{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:32:06Z","timestamp":1758893526095},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1109\/date.2010.5456933","type":"proceedings-article","created":{"date-parts":[[2013,2,19]],"date-time":"2013-02-19T18:16:33Z","timestamp":1361297793000},"source":"Crossref","is-referenced-by-count":49,"title":["Fault-based attack of RSA authentication"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Pellegrini","sequence":"first","affiliation":[]},{"given":"Valeria","family":"Bertacco","sequence":"additional","affiliation":[]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900055"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1201\/9781439821916","article-title":"Handbook of Applied Cryptography","author":"menezes","year":"1996"},{"key":"ref12","article-title":"Digital Integrated Circuits","author":"rabaey","year":"2003"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2008.10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030097"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0028164","article-title":"Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults","author":"bao","year":"1998","journal-title":"Proc of the Workshop on Security Protocols"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_13"},{"key":"ref8","article-title":"Remote timing attacks are practical","author":"brumley","year":"2003","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_3"},{"key":"ref2","article-title":"Fault attacks on RSA with CRT: Concrete results and practical countermeasures","author":"aum\u00fcller","year":"2003","journal-title":"Proc Workshop Cryptographic Hardware Embedded Syst"},{"key":"ref1","year":"0","journal-title":"OpenSSL The Open Source Toolkit for SSL\/TLS"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.1995.479995"}],"event":{"name":"2010 Design, Automation & Test in Europe Conference & Exhibition (DATE 2010)","location":"Dresden","start":{"date-parts":[[2010,3,8]]},"end":{"date-parts":[[2010,3,12]]}},"container-title":["2010 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE 2010)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5450668\/5456897\/05456933.pdf?arnumber=5456933","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T22:19:01Z","timestamp":1562710741000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5456933\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,3]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/date.2010.5456933","relation":{},"subject":[],"published":{"date-parts":[[2010,3]]}}}