Efficient flush-reload cache attack on scalar multiplication based signature algorithm

  • Ping Zhou
  • Tao Wang
  • Xiaoxuan Lou
  • Xinjie Zhao
  • Fan Zhang
  • Shize Guo
Letter
  • 206 Downloads

Supplementary material

11432_2017_9108_MOESM1_ESM.pdf (149 kb)
Efficient flush-reload cache attack on scalar multiplication based signature algorithm

References

  1. 1.
    Yarom Y, Falkner K. Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 719–732Google Scholar
  2. 2.
    Yarom Y, Benger N. Recovering OpenSSL ECDSA nonces using the FLUSH + RELOAD cache sidechannel attack. IACR Cryptology ePrint Archive, 2014, 2014: 140Google Scholar
  3. 3.
    State Cryptography Administration of China. Public key cryptographic algorithm SM2 based on elliptic curves. GM/T 0003-2012. http://www.oscca.gov.cn/UpFile/2010122214822692.pdfGoogle Scholar
  4. 4.
    Nguyen P Q, Shparlinski I E. The insecurity of the ellipitc curve digital signature algorithm with partially known nonces. Design Code Cryptogr, 2003, 30: 151–176CrossRefMATHGoogle Scholar
  5. 5.
    Liu M, Chen J. Partially known nonces and fault injection attacks on SM2 signature algorithm. In: Proceedings of Information Security and Cryptology, Guangzhou, 2013. 343–358Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  • Ping Zhou
    • 1
  • Tao Wang
    • 1
  • Xiaoxuan Lou
    • 3
  • Xinjie Zhao
    • 2
  • Fan Zhang
    • 3
    • 4
  • Shize Guo
    • 2
  1. 1.Department of Information EngineeringOrdnance Engineering CollegeShijiazhuangChina
  2. 2.Institute of North Electronic EquipmentBeijingChina
  3. 3.College of Information Science and Electrical EngineeringZhejiang UniversityHangzhouChina
  4. 4.Science and Technology on Communication Security LaboratoryChengduChina

Personalised recommendations