{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T12:06:43Z","timestamp":1759147603349,"version":"3.37.3"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T00:00:00Z","timestamp":1573516800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11265-019-01481-6","type":"journal-article","created":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T08:03:16Z","timestamp":1573545796000},"page":"375-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Secure Modular Division Algorithm Embedding with Error Detection and Low-Area ASIC Implementation"],"prefix":"10.1007","volume":"92","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8247-0000","authenticated-orcid":false,"given":"Xiaoting","family":"Hu","sequence":"first","affiliation":[]},{"given":"Zhongping","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,12]]},"reference":[{"issue":"12","key":"1481_CR1","doi-asserted-by":"publisher","first-page":"2295","DOI":"10.1109\/TVLSI.2012.2231707","volume":"21","author":"D Karaklajic","year":"2013","unstructured":"Karaklajic, D., Schmidt, J. M., & Verbauwhede, I. (2013). Hardware Designer\u2019s guide to fault attacks. IEEE Transactions on Very Large Scale Integration System, 21(12), 2295\u20132306.","journal-title":"IEEE Transactions on Very Large Scale Integration System"},{"key":"1481_CR2","doi-asserted-by":"crossref","unstructured":"Van Woudenberg, J. G. J., & Witteman, M. F., and Menarini, F. (2011). Practical optical fault injection on secure microcontrollers, 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 91\u201399.","DOI":"10.1109\/FDTC.2011.12"},{"key":"1481_CR3","first-page":"407","volume-title":"Electromagnetic attacks and countermeasures","author":"P Rohatgi","year":"2009","unstructured":"Rohatgi, P. (2009). Electromagnetic attacks and countermeasures (pp. 407\u2013430). Berlin: Cryptographic Engineering, Springer-Verlog."},{"key":"1481_CR4","doi-asserted-by":"crossref","unstructured":"Vasselle, A., Thiebeauld, H., Maouhoub, Q., Morisset, A., & Ermeneux, S. (2018). Laser-induced fault injection on smartphone bypassing the secure boot. IEEE Transactions on Computers, 1.","DOI":"10.1109\/TC.2018.2860010"},{"key":"1481_CR5","doi-asserted-by":"crossref","unstructured":"Kong, F., Zhou, D., Jiang, Y., Shang, J., & Yu, J. (2017). Fault attack on an improved CRT- RSA algorithm with the Modulus chaining method, 2017 IEEE International Conference on Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), 1, 866\u2013869.","DOI":"10.1109\/CSE-EUC.2017.174"},{"key":"1481_CR6","doi-asserted-by":"crossref","unstructured":"Selmke B, Heyszl J, Sigl G (2016) Attack on a DFA protected AES by simultaneous laser fault injections, 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 36\u201346.","DOI":"10.1109\/FDTC.2016.16"},{"key":"1481_CR7","doi-asserted-by":"crossref","unstructured":"Tajik, S., Lohrke, H., & Ganji, F., Seifert, J., & Boit, C. (2015) Laser fault attack on physically Unclonable functions, 2015 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 85\u201396.","DOI":"10.1109\/FDTC.2015.19"},{"issue":"11","key":"1481_CR8","doi-asserted-by":"publisher","first-page":"3056","DOI":"10.1109\/JPROC.2012.2188769","volume":"100","author":"A Barenghi","year":"2012","unstructured":"Barenghi, A., Breveglieri, L., Koren, I., & Naccache, D. (2012). Fault injection attacks on cryptographic devices: Theory, practice, and countermeasures. Proceedings of the IEEE, 100(11), 3056\u20133076.","journal-title":"Proceedings of the IEEE"},{"key":"1481_CR9","doi-asserted-by":"crossref","unstructured":"Jeong, K., Lee, Y., Sung, J., & Hong, S. (2011). Fault injection attack on A5\/3. International Symposium on Parallel and Distributed Processing with Applications, 300\u2013303.","DOI":"10.1109\/ISPA.2011.17"},{"key":"1481_CR10","doi-asserted-by":"crossref","unstructured":"Schmidt, J., and Hutter, M., & Plos, T., (2009). Optical Fault Attacks on AES: A Threat in Violet, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography, 13\u201322.","DOI":"10.1109\/FDTC.2009.37"},{"key":"1481_CR11","doi-asserted-by":"crossref","unstructured":"Howe, J., Khalid, A., Martinoli, M., Regazzoni, F., & Oswald, E. (2019). Fault attack countermeasures for error samplers in lattice-based cryptography, 2019 IEEE International Symposium on Circuits and Systems (ISCAS), 1\u20135.","DOI":"10.1109\/ISCAS.2019.8702794"},{"issue":"6","key":"1481_CR12","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/TVLSI.2011.2147340","volume":"20","author":"Z Wang","year":"2012","unstructured":"Wang, Z., Karpovsky, M., & Joshi, A. (2012). Secure multipliers resilient to strong fault injection attacks using multilinear arithmetic codes. IEEE Transactions on Very Large Scale Integration System, 20(6), 1036\u20131048.","journal-title":"IEEE Transactions on Very Large Scale Integration System"},{"issue":"3","key":"1481_CR13","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/TDSC.2008.21","volume":"6","author":"A Dominguez-Oviedo","year":"2009","unstructured":"Dominguez-Oviedo, A., & Hasan, M. A. (2009). Error detection and fault tolerance in ECSM using input randomization. IEEE Transactions on Dependable and Secure Computing, 6(3), 175\u2013187.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1481_CR14","unstructured":"Berzati, A., Canovas, C., & Goubin, L. (2008). In (security) against fault injection attacks for CRT-RSA implementations, FDTC\u201908. 5th workshop, 101\u2013107."},{"key":"1481_CR15","doi-asserted-by":"crossref","unstructured":"Natale, G. D., & Flottes, M. L., and Rouzeyre, B. (2007). An On-Line Fault Detection Scheme for SBoxes in Secure Circuits, 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 57\u201362.","DOI":"10.1109\/IOLTS.2007.16"},{"key":"1481_CR16","doi-asserted-by":"crossref","unstructured":"Karpovsky, M., Kulikowski, K. J., & Taubin, A. (2004). Robust protection against fault- injection attacks on smart cards implementing the advanced encryption standard, 2004 International Conference on Dependable Systems and Networks, 93\u2013101.","DOI":"10.1109\/DSN.2004.1311880"},{"key":"1481_CR17","doi-asserted-by":"crossref","unstructured":"Galbraith, S. D., & Gebregiyorgis, S. W. (2014). Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two, Progress in Cryptology -- INDOCRYPT 2014, 409\u2013427, Springer International Publishing.","DOI":"10.1007\/978-3-319-13039-2_24"},{"issue":"6","key":"1481_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2016.120","volume":"14","author":"N Koblitz","year":"2016","unstructured":"Koblitz, N., & Menezes, A. (2016). A riddle wrapped in an enigma. IEEE Security and Privacy, 14(6), 34\u201342.","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"1481_CR19","first-page":"199","volume":"45","author":"AC Aldaya","year":"2017","unstructured":"Aldaya, A. C., Marquez, R. C., Sarmiento, A. J. C., & Sanchez-Solano, S. (2017). Side-channel analysis of the modular inversion step in the RSA key generation algorithm. Journal of Cryptographic Engineering, 45(2), 199\u2013213.","journal-title":"Journal of Cryptographic Engineering"},{"issue":"4","key":"1481_CR20","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s13389-016-0135-4","volume":"7","author":"AC Aldaya","year":"2017","unstructured":"Aldaya, A. C., Sarmiento, A. J. C., & Sanchez-Solano, S. (2017). SPA vulnerabilities of the binary extended Euclidean algorithm. Journal of Cryptographic Engineering, 7(4), 273\u2013285.","journal-title":"Journal of Cryptographic Engineering"},{"key":"1481_CR21","first-page":"683","volume-title":"Handbook of applied cryptography","author":"S Vanstone","year":"1997","unstructured":"Vanstone, S., Menezes, A., & Oorschot, P. V. (1997). Handbook of applied cryptography (pp. 683\u2013683). Boca Raton: CRC Press."},{"key":"1481_CR22","volume-title":"The art of computer programming, volume 2: Seminumerical algorithms","author":"E Knuth Donald","year":"1997","unstructured":"Knuth Donald, E. (1997). The art of computer programming, volume 2: Seminumerical algorithms. Boston: Addison-Wesley Longman Publishing Co., Inc."},{"key":"1481_CR23","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1016\/0021-9991(67)90047-2","volume":"1","author":"J Stein","year":"1967","unstructured":"Stein, J. (1967). Computational problems associated with Racah algebra. Journal of Computational Physics, 1, 397\u2013405.","journal-title":"Journal of Computational Physics"},{"key":"1481_CR24","unstructured":"Brent, R. P., & Kung, H. T. (1983). Systolic VLSI arrays for linear-time GCD computation, Proc.VLSI\u201983, 145\u2013154."},{"key":"1481_CR25","unstructured":"Takagi, N. (1998). A VLSI algorithm for modular division based on the binary GCD, IEICE Transactions on fundamentals of electronics communications and computer sciences, E81-A, 724-728."},{"key":"1481_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/TC.2005.1","volume":"54","author":"ME Kaihara","year":"2005","unstructured":"Kaihara, M. E., & Takagi, N. (2005). A hardware algorithm for modular multiplication\/division. EEE Trans. Comput., 54, 12\u201321.","journal-title":"EEE Trans. Comput."},{"key":"1481_CR27","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/TC.2007.20","volume":"56","author":"G Chen","year":"2007","unstructured":"Chen, G., Bai, G., & Chen, H. (2007). A new systolic architecture for modular Divsion. IEEE Transactions on Computers, 56, 282\u2013286.","journal-title":"IEEE Transactions on Computers"},{"key":"1481_CR28","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1080\/00207217.2011.567036","volume":"98","author":"C Chen","year":"2011","unstructured":"Chen, C., & Qin, Z. (2011). Efficient algorithm and systolic architecture for modular division. International Journal of Electronics, 98, 813\u2013823.","journal-title":"International Journal of Electronics"},{"key":"1481_CR29","doi-asserted-by":"crossref","unstructured":"Mrabet, A., El-Mrabet, N., Bouallegue, B., Mesnager, S., & Machhout, M. (2017). An efficient and scalable modular inversion\/division for public key cryptosystems, 2017 International Conference on Engineering MIS (ICEMIS), 1\u20136.","DOI":"10.1109\/ICEMIS.2017.8272995"},{"key":"1481_CR30","doi-asserted-by":"crossref","unstructured":"Hossain, M. R., & Hossain, M. S. (2019). Efficient FPGA implementation of modular arithmetic for elliptic curve cryptography, 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), 1\u20136.","DOI":"10.1109\/ECACE.2019.8679419"},{"key":"1481_CR31","doi-asserted-by":"publisher","first-page":"1553","DOI":"10.1109\/TC.2009.62","volume":"58","author":"S Bayat-Sarmadi","year":"2009","unstructured":"Bayat-Sarmadi, S., & Hasan, M. A. (2009). Concurrent error detection in finite-field arithmetic operations using pipelined and systolic architectures. IEEE Transactions on Computers, 58, 1553\u20131567.","journal-title":"IEEE Transactions on Computers"},{"key":"1481_CR32","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TC.2010.33","volume":"59","author":"M Mozaffari Kermani","year":"2010","unstructured":"Mozaffari Kermani, M., & Masolen, A. R. (2010). Concurrent structure-independent fault detection schemes for the advanced encryption standard. IEEE Transactions on Computers, 59, 608\u2013622.","journal-title":"IEEE Transactions on Computers"},{"key":"1481_CR33","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1109\/TVLSI.2013.2260570","volume":"22","author":"M Mozaffari-Kermani","year":"2014","unstructured":"Mozaffari-Kermani, M., Azarderakhsh, R., & Lee, C.-Y. (2014). Reliable concurrent error detection architectures for extended Euclidean-based division over GF(2m). IEEE Transactions on Very Large Scale Integration System, 22, 995\u20131003.","journal-title":"IEEE Transactions on Very Large Scale Integration System"},{"key":"1481_CR34","first-page":"58","volume":"232-246","author":"C-Y Lee","year":"2010","unstructured":"Lee, C.-Y., Che, W.-C., & Lin, J.-M. (2010). Concurrent error detection in multiplexer-based multipliers for Normal basis of GF(2m) using double parity prediction scheme. Journal of Signal Processing Systems, 232-246, 58.","journal-title":"Journal of Signal Processing Systems"},{"key":"1481_CR35","doi-asserted-by":"crossref","unstructured":"Gunnar, G., & Berk, S. (2006). Robust finite field arithmetic for fault-tolerant public-key cryptography, Fault Diagnosis and Tolerance in Cryptography, Third International Workshop (FDTC 2006), 196\u2013210.","DOI":"10.1007\/11889700_18"},{"key":"1481_CR36","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TC.2012.236","volume":"63","author":"K Yumbul","year":"2014","unstructured":"Yumbul, K., Ser Erdem, S., & Savas, E. (2014). On selection of Modulus of quadratic codes for the protection of cryptographic operations against fault attacks. IEEE Transactions on Computers, 63, 1182\u20131196.","journal-title":"IEEE Transactions on Computers"},{"key":"1481_CR37","doi-asserted-by":"publisher","first-page":"1889","DOI":"10.1109\/TVLSI.2014.2356015","volume":"23","author":"Q Yang","year":"2015","unstructured":"Yang, Q., Hu, X., & Qin, Z. (2015). Secure systolic Montgomery modular multiplier over prime fields resilient to fault-injection attacks. IEEE Transactions on Very Large Scale Integration System, 23, 1889\u20131902.","journal-title":"IEEE Transactions on Very Large Scale Integration System"},{"key":"1481_CR38","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/92.820767","volume":"8","author":"W-C Tsai","year":"2000","unstructured":"Tsai, W.-C., Shung, C. B., & Wang, S.-J. (2000). Two systolic architectures for modular multiplication. IEEE Transactions on Very Large Scale Integration System, 8, 103\u2013107.","journal-title":"IEEE Transactions on Very Large Scale Integration System"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01481-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11265-019-01481-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-019-01481-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T22:02:17Z","timestamp":1612303337000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11265-019-01481-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,12]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["1481"],"URL":"https:\/\/doi.org\/10.1007\/s11265-019-01481-6","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"type":"print","value":"1939-8018"},{"type":"electronic","value":"1939-8115"}],"subject":[],"published":{"date-parts":[[2019,11,12]]},"assertion":[{"value":"10 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 August 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 September 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 November 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}