{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:29:51Z","timestamp":1758893391501},"publisher-location":"Berlin, Heidelberg","reference-count":52,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540433194"},{"type":"electronic","value":"9783540458616"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45861-1_31","type":"book-chapter","created":{"date-parts":[[2007,10,28]],"date-time":"2007-10-28T02:40:01Z","timestamp":1193539201000},"page":"414-427","source":"Crossref","is-referenced-by-count":41,"title":["A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack"],"prefix":"10.1007","author":[{"given":"Yen","family":"Sung-Ming","sequence":"first","affiliation":[]},{"given":"Seungjoo","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seongan","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Sangjae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,4,23]]},"reference":[{"issue":"2","key":"31_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman, \u201cA method for obtaining digital signatures and public-key cryptosystem,\u201d Commun. of ACM, vol. 21, no. 2, pp. 120\u2013126, 1978.","journal-title":"Commun. of ACM"},{"issue":"4","key":"31_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"T. ElGamal, \u201cA public key cryptosystem and a signature scheme based on discrete logarithms,\u201d IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469\u2013472, 1985.","journal-title":"IEEE Trans. Inf. Theory"},{"key":"31_CR3","unstructured":"R. Anderson and M. Kuhn, \u201cTamper resistance-a cautionary note,\u201d In Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1\u201311, 1996."},{"key":"31_CR4","unstructured":"R. Anderson and M. Kuhn, \u201cLow cost attacks on tamper resistant devices,\u201d In Preproceedings of the 1997 Security Protocols Workshop, Paris, France, 7\u20139th April 1997."},{"issue":"2","key":"31_CR5","first-page":"203","volume":"46","author":"D. Boneh","year":"1999","unstructured":"D. Boneh, \u201cTwenty years of attacks on the RSA cryptosystem,\u201d Notices of the AMS, vol. 46, no. 2, pp. 203\u2013213, Feb 1999.","journal-title":"Notices of the AMS"},{"key":"31_CR6","unstructured":"Bellcore Press Release, \u201cNew threat model breaks crypto codes,\u201d Sept. 1996, available at URL < http:\/\/www.bellcore.com\/PRESS\/ADVSRY96\/facts.html >."},{"key":"31_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology-EUROCRYPT\u201997","author":"D. Boneh","year":"1997","unstructured":"D. Boneh, R.A. DeMillo, and R.J. Lipton, \u201cOn the importance of checking cryptographic protocols for faults,\u201d In Advances in Cryptology-EUROCRYPT\u201997, LNCS 1233, pp. 37\u201351, Springer-Verlag, 1997."},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"F. Bao, R.H. Deng, Y. Han, A. Jeng, A.D. Narasimbalu, and T. Ngair, \u201cBreaking public key cryptosystems on tamper resistant devices in the presence of transient faults,\u201d In Pre-proceedings of the 1997 Security Protocols Workshop, Paris, France, 1997.","DOI":"10.1007\/BFb0028164"},{"key":"31_CR9","unstructured":"Y. Zheng and T. Matsumoto, \u201cBreaking real-world implementations of cryptosystems by manipulating their random number generation,\u201d In Pre-proceedings of the 1997 Symposium on Cryptography and Information Security, Fukuoka, Japan, 29th January\u20131st February 1997. An earlier version was presented at the rump session of ASIACRYPT\u201996."},{"issue":"5","key":"31_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.2307\/3980615","volume":"151","author":"I. Peterson","year":"1997","unstructured":"I. Peterson, \u201cChinks in digital armor-Exploiting faults to break smart-card cryptosystems,\u201d Science News, vol. 151, no. 5, pp. 78\u201379, 1997.","journal-title":"Science News"},{"key":"31_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"M. Joye, J.-J. Quisquater, F. Bao, and R.H. Deng, \u201cRSA-type signatures in the presence of transient faults,\u201d In Cryptography and Coding, LNCS 1355, pp. 155\u2013160, Springer-Verlag, 1997."},{"key":"31_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/3-540-63594-7_71","volume-title":"Financial Cryptography","author":"D.P. Maher","year":"1997","unstructured":"D.P. Maher, \u201cFault induction attacks, tamper resistance, and hostile reverse engineering in perspective,\u201d In Financial Cryptography, LNCS 1318, pp. 109\u2013121, Springer-Verlag, Berlin, 1997."},{"key":"31_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology-CRYPTO\u201997","author":"E. Biham","year":"1997","unstructured":"E. Biham and A. Shamir, \u201cDifferential fault analysis of secret key cryptosystems,\u201d In Advances in Cryptology-CRYPTO\u201997, LNCS 1294, pp. 513\u2013525, Springer-Verlag, Berlin, 1997."},{"key":"31_CR14","unstructured":"A.K. Lenstra, \u201cMemo on RSA signature generation in the presence of faults,\u201d September 1996."},{"issue":"4","key":"31_CR15","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"M. Joye, A.K. Lenstra, and J.-J. Quisquater, \u201cChinese remaindering based cryptosystems in the presence of faults,\u201d Journal of Cryptology, vol. 12, no. 4, pp. 241\u2013245, 1999.","journal-title":"Journal of Cryptology"},{"key":"31_CR16","unstructured":"M. Joye, F. Koeune, and J.-J. Quisquater, \u201cFurther results on Chinese remaindering,\u201d Tech. Report CG-1997\/1, UCL Crypto Group, Louvain-la-Neuve, March 1997."},{"key":"31_CR17","unstructured":"A. Shamir, \u201cHow to check modular exponentiation,\u201d presented at the rump session of EUROCRYPT\u201997, Konstanz, Germany, 11\u201315th May 1997."},{"key":"31_CR18","first-page":"23","volume":"5991415","author":"A. Shamir","year":"1999","unstructured":"A. Shamir, \u201cMethod and apparatus for protecting public key schemes from timing and fault attacks,\u201d United States Patent 5991415, November 23, 1999.","journal-title":"United States Patent"},{"issue":"9","key":"31_CR19","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"S.M. Yen and M. Joye, \u201cChecking before output may not be enough against faultbased cryptanalysis,\u201d IEEE Trans. on Computers, vol. 49, no. 9, pp. 967\u2013970, Sept. 2000.","journal-title":"IEEE Trans. on Computers"},{"key":"31_CR20","unstructured":"P.J. Smith and M.J.J. Lennon, \u201cLUC: A new public key system,\u201d In Ninth IFIP Symposium on Computer Security, Elsevier Science Publishers, pp. 103\u2013117, 1993."},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"I.F. Blake, G. Seroussi, and N.P. Smart. Elliptic curves in cryptography. vol. 265 of London Mathematical Society Lecture Note Series, Cambridge University Press, 1999.","DOI":"10.1017\/CBO9781107360211"},{"key":"31_CR22","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology-CRYPTO\u201996","author":"P. Kocher","year":"1996","unstructured":"P. Kocher, \u201cTiming attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,\u201d In Advances in Cryptology-CRYPTO\u201996, LNCS 1109, pp. 104\u2013113, Springer-Verlag, 1996."},{"key":"31_CR23","unstructured":"J.F. Dhem, F. Koeune, P.A. Leroux, P. Mestre, J.J. Quisquater, and J.L. Willems, \u201cA practical implementation of the timing attack,\u201d Technical Report CG-1998\/1, UCL Crypto Group, Universit\u00e9 catholique de Louvain, June 1998."},{"key":"31_CR24","unstructured":"J.F. Dhem, F. Koeune, P.A. Leroux, P. Mestre, J.J. Quisquater, and J.L. Willems, \u201cA practical implementation of the timing attack,\u201d In Proceedings of CARDIS\u2019 98-Third Smart Card Research and Advanced Application Conference, UCL, Louvainla-Neuve, Belgium, Sep. 14\u201316, 1998."},{"key":"31_CR25","unstructured":"F. Koeune and J.-J. Quisquater, \u201cA timing attack against Rijndael,\u201d Technical Report CG-1999\/1, Universit\u00e9 catholique de Louvain, June 1999."},{"key":"31_CR26","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/3-540-44499-8_8","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"W. Schindler","year":"2000","unstructured":"W. Schindler, \u201cA timing attack against RSA with the Chinese Remainder Theorem,\u201d In Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS 1965, pp. 109\u2013124, Springer-Verlag, 2000."},{"key":"31_CR27","unstructured":"B.S. Kaliski Jr. and M.J.B. Robshaw, \u201cComments on some new attacks on cryptographic devices,\u201d RSA Laboratories Bulletin, no. 5, July 1997."},{"key":"31_CR28","unstructured":"P. Kocher, J. Jaffe and B. Jun, \u201cIntroduction to differential power analysis and related attacks,\u201d 1998, available at URL < http:\/\/www.cryptography.com\/dpa\/technical >."},{"key":"31_CR29","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"P. Kocher","year":"1999","unstructured":"P. Kocher, J. Jaffe and B. Jun, \u201cDifferential power analysis,\u201d In Advances in Cryptology-CRYPTO\u201999, LNCS 1666, pp. 388\u2013397, Springer-Verlag, 1999."},{"key":"31_CR30","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u2019 99","author":"T.S. Messerges","year":"1999","unstructured":"T.S. Messerges, E.A. Dabbish, and R.H. Sloan, \u201cPower analysis attacks of modular exponentiation in smartcards,\u201d In Cryptographic Hardware and Embedded Systems-CHES\u2019 99, LNCS 1717, pp. 144\u2013157, Springer-Verlag, 1999."},{"key":"31_CR31","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/3-540-44499-8_20","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"C. Clavier","year":"2000","unstructured":"C. Clavier, J.-S. Coron, and N. Dabbous, \u201cDifferential power analysis in the presence of hardware countermeasures,\u201d In Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS 1965, pp. 252\u2013263, Springer-Verlag, 2000."},{"key":"31_CR32","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/3-540-44495-5_16","volume-title":"Advances in Cryptology-INDOCRYPT2000","author":"K. Okeya","year":"2000","unstructured":"K. Okeya and K. Sakurai, \u201cPower analysis breaks elliptic curve cryptosystems even secure against the timing attack,\u201d In Advances in Cryptology-INDOCRYPT2000, LNCS 1977, pp. 178\u2013190, Springer-Verlag, 2000."},{"key":"31_CR33","doi-asserted-by":"crossref","unstructured":"C.D. Walter, \u201cSliding windows succumbs to big mac attack,\u201d In Pre-proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, pp. 291\u2013304, May 13\u201316, 2001.","DOI":"10.1007\/3-540-44709-1_24"},{"key":"31_CR34","doi-asserted-by":"crossref","unstructured":"C. Clavier and M. Joye, \u201cUniversal exponentiation algorithm: A first step towards provable SPA-resistance,\u201d In Pre-proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, pp. 305\u2013314, May 13\u201316, 2001.","DOI":"10.1007\/3-540-44709-1_25"},{"key":"31_CR35","unstructured":"T.S. Messerges, E.A. Dabbish, and R.H. Sloan, \u201cInvestigations of power analysis attacks on smartcards,\u201d In Proceedings of USENIX Workshop on Smartcard Technology, pp. 151\u2013161, May 1999."},{"key":"31_CR36","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-48059-5_15","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u2019 99","author":"L. Goubin","year":"1999","unstructured":"L. Goubin and J. Patarin, \u201cDES and differential power analysis-The duplication method,\u201d In Cryptographic Hardware and Embedded Systems-CHES\u2019 99, LNCS 1717, pp. 158\u2013172, Springer-Verlag, 1999."},{"key":"31_CR37","unstructured":"E. Biham and A. Shamir, \u201cPower analysis of the key scheduling of the AES candidates,\u201d In Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, pp. 115\u2013121, March 1999, available at URL < http:\/\/csrc.nist.gov\/encryption\/aes\/round1\/Conf2\/aes2conf.html >."},{"key":"31_CR38","unstructured":"S. Chari, C.S. Jutla, J.R. Rao, and P. Rohatgi, \u201cA cautionary note regarding evaluation of AES candidates on smart-cards,\u201d In Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, pp. 133\u2013147, March 1999, available at URL < http:\/\/csrc.nist.gov\/encryption\/aes\/round1\/Conf2\/aes2conf.html >."},{"key":"31_CR39","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology-CRYPTO\u201999","author":"S. Chari","year":"1999","unstructured":"S. Chari, C.S. Jutla, J.R. Rao, and P. Rohatgi, \u201cTowards sound approaches to counteract power-analysis attacks,\u201d In Advances in Cryptology-CRYPTO\u201999, LNCS 1666, pp. 398\u2013412, Springer-Verlag, 1999."},{"key":"31_CR40","unstructured":"J. Daemen and V. Rijmen, \u201cResistance against implementation attacks: A comparative study of the AES proposals,\u201d In Proceedings of the Second Advanced Encryption Standard (AES) Candidate Conference, pp. 122\u2013132, March 1999, available at URL < http:\/\/csrc.nist.gov\/encryption\/aes\/round1\/Conf2\/aes2conf.html >."},{"key":"31_CR41","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/3-540-48059-5_16","volume-title":"Cryptographic Hardware and Embedded Systems-CHES\u2019 99","author":"P.N. Fahn","year":"1999","unstructured":"P.N. Fahn and P.K. Pearson, \u201cIPA: A new class of power attacks,\u201d In Cryptographic Hardware and Embedded Systems-CHES\u2019 99, LNCS 1717, pp. 173\u2013186, Springer-Verlag, 1999."},{"key":"31_CR42","series-title":"Lect Notes Comput Sci","volume-title":"Securing the AES finalists against power analysis attacks","author":"T.S. Messerges","year":"2001","unstructured":"T.S. Messerges, \u201cSecuring the AES finalists against power analysis attacks,\u201d In Proceedings of Fast Software Encryption Workshop-FSE 2000, LNCS 1978, Springer-Verlag, 2000."},{"key":"31_CR43","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-44499-8_18","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"J.-S. Coron","year":"2000","unstructured":"J.-S. Coron and L. Goubin, \u201cOn boolean and arithmetic masking against differential power analysis,\u201d In Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS 1965, pp. 231\u2013237, Springer-Verlag, 2000."},{"key":"31_CR44","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/3-540-44499-8_19","volume-title":"Cryptographic Hardware and Embedded Systems-CHES 2000","author":"T.S. Messerges","year":"2000","unstructured":"T.S. Messerges, \u201cUsing second-order power analysis to attack DPA resistant software,\u201d In Cryptographic Hardware and Embedded Systems-CHES 2000, LNCS 1965, pp. 238\u2013251, Springer-Verlag, 2000."},{"key":"31_CR45","doi-asserted-by":"crossref","unstructured":"L. Goubin, \u201cA sound method for switching between boolean and arithmetic masking,\u201d In Pre-proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, pp. 3\u201315, May 13\u201316, 2001.","DOI":"10.1007\/3-540-44709-1_2"},{"key":"31_CR46","doi-asserted-by":"crossref","unstructured":"M. Akkar and C. Giraud, \u201cAn implementation of DES and AES, secure against some attacks,\u201d In Pre-proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES 2001, pp. 315\u2013325, May 13\u201316, 2001.","DOI":"10.1007\/3-540-44709-1_26"},{"key":"31_CR47","unstructured":"A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone. Handbook of applied cryptography. CRC Press, 1997."},{"issue":"5","key":"31_CR48","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TC.1983.1676262","volume":"32","author":"G.R. Blakley","year":"1983","unstructured":"G.R. Blakley, \u201cA computer algorithm for the product AB modulo M,\u201d IEEE Transactions on Computers, vol. 32, no. 5, pp. 497\u2013500, May 1983.","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"31_CR49","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TC.1985.1676574","volume":"34","author":"K.R. Sloan Jr.","year":"1985","unstructured":"K.R. Sloan, Jr., Comments on \u201cA computer algorithm for the product AB modulo M,\u201d IEEE Transactions on Computers, vol. 34, no. 3, pp. 290\u2013292, March 1985.","journal-title":"IEEE Transactions on Computers"},{"key":"31_CR50","unstructured":"\u00c7.K. Ko\u00e7, \u201cRSA hardware implementation,\u201d Technical Report TR 801, RSA Laboratories, Redwood City, April 1996"},{"key":"31_CR51","unstructured":"S.M. Yen and S.Y. Tseng, \u201cDifferential power cryptanalysis of a Rijndael implementation,\u201d LCIS Technical Report TR-2K1-9, Dept. of Computer Science and Information Engineering, National Central University, Taiwan, May 3, 2001."},{"key":"31_CR52","doi-asserted-by":"crossref","unstructured":"M. Joye, J.-J. Quisquater, S.M. Yen, and M. Yung, \u201cObservability analysis-detecting when improved cryptosystems fail,\u201d In Proceedings of the CT-RSA 2002 Conference, 2002. (to appear)","DOI":"10.1007\/3-540-45760-7_2"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2014 ICISC 2001"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45861-1_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T22:29:48Z","timestamp":1556922588000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45861-1_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540433194","9783540458616"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/3-540-45861-1_31","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}