{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:39:26Z","timestamp":1725561566526},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147111"},{"type":"electronic","value":"9783642147128"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14712-8_19","type":"book-chapter","created":{"date-parts":[[2010,7,29]],"date-time":"2010-07-29T05:17:50Z","timestamp":1280380670000},"page":"305-322","source":"Crossref","is-referenced-by-count":13,"title":["Combined Implementation Attack Resistant Exponentiation"],"prefix":"10.1007","author":[{"given":"J\u00f6rn-Marc","family":"Schmidt","sequence":"first","affiliation":[]},{"given":"Michael","family":"Tunstall","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Avanzi","sequence":"additional","affiliation":[]},{"given":"Ilya","family":"Kizhvatov","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Kasper","sequence":"additional","affiliation":[]},{"given":"David","family":"Oswald","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-44709-1_21","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2001","author":"K. Gandolfi","year":"2001","unstructured":"Gandolfi, K., Mourtel, C., Olivier, F.: Electromagnetic analysis: Concrete results. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol.\u00a02162, pp. 251\u2013261. Springer, Heidelberg (2001)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-61996-8","volume-title":"Electronic Commerce","author":"R.J. Anderson","year":"1996","unstructured":"Anderson, R.J., Kuhn, M.G.: Tamper resistance \u2014 a cautionary note. In: Adam, N.R., Yesha, Y. (eds.) Electronic Commerce 1994. LNCS, vol.\u00a01028, pp. 1\u201311. Springer, Heidelberg (1996)"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-36400-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.P. Skorobogatov","year":"2003","unstructured":"Skorobogatov, S.P., Anderson, R.J.: Optical fault induction attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 2\u201312. Springer, Heidelberg (2003)"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-540-72163-5_18","volume-title":"Information Security Practice and Experience","author":"Y.J. Baek","year":"2007","unstructured":"Baek, Y.J., Vasyltsov, I.: How to prevent DPA and fault attack in a unified way for ECC scalar multiplication \u2014 ring extension method. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol.\u00a04464, pp. 225\u2013237. Springer, Heidelberg (2007)"},{"key":"19_CR7","first-page":"21","volume-title":"FDTC 2007","author":"C.H. Kim","year":"2007","unstructured":"Kim, C.H., Quisquater, J.J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.) FDTC 2007, pp. 21\u201329. IEEE Computer Society, Los Alamitos (2007)"},{"key":"19_CR8","first-page":"92","volume-title":"FDTC 2007","author":"F. Amiel","year":"2007","unstructured":"Amiel, F., Villegas, K., Feix, B., Marcel, L.: Passive and active combined attacks: Combining fault attacks and side channel analysis. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.) FDTC 2007, pp. 92\u2013102. IEEE Computer Society, Los Alamitos (2007)"},{"key":"19_CR9","series-title":"Lecture Notes in Computer Science","first-page":"397","volume-title":"Information Security and Cryptology - ICISC 2001","author":"S.M. Yen","year":"2002","unstructured":"Yen, S.M., Kim, S., Lim, S., Moon, S.J.: RSA speedup with residue number system immune against hardware fault cryptanalysis. In: Kim, K. (ed.) ICISC 2001. LNCS, vol.\u00a02288, pp. 397\u2013413. Springer, Heidelberg (2002)"},{"key":"19_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/11889700_18","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"G. Gaubatz","year":"2006","unstructured":"Gaubatz, G., Sunar, B.: Robust finite field arithmetic for fault-tolerant public-key cryptography. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 196\u2013210. Springer, Heidelberg (2006)"},{"issue":"6","key":"19_CR11","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TC.2004.13","volume":"53","author":"B. Chevallier-Mames","year":"2004","unstructured":"Chevallier-Mames, B., Ciet, M., Joye, M.: Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity. IEEE Transactions on Computers\u00a053(6), 760\u2013768 (2004)","journal-title":"IEEE Transactions on Computers"},{"unstructured":"Shamir, A.: Improved method and apparatus for protecting public key schemes from timing and fault attacks. US Patent 5991415 (1999)","key":"19_CR12"},{"key":"19_CR13","volume-title":"Power Analysis Attacks \u2014 Revealing the Secrets of Smart Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks \u2014 Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)"},{"issue":"2","key":"19_CR14","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1109\/JPROC.2005.862424","volume":"94","author":"H. Bar-El","year":"2006","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. Proceedings of the IEEE\u00a094(2), 370\u2013382 (2006)","journal-title":"Proceedings of the IEEE"},{"doi-asserted-by":"crossref","unstructured":"Courr\u00e9ge, J.C., Feix, B., Roussellet, M.: Simple power analysis on exponentiation revisited. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 65\u201379. Springer, Heidelberg (2010)","key":"19_CR15","DOI":"10.1007\/978-3-642-12510-2_6"},{"key":"19_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-77224-8_4","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"D.J. Bernstein","year":"2007","unstructured":"Bernstein, D.J., Lange, T.: Inverted Edwards coordinates. In: Boztas, S., Lu, H. (eds.) AAECC 2007. LNCS, vol.\u00a04851, pp. 20\u201327. Springer, Heidelberg (2007)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-72354-7_18","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"C.H. Kim","year":"2007","unstructured":"Kim, C.H., Quisquater, J.J.: Fault attacks for CRT based RSA: New attacks, new results, and new countermeasures. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J. J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 215\u2013228. Springer, Heidelberg (2007)"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1007\/978-3-642-03944-7_6","volume-title":"WISTP 2009","author":"E. Dottax","year":"2009","unstructured":"Dottax, E., Giraud, C., Rivain, M., Sierra, Y.: On second-order fault analysis resistance for CRT-RSA implementations. In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C.J., Quisquater, J.J. (eds.) WISTP 2009. LNCS, vol.\u00a05746, pp. 68\u201383. Springer, Heidelberg (2009)"},{"doi-asserted-by":"crossref","unstructured":"Rivain, M.: Securing RSA against fault analysis by double addition chain exponentiation. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol.\u00a05473, pp. 459\u2013480. Springer, Heidelberg (2009)","key":"19_CR19","DOI":"10.1007\/978-3-642-00862-7_31"},{"issue":"4","key":"19_CR20","first-page":"241","volume":"12","author":"C. Giraud","year":"2006","unstructured":"Giraud, C.: An RSA implementation resistant to fault attacks and to simple power analysis. IEEE Transactions on Computers\u00a012(4), 241\u2013245 (2006)","journal-title":"IEEE Transactions on Computers"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"M. Joye","year":"2003","unstructured":"Joye, M., Yen, S.M.: The Montgomery powering ladder. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 291\u2013302. Springer, Heidelberg (2003)"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-540-72354-7_19","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"A. Boscher","year":"2007","unstructured":"Boscher, A., Naciri, R., Prouff, E.: CRT RSA algorithm protected against fault attacks. In: Sauveron, D., Markantonakis, C., Bilas, A., Quisquater, J.J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 229\u2013243. Springer, Heidelberg (2007)"},{"key":"19_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/11889700_6","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"G. Fumaroli","year":"2006","unstructured":"Fumaroli, G., Vigilant, D.: Blinded fault resistant exponentiation. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 62\u201370. Springer, Heidelberg (2006)"},{"unstructured":"Proudler, I.K.: Idempotent AN codes. In: IEE Colloquium on Signal Processing Applications of Finite Field Mathematics, pp. 8\/1\u20138\/5. IEEE, Los Alamitos (1989)","key":"19_CR24"},{"key":"19_CR25","first-page":"68","volume-title":"FDTC 2008","author":"M. Medwed","year":"2008","unstructured":"Medwed, M., Schmidt, J.M.: A generic fault countermeasure providing data and program flow integrity. In: Breveglieri, L., Gueron, S., Koren, I., Naccache, D., Seifert, J.P. (eds.) FDTC 2008, pp. 68\u201373. IEEE, Los Alamitos (2008)"},{"doi-asserted-by":"crossref","unstructured":"Smart, N., Oswald, E., Page, D.: Randomised representations. In: IET Proceedings on Information Security, vol.\u00a02(2), pp. 19\u201327 (2008)","key":"19_CR26","DOI":"10.1049\/iet-ifs:20070017"},{"issue":"1","key":"19_CR27","first-page":"15","volume":"19","author":"T. Lange","year":"2004","unstructured":"Lange, T.: Trace zero subvarieties of genus 2 curves for cryptosystems. Journal of the Ramanujan Mathematical Society\u00a019(1), 15\u201333 (2004)","journal-title":"Journal of the Ramanujan Mathematical Society"},{"key":"19_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11889700_4","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"J. Bl\u00f6mer","year":"2006","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.P.: Sign change fault attacks on elliptic curve cryptosystems. In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J. P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 36\u201352. Springer, Heidelberg (2006)"},{"key":"19_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36288-6_15","volume-title":"Public Key Cryptography - PKC 2003","author":"L. Goubin","year":"2002","unstructured":"Goubin, L.: A refined power analysis attack on elliptic curve cryptosystems. In: Desmedt, Y. (ed.) PKC 2003. LNCS, vol.\u00a02567, pp. 199\u2013210. Springer, Heidelberg (2002)"},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"I. Biehl","year":"2000","unstructured":"Biehl, I., Meyer, B., M\u00fcller, V.: Differential fault attacks on elliptic curve cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 131\u2013146. Springer, Heidelberg (2000)"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-540-45238-6_29","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"R.M. Avanzi","year":"2003","unstructured":"Avanzi, R.M.: Countermeasures against differential power analysis for hyperelliptic curves. In: Walter, C., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 77\u201388. Springer, Heidelberg (2003)"},{"key":"19_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/978-3-540-77272-9_12","volume-title":"Cryptography and Coding","author":"O. Acimez","year":"2007","unstructured":"Acimez, O., Gueron, S., Seifert, J.P.: New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol.\u00a04887, pp. 185\u2013203. Springer, Heidelberg (2007)"},{"issue":"2","key":"19_CR33","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1006\/jsco.1993.1012","volume":"15","author":"T. Jebelean","year":"1993","unstructured":"Jebelean, T.: An algorithm for exact division. Journal of Symbolic Computation\u00a015(2), 169\u2013180 (1993)","journal-title":"Journal of Symbolic Computation"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2010"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14712-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T16:49:20Z","timestamp":1558284560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14712-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147111","9783642147128"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14712-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}