{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:10:31Z","timestamp":1760202631995,"version":"3.40.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T00:00:00Z","timestamp":1325808000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s12095-011-0061-3","type":"journal-article","created":{"date-parts":[[2012,1,6]],"date-time":"2012-01-06T06:49:53Z","timestamp":1325832593000},"page":"131-144","source":"Crossref","is-referenced-by-count":13,"title":["Fault analysis of the NTRUSign digital signature scheme"],"prefix":"10.1007","volume":"4","author":[{"given":"Abdel Alim","family":"Kamal","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,1,6]]},"reference":[{"unstructured":"Hoffstein, J., Graham, N., Pipher, J., Silverman, J., Whyte, W.: NTRUSign: Digital signatures using the NTRU lattice. Draft 2, NTRU Cryptosystem Inc. (2002). Available at: www.sisecure.com\/cryptolab\/pdf\/NTRUSign-preV2.ps","key":"61_CR1"},{"doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Graham, N., Pipher, J., Silverman, J., Whyte, W.: NTRUSign: digital signatures using the NTRU lattice. In: Proc. of CT-RSA\u201903, LNCS 2612, pp. 122\u2013140. Springer (2003)","key":"61_CR2","DOI":"10.1007\/3-540-36563-X_9"},{"doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.: An Introduction to Mathematical Cryptography. Undergraduate Texts in Mathematics. Springer (2008)","key":"61_CR3","DOI":"10.1007\/978-0-387-77993-5_6"},{"unstructured":"Consortium for Efficient Embedded Security. Efficient Embedded Security Standard (EESS)#1: Implementation Aspects of NTRUEncrypt and NTRUSign (2003). Available at http:\/\/grouper.ieee.org\/groups\/1363\/lattPK\/submissions\/EESS1v2.pdf","key":"61_CR4"},{"doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.: NSS: an NTRU lattice-based signature scheme. In: Proc. of EUROCRYPT\u201901, LNCS 2045, pp. 211\u2013228. Springer (2001)","key":"61_CR5","DOI":"10.1007\/3-540-44987-6_14"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C., Jonsson, J., Stern, J., Szydlo, M.: Cryptanalysis of the NTRU signature scheme (NSS) from Eurocrypt 2001. In: Proc. of ASIACRYPT\u201901, LNCS 2248, pp. 1\u201320. Springer (2001)","key":"61_CR6","DOI":"10.1007\/3-540-45682-1_1"},{"doi-asserted-by":"crossref","unstructured":"Gentry, C., Szydlo, M.: Cryptanalysis of the revised NTRU signature scheme. In: Proc. of EUROCRYPT\u201902, LNCS 2332, pp. 299\u2013320. Springer (2002)","key":"61_CR7","DOI":"10.1007\/3-540-46035-7_20"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O., Goldwasser, S., Halevi, S.: Public-key cryptosystems from lattice reduction problems. In: Proc. of CRYPTO\u201997, LNCS 1294, pp. 112\u2013131. Springer (1997)","key":"61_CR8","DOI":"10.1007\/BFb0052231"},{"doi-asserted-by":"crossref","unstructured":"Min, S., Yamamoto, G., Kim, K.: Weak property of malleability in NTRUSign. In: Proc. ACISP\u201904, LNCS 3108, pp. 379\u2013390. Springer (2004)","key":"61_CR9","DOI":"10.1007\/978-3-540-27800-9_33"},{"doi-asserted-by":"crossref","unstructured":"Szydlo, M.: Hypercubic lattice reduction and analysis of GGH and NTRU signatures. In: Proc. of EUROCRYPT\u201903, LNCS 2656, pp. 433\u2013448. Springer (2003)","key":"61_CR10","DOI":"10.1007\/3-540-39200-9_27"},{"doi-asserted-by":"crossref","unstructured":"Nguyen, P., Regev, O.: Learning a parallelepiped: cryptanalysis of GGH and NTRU signatures. In: Proc. of EUROCRYPT\u201906, LNCS 4004, pp. 215\u2013233. Springer (2006)","key":"61_CR11","DOI":"10.1007\/11761679_17"},{"doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Proc. of EUROCRYPT\u201997, LNCS 1233, pp. 37\u201351. Springer, Heidelberg (1997)","key":"61_CR12","DOI":"10.1007\/3-540-69053-0_4"},{"doi-asserted-by":"crossref","unstructured":"Biernat, J., Nikodem, M.: Fault cryptanalysis of ElGamal signature scheme. In: Proc. of EUROCAST\u201905, LNCS 3643, pp. 327\u2013336. Springer (2005)","key":"61_CR13","DOI":"10.1007\/11556985_43"},{"doi-asserted-by":"crossref","unstructured":"Giraud, C., Knudsen, E., Tunstall, M.: Improved fault analysis of signature schemes. In: Proc. of CARDIS\u201910, LNCS 6035, pp. 164\u2013181. Springer (2010)","key":"61_CR14","DOI":"10.1007\/978-3-642-12510-2_12"},{"doi-asserted-by":"crossref","unstructured":"Biehl, I., Meyer, B., Muller, V.: Differential fault analysis on elliptic curve cryptosystems. In: Proc. of CRYPTO\u201900, LNCS 1880, pp. 131\u2013146. Springer (2000)","key":"61_CR15","DOI":"10.1007\/3-540-44598-6_8"},{"doi-asserted-by":"crossref","unstructured":"Seifert, J.: On authenticated computing and RSA-based authentication. In: Proc. of ACM CCS\u201905, pp. 122\u2013127. ACM Press (2005)","key":"61_CR16","DOI":"10.1145\/1102120.1102138"},{"doi-asserted-by":"crossref","unstructured":"Muir, J.: Seifert\u2019s RSA fault attack: simplified analysis and generalizations. In: Proc. of ICICS\u201906, LNCS 4307, pp. 420\u2013434. Springer (2006)","key":"61_CR17","DOI":"10.1007\/11935308_30"},{"doi-asserted-by":"crossref","unstructured":"Brier, E., Chevallier-Mames, B., Ciet, M., Clavier, C.: Why one should also secure RSA public key elements. In: Proc. of CHES\u201906, LNCS 4249, pp. 324\u2013338. Springer (2006)","key":"61_CR18","DOI":"10.1007\/11894063_26"},{"doi-asserted-by":"crossref","unstructured":"Berzati, A., Canovas, C., Goubin, L.: Perturbating RSA public keys: an improved attack. In: Proc. of CHES\u201908, LNCS 5141 , pp. 380\u2013395. Springer (2008)","key":"61_CR19","DOI":"10.1007\/978-3-540-85053-3_24"},{"doi-asserted-by":"crossref","unstructured":"Berzati, A., Canovas, C., Doumas, J., Goubin, L.: Fault attacks on RSA public keys: left-to-right implementations are also vulnerable. In: Proc. of CT-RSA\u201909, LNCS 5473, pp. 414\u2013428. Springer (2009)","key":"61_CR20","DOI":"10.1007\/978-3-642-00862-7_28"},{"doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Proc. of CRYPTO\u201997, LNCS 1294, pp. 513\u2013525. Springer (1997)","key":"61_CR21","DOI":"10.1007\/BFb0052259"},{"doi-asserted-by":"crossref","unstructured":"Dusart, P., Letourneux, G., Vivolo, O.: Differential fault analysis on AES. In: Proc. of ACNS\u201903, LNCS 2846, pp. 293\u2013306. Springer (2003)","key":"61_CR22","DOI":"10.1007\/978-3-540-45203-4_23"},{"doi-asserted-by":"crossref","unstructured":"Hoch, J., Shamir, A.: Fault analysis of stream ciphers. In: Proc. of CHES\u201904, LNCS 3156, pp. 240\u2013253. Springer (2004)","key":"61_CR23","DOI":"10.1007\/978-3-540-28632-5_18"},{"issue":"4","key":"61_CR24","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1587\/transfun.E94.A.1156","volume":"E94-A","author":"A Kamal","year":"2011","unstructured":"Kamal, A., Youssef, A.: Fault analysis of NTRUEncrypt. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E94-A(4), 1156\u20131158 (2011)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Otto, M.: Wagner\u2019s attack on a secure CRT-RSA algorithm reconsidered. In: Proc. of FDTC\u201906, LNCS 4236, pp. 13\u201323. Springer (2006)","key":"61_CR25","DOI":"10.1007\/11889700_2"},{"unstructured":"Shamir, A.: Method and apparatus for protecting public key schemes from timing and fault attacks. United States Patent #5991415, November 23, 1999. Also presented at the rump session of EUROCRYPT\u201997","key":"61_CR26"},{"doi-asserted-by":"crossref","unstructured":"Kim, C., Quisquater, J.: Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures. In: Proc. of WISTP\u201907, LNCS 4462, pp. 215\u2013228. Springer (2007)","key":"61_CR27","DOI":"10.1007\/978-3-540-72354-7_18"},{"issue":"4","key":"61_CR28","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1109\/TC.2003.1190587","volume":"52","author":"S Yen","year":"2003","unstructured":"Yen, S., Kim, S., Lim, S., Moon, S.: RSA speedup with Chinese Remainder Theorem immune against hardware fault cryptanalysis. IEEE Trans. Comput. 52(4), 461\u2013472 (2003)","journal-title":"IEEE Trans. Comput."},{"doi-asserted-by":"crossref","unstructured":"Bl\u00f6mer, J., Otto, M., Seifert, J.: A new CRT-RSA algorithm secure against Bellcore attacks. In: Proc. of CCS\u201903, pp. 311\u2013320 (2003)","key":"61_CR29","DOI":"10.1145\/948148.948151"},{"unstructured":"Ciet, M., Joye, M.: Practical fault countermeasures for Chinese remaindering based RSA. In: Proc. of FDTC\u201905, pp. 124\u2013131 (2005)","key":"61_CR30"},{"doi-asserted-by":"crossref","unstructured":"Driessen, B., Poschmann, A., Paar, C.: Comparison of innovative signature algorithms for WSNs. In: Proc. of WiSec\u201908, pp. 30\u201335. ACM Press (2008)","key":"61_CR31","DOI":"10.1145\/1352533.1352539"},{"doi-asserted-by":"crossref","unstructured":"Skorobogatov, S., Anderson, R.: Optical fault induction attacks. In: Proc. of CHES\u201903, LNCS 2523, pp. 2\u201312. Springer (2003)","key":"61_CR32","DOI":"10.1007\/3-540-36400-5_2"},{"key":"61_CR33","first-page":"1","volume-title":"The LLL Algorithm","author":"J Hoffstein","year":"2010","unstructured":"Hoffstein, J., Howgrave-Graham, N., Pipher, J., Whyte, W.: Practical lattice-based cryptography: NTRUEncrypt and NTRUSign. In: The LLL Algorithm, pp. 1\u201342. Springer, Berlin (2010)"},{"unstructured":"Hoffstein, J., Howgrave-Graham, N., Pipher, J., Silverman, J., Whyte, W.: Performance improvements and a baseline parameter generation algorithm for NTRUSign. In: Workshop on Mathematical Problems and Techniques in Cryptology, Barcelona, Spain (2005)","key":"61_CR34"},{"unstructured":"Silverman, J.: Almost inverses and fast NTRU key creation. NTRU Report 014, NTRU Cryptosystem Inc. (1999). Available at: http:\/\/securityinnovation.com\/cryptolab\/pdf\/NTRUTech014.pdf","key":"61_CR35"},{"unstructured":"Silverman, J.: Invertibility in truncated polynomial rings. NTRU Report 009, NTRU cryptosystem Inc. (1998). Available at: http:\/\/securityinnovation.com\/cryptolab\/pdf\/NTRUTech009.pdf","key":"61_CR36"},{"doi-asserted-by":"crossref","unstructured":"Koren, I., Mani Krishna, C.: Fault-Tolerant Systems. Elsevier\/Morgan Kaufmann (2007)","key":"61_CR37","DOI":"10.1016\/B978-012088525-1\/50007-9"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-011-0061-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-011-0061-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-011-0061-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T01:47:20Z","timestamp":1742262440000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-011-0061-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,6]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["61"],"URL":"https:\/\/doi.org\/10.1007\/s12095-011-0061-3","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2012,1,6]]}}}