{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T18:02:03Z","timestamp":1746640923431},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385186"},{"type":"electronic","value":"9783642385193"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38519-3_1","type":"book-chapter","created":{"date-parts":[[2013,5,2]],"date-time":"2013-05-02T03:59:28Z","timestamp":1367467168000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["On the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown"],"prefix":"10.1007","author":[{"given":"Lidong","family":"Han","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Mingjie","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s001450010016","volume":"14","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. Journal of Cryptology\u00a014(2), 101\u2013119 (2001)","journal-title":"Journal of Cryptology"},{"key":"1_CR2","unstructured":"Cohn, H., Heninger, N.: Approximate Common Divisiors Via Lattices. Cryptology ePrint Archive, Report 2011\/437, \n                  \n                    http:\/\/eprint.iacr.org\/2011\/437"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s001459900030","volume":"10","author":"D. Coppersmith","year":"1997","unstructured":"Coppersmith, D.: Small Solutions to Polynomial Equations, and Low Exponent Vulnerabilities. Journal of Cryptology\u00a010(4), 233\u2013260 (1997)","journal-title":"Journal of Cryptology"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-642-04138-9_31","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2009","author":"J.-S. Coron","year":"2009","unstructured":"Coron, J.-S., Joux, A., Kizhvatov, I., Naccache, D., Paillier, P.: Fault Attacks on RSA Signatures with Partially Unknown Messages. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol.\u00a05747, pp. 444\u2013456. Springer, Heidelberg (2009), Full version: \n                  \n                    eprint.iacr.org\/2009\/309"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-11925-5_15","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"J.-S. Coron","year":"2010","unstructured":"Coron, J.-S., Naccache, D., Tibouchi, M.: Fault Attacks Against emv Signatures. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol.\u00a05985, pp. 208\u2013220. Springer, Heidelberg (2010)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/978-3-642-03356-8_25","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"J.-S. Coron","year":"2009","unstructured":"Coron, J.-S., Naccache, D., Tibouchi, M., Weinmann, R.-P.: Practical Cryptanalysis of iso\/iec 9796-2 and emv Signatures. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 428\u2013444. Springer, Heidelberg (2009)"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/11935230_18","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"E. Jochemsz","year":"2006","unstructured":"Jochemsz, E., May, A.: A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 267\u2013282. Springer, Heidelberg (2006)"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-44670-2_6","volume-title":"Cryptography and Lattices","author":"N. Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham, N.: Approximate integer common divisors. In: Silverman, J.H. (ed.) CaLC 2001. LNCS, vol.\u00a02146, pp. 51\u201366. Springer, Heidelberg (2001)"},{"key":"1_CR9","unstructured":"ISO\/IEC 9796-2, Information Technology-Security Techniques-Digital Signature Schemes Giving Message Recovery-Part 2: Mechanisms Using a Hash-Funcion (1997)"},{"key":"1_CR10","unstructured":"ISO\/IEC 9796-2: 2002 Information Technology-Security Techniques-Digital Signature Schemes Giving Message Recovery-Part 2: Integer Factorization Based Mechanisms (2002)"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/BF01457454","volume":"261","author":"A. Lenstra","year":"1982","unstructured":"Lenstra, A., Lenstra Jr., H., Lov\u00e1sz, L.: Factoring Polynomials with Rational Coefficients. Mathematische Annalen\u00a0261, 513\u2013534 (1982)","journal-title":"Mathematische Annalen"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-48892-8_17","volume-title":"Selected Areas in Cryptography","author":"P. Nguyen","year":"1999","unstructured":"Nguyen, P., Stern, J.: Cryptanalysis of a fast public key cryptosystem presented at SAC \u201997. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol.\u00a01556, pp. 213\u2013218. Springer, Heidelberg (1999)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM, 120\u2013126 (1978)","DOI":"10.1145\/359340.359342"},{"key":"1_CR14","unstructured":"Shoup, V.: Number Theory C++ Library (NTL) version version 5.5.2, \n                  \n                    http:\/\/www.shoup.net\/ntl\/"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38519-3_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T15:12:35Z","timestamp":1557673955000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38519-3_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385186","9783642385193"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38519-3_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}