{"id":"https://openalex.org/W1494003910","doi":"https://doi.org/10.1007/978-3-642-12510-2_12","title":"Improved Fault Analysis of Signature Schemes","display_name":"Improved Fault Analysis of Signature Schemes","publication_year":2010,"publication_date":"2010-01-01","ids":{"openalex":"https://openalex.org/W1494003910","doi":"https://doi.org/10.1007/978-3-642-12510-2_12","mag":"1494003910"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-642-12510-2_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-12510-2_12","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-12510-2_12.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-12510-2_12.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034963776","display_name":"Christophe Giraud","orcid":"https://orcid.org/0000-0003-4414-1852"},"institutions":[{"id":"https://openalex.org/I87777523","display_name":"Oberthur Technologies (France)","ror":"https://ror.org/039ds3g53","country_code":"FR","type":"company","lineage":["https://openalex.org/I87777523"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Christophe Giraud","raw_affiliation_strings":["Oberthur Technologies, 4, all\u00e9e du doyen Georges Brus, 33 600, Pessac, France"],"affiliations":[{"raw_affiliation_string":"Oberthur Technologies, 4, all\u00e9e du doyen Georges Brus, 33 600, Pessac, France","institution_ids":["https://openalex.org/I87777523"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086549082","display_name":"Erik Woodward Knudsen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Erik W. Knudsen","raw_affiliation_strings":["Alm. Brand, Midtermolen 7, 2100, K\u00f8benhavn \u00d8, Denmark"],"affiliations":[{"raw_affiliation_string":"Alm. Brand, Midtermolen 7, 2100, K\u00f8benhavn \u00d8, Denmark","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005525776","display_name":"Michael Tunstall","orcid":"https://orcid.org/0000-0002-7107-8644"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Tunstall","raw_affiliation_strings":["Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United Kingdom"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Bristol, Merchant Venturers Building, Woodland Road, Bristol, BS8 1UB, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034963776"],"corresponding_institution_ids":["https://openalex.org/I87777523"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.1306,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.77570379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"164","last_page":"181"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.7676265835762024},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.735379695892334},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6857041120529175},{"id":"https://openalex.org/keywords/elliptic-curve-digital-signature-algorithm","display_name":"Elliptic Curve Digital Signature Algorithm","score":0.6411736011505127},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6108035445213318},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6043763160705566},{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5266984105110168},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.480576753616333},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3233734369277954},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3031536936759949},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22792533040046692},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.19989028573036194},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.16262248158454895},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.06942200660705566},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.06365761160850525}],"concepts":[{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.7676265835762024},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.735379695892334},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6857041120529175},{"id":"https://openalex.org/C197966572","wikidata":"https://www.wikidata.org/wiki/Q915079","display_name":"Elliptic Curve Digital Signature Algorithm","level":5,"score":0.6411736011505127},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6108035445213318},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6043763160705566},{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5266984105110168},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.480576753616333},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3233734369277954},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3031536936759949},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22792533040046692},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.19989028573036194},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.16262248158454895},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.06942200660705566},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.06365761160850525},{"id":"https://openalex.org/C165205528","wikidata":"https://www.wikidata.org/wiki/Q83371","display_name":"Seismology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-642-12510-2_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-12510-2_12","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-12510-2_12.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01056107v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01056107","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.164-181, &#x27E8;10.1007/978-3-642-12510-2_12&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/c85a4f47-3c96-400e-9a18-c07e6296d153","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/c85a4f47-3c96-400e-9a18-c07e6296d153","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Giraud, C, Knudsen, E W & Tunstall, M 2010, Improved Fault Analysis of Signature Schemes. in Smart Card Research and Advanced Application - CARDIS 2010. vol. 6035, Springer Berlin Heidelberg, pp. 164-181. < http://www.cs.bris.ac.uk/Publications/pub_master.jsp?id=2001187 >","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"doi:10.1007/978-3-642-12510-2_12","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-642-12510-2_12","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-642-12510-2_12.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G289470146","display_name":"Investigation of Power Analysis Attacks","funder_award_id":"EP/F039638/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1494003910.pdf","grobid_xml":"https://content.openalex.org/works/W1494003910.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1490121172","https://openalex.org/W1524438853","https://openalex.org/W1527059802","https://openalex.org/W1584975026","https://openalex.org/W1587518092","https://openalex.org/W1603501441","https://openalex.org/W1646354800","https://openalex.org/W1768621358","https://openalex.org/W1829732909","https://openalex.org/W1994959057","https://openalex.org/W2108834246","https://openalex.org/W2111725598","https://openalex.org/W2117947592","https://openalex.org/W2125815652","https://openalex.org/W2170489924","https://openalex.org/W2224364690","https://openalex.org/W2478032277","https://openalex.org/W2484860292","https://openalex.org/W2490520464","https://openalex.org/W2493671158","https://openalex.org/W2506201965","https://openalex.org/W3030356974","https://openalex.org/W3035112273"],"related_works":["https://openalex.org/W2357836683","https://openalex.org/W2786261067","https://openalex.org/W2953123926","https://openalex.org/W2884819388","https://openalex.org/W2361840262","https://openalex.org/W2998969597","https://openalex.org/W1993515019","https://openalex.org/W2347653872","https://openalex.org/W2520713489","https://openalex.org/W2223135139"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
