{"id":"https://openalex.org/W2166326153","doi":"https://doi.org/10.1145/1873548.1873556","title":"A new CRT-RSA algorithm resistant to powerful fault attacks","display_name":"A new CRT-RSA algorithm resistant to powerful fault attacks","publication_year":2010,"publication_date":"2010-10-24","ids":{"openalex":"https://openalex.org/W2166326153","doi":"https://doi.org/10.1145/1873548.1873556","mag":"2166326153"},"language":"en","primary_location":{"id":"doi:10.1145/1873548.1873556","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1873548.1873556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Workshop on Embedded Systems Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091219827","display_name":"Nevine Ebeid","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nevine Ebeid","raw_affiliation_strings":["Certicom Corp., Mississauga, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Certicom Corp., Mississauga, Ontario, Canada","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017085710","display_name":"Rob Lambert","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rob Lambert","raw_affiliation_strings":["Certicom Corp., Mississauga, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"Certicom Corp., Mississauga, Ontario, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5091219827"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9021,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81645643,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.7844182252883911},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7360190153121948},{"id":"https://openalex.org/keywords/modulo","display_name":"Modulo","score":0.7192798852920532},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6700972318649292},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.45914456248283386},{"id":"https://openalex.org/keywords/electronic-countermeasure","display_name":"Electronic countermeasure","score":0.4504089653491974},{"id":"https://openalex.org/keywords/random-number-generation","display_name":"Random number generation","score":0.4303261935710907},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3932505249977112},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36755359172821045},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11815544962882996},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10420450568199158}],"concepts":[{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.7844182252883911},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7360190153121948},{"id":"https://openalex.org/C54732982","wikidata":"https://www.wikidata.org/wiki/Q1415345","display_name":"Modulo","level":2,"score":0.7192798852920532},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6700972318649292},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.45914456248283386},{"id":"https://openalex.org/C131426668","wikidata":"https://www.wikidata.org/wiki/Q849203","display_name":"Electronic countermeasure","level":3,"score":0.4504089653491974},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.4303261935710907},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3932505249977112},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36755359172821045},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11815544962882996},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10420450568199158},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0},{"id":"https://openalex.org/C554190296","wikidata":"https://www.wikidata.org/wiki/Q47528","display_name":"Radar","level":2,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1873548.1873556","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1873548.1873556","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Workshop on Embedded Systems Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W118467740","https://openalex.org/W1521788351","https://openalex.org/W1554128539","https://openalex.org/W1563765474","https://openalex.org/W1565369953","https://openalex.org/W1570388754","https://openalex.org/W1730333074","https://openalex.org/W1996360405","https://openalex.org/W2006512828","https://openalex.org/W2026436569","https://openalex.org/W2053464283","https://openalex.org/W2066425771","https://openalex.org/W2067706455","https://openalex.org/W2095881422","https://openalex.org/W2096133993","https://openalex.org/W2111725598","https://openalex.org/W2117317147","https://openalex.org/W2127262877","https://openalex.org/W2128771831","https://openalex.org/W2144952508","https://openalex.org/W2148862943","https://openalex.org/W2154909745","https://openalex.org/W2157999631","https://openalex.org/W2172184773","https://openalex.org/W2490520464","https://openalex.org/W2500626043","https://openalex.org/W2773506996","https://openalex.org/W3029245066","https://openalex.org/W4232836212","https://openalex.org/W4237535870","https://openalex.org/W4251062109","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2387850992","https://openalex.org/W2362734542","https://openalex.org/W2391225515","https://openalex.org/W2382630346","https://openalex.org/W1598708558","https://openalex.org/W2390589810","https://openalex.org/W2365830296","https://openalex.org/W2373537330","https://openalex.org/W2390449206","https://openalex.org/W2977376051"],"abstract_inverted_index":{"CRT-RSA":[0,31],"is":[1],"widely":[2],"deployed":[3],"in":[4,53],"embedded":[5],"devices":[6],"to":[7,18,68],"accelerate":[8],"the":[9,23,65],"RSA":[10],"signature":[11,81,84],"generation":[12],"by":[13],"about":[14],"four":[15],"times":[16],"compared":[17],"regular":[19],"RSA.":[20],"However,":[21],"since":[22],"Bellcore":[24],"attack":[25],"of":[26,75],"1996,":[27],"research":[28],"into":[29],"securing":[30],"has":[32],"remained":[33],"active":[34],"as":[35],"countermeasures":[36],"are":[37],"themselves":[38],"attacked.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43],"propose":[44],"a":[45,50],"new":[46],"countermeasure":[47,77],"designed":[48],"with":[49,83],"powerful":[51],"attacker":[52,56],"mind.":[54],"The":[55],"may":[57,63],"inject":[58],"multiple":[59],"precise/random":[60],"faults":[61],"and":[62],"alter":[64],"program":[66],"counter":[67],"skip":[69],"one":[70],"or":[71],"more":[72],"instructions.The":[73],"strength":[74],"our":[76],"derives":[78],"from":[79],"combining":[80],"validation":[82],"unblinding":[85],"modulo":[86],"n.":[87]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
