{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:59:24Z","timestamp":1725551964523},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642125096"},{"type":"electronic","value":"9783642125102"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12510-2_12","type":"book-chapter","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T19:43:16Z","timestamp":1270842196000},"page":"164-181","source":"Crossref","is-referenced-by-count":5,"title":["Improved Fault Analysis of Signature Schemes"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Giraud","sequence":"first","affiliation":[]},{"given":"Erik W.","family":"Knudsen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Tunstall","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/BFb0028164","volume-title":"Security Protocols","author":"F. Bao","year":"1998","unstructured":"Bao, F., Deng, R., Han, Y., Jeng, A., Narasimhalu, A.D., Ngair, T.-H.: Breaking Public Key Cryptosystems an Tamper Resistance Devices in the Presence of Transient Fault. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 115\u2013124. Springer, Heidelberg (1998)"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The Sorcerer\u2019s Apprentice Guide to Fault Attacks. IEEE\u00a094(2), 370\u2013382 (2006)","journal-title":"IEEE"},{"key":"12_CR3","unstructured":"Bellcore. New Threat Model Breaks Crypto Codes. Press Release (September 1996)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/BFb0052259","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Biham","year":"1997","unstructured":"Biham, E., Shamir, A.: Differential Fault Analysis of Secret Key Cryptosystem. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 513\u2013525. Springer, Heidelberg (1997)"},{"key":"12_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R., Lipton, R.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"12_CR6","unstructured":"Dottax, E.: Fault Attacks on NESSIE Signature and Identification Schemes. Technical report, NESSIE (October 2002)"},{"issue":"4","key":"12_CR7","first-page":"172","volume":"31","author":"T. ElGamal","year":"1985","unstructured":"ElGamal, T.: A Public-Key Cryptosystems and a Signature Scheme based on Discret Logarithms. IEEE Transaction on Information Theory\u00a031(4), 172\u2013469 (1985)","journal-title":"IEEE Transaction on Information Theory"},{"key":"12_CR8","unstructured":"FIPS PUB 186-3. Digital Signature Standard. National Institute of Standards and Technology, Draft (March 2006)"},{"key":"12_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1007\/978-3-540-27800-9_41","volume-title":"Information Security and Privacy","author":"C. Giraud","year":"2004","unstructured":"Giraud, C., Knudsen, E.: Fault Attacks on Signature Schemes. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol.\u00a03108, pp. 478\u2013491. Springer, Heidelberg (2004)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/1-4020-8147-2_11","volume-title":"Smart Card Research and Advanced Applications VI \u2013 CARDIS 2004","author":"C. Giraud","year":"2004","unstructured":"Giraud, C., Thiebeauld, H.: A Survey on Fault Attacks. In: Quisquater, J.-J., Paradinas, P., Deswarte, Y., Kalam, A.E. (eds.) Smart Card Research and Advanced Applications VI \u2013 CARDIS 2004, pp. 159\u2013176. Kluwer Academic Publishers, Dordrecht (2004)"},{"issue":"4","key":"12_CR11","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s001459900055","volume":"12","author":"M. Joye","year":"1999","unstructured":"Joye, M., Lenstra, A., Quisquater, J.-J.: Chinese Remaindering Based Cryptosystems in the Presence of Faults. Journal of Cryptology\u00a012(4), 241\u2013245 (1999)","journal-title":"Journal of Cryptology"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/BFb0024460","volume-title":"Cryptography and Coding","author":"M. Joye","year":"1997","unstructured":"Joye, M., Quisquater, J.-J., Bao, F., Deng, R.: RSA-type Signatures in the Presence of Transient Faults. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol.\u00a01355, pp. 155\u2013160. Springer, Heidelberg (1997)"},{"key":"12_CR13","unstructured":"Lenstra, A.: Memo on RSA Signature Generation in the Presence of Faults. Manuscript (1996)"},{"key":"12_CR14","unstructured":"Lenstra, A., Verheul, E.: An Overview of the XTR Public Key System. In: Alster, K., Urbanowicz, J., Williams, H. (eds.) Public Key Cryptography and Computational Number Theory, de Gruyter, pp. 151\u2013180 (2000)"},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1007\/978-3-540-30580-4_3","volume-title":"Public Key Cryptography - PKC 2005","author":"D. Naccache","year":"2005","unstructured":"Naccache, D., Nguyen, P., Tunstall, M., Whelan, C.: Experimenting with Faults, Lattices and the DSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 16\u201328. Springer, Heidelberg (2005)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Saha, D., Mukhopadhyay, D., RoyChowdhury, D.: A Diagonal Fault Attack on the Advanced Encryption Standard. Cryptology ePrint Archive, Report 2009\/581 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/","DOI":"10.1007\/978-3-642-02384-2_26"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/0-387-34805-0_22","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"C. Schnorr","year":"1990","unstructured":"Schnorr, C.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 239\u2013252. Springer, Heidelberg (1990)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Application"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12510-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T14:12:15Z","timestamp":1558275135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12510-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642125096","9783642125102"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12510-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}