Flush-reload cache timing attack on SM2 digital signature algorithm

被引:0
|
作者
Zhou, Ping [1 ,2 ]
Wang, Tao [1 ]
Zhang, Fan [3 ,4 ]
Zhao, Xinjie [5 ]
机构
[1] Department of Information Engineering, Ordnance Engineering College, Shijiazhuang,050003, China
[2] PLA Unit 69016, Urumqi,830049, China
[3] College of Information Science & Electronics Engineering, Zhejiang University, Hangzhou,310027, China
[4] Science and Technology on Communication Security Laboratory, China Electronics Technology Group Corporation, Chengdu,610041, China
[5] The Institute of North Electronic Equipment, Beijing,100083, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Public key cryptography
引用
收藏
页码:24 / 29
相关论文
共 50 条
  • [1] SM2签名算法flush-reload cache计时攻击
    周平
    王韬
    张帆
    赵新杰
    华中科技大学学报(自然科学版), 2018, 46 (03) : 24 - 29
  • [2] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Zhou, Ping
    Wang, Tao
    Lou, Xiaoxuan
    Zhao, Xinjie
    Zhang, Fan
    Guo, Shize
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [3] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Ping Zhou
    Tao Wang
    Xiaoxuan Lou
    Xinjie Zhao
    Fan Zhang
    Shize Guo
    Science China Information Sciences, 2018, 61
  • [4] Efficient flush-reload cache attack on scalar multiplication based signature algorithm
    Ping ZHOU
    Tao WANG
    Xiaoxuan LOU
    Xinjie ZHAO
    Fan ZHANG
    Shize GUO
    ScienceChina(InformationSciences), 2018, 61 (03) : 234 - 236
  • [5] Flush-Reload Attack and its Mitigation on an FPGA Based Compressed Cache Design
    Mata, Prashant
    Rao, Nanditha
    PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 535 - 541
  • [6] Timing leakage to break SM2 signature algorithm
    Chen, Aidong
    Hong, Chen
    Shang, Xinna
    Jing, Hongyuan
    Xu, Sen
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 67
  • [7] Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme
    Bruinderink, Leon Groot
    Hulsing, Andreas
    Lange, Tanja
    Yarom, Yuval
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2016, 2016, 9813 : 323 - 345
  • [8] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [9] CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds
    Zhang, Weijuan
    Jia, Xiaoqi
    Tai, Jianwei
    Wang, Mingsheng
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 665 - 677
  • [10] Analysis on the Parameter Selection Method for FLUSH plus RELOAD Based Cache Timing Attack on RSA
    Zhou Ping
    Wang Tao
    Li Guang
    Zhang Fan
    Zhao Xinjie
    CHINA COMMUNICATIONS, 2015, 12 (06) : 33 - 45