{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:00:08Z","timestamp":1761807608840,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T00:00:00Z","timestamp":1287878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,24]]},"DOI":"10.1145\/1873548.1873556","type":"proceedings-article","created":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T13:32:23Z","timestamp":1288618343000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A new CRT-RSA algorithm resistant to powerful fault attacks"],"prefix":"10.1145","author":[{"given":"Nevine","family":"Ebeid","sequence":"first","affiliation":[{"name":"Certicom Corp., Mississauga, Ontario, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rob","family":"Lambert","sequence":"additional","affiliation":[{"name":"Certicom Corp., Mississauga, Ontario, Canada"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,10,24]]},"reference":[{"volume-title":"February 13, 2007.","author":"Antipa A.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","series-title":"LNCS","first-page":"260","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '02","author":"Aum\u00fcller C.","year":"2002"},{"key":"e_1_3_2_1_3_1","first-page":"330","volume-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC '04 in association with the International Conference on Dependable Systems and Networks - DSN '04","author":"H.","year":"2004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948151"},{"key":"e_1_3_2_1_7_1","first-page":"37","volume-title":"Advances in Cryptology -- EUROCRYPT '97","author":"Boneh D.","year":"1997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001450010016"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2009.31"},{"key":"e_1_3_2_1_10_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/978-3-540-72354-7_19","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems -- WISTP '07","author":"Boscher A.","year":"2007"},{"key":"e_1_3_2_1_11_1","first-page":"124","volume-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography -- FDTC '05","author":"Ciet M.","year":"2005"},{"key":"e_1_3_2_1_12_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '99","author":"Coron J.-S.","year":"1999"},{"key":"e_1_3_2_1_13_1","series-title":"LNCS","first-page":"228","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '02","author":"den Boer B.","year":"2002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889700_6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEC.1959.5219515"},{"key":"e_1_3_2_1_16_1","first-page":"142","volume-title":"Workshop on Fault Diagnosis and Tolerance in Cryptography -- FDTC '05","author":"Giraud C.","year":"2005"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.135"},{"key":"e_1_3_2_1_18_1","first-page":"227","volume-title":"Cryptology and Network Security -- CNS '01","author":"Joye M.","year":"2001"},{"key":"e_1_3_2_1_19_1","series-title":"LNCS","first-page":"291","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '02","author":"Joye M.","year":"2002"},{"key":"e_1_3_2_1_20_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1007\/978-3-540-72354-7_18","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems -- WISTP '07","author":"Kim C. H.","year":"2007"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2007.8"},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","volume-title":"Advances in Cryptology -- CRYPTO '99","author":"Kocher P.","year":"1999"},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/3-540-48059-5_14","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '99","author":"Messerges T. S.","year":"1999"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:19820617"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"109","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '00","author":"Schindler W.","year":"2000"},{"volume-title":"November 23, 1999. Presented earlier at the rump session of EUROCRYPT '97","author":"Shamir A.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","series-title":"LNCS","first-page":"130","volume-title":"Cryptographic Hardware and Embedded Systems -- CHES '08","author":"Vigilant D.","year":"2008"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030097"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.869328"},{"key":"e_1_3_2_1_31_1","first-page":"397","volume-title":"Information Security and Cryptology -- ICISC '01","author":"Yen S.-M.","year":"2001"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1190587"}],"event":{"name":"ESWeek '10: Sixth Embedded Systems Week","sponsor":["CEDA Council on Electronic Design Automation","SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CS"],"location":"Scottsdale Arizona","acronym":"ESWeek '10"},"container-title":["Proceedings of the 5th Workshop on Embedded Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873548.1873556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1873548.1873556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:33Z","timestamp":1750249053000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873548.1873556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,24]]},"references-count":32,"alternative-id":["10.1145\/1873548.1873556","10.1145\/1873548"],"URL":"https:\/\/doi.org\/10.1145\/1873548.1873556","relation":{},"subject":[],"published":{"date-parts":[[2010,10,24]]},"assertion":[{"value":"2010-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}