{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,16]],"date-time":"2025-06-16T22:26:46Z","timestamp":1750112806367},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540244547"},{"type":"electronic","value":"9783540305804"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-30580-4_3","type":"book-chapter","created":{"date-parts":[[2010,7,5]],"date-time":"2010-07-05T19:51:09Z","timestamp":1278359469000},"page":"16-28","source":"Crossref","is-referenced-by-count":51,"title":["Experimenting with Faults, Lattices and the DSA"],"prefix":"10.1007","author":[{"given":"David","family":"Naccache","sequence":"first","affiliation":[]},{"given":"Phong Q.","family":"Nguy\u00ean","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Tunstall","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Whelan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BFb0028164","volume-title":"5-th Security Protocols Workshop","author":"F. Bao","year":"1997","unstructured":"Bao, F., Deng, R., Han, Y., Jeng, A., Narasimhalu, A., Hgair, T.: Breaking Public Key Cryptosystems and Tamper Resistant Devices in the Presence of Transient Faults. In: 5-th Security Protocols Workshop. LNCS, vol.\u00a01361, pp. 115\u2013124. Springer, Heidelberg (1997)"},{"key":"3_CR2","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerers Apprentice Guide to Fault Attacks. In: Workshop on Fault Diagnosis and Tolerence in Cryptography in association with DSN 2004 \u2013 The International Conference on Dependable Systems and Networks, pp. 330\u2013342 (2004)"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO 1997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. Journal of Cryptology\u00a014(2), 101\u2013119 (2001)","journal-title":"Journal of Cryptology"},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-68697-5_11","volume-title":"Advances in Cryptology - CRYPTO 1996","author":"D. Boneh","year":"1996","unstructured":"Boneh, D., Venkatesan, R.: Hardness of computing the most significant bits of secret keys in diffie-hellman and related schemes. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 129\u2013142. Springer, Heidelberg (1996)"},{"key":"3_CR6","unstructured":"Dottax, E.: Fault Attacks on NESSIE Signature and Identification Schemes, NESSIE Technical Report (October 2002)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Giraud, C., Knudsen, E.: Fault Attacks on Signature Schemes. In: Workshop on Fault Diagnosis and Tolerence in Cryptography in association with DSN 2004 \u2013 The International Conference on Dependable Systems and Networks (2004)","DOI":"10.1007\/978-3-540-27800-9_41"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/978-3-540-28632-5_18","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J.J. Hoch","year":"2004","unstructured":"Hoch, J.J., Shamir, A.: Fault analysis of stream ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 240\u2013253. Springer, Heidelberg (2004)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1011214926272","volume":"23","author":"N.A. Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham, N.A., Smart, N.P.: Lattice Attacks on Digital Signature Schemes. Design, Codes and Cryptography\u00a023, 283\u2013290 (2001)","journal-title":"Design, Codes and Cryptography"},{"key":"3_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/978-3-540-28632-5_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Joshi","year":"2004","unstructured":"Joshi, N., Wu, K., Karri, R.: Concurrent error detection schemes for involution ciphers. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 400\u2013412. Springer, Heidelberg (2004)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"May, T., Woods, M.: A New Physical Mechanism for Soft Errors in Dynamic Memories. In: Proceedings of the 16-th International Reliability Physics Symposium (April 1978)","DOI":"10.1109\/IRPS.1978.362815"},{"key":"3_CR12","unstructured":"National Institute of Standards and Technology, FIPS PUB 186-2: Digital Signature Standard (2000)"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/978-3-540-24676-3_33","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"P.Q. Nguy\u00ean","year":"2004","unstructured":"Nguy\u00ean, P.Q.: Can we trust cryptographic software? Cryptographic flaws in GNU privacy guard v1.2.3. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 555\u2013570. Springer, Heidelberg (2004)"},{"issue":"3","key":"3_CR14","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s00145-002-0021-3","volume":"15","author":"P.Q. Nguy\u00ean","year":"2002","unstructured":"Nguy\u00ean, P.Q., Shparlinski, I.E.: The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Journal of Cryptology\u00a015(3), 151\u2013176 (2002)","journal-title":"Journal of Cryptology"},{"key":"3_CR15","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1023\/A:1025436905711","volume":"30","author":"P.Q. Nguy\u00ean","year":"2003","unstructured":"Nguy\u00ean, P.Q., Shparlinski, I.E.: The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. Design, Codes and Cryptography\u00a030, 201\u2013217 (2003)","journal-title":"Design, Codes and Cryptography"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/3-540-44670-2_12","volume-title":"Cryptography and Lattices","author":"P.Q. Nguy\u00ean","year":"2001","unstructured":"Nguy\u00ean, P.Q., Stern, J.: The two faces of lattices in cryptology. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol.\u00a02146, pp. 146\u2013180. Springer, Heidelberg (2001)"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/BF01581144","volume":"66","author":"C.P. Schnorr","year":"1994","unstructured":"Schnorr, C.P., Euchner, M.: Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Programming\u00a066, 181\u2013199 (1994)","journal-title":"Math. Programming"},{"key":"3_CR18","unstructured":"Shoup, V.: Number Theory C++ Library (NTL), \n                    \n                      http:\/\/www.shoup.net\/ntl\/"}],"container-title":["Lecture Notes in Computer Science","Public Key Cryptography - PKC 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30580-4_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:31:29Z","timestamp":1620012689000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30580-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540244547","9783540305804"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30580-4_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}