{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:23:30Z","timestamp":1725675810138},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642299117"},{"type":"electronic","value":"9783642299124"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29912-4_9","type":"book-chapter","created":{"date-parts":[[2012,4,19]],"date-time":"2012-04-19T07:19:30Z","timestamp":1334819970000},"page":"105-119","source":"Crossref","is-referenced-by-count":8,"title":["RSA Key Generation: New Attacks"],"prefix":"10.1007","author":[{"given":"Camille","family":"Vuillaume","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Endo","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Wooderson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-04138-9_11","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"T. Finke","year":"2009","unstructured":"Finke, T., Gebhardt, M., Schindler, W.: A New Side-Channel Attack on RSA Prime Generation. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 141\u2013155. Springer, Heidelberg (2009)"},{"key":"9_CR2","unstructured":"Common Criteria Portal: Security Targets of ICs, Smart Cards and Smart Card-Related Devices and Systems, \n                    \n                      http:\/\/www.commoncriteriaportal.org\/products\/\n                    \n                    \n                   (retrieved in December 2011)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO \u201999","author":"P. Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-36400-5_3","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Chari","year":"2003","unstructured":"Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 13\u201328. Springer, Heidelberg (2003)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"D. Boneh","year":"1997","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 37\u201351. Springer, Heidelberg (1997)"},{"key":"9_CR6","unstructured":"Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. In: Public-Key Parameters,\u00a0ch. 4. CRC Press (1996)"},{"issue":"203","key":"9_CR7","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1090\/S0025-5718-1993-1189518-9","volume":"61","author":"I. Damg\u00e5rd","year":"1993","unstructured":"Damg\u00e5rd, I., Landrock, P., Pomerance, C.: Average Case Error Estimates for the Strong Probable Prime Test. Mathematics of Computation\u00a061(203), 177\u2013194 (1993)","journal-title":"Mathematics of Computation"},{"key":"9_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/3-540-57332-1_37","volume-title":"Advances in Cryptology - ASIACRYPT \u201991","author":"J. Brandt","year":"1993","unstructured":"Brandt, J., Damg\u00e5rd, I., Landrock, P.: Speeding up Prime Number Generation. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol.\u00a0739, pp. 440\u2013449. Springer, Heidelberg (1993)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/3-540-48071-4_26","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"J. Brandt","year":"1993","unstructured":"Brandt, J., Damg\u00e5rd, I.B.: On Generation of Probable Primes by Incremental Search. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 358\u2013370. Springer, Heidelberg (1993)"},{"issue":"1","key":"9_CR10","first-page":"9","volume":"3","author":"R.D. Silverman","year":"1997","unstructured":"Silverman, R.D.: Fast Generation of Random, Strong RSA Primes. Cryptobytes\u00a03(1), 9\u201313 (1997)","journal-title":"Cryptobytes"},{"key":"9_CR11","unstructured":"Federal Information Processing Standards: Digital Signature Standard (DSS). FIPS PUB 186-3 (2009)"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/3-540-44499-8_27","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2000","author":"M. Joye","year":"2000","unstructured":"Joye, M., Paillier, P., Vaudenay, S.: Efficient Generation of Prime Numbers. In: Paar, C., Ko\u00e7, \u00c7.K. (eds.) CHES 2000. LNCS, vol.\u00a01965, pp. 340\u2013354. Springer, Heidelberg (2000)"},{"key":"9_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/11894063_13","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"M. Joye","year":"2006","unstructured":"Joye, M., Paillier, P.: Fast Generation of Prime Numbers on Portable Devices: An Update. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol.\u00a04249, pp. 160\u2013173. Springer, Heidelberg (2006)"},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-540-74735-2_30","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2007","author":"C. Clavier","year":"2007","unstructured":"Clavier, C., Coron, J.-S.: On the Implementation of a Fast Prime Generation Algorithm. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol.\u00a04727, pp. 443\u2013449. Springer, Heidelberg (2007)"},{"issue":"9","key":"9_CR15","doi-asserted-by":"publisher","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.-M. Yen","year":"2000","unstructured":"Yen, S.-M., Joye, M.: Checking Before Output Not Be Enough Against Fault-Based Cryptanalysis. IEEE Trans. Computers\u00a049(9), 967\u2013970 (2000)","journal-title":"IEEE Trans. Computers"},{"key":"9_CR16","unstructured":"Riscure. Diode Laser Station DLS 1.0.0714 Datasheet (2011)"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1112\/S0025579300016442","volume":"23","author":"P.X. Gallagher","year":"1976","unstructured":"Gallagher, P.X.: On the Distribution of Primes in Short Intervals. Mathematika\u00a023, 4\u20139 (1976)","journal-title":"Mathematika"}],"container-title":["Lecture Notes in Computer Science","Constructive Side-Channel Analysis and Secure Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29912-4_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:20:39Z","timestamp":1620127239000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29912-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642299117","9783642299124"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29912-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}