{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:23Z","timestamp":1750308203795,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030097","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"92-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Cryptanalysis of a provably secure CRT-RSA algorithm"],"prefix":"10.1145","author":[{"given":"David","family":"Wagner","sequence":"first","affiliation":[{"name":"University of California at Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Tamper resistance---a cautionary note","author":"Anderson R.","year":"1996","unstructured":"R. Anderson , M. Kuhn , \" Tamper resistance---a cautionary note ,\" 2nd USENIX Workshop on Electronic Commerce , pp. 1 -- 11 , 1996 . R. Anderson, M. Kuhn, \"Tamper resistance---a cautionary note,\" 2nd USENIX Workshop on Electronic Commerce, pp.1--11, 1996.","journal-title":"2nd USENIX Workshop on Electronic Commerce"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"R. Anderson M. Kuhn \"Low cost attacks on tamper resistant devices \" 1997 Security Protocols Workshop.   R. Anderson M. Kuhn \"Low cost attacks on tamper resistant devices \" 1997 Security Protocols Workshop.","DOI":"10.1007\/BFb0028165"},{"key":"e_1_3_2_1_3_1","unstructured":"H. Bar-El H. Choukri D. Naccache M. Tunstall C. Whelan \"The sorcerer's apprentice guide to fault attacks \" Workshop on Fault Detection and Tolerance in Cryptography June 2004.  H. Bar-El H. Choukri D. Naccache M. Tunstall C. Whelan \"The sorcerer's apprentice guide to fault attacks \" Workshop on Fault Detection and Tolerance in Cryptography June 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948151"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"D. Boneh R.A. DeMillo R.J. Lipton \"On the importance of checking cryptographic protocols for fault \" EUROCRYPT'97 Springer-Verlag LNCS 1233 pp.37--51 1997.   D. Boneh R.A. DeMillo R.J. Lipton \"On the importance of checking cryptographic protocols for fault \" EUROCRYPT'97 Springer-Verlag LNCS 1233 pp.37--51 1997.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900055"},{"key":"e_1_3_2_1_7_1","unstructured":"A.K. Lenstra \"Memo on RSA signature generation in the presence of faults \" Sept. 1996.  A.K. Lenstra \"Memo on RSA signature generation in the presence of faults \" Sept. 1996."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"key":"e_1_3_2_1_9_1","first-page":"397","volume-title":"ICICS 2001","author":"Yen S.-M.","year":"2002","unstructured":"S.-M. Yen , S. Kim , S. Lim , S. Moon , \" RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis,\" ICICS 2001 , Springer-Verlag, LNCS 2288 , pp. 397 -- 413 , 2002 . S.-M. Yen, S. Kim, S. Lim, S. Moon, \"RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis,\" ICICS 2001, Springer-Verlag, LNCS 2288, pp.397--413, 2002."}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":9,"alternative-id":["10.1145\/1030083.1030097","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030097","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}