{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:39:48Z","timestamp":1725518388749},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540858928"},{"type":"electronic","value":"9783540858935"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85893-5_5","type":"book-chapter","created":{"date-parts":[[2008,8,29]],"date-time":"2008-08-29T02:28:18Z","timestamp":1219976898000},"page":"61-73","source":"Crossref","is-referenced-by-count":2,"title":["DSA Signature Scheme Immune to the Fault Cryptanalysis"],"prefix":"10.1007","author":[{"given":"Maciej","family":"Nikodem","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Anderson, R.J., Kuhn, M.G.: Tamper Resistance - a\u00a0Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 18\u201321 (1996)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"C. Aumller","year":"2003","unstructured":"Aumller, C., Bier, P., Fischer, W., Hofreiter, P., Seifert, J.P.: Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 260\u2013275. Springer, Heidelberg (2003)"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BFb0028164","volume-title":"Security Protocols","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T.-H.: Breaking Public Key Cryptosystems on Tamper Resistance Devices in the Presence of Transient Fault. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 115\u2013124. Springer, Heidelberg (1998)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystems. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"5_CR5","first-page":"311","volume-title":"Proc. ACM Computer and Communications Security 2003 (ACM CCS 2003)","author":"J. Blmer","year":"2003","unstructured":"Blmer, J., Otto, M., Seifert, J.-P.: A New CRT-RSA Algorithm Secure Against Bellcore Attacks. In: Proc. ACM Computer and Communications Security 2003 (ACM CCS 2003), pp. 311\u2013320. ACM Press, New York (2003)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"5_CR7","unstructured":"Boneh, D., Venkatesan, R.: Rounding in Lattices and Its Cryptographic Applications. In: SODA: ACM-SIAM Symposium on Discrete Algorithms (A Conference on Theoretical, Experimental Analysis of Discrete Algorithms), pp. 675\u2013681 (1997)"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/11889700_7","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"L. Breveglieri","year":"2006","unstructured":"Breveglieri, L., Koren, I., Maistri, P., Ravasio, M.: Incorporating Error Detection in an RSA Architecture. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 71\u201379. Springer, Heidelberg (2006)"},{"key":"5_CR9","unstructured":"Czapski, M., Nikodem, M.: Error Correction Procedures for Advanced Encryption Standard. In: Int. Workshop on Coding and Cryptography (WCC 2007), April 16-20, 2007, pp. 89\u201398. INRIA (2007)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential Fault Analysis on A.E.S., ArXiv Computer Science e-prints (January 2003)","DOI":"10.1007\/978-3-540-45203-4_23"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1007\/978-3-540-27800-9_41","volume-title":"Information Security and Privacy","author":"C. Giraud","year":"2004","unstructured":"Giraud, C., Knudsen, E.: Fault Attacks on Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 478\u2013491. Springer, Heidelberg (2004)"},{"key":"5_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"Joye, M., Lenstra, A., Quisquater, J.J.: Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology\u00a012, 241\u2013245 (1999)","journal-title":"Journal of Cryptology"},{"key":"5_CR13","first-page":"177","volume-title":"Proceedings of CARDIS 2004","author":"M. Karpovsky","year":"2004","unstructured":"Karpovsky, M., Kulikowski, K.J., Taubin, A.: A Differential Fault Analysis Attack Resistant Architecture of the Advanced Encryption Standard. In: Proceedings of CARDIS 2004, pp. 177\u2013192. Kluwer, Dordrecht (2004)"},{"issue":"12","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1509","DOI":"10.1109\/TCAD.2002.804378","volume":"21","author":"R. Karri","year":"2002","unstructured":"Karri, R., Wu, K., Mishra, P., Kim, Y.: Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. IEEE Trans. on CAD of Integrated Circuits and Systems\u00a021(12), 1509\u20131517 (2002)","journal-title":"IEEE Trans. on CAD of Integrated Circuits and Systems"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-72354-7_18","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"C.-H. Kim","year":"2007","unstructured":"Kim, C.-H., Quisquater, J.-J.: Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 215\u2013228. Springer, Heidelberg (2007)"},{"key":"5_CR16","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors. In: USENIX Workshop on Smartcard Technology - Smartcard 1999, USENIX Association, pp. 9\u201320 (1999)"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30580-4_3","volume-title":"Public Key Cryptography - PKC 2005","author":"D. Naccache","year":"2005","unstructured":"Naccache, D., Nguyen, P.Q., Tunstall, M., Whelan, C.: Experimenting with Faults, Lattices and the DSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 16\u201328. Springer, Heidelberg (2005)"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s00145-002-0021-3","volume":"15","author":"P.Q. Nguyen","year":"2002","unstructured":"Nguyen, P.Q., Shparlinski, I.E.: The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. Journal of Cryptology\u00a015(3), 151\u2013176 (2002)","journal-title":"Journal of Cryptology"},{"key":"5_CR19","unstructured":"Rosa, T.: Lattice-based Fault Attacks on DSA - Another Possible Strategy. In: Proceedings of the conference Security and Protection of Information 2005, Brno, Czech Republic, 3-5 May 2005, pp. 91\u201396 (2005)"},{"issue":"9","key":"5_CR20","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"Yen, S.M., Joye, M.: Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. IEEE Transactions on Computers\u00a049(9), 967\u2013970 (2000)","journal-title":"IEEE Transactions on Computers"},{"issue":"4","key":"5_CR21","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1109\/TC.2003.1190587","volume":"52","author":"S.M. Yen","year":"2003","unstructured":"Yen, S.M., Kim, S., Lim, S., Moon, S.: RSA Speedup with Chinese Remainder Theorem Immune Against Hardware Fault Cryptanalysis. IEEE Transactions on Computers\u00a052(4), 461\u2013472 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/11889700_5","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"S.M. Yen","year":"2006","unstructured":"Yen, S.M., Kim, D., Moon, S.: Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 53\u201361. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85893-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T13:38:28Z","timestamp":1557754708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85893-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540858928","9783540858935"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85893-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}