{"id":"https://openalex.org/W2117317147","doi":"https://doi.org/10.1109/tc.2003.1190587","title":"RSA speedup with chinese remainder theorem immune against hardware fault cryptanalysis","display_name":"RSA speedup with chinese remainder theorem immune against hardware fault cryptanalysis","publication_year":2003,"publication_date":"2003-04-01","ids":{"openalex":"https://openalex.org/W2117317147","doi":"https://doi.org/10.1109/tc.2003.1190587","mag":"2117317147"},"language":"en","primary_location":{"id":"doi:10.1109/tc.2003.1190587","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2003.1190587","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111969870","display_name":"Sung\u2010Ming Yen","orcid":null},"institutions":[{"id":"https://openalex.org/I22265921","display_name":"National Central University","ror":"https://ror.org/00944ve71","country_code":"TW","type":"education","lineage":["https://openalex.org/I22265921"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Sung-Ming Yen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Central University, Chungli, Taiwan","[Department of Computer Science and Information Engineering, National Central University, Chung Li, Taiwan]"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Central University, Chungli, Taiwan","institution_ids":["https://openalex.org/I22265921"]},{"raw_affiliation_string":"[Department of Computer Science and Information Engineering, National Central University, Chung Li, Taiwan]","institution_ids":["https://openalex.org/I22265921"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011698913","display_name":"Seungjoo Kim","orcid":"https://orcid.org/0000-0002-2157-0403"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seungjoo Kim","raw_affiliation_strings":["Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea","[Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea]"],"affiliations":[{"raw_affiliation_string":"Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea","institution_ids":["https://openalex.org/I4210122441"]},{"raw_affiliation_string":"[Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea]","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000016154","display_name":"Seongan Lim","orcid":"https://orcid.org/0000-0002-1192-6672"},"institutions":[{"id":"https://openalex.org/I4210122441","display_name":"National Information Society Agency","ror":"https://ror.org/02hjfaw18","country_code":"KR","type":"other","lineage":["https://openalex.org/I4210122441"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seongan Lim","raw_affiliation_strings":["Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea","[Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea]"],"affiliations":[{"raw_affiliation_string":"Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea","institution_ids":["https://openalex.org/I4210122441"]},{"raw_affiliation_string":"[Information Security Technology Department, Korea Information Security Agency, Seoul, South Korea]","institution_ids":["https://openalex.org/I4210122441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080850329","display_name":"SangJae Moon","orcid":null},"institutions":[{"id":"https://openalex.org/I31419693","display_name":"Kyungpook National University","ror":"https://ror.org/040c17130","country_code":"KR","type":"education","lineage":["https://openalex.org/I31419693"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sang-Jae Moon","raw_affiliation_strings":["School of Electronic, Electrical, and Computer Engineering, Kyungpook National University, Taegu, South Korea","[School of Electronic, Electrical, and Computer Engineering, Kyungpook National University, Taegu, South Korea]"],"affiliations":[{"raw_affiliation_string":"School of Electronic, Electrical, and Computer Engineering, Kyungpook National University, Taegu, South Korea","institution_ids":["https://openalex.org/I31419693"]},{"raw_affiliation_string":"[School of Electronic, Electrical, and Computer Engineering, Kyungpook National University, Taegu, South Korea]","institution_ids":["https://openalex.org/I31419693"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5111969870"],"corresponding_institution_ids":["https://openalex.org/I22265921"],"apc_list":null,"apc_paid":null,"fwci":7.4874,"has_fulltext":false,"cited_by_count":135,"citation_normalized_percentile":{"value":0.97136599,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"52","issue":"4","first_page":"461","last_page":"472"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7032893896102905},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.701275110244751},{"id":"https://openalex.org/keywords/speedup","display_name":"Speedup","score":0.6862183213233948},{"id":"https://openalex.org/keywords/chinese-remainder-theorem","display_name":"Chinese remainder theorem","score":0.6077616214752197},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.5155458450317383},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.455039918422699},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4433711767196655},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4427487254142761},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4036625921726227},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3890051245689392},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.34609225392341614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1848166286945343},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.10532832145690918}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7032893896102905},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.701275110244751},{"id":"https://openalex.org/C68339613","wikidata":"https://www.wikidata.org/wiki/Q1549489","display_name":"Speedup","level":2,"score":0.6862183213233948},{"id":"https://openalex.org/C151635116","wikidata":"https://www.wikidata.org/wiki/Q193878","display_name":"Chinese remainder theorem","level":2,"score":0.6077616214752197},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.5155458450317383},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.455039918422699},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4433711767196655},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4427487254142761},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4036625921726227},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3890051245689392},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.34609225392341614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1848166286945343},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.10532832145690918}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tc.2003.1190587","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tc.2003.1190587","pdf_url":null,"source":{"id":"https://openalex.org/S157670870","display_name":"IEEE Transactions on Computers","issn_l":"0018-9340","issn":["0018-9340","1557-9956","2326-3814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1484814447","https://openalex.org/W1488605673","https://openalex.org/W1538668796","https://openalex.org/W1571786080","https://openalex.org/W1583816927","https://openalex.org/W1584975026","https://openalex.org/W1587481360","https://openalex.org/W1595231197","https://openalex.org/W1597805936","https://openalex.org/W1613874182","https://openalex.org/W1660562555","https://openalex.org/W1768621358","https://openalex.org/W1829732909","https://openalex.org/W1994959057","https://openalex.org/W1996360405","https://openalex.org/W2045682094","https://openalex.org/W2053464283","https://openalex.org/W2108834246","https://openalex.org/W2128718974","https://openalex.org/W2144952508","https://openalex.org/W2170489924","https://openalex.org/W2245967636","https://openalex.org/W4232836212","https://openalex.org/W4285719527","https://openalex.org/W6635566339"],"related_works":["https://openalex.org/W1907974733","https://openalex.org/W2802560047","https://openalex.org/W2093538406","https://openalex.org/W2026284256","https://openalex.org/W2397489728","https://openalex.org/W1849484603","https://openalex.org/W2102023965","https://openalex.org/W2786560893","https://openalex.org/W2771299629","https://openalex.org/W1996683293"],"abstract_inverted_index":{"This":[0],"article":[1],"considers":[2],"the":[3,71,76,90,108,151,163,189,206,227,237,276,282],"problem":[4],"of":[5,92,118,192,218,278,284],"how":[6],"to":[7,52,89,162,182,244,260,274,310],"prevent":[8],"RSA":[9,38,72],"signature":[10,39,88],"and":[11,31,125,197,236,280,307],"decryption":[12],"computation":[13,63,196],"with":[14,214,265],"a":[15,23,28,60,81,87,93,134,166,215,232,266],"residue":[16],"number":[17],"system":[18,73],"(CRT-based":[19],"approach)":[20,103],"speedup":[21,35],"from":[22,49],"hardware":[24,65,145],"fault":[25,66,97,146,193,198],"cryptanalysis":[26,67,173],"in":[27,107,128],"highly":[29],"reliable":[30],"efficient":[32],"approach.":[33],"CRT-based":[34],"for":[36,226],"an":[37,45,100],"has":[40,250],"been":[41,105],"widely":[42],"adopted":[43],"as":[44],"implementation":[46],"standard":[47],"ranging":[48],"large":[50,267],"servers":[51],"very":[53,116],"tiny":[54],"smart":[55],"IC":[56],"cards.":[57],"However,":[58],"given":[59],"single":[61],"erroneous":[62],"result,":[64],"can":[68,240],"totally":[69],"break":[70],"by":[74,156],"factoring":[75],"public":[77,94,234,268],"modulus.":[78],"Countermeasures":[79],"using":[80,165],"simple":[82,167],"verification":[83,168],"function":[84,169],"(e.g.,":[85,99,174],"raising":[86],"power":[91],"key)":[95],"or":[96,292],"detection":[98],"expanded":[101,152],"modulus":[102,153],"have":[104,241],"reported":[106],"literature;":[109],"however,":[110],"it":[111],"is":[112,160,177],"pointed":[113],"out":[114,312],"that":[115,133,150],"few":[117],"these":[119,129],"existing":[120],"solutions":[121],"are":[122,202,212,224,304],"both":[123],"sound":[124],"efficient.":[126],"Unreasonably,":[127],"methods,":[130],"they":[131],"assume":[132],"comparison":[135],"instruction":[136],"will":[137],"always":[138,296],"be":[139],"fault-free":[140,297],"when":[141,170],"developing":[142,279],"countermeasures":[143],"against":[144],"cryptanalysis.":[147],"Research":[148],"shows":[149],"approach":[154,164],"proposed":[155,238],"Shamir":[157],"(1997,":[158],"1999)":[159],"superior":[161],"another":[171],"physical":[172],"timing":[175],"cryptanalysis)":[176],"considered.":[178],"So,":[179],"we":[180,272],"intend":[181],"improve":[183],"Shamir's":[184,245,254],"method.":[185],"In":[186,299],"this":[187,300],"paper,":[188,301],"new":[190,207],"concepts":[191],"infective":[194,199],"CRT":[195,200,262],"recombination":[201],"proposed.":[203],"Based":[204],"on":[205,290],"concepts,":[208],"two":[209],"novel":[210],"protocols":[211,239,287,303],"developed":[213],"rigorous":[216],"proof":[217],"security.":[219],"Two":[220],"possible":[221,313],"parameter":[222],"settings":[223],"provided":[225],"protocols.":[228],"One":[229],"setting":[230,249],"selects":[231],"small":[233],"key":[235],"comparable":[242,258],"performance":[243,252,259],"scheme.":[246],"The":[247],"other":[248],"better":[251],"than":[253],"scheme":[255],"(i.e.,":[256],"having":[257],"conventional":[261],"speedup),":[263],"but":[264],"key.":[269],"Most":[270],"importantly,":[271],"wish":[273],"emphasize":[275],"importance":[277],"proving":[281],"security":[283],"physically":[285],"secure":[286],"without":[288],"relying":[289],"unreliable":[291],"unreasonable":[293],"assumptions,":[294],"e.g.,":[295],"instructions.":[298],"related":[302],"also":[305],"considered":[306],"carefully":[308],"examined":[309],"point":[311],"weaknesses.":[314]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":6},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":11}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
