{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:45Z","timestamp":1750308405557,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371699","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"123-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Fault-injection Attack and Improvement of a CRT-RSA Exponentiation Algorithm"],"prefix":"10.1145","author":[{"given":"Fanyu","family":"Kong","sequence":"first","affiliation":[{"name":"Institute of Network Security, Shandong University, Jinan, China and Key Lab of Cryptologic Technology and Information Security, Ministry of Education, Jinan, China"}]},{"given":"Guoqiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Beijing Sansec Technology Development Co., Ltd, Beijing, China"}]},{"given":"Huiyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Sansec Technology Development Co., Ltd, Beijing, China"}]},{"given":"Yali","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Network Security, Shandong University, Jinan, China and Key Lab of Cryptologic Technology and Information Security, Ministry of Education, Jinan, China"}]},{"given":"Chengyu","family":"Hu","sequence":"additional","affiliation":[{"name":"Key Lab of Cryptologic Technology and Information Security, Ministry of Education, Jinan, China and School of Cyber Science and Technology, Qingdao, China"}]},{"given":"Dashui","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute of Network Security, Shandong University, Jinan, China and Key Lab of Cryptologic Technology and Information Security, Ministry of Education, Jinan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12095-017-0271-4"},{"key":"e_1_3_2_1_2_1","first-page":"3","author":"Szefer J.","year":"2019","unstructured":"J. Szefer , Survey of Microarchitectural Side and Covert Channels , Attacks, and Defenses , Journal of Hardware and Systems Security , September 2019 , Volume 3 , Issue 3, pp 219--234. J. Szefer, Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses, Journal of Hardware and Systems Security, September 2019, Volume 3, Issue 3, pp 219--234.","journal-title":"Journal of Hardware and Systems Security"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"D.\n      Boneh R.A.\n      DeMillo R.J.\n      Lipton On the importance of checking cryptographic protocols for faults In\n  : Advances in \n  Cryptology - EUROCRYPT\n  ' \n  1997 Lecture Notes in Computer Science\n   vol. \n  1233 pp. \n  37\n  --\n  51 1997.  D. Boneh R.A. DeMillo R.J. Lipton On the importance of checking cryptographic protocols for faults In: Advances in Cryptology - EUROCRYPT' 1997 Lecture Notes in Computer Science vol. 1233 pp. 37--51 1997.","DOI":"10.1007\/3-540-69053-0_4"},{"key":"e_1_3_2_1_4_1","first-page":"991","article-title":"Method and apparatus for protecting public key schemes from timing and fault attacks","volume":"5","author":"Shamir A.","year":"1999","unstructured":"A. Shamir , Method and apparatus for protecting public key schemes from timing and fault attacks . US Patent 5 , 991 , 415, 1999 . A. Shamir, Method and apparatus for protecting public key schemes from timing and fault attacks. US Patent 5, 991, 415, 1999.","journal-title":"US Patent"},{"key":"e_1_3_2_1_5_1","first-page":"227","volume-title":"Proc. of 2001 International Workshop on Cryptology and Network Security","author":"Joye M.","year":"2001","unstructured":"M. Joye , P. Pailler , S.-M. Yen , Secure Evaluation of Modular Functions , In: Proc. of 2001 International Workshop on Cryptology and Network Security , pp. 227 -- 229 , 2001 . M. Joye, P. Pailler, S.-M. Yen, Secure Evaluation of Modular Functions, In: Proc. of 2001 International Workshop on Cryptology and Network Security, pp. 227--229, 2001."},{"key":"e_1_3_2_1_6_1","first-page":"260","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"Aum\u00fcller C.","year":"2002","unstructured":"C. Aum\u00fcller , P. Bier , W. Fischer , P. Hofreiter , J. Seifert , Fault attacks on RSA with CRT: concrete results and practical countermeasures , In: Cryptographic Hardware and Embedded Systems - CHES 2002 , pp. 260 -- 275 , 2002 . C. Aum\u00fcller, P. Bier, W. Fischer, P. Hofreiter, J. Seifert, Fault attacks on RSA with CRT: concrete results and practical countermeasures, In: Cryptographic Hardware and Embedded Systems - CHES 2002, pp. 260--275, 2002."},{"key":"e_1_3_2_1_7_1","first-page":"374","volume-title":"Information Security and Cryptology-ICISC 2002","author":"Yen S.-M.","year":"2002","unstructured":"S.-M. Yen , S. J. Moon , J. Ha, Hardware fault attack on RSA with CRT revisited , In: Information Security and Cryptology-ICISC 2002 , pp. 374 -- 388 , 2002 . S.-M. Yen, S. J. Moon, J. Ha, Hardware fault attack on RSA with CRT revisited, In: Information Security and Cryptology-ICISC 2002, pp. 374--388, 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948151"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030097"},{"key":"e_1_3_2_1_10_1","first-page":"53","volume-title":"Cryptanalysis of two protocols for RSA with CRT based on fault infection","author":"Yen S.-M.","year":"2006","unstructured":"S.-M. Yen , D. Kim , S. Moon , Cryptanalysis of two protocols for RSA with CRT based on fault infection , In : Fault Diagnosis and Tolerance in Cryptography 2006 , pp. 53 -- 61 , 2006. S.-M. Yen, D. Kim, S. Moon, Cryptanalysis of two protocols for RSA with CRT based on fault infection, In: Fault Diagnosis and Tolerance in Cryptography 2006, pp. 53--61, 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.135"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85053-3_9"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4218\/etrij.14.0113.0317"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2349007"},{"key":"e_1_3_2_1_15_1","first-page":"68","volume-title":"Countermeasures against high-order fault-injection attacks on CRT-RSA","author":"Rauzy P.","year":"2014","unstructured":"P. Rauzy , S. Guilley , Countermeasures against high-order fault-injection attacks on CRT-RSA , In : Fault Diagnosis and Tolerance in Cryptography 2014 , pp. 68 -- 82 , 2014. P. Rauzy, S. Guilley, Countermeasures against high-order fault-injection attacks on CRT-RSA, In: Fault Diagnosis and Tolerance in Cryptography 2014, pp. 68--82, 2014."},{"key":"e_1_3_2_1_16_1","first-page":"111","volume-title":"International Workshop on Constructive Side-Channel Analysis and Secure Design","author":"Kr\u00e4mer J.","year":"2016","unstructured":"\u00c1. Kiss, J. Kr\u00e4mer , P. Rauzy , J. P. Seifert, Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT , In: International Workshop on Constructive Side-Channel Analysis and Secure Design , pp. 111 -- 129 , 2016 . \u00c1. Kiss, J. Kr\u00e4mer, P. Rauzy, J. P. Seifert, Algorithmic countermeasures against fault attacks and power analysis for RSA-CRT, In: International Workshop on Constructive Side-Channel Analysis and Secure Design, pp. 111--129, 2016."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2015.1118909"},{"key":"e_1_3_2_1_18_1","volume-title":"the Workshop on Fault Diagnosis & Tolerance in Cryptography, 45--53","author":"Battistello A.","year":"2016","unstructured":"A. Battistello , C. Giraud, Lost in translation: fault analysis of infective security proofs , In: the Workshop on Fault Diagnosis & Tolerance in Cryptography, 45--53 , 2016 . A. Battistello, C. Giraud, Lost in translation: fault analysis of infective security proofs, In: the Workshop on Fault Diagnosis & Tolerance in Cryptography, 45--53, 2016."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSE-EUC.2017.174"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJITST.2018.092140"},{"issue":"1","key":"e_1_3_2_1_21_1","first-page":"30","article-title":"Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem","volume":"5","author":"Kong F.","year":"2019","unstructured":"F. Kong , Y. Qiao , P. Liu , , Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem , Chinese Journal of Network and Information Security , 5 : 1 , 30 -- 36 , 2019 . F. Kong, Y. Qiao, P. Liu, et al., Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem, Chinese Journal of Network and Information Security, 5:1, 30--36, 2019.","journal-title":"Chinese Journal of Network and Information Security"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.05.004"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274728"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371699","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:45:23Z","timestamp":1750268723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371699"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":23,"alternative-id":["10.1145\/3371676.3371699","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371699","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}