{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:07:08Z","timestamp":1725574028962},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220541"},{"type":"electronic","value":"9783540247074"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24707-4_19","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T17:05:36Z","timestamp":1294419936000},"page":"150-158","source":"Crossref","is-referenced-by-count":14,"title":["A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks"],"prefix":"10.1007","author":[{"given":"ChangKyun","family":"Kim","sequence":"first","affiliation":[]},{"given":"JaeCheol","family":"Ha","sequence":"additional","affiliation":[]},{"given":"Sung-Hyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Seokyu","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Sung-Ming","family":"Yen","sequence":"additional","affiliation":[]},{"given":"SangJae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/3-540-36400-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"B. Boer den","year":"2003","unstructured":"den Boer, B., Lemke, K., Wieke, G.: A DPA attack against the modular reduction within a CRT implementation of RSA. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 228\u2013243. Springer, Heidelberg (2003)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Liption, R.J.: One the important of checking cryptographic protocols for faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J. Coron","year":"1999","unstructured":"Coron, J.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"Joye, M., Lenstra, A.K., Quisquater, J.-J.: Chinese remaindering based cryptosystems in the presence of faults. Journal of Cryptology\u00a012(4), 241\u2013245 (1999)","journal-title":"Journal of Cryptology"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"Joye, M., Quisquater, J.-J., Bao, F., Deng, R.H.: RSA-type signatures in the presence of transient faults. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 155\u2013160. Springer, Heidelberg (1997)"},{"key":"19_CR6","unstructured":"Lenstra, A.K.: Memo on RSA signature generation in the presence of faults (September 1996)"},{"key":"19_CR7","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorchot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)"},{"issue":"21","key":"19_CR8","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1049\/el:19820617","volume":"18","author":"J.-J. Quisquater","year":"1982","unstructured":"Quisquater, J.-J., Couvreur, C.: Fast decipherment algorithm for RSA public key cryptosystem. Electronics Letters\u00a018(21), 905\u2013907 (1982)","journal-title":"Electronics Letters"},{"issue":"2","key":"19_CR9","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystem. Commun. of ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. of ACM"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"19_CR11","unstructured":"Shamir, A.: How to check modular exponentiation. Presented at the rump session of EUROCRYPT 1997, Konstanz, Germany (May 1997)"},{"key":"19_CR12","unstructured":"Shamir, A.: Method and apparatus for protecting public key schemes from timing and fault attacks, United States Patent 5991415, November 23 (1999)"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/3-540-45861-1_30","volume-title":"Information Security and Cryptology - ICISC 2001","author":"S.M. Yen","year":"2002","unstructured":"Yen, S.M., Kim, S.J., Lim, S.G., Moon, S.J.: RSA speedup with residue number system immune against hardware fault cryptanalysis. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 397\u2013413. Springer, Heidelberg (2002)"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/3-540-45067-X_25","volume-title":"Information Security and Privacy","author":"S.M. Yen","year":"2003","unstructured":"Yen, S.M., Moon, S.J., Ha, J.C.: Permanent fault attack on the parameters of RSA with CRT. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 285\u2013296. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2004"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24707-4_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T23:26:02Z","timestamp":1558308362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24707-4_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220541","9783540247074"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24707-4_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}