{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:06:33Z","timestamp":1743026793341,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_4","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"31-45","source":"Crossref","is-referenced-by-count":2,"title":["Manger\u2019s Attack Revisited"],"prefix":"10.1007","author":[{"given":"Falko","family":"Strenzke","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"D. Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS#1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 1\u201312. Springer, Heidelberg (1998)"},{"key":"4_CR2","unstructured":"RSA Data Security, Redwood City, CA: PKCS#1: RSA Encryption Standard, Version 1.5 (1993)"},{"key":"4_CR3","unstructured":"RSA Laboratories, RSA Security Inc., 20 Crosby Drive, Bedford, MA 01730 USA: RSAES-OAEP Encryption Scheme (2000)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/3-540-44647-8_14","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"J. Manger","year":"2001","unstructured":"Manger, J.: A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 230. Springer, Heidelberg (2001)"},{"key":"4_CR5","unstructured":"The Botan Library, \n                    \n                      http:\/\/botan.randombit.net"},{"key":"4_CR6","unstructured":"The OpenSSL Library, \n                    \n                      http:\/\/www.openssl.org"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/11967668_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2007","author":"O. Ac\u0131i\u00e7mez","year":"2006","unstructured":"Ac\u0131i\u00e7mez, O., Ko\u00e7, \u00c7.K., Seifert, J.P.: Predicting secret keys via branch prediction. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol.\u00a04377, pp. 225\u2013242. Springer, Heidelberg (2006)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/11734727_14","volume-title":"Information Security and Cryptology - ICISC 2005","author":"D. Molnar","year":"2006","unstructured":"Molnar, D., Piotrowski, M., Schultz, D., Wagner, D.: The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol.\u00a03935, pp. 156\u2013168. Springer, Heidelberg (2006)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Coppens, B., Verbauwhede, I., Bosschere, K.D., Sutter, B.D.: Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors. In: IEEE Symposium on Security and Privacy, pp. 45\u201360 (2009)","DOI":"10.1109\/SP.2009.19"},{"key":"4_CR10","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smard Cards","author":"S. Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smard Cards. Springer, Heidelberg (2007)"},{"key":"4_CR11","series-title":"LNCS","volume-title":"Post-Quantum Cryptography","author":"F. Strenzke","year":"2008","unstructured":"Strenzke, F., Tews, E., Molter, H.G., Overbeck, R., Shoufan, A.: Side Channels in the McEliece PKC. In: Post-Quantum Cryptography. LNCS. Springer, Heidelberg (2008)"},{"key":"4_CR12","unstructured":"Software Engineering Institute, \n                    \n                      https:\/\/buildsecurityin.us-cert.gov\/bsi-rules\/home\/g1\/771-BSI.html"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"4_CR14","unstructured":"The PolarSSL Library, \n                    \n                      http:\/\/www.polarssl.org\/"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:16:44Z","timestamp":1566764204000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}