{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:33:05Z","timestamp":1725672785247},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642291005"},{"type":"electronic","value":"9783642291012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29101-2_21","type":"book-chapter","created":{"date-parts":[[2012,4,2]],"date-time":"2012-04-02T00:10:23Z","timestamp":1333325423000},"page":"301-318","source":"Crossref","is-referenced-by-count":1,"title":["Structure-Based RSA Fault Attacks"],"prefix":"10.1007","author":[{"given":"Benjamin","family":"Mich\u00e9le","sequence":"first","affiliation":[]},{"given":"Juliane","family":"Kr\u00e4mer","sequence":"additional","affiliation":[]},{"given":"Jean-Pierre","family":"Seifert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Bar-El, H., Choukri, H., Naccache, D., Tunstall, M., Whelan, C.: The sorcerer\u2019s apprentice guide to fault attacks. In: Proceedings of the IEEE 1994, pp. 370\u2013382 (2006)","DOI":"10.1109\/JPROC.2005.862424"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"I. Biehl","year":"2000","unstructured":"Biehl, I., Meyer, B., M\u00fcller, V.: Differential Fault Attacks on Elliptic Curve Cryptosystems. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 131\u2013146. Springer, Heidelberg (2000)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1007\/11894063_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"E. Brier","year":"2006","unstructured":"Brier, E., Chevallier-Mames, B., Ciet, M., Clavier, C.: Why One Should Also Secure RSA Public Key Elements. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 324\u2013338. Springer, Heidelberg (2006)"},{"key":"21_CR4","unstructured":"BT-Vision. STB Software Package (2010), \n                    \n                      http:\/\/ref-bootstrap.nevis.btopenworld.com\/upgrade\/upgrade-files\/005\/Philips_DiT9719_05_L3\/1.6.25077.835\/PKG.DIR"},{"key":"21_CR5","unstructured":"Bushing, Marcan: Console Hacking 2008: Wii Fail (2008), \n                    \n                      http:\/\/events.ccc.de\/congress\/2008\/Fahrplan\/events\/2799.en.html"},{"key":"21_CR6","unstructured":"Chen, S., Xu, J., Sezer, E.C., Gauriar, P., Iyer, R.K.: Non-Control-Data Attacks Are Realistic Threats. In: USENIX Security Symposium, pp. 177\u2013192 (2005)"},{"key":"21_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11889700_1","volume-title":"Fault Diagnosis and Tolerance in Cryptography","author":"S. Gueron","year":"2006","unstructured":"Gueron, S., Seifert, J.-P.: Is It Wise to Publish Your Public RSA Keys? In: Breveglieri, L., Koren, I., Naccache, D., Seifert, J.-P. (eds.) FDTC 2006. LNCS, vol.\u00a04236, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"21_CR8","unstructured":"Huang, A.: Hacking the Xbox. No Starch Press (2003)"},{"key":"21_CR9","unstructured":"Huang, A.: Xbox Hardware Hacking (2003), \n                    \n                      http:\/\/events.ccc.de\/congress\/2003\/fahrplan\/event\/604.en.html"},{"key":"21_CR10","unstructured":"ITU. Abstract Syntax Notation One (ASN.1): Specification of basic notation (ITU-T Recommendation X.680). International Telecommunications Union, Nov. 2208"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Jonsson, J., Kaliski, B.: Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. RFC 3447 (Informational) (February 2003)","DOI":"10.17487\/rfc3447"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/3-540-68697-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"J. Kelsey","year":"1996","unstructured":"Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 237\u2013251. Springer, Heidelberg (1996)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Kleinjung, T., et al.: Factorization of a 768-bit RSA modulus. Cryptology ePrint Archive, 2010\/006","DOI":"10.1007\/978-3-642-14623-7_18"},{"key":"21_CR14","unstructured":"Knuth, D.E.: The Art of Computer Programming, 3rd edn., vol.\u00a02. Addison-Wesley (1997)"},{"key":"21_CR15","series-title":"Lecture Notes in Mathematics","volume-title":"The development of the number field sieve","year":"1993","unstructured":"Lenstra, A.K., Hendrik, J., Lenstra, W. (eds.): The development of the number field sieve. Lecture Notes in Mathematics, vol.\u00a01554. Springer, Berlin (1993)"},{"key":"21_CR16","unstructured":"Leyland, P.: The comp.security.pgp FAQ (1997), \n                    \n                      http:\/\/www.pgp.net\/pgpnet\/pgp-faq\/#KEY-PUBLIC-KEY-FORGERY"},{"key":"21_CR17","unstructured":"Microsoft. Mediaroom, \n                    \n                      http:\/\/www.microsoft.com\/mediaroom\/you\/"},{"key":"21_CR18","unstructured":"MIPS Technologies. MIPS32 Architecture (2008), \n                    \n                      http:\/\/www.mips.com\/products\/architectures\/mips32\/#specifications"},{"key":"21_CR19","unstructured":"Mitre. Common Vulnerabilities and Exposures: CVE-2006-4339, RSA Signature Forgery (2006), \n                    \n                      http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2006-4339"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Muir, J.A.: Seiferts RSA fault attack: Simplified analysis and generalizations. IACR Eprint archive (2005)","DOI":"10.1007\/11935308_30"},{"key":"21_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-30580-4_3","volume-title":"Public Key Cryptography - PKC 2005","author":"D. Naccache","year":"2005","unstructured":"Naccache, D., Nguy\u00ean, P.Q., Tunstall, M., Whelan, C.: Experimenting with Faults, Lattices and the DSA. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol.\u00a03386, pp. 16\u201328. Springer, Heidelberg (2005)"},{"key":"21_CR22","unstructured":"National Institute of Standards and Technology. Secure Hash Standard. Federal Information Processing Standard (FIPS) 180-1 (April 1993)"},{"key":"21_CR23","unstructured":"National Institute of Standards and Technology. NIST\u2019s Policy on Hash Functions (2008), \n                    \n                      http:\/\/csrc.nist.gov\/groups\/ST\/hash\/policy.html"},{"key":"21_CR24","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding Cryptography. A Textbook for Students and Practitioners","author":"C. Paar","year":"2010","unstructured":"Paar, C., Pelzl, J.: Understanding Cryptography. A Textbook for Students and Practitioners. Springer, Heidelberg (2010)"},{"key":"21_CR25","unstructured":"Plenkk. Pkgtool (2010), \n                    \n                      http:\/\/www.t-hack.com\/wiki\/index.php\/Download_Update_Files"},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM\u00a021, 120\u2013126 (1978)","journal-title":"Communications of the ACM"},{"key":"21_CR27","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1145\/1102120.1102138","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005","author":"J.-P. Seifert","year":"2005","unstructured":"Seifert, J.-P.: On authenticated computing and RSA-based authentication. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 122\u2013127. ACM, New York (2005)"},{"key":"21_CR28","unstructured":"Ubiquisys. Residential femtocells, \n                    \n                      http:\/\/www.ubiquisys.com\/residential-3g-femtocells"},{"key":"21_CR29","unstructured":"US-CERT. Vulnerability note vu#748355 (2002), \n                    \n                      http:\/\/www.kb.cert.org\/vuls\/id\/748355"},{"key":"21_CR30","unstructured":"US-CERT. Technical cyber security alert ta04-041a (2004), \n                    \n                      http:\/\/www.us-cert.gov\/cas\/techalerts\/TA04-041A.html"},{"key":"21_CR31","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"X. Wang","year":"2005","unstructured":"Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 17\u201336. Springer, Heidelberg (2005)"},{"key":"21_CR32","unstructured":"Zimmermann, P.: GMP-ECM, \n                    \n                      http:\/\/ecm.gforge.inria.fr\/"},{"key":"21_CR33","unstructured":"Zimmermann, P.: Optimal parameters for ECM, \n                    \n                      http:\/\/www.loria.fr\/~zimmerma\/records\/ecm\/params.html"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29101-2_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:23:37Z","timestamp":1620113017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29101-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642291005","9783642291012"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29101-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}