{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:14:43Z","timestamp":1766268883983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T00:00:00Z","timestamp":1516752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,24]]},"DOI":"10.1145\/3178291.3178294","type":"proceedings-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T13:37:41Z","timestamp":1544103461000},"page":"7-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Exploring the Vulnerability of R-LWE Encryption to Fault Attacks"],"prefix":"10.1145","author":[{"given":"Felipe","family":"Valencia","sequence":"first","affiliation":[{"name":"ALaRI - Universit\u00e0 Della Svizzera Italiana, Switzerland"}]},{"given":"Tobias","family":"Oder","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Tim","family":"G\u00fcneysu","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Francesco","family":"Regazzoni","sequence":"additional","affiliation":[{"name":"ALaRI - Universit\u00e0 Della Svizzera Italiana, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,1,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862424"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2188769"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2899007.2899011"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23141-4_3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2015.2391773"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755753.2755830"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISVC.2010.5656421"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/1-4020-8147-2_11","volume-title":"Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8\/WG8.8 & TC11\/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS)","author":"Giraud Christophe","year":"2004","unstructured":"Christophe Giraud and Hugues Thiebeauld . Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8\/WG8.8 & TC11\/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, France , chapter A Survey on Fault Attacks, pages 159 -- 176 . Springer US , Boston, MA, 2004. Christophe Giraud and Hugues Thiebeauld. Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8\/WG8.8 & TC11\/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications (CARDIS) 22-27 August 2004 Toulouse, France, chapter A Survey on Fault Attacks, pages 159--176. Springer US, Boston, MA, 2004."},{"key":"e_1_3_2_1_11_1","first-page":"111","volume-title":"Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT","author":"Kiss \u00c1gnes","year":"2016","unstructured":"\u00c1gnes Kiss , Juliane Kr\u00e4mer , Pablo Rauzy , and Jean-Pierre Seifert . Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT , pages 111 -- 129 . Springer International Publishing , Cham , 2016 . \u00c1gnes Kiss, Juliane Kr\u00e4mer, Pablo Rauzy, and Jean-Pierre Seifert. Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT, pages 111--129. Springer International Publishing, Cham, 2016."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_33"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2013.9"},{"key":"e_1_3_2_1_15_1","volume-title":"Theoretical Foundations of Practical Information Security, number 08491 in Dagstuhl Seminar Proceedings","author":"Peikert Chris","year":"2009","unstructured":"Chris Peikert . Public-key cryptosystems from the worst-case shortest vector problem . In Ran Canetti, Shafi Goldwasser, G\u00fcnter M\u00fcller, and Rainer Steinwandt, editors, Theoretical Foundations of Practical Information Security, number 08491 in Dagstuhl Seminar Proceedings , Dagstuhl, Germany , 2009 . Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany . Chris Peikert. Public-key cryptosystems from the worst-case shortest vector problem. In Ran Canetti, Shafi Goldwasser, G\u00fcnter M\u00fcller, and Rainer Steinwandt, editors, Theoretical Foundations of Practical Information Security, number 08491 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2009. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11659-4_12"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.07.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48324-4_34"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_21"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2011.13"}],"event":{"name":"CS2 '18: Fifth Workshop on Cryptography and Security in Computing Systems","sponsor":["HiPEAC HiPEAC Network of Excellence"],"location":"Manchester United Kingdom","acronym":"CS2 '18"},"container-title":["Proceedings of the Fifth Workshop on Cryptography and Security in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178291.3178294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3178291.3178294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:23Z","timestamp":1750213583000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3178291.3178294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,24]]},"references-count":22,"alternative-id":["10.1145\/3178291.3178294","10.1145\/3178291"],"URL":"https:\/\/doi.org\/10.1145\/3178291.3178294","relation":{},"subject":[],"published":{"date-parts":[[2018,1,24]]},"assertion":[{"value":"2018-01-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}