a cautionary note,\u201d In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1\u201311, 1996."},{"key":"30_CR4","unstructured":"R. Anderson and M. Kuhn, \u201cLow cost attacks on tamper resistant devices,\u201d In Preproceedings of the 1997 Security Protocols Workshop, Paris, France, 7\u20139th April 1997."},{"key":"30_CR5","unstructured":"Bellcore Press Release, \u201cNew threat model breaks crypto codes,\u201d Sept. 1996, available at URL < http:\/\/www.bellcore.com\/PRESS\/ADVSRY96\/facts.html >."},{"key":"30_CR6","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology-EUROCRYPT\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton, \u201cOn the importance of checking cryptographic protocols for faults,\u201d In Advances in Cryptology-EUROCRYPT\u201997, LNCS 1233, pp. 37\u201351, Springer-Verlag, 1997."},{"key":"30_CR7","doi-asserted-by":"crossref","unstructured":"F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimbalu, and T. Ngair, \u201cBreaking public key cryptosystems on tamper resistant devices in the presence of transient faults,\u201d In Pre-proceedings of the 1997 Security Protocols Workshop, Paris, France, 1997.","DOI":"10.1007\/BFb0028164"},{"key":"30_CR8","unstructured":"Y. Zheng and T. Matsumoto, \u201cBreaking real-world implementations of cryptosystems by manipulating their random number generation,\u201d In Pre-proceedings of the 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, 29th January\u20131st February 1997. An earlier version was presented at the rump session of ASIACRYPT\u201996."},{"issue":"5","key":"30_CR9","doi-asserted-by":"publisher","first-page":"78","DOI":"10.2307\/3980615","volume":"151","author":"I. Peterson","year":"1997","unstructured":"I. Peterson, \u201cChinks in digital armor-Exploiting faults to break smart-card cryptosystems,\u201d Science News, vol. 151, no. 5, pp. 78\u201379, 1997.","journal-title":"Science News"},{"key":"30_CR10","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, \u201cRSA-type signatures in the presence of transient faults,\u201d In Cryptography and Coding, LNCS 1355, pp. 155\u2013160, Springer-Verlag, 1997."},{"key":"30_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/3-540-63594-7_71","volume-title":"Financial Cryptography","author":"D.P. Maher","year":"1997","unstructured":"D.P. Maher, \u201cFault induction attacks, tamper resistance, and hostile reverse engineering in perspective,\u201d In Financial Cryptography, LNCS 1318, pp. 109\u2013121, Springer-Verlag, Berlin, 1997."},{"key":"30_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology-CRYPTO\u201997","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir, \u201cDifferential fault analysis of secret key cryptosystems,\u201d In Advances in Cryptology-CRYPTO\u201997, LNCS 1294, pp. 513\u2013525, Springer-Verlag, Berlin, 1997."},{"key":"30_CR13","unstructured":"A.K. Lenstra, \u201cMemo on RSA signature generation in the presence of faults,\u201d September 1996."},{"issue":"4","key":"30_CR14","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"M. Joye, A.K. Lenstra, and J.-J. Quisquater, \u201cChinese remaindering based cryptosystems in the presence of faults,\u201d Journal of Cryptology, vol. 12, no. 4, pp. 241\u2013245, 1999.","journal-title":"Journal of Cryptology"},{"key":"30_CR15","unstructured":"M. Joye, F. Koeune, and J.-J. Quisquater, \u201cFurther results on Chinese remaindering,\u201d Tech. Report CG-1997\/1, UCL Crypto Group, Louvain-la-Neuve, March 1997."},{"key":"30_CR16","unstructured":"A. Shamir, \u201cHow to check modular exponentiation,\u201d presented at the rump session of EUROCRYPT\u201997, Konstanz, Germany, 11\u201315th May 1997."},{"key":"30_CR17","first-page":"23","volume":"5991415","author":"A. Shamir","year":"1999","unstructured":"A. Shamir, \u201cMethod and apparatus for protecting public key schemes from timing and fault attacks,\u201d United States Patent 5991415, November 23, 1999.","journal-title":"United States Patent"},{"issue":"9","key":"30_CR18","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"S.M. Yen and M. Joye, \u201cChecking before output may not be enough against faultbased cryptanalysis,\u201d IEEE Trans. on Computers, vol. 49, no. 9, pp. 967\u2013970, Sept. 2000.","journal-title":"IEEE Trans. on Computers"},{"key":"30_CR19","unstructured":"P.J. Smith and M.J.J. Lennon, \u201cLUC: A new public key system,\u201d In Ninth IFIP Symposium on Computer Security, Elsevier Science Publishers, pp. 103\u2013117, 1993."},{"issue":"21","key":"30_CR20","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquater","year":"1982","unstructured":"J.-J. Quisquater and C. Couvreur, \u201cFast decipherment algorithm for RSA publickey cryptosystem,\u201d Electronics Letters, vol. 18, no. 21, pp. 905\u2013907, 1982.","journal-title":"Electronics Letters"},{"key":"30_CR21","unstructured":"A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of applied cryptography. CRC Press, 1997."},{"key":"30_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u201996","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, \u201cTiming attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,\u201d In Advances in Cryptology-CRYPTO\u201996, LNCS 1109, pp. 104\u2013113, Springer-Verlag, 1996."},{"key":"30_CR23","unstructured":"B.S. Kaliski Jr. and M.J.B. Robshaw, \u201cComments on some new attacks on cryptographic devices,\u201d RSA Laboratories Bulletin, no. 5, July 1997."},{"key":"30_CR24","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/3-540-44499-8_8","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"W. Schindler","year":"2000","unstructured":"W. Schindler, \u201cA timing attack against RSA with the Chinese Remainder Theorem,\u201d In Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS 1965, pp. 109\u2013124, Springer-Verlag, 2000."},{"issue":"21","key":"30_CR25","doi-asserted-by":"publisher","first-page":"1831","DOI":"10.1049\/el:19991230","volume":"35","author":"C.D. Walter","year":"1999","unstructured":"C.D. Walter, \u201cMontgomery\u2019s exponentiation needs no final subtractions,\u201d Electronics Letters, vol. 35, no. 21, pp. 1831\u20131832, 1999.","journal-title":"Electronics Letters"},{"key":"30_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/3-540-44499-8_23","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"C. Hachez","year":"2000","unstructured":"C. Hachez and J.-J. Quisquater, \u201cMontgomery exponentiation with no final subtractions: Improved results,\u201d In Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS 1965, pp. 293\u2013301, Springer-Verlag, 2000."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45861-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T22:29:17Z","timestamp":1556922557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45861-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540433194","9783540458616"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/3-540-45861-1_30","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}