Efficient flush-reload cache attack on scalar multiplication based signature algorithm
Letter
First Online:
Received:
Revised:
Accepted:
- 418 Downloads
Notes
Acknowledgements
This work was supported in part by National Basic Research Program of China (973 Program) (Grant No. 2013CB338004) and National Natural Science Foundation of China (Grant Nos. 61272491, 61309021, 61472357, 61571063).
Supplementary material
11432_2017_9108_MOESM1_ESM.pdf (149 kb)
Efficient flush-reload cache attack on scalar multiplication based signature algorithm
References
- 1.Yarom Y, Falkner K. Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 719–732Google Scholar
- 2.Yarom Y, Benger N. Recovering OpenSSL ECDSA nonces using the FLUSH + RELOAD cache sidechannel attack. IACR Cryptology ePrint Archive, 2014, 2014: 140Google Scholar
- 3.State Cryptography Administration of China. Public key cryptographic algorithm SM2 based on elliptic curves. GM/T 0003-2012. http://www.oscca.gov.cn/UpFile/2010122214822692.pdfGoogle Scholar
- 4.Nguyen P Q, Shparlinski I E. The insecurity of the ellipitc curve digital signature algorithm with partially known nonces. Design Code Cryptogr, 2003, 30: 151–176CrossRefMATHGoogle Scholar
- 5.Liu M, Chen J. Partially known nonces and fault injection attacks on SM2 signature algorithm. In: Proceedings of Information Security and Cryptology, Guangzhou, 2013. 343–358Google Scholar
Copyright information
© Science China Press and Springer-Verlag GmbH Germany 2017