{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T05:15:56Z","timestamp":1722057356468},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T00:00:00Z","timestamp":1369872000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Cryptogr Eng"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s13389-013-0061-7","type":"journal-article","created":{"date-parts":[[2013,5,29]],"date-time":"2013-05-29T19:50:43Z","timestamp":1369857043000},"page":"227-240","source":"Crossref","is-referenced-by-count":13,"title":["Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks"],"prefix":"10.1007","volume":"3","author":[{"given":"Abdel Alim","family":"Kamal","sequence":"first","affiliation":[]},{"given":"Amr M.","family":"Youssef","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,30]]},"reference":[{"key":"61_CR1","volume-title":"An introduction to mathematical cryptography. Undergraduate texts in mathematics","author":"J Hoffstein","year":"2008","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: An introduction to mathematical cryptography. Undergraduate texts in mathematics. Springer, New York (2008)"},{"key":"61_CR2","doi-asserted-by":"crossref","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: a ring based public key cryptosystem. In: Buhler, J.P. (ed) Algorithmic number theory symposium-ANTS III, vol. 1423, pp. 267\u2013288. Springer, Heidelberg (1998)","DOI":"10.1007\/BFb0054868"},{"issue":"9","key":"61_CR3","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S1353-4858(00)09025-5","volume":"2000","author":"B Kaliski","year":"2000","unstructured":"Kaliski, B.: Considerations for new public-key algorithms. Netw. Secur. 2000(9), 9\u201310 (2000)","journal-title":"Netw. Secur."},{"key":"61_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., DeMillo, R.A., Lipton, R.J.: On the importance of checking cryptographic protocols for faults. In: Fumy, W. (ed) Advances in cryptology-EUROCRYPT\u201997, vol. 1233, pp. 37\u201351. Springer, Heidelberg (1997)","DOI":"10.1007\/3-540-69053-0_4"},{"key":"61_CR5","doi-asserted-by":"crossref","unstructured":"Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B. S. Jr. (ed) Advances in cryptology-CRYPTO\u201997, vol. 1294, pp. 513\u2013525. Springer, Berlin (1997)","DOI":"10.1007\/BFb0052259"},{"key":"61_CR6","doi-asserted-by":"crossref","unstructured":"Hoch, J., Shamir, A.: Fault analysis of stream ciphers. In: Joye, M., Quisquatdr, J.-J. (eds) Cryptographic hardware and embedded systems-CHES\u201904, vol. 3156, pp. 240\u2013253. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-28632-5_18"},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"Biehl, I., Meyer, B., Muller, V.: Differential fault analysis on elliptic curve cryptosystems. In: Bellare, M. (ed) Advances in cryptology-CRYPTO\u201900, vol. 1880, pp. 131\u2013146. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44598-6_8"},{"issue":"2","key":"61_CR8","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s12095-011-0061-3","volume":"4","author":"A Kamal","year":"2012","unstructured":"Kamal, A., Youssef, A.M.: Fault analysis of the NTRUSign digital signature scheme. Cryptogr. Commun. 4(2), 131\u2013144 (2012)","journal-title":"Cryptogr. Commun."},{"issue":"4","key":"61_CR9","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1587\/transfun.E94.A.1156","volume":"E94\u2013A","author":"A Kamal","year":"2011","unstructured":"Kamal, A., Youssef, A.M.: Fault analysis of the NTRUEncrypt cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E94\u2013A(4), 1156\u20131158 (2011)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"61_CR10","unstructured":"Hoffstein, J., Lieman, D., Pipher, J., Silverman, J.H.: NTRU: a public key cryptosystem. Submissions and contributions to IEEE P1363.1, presented at the August 1999 and October 1999 meetings. http:\/\/grouper.ieee.org\/groups\/1363\/lattPK\/submissions\/ntru.pdf"},{"key":"61_CR11","unstructured":"Silverman, J.: Almost inverses and fast NTRU key creation. Report #014, Version 1. http:\/\/www.securityinnovation.com\/uploads\/Crypto\/NTRUTech014.pdf . Accessed Mar 2013"},{"key":"61_CR12","unstructured":"Atici, A.C., Batina, L., Verbauwhede, I.: Power analysis on NTRU implementation for RFIDs: first results. In: RFID security-RFIDSec\u201908, pp. 128\u2013139 (2008)"},{"issue":"1","key":"61_CR13","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1587\/transfun.E93.A.153","volume":"E93\u2013A","author":"M Lee","year":"2010","unstructured":"Lee, M., Song, J., Choi, D., Han, D.: Countermeasures against power analysis attacks for the NTRU public key cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E93\u2013A(1), 153\u2013163 (2010)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"61_CR14","doi-asserted-by":"crossref","unstructured":"Atici, A.C., Batina, L., Fan, J., Verbauwhede, I., Ors, S.B.: Low-cost implementations of NTRU for pervasive security. In: Application-specific systems, architectures and processors-ASAP, pp. 79\u201384 (2008)","DOI":"10.1109\/ASAP.2008.4580158"},{"key":"61_CR15","volume-title":"Fault-tolerant systems","author":"I Koren","year":"2007","unstructured":"Koren, I., Krishna, C.M.: Fault-tolerant systems. Elsevier\/Morgan Kaufmann, Amsterdam (2007)"},{"key":"61_CR16","unstructured":"Wilhelm, K.: Aspects of hardware methodologies for the NTRU public key cryptosystem. Thesis submitted to Rochester institute of technology, Rochester, New York (2008)"},{"key":"61_CR17","unstructured":"Howgrave-Graham, N., Silverman, J., Singer, A., Whyte, W.: NAEP: provable security in the presence of decryption failures. Cryptology ePrint archive. Report 172 (2003)"},{"key":"61_CR18","doi-asserted-by":"crossref","unstructured":"Joye, M.: Protecting RSA against fault attacks: the embedding method. In: 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 41\u201345 (2009)","DOI":"10.1109\/FDTC.2009.32"}],"container-title":["Journal of Cryptographic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0061-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13389-013-0061-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13389-013-0061-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,14]],"date-time":"2019-07-14T07:08:13Z","timestamp":1563088093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13389-013-0061-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,30]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["61"],"URL":"https:\/\/doi.org\/10.1007\/s13389-013-0061-7","relation":{},"ISSN":["2190-8508","2190-8516"],"issn-type":[{"value":"2190-8508","type":"print"},{"value":"2190-8516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,30]]}}}