{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:16:29Z","timestamp":1648934189982},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2010,9,24]],"date-time":"2010-09-24T00:00:00Z","timestamp":1285286400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1007\/s10207-010-0118-x","type":"journal-article","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T06:57:39Z","timestamp":1285225059000},"page":"363-370","source":"Crossref","is-referenced-by-count":6,"title":["Regular 2 w -ary right-to-left exponentiation algorithm with very efficient DPA and FA countermeasures"],"prefix":"10.1007","volume":"9","author":[{"given":"Yoo-Jin","family":"Baek","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,9,24]]},"reference":[{"key":"118_CR1","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/3-540-36400-5_20","volume":"2523","author":"C. Aum\u00fcller","year":"2002","unstructured":"Aum\u00fcller C., Bier P., Fischer W., Hofreiter P., Seifert J.-P.: Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures, CHES 2002. Lecture Notes in Computer Science 2523, 260\u2013275 (2002)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/3-540-44598-6_8","volume":"1880","author":"I. Biehl","year":"2000","unstructured":"Biehl I., Meyer B., Muller V.: Differential Fault Attacks on Elliptic Curve Cryptosystems, CRYPTO 2000. Lecture Notes in Computer Science 1880, 131\u2013146 (2000)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/3-540-69053-0_4","volume":"1233","author":"D. Boneh","year":"1997","unstructured":"Boneh D., DeMillo R., Lipton R.: On the Importance of Checking Cryptographic Protocols for Faults, EUROCRYPT \u201997. Lecture Notes in Computer Science 1233, 37\u201351 (1997)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR4","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-540-72354-7_19","volume":"4462","author":"A. Boscher","year":"2007","unstructured":"Boscher A., Naciri R., Prouff E.: CRT RSA Algorithm Protected Against Fault Attacks, WISTP 2007. Lecture Notes in Computer Science 4462, 229\u2013243 (2007)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR5","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume":"1717","author":"J. Coron","year":"1999","unstructured":"Coron J.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems, CHES 1999. Lecture Notes in Computer Science 1717, 292\u2013302 (1999)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR6","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/978-3-540-45238-6_21","volume":"2779","author":"P.-A. Fouque","year":"1999","unstructured":"Fouque P.-A., Martinet G., Poupard G.: Attacking Unbalanced RSA-CRT Using SPA, CHES 2003. Lecture Notes in Computer Science 2779, 254\u2013268 (1999)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR7","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/11889700_6","volume":"4236","author":"G. Fumaroli","year":"2006","unstructured":"Fumaroli G., Vigilant D.: Blinded Fault Resistant Exponentiation, FDTC 2006. Lecture Notes in Computer Science 4236, 62\u201370 (2006)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR8","unstructured":"Giraud, C.: Fault resistant RSA implementation. In: Proceedings of 2nd Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2005), pp. 142\u2013151 (2005)"},{"key":"118_CR9","first-page":"99","volume":"153","author":"K. Itoh","year":"2004","unstructured":"Itoh K., Izu T., Takenaka M.: Efficient countermeasures against power analysis for elliptic curve cryptosystems, CARDIS 2004. IFIP Int. Fed. Inf. Process. 153, 99\u2013114 (2004)","journal-title":"IFIP Int. Fed. Inf. Process."},{"key":"118_CR10","doi-asserted-by":"crossref","unstructured":"Joye, M.: Highly Regular m-ary Powering Ladders, Proceedings of Selected Areas in Cryptography 2009 (SAC 2009)","DOI":"10.1007\/978-3-642-05445-7_22"},{"key":"118_CR11","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1007\/978-3-642-02384-2_21","volume":"5580","author":"M. Joye","year":"2009","unstructured":"Joye M., Tunstall M.: Exponent Recoding and Regular Exponentiation Algorithms, AfricaCrypt 2009. Lecture Notes in Computer Science 5580, 334\u2013349 (2009)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR12","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/3-540-36400-5_22","volume":"2523","author":"M. Joye","year":"2003","unstructured":"Joye M., Yen S.: The Montgomery Powering Ladder, CHES 2002. Lecture Notes in Computer Science 2523, 291\u2013302 (2003)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR13","doi-asserted-by":"crossref","unstructured":"Kim, C.H., Quisquater, J.-J.: How can we overcome both side channel analysis and fault attacks on RSA-CRT? In: Proceedings of Fault Diagnosis and Tolerance in Cryptography\u2014FDTC 2007, pp. 21\u201329 (2007)","DOI":"10.1109\/FDTC.2007.11"},{"key":"118_CR14","volume-title":"The Art of Computer Programming, volume 2","author":"D.E. Knuth","year":"1981","unstructured":"Knuth D.E.: The Art of Computer Programming, volume 2. 2nd edn. Addison-Wesley, Reading, MA (1981)","edition":"2"},{"key":"118_CR15","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume":"1109","author":"P.C. Kocher","year":"1996","unstructured":"Kocher P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO \u201996. Lecture Notes in Computer Science 1109, 104\u2013113 (1996)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR16","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume":"1666","author":"P. Kocher","year":"1999","unstructured":"Kocher P., Jaffe J., Jun B.: Differential Power Analysis, CRYPTO \u201999. Lecture Notes in Computer Science 1666, 388\u2013397 (1999)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR17","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes A.J., van Oorschot P.C., Vanstone S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1997)"},{"key":"118_CR18","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume":"1717","author":"T.S. Messerges","year":"1999","unstructured":"Messerges T.S., Dabbish E.A., Sloan R.H.: Power Analysis Attacks of Modular Exponentiation in Smartcards, CHES 1999. Lecture Notes in Computer Science 1717, 144\u2013157 (1999)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR19","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"P. Montgomery","year":"1987","unstructured":"Montgomery P.: Speeding the pollard and elliptic curve methods for factorizations. Math. Comput. 48, 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"118_CR20","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/3-540-45664-3_18","volume":"2274","author":"R. Novak","year":"1999","unstructured":"Novak R.: SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation, PKC 2002. Lecture Notes in Computer Science 2274, 252\u2013268 (1999)","journal-title":"Lecture Notes in Computer Science"},{"key":"118_CR21","unstructured":"Shamir, A.: How to check modular exponentiation, Presented at the Rump Session of EUROCRYPT \u201997"},{"issue":"1","key":"118_CR22","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1137\/0205008","volume":"5","author":"A.C. Yao","year":"1976","unstructured":"Yao A.C.: On the evaluation of powers. SIAM J. Sci. Comput. 5(1), 100\u2013103 (1976)","journal-title":"SIAM J. Sci. Comput."},{"key":"118_CR23","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/12.869328","volume":"49","author":"S.M. Yen","year":"2000","unstructured":"Yen S.M., Joye M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49, 967\u2013970 (2000)","journal-title":"IEEE Trans. Comput."},{"key":"118_CR24","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/TC.2003.1190587","volume":"52","author":"S.M. Yen","year":"2003","unstructured":"Yen S.M., Kim S.J., Lim S.A., Moon S.J.: RSA speedup with Chinese remainder Theorem immune against hardware fault cryptanalysis. IEEE Trans. Comput. 52, 461\u2013472 (2003)","journal-title":"IEEE Trans. Comput."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0118-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-010-0118-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-010-0118-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,5]],"date-time":"2019-06-05T01:03:26Z","timestamp":1559696606000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-010-0118-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9,24]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10]]}},"alternative-id":["118"],"URL":"https:\/\/doi.org\/10.1007\/s10207-010-0118-x","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,9,24]]}}}