Flush-reload cache timing attack on SM2 digital signature algorithm

被引:0
|
作者
Zhou, Ping [1 ,2 ]
Wang, Tao [1 ]
Zhang, Fan [3 ,4 ]
Zhao, Xinjie [5 ]
机构
[1] Department of Information Engineering, Ordnance Engineering College, Shijiazhuang,050003, China
[2] PLA Unit 69016, Urumqi,830049, China
[3] College of Information Science & Electronics Engineering, Zhejiang University, Hangzhou,310027, China
[4] Science and Technology on Communication Security Laboratory, China Electronics Technology Group Corporation, Chengdu,610041, China
[5] The Institute of North Electronic Equipment, Beijing,100083, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Public key cryptography
引用
收藏
页码:24 / 29
相关论文
共 50 条
  • [31] Continual leakage resilient SM2 signature scheme
    Ding Yujie
    Zhang Yingnan
    Zhou Tanping
    PROCEEDINGS OF 2020 3RD INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), 2020, : 931 - 936
  • [32] Research on cache timing template attack based on KNN algorithm
    Chen, Cai-Sen
    Cheng, Zhi-Wei
    Wang, Yu-Bo
    Wang, An
    Ma, Xiang-Liang
    Journal of Computers (Taiwan), 2020, 31 (01): : 184 - 191
  • [33] A High Throughput SM2 Digital Signature Computing Scheme Based on Graphics Processing Unit Platform
    Zhu Hui
    Huang Yukun
    Wang Fengwei
    Yang Xiaopeng
    Li Hui
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4274 - 4283
  • [34] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    ScienceChina(InformationSciences), 2019, 62 (03) : 61 - 74
  • [35] Partially known information attack on SM2 key exchange protocol
    Wei Wei
    Jiazhe Chen
    Dan Li
    Beibei Wang
    Science China Information Sciences, 2019, 62
  • [36] Efficient Cache Timing Attack on the Present Algorithm for Master Key Recovery
    Amsaprabhaa, M.
    Dhyaneswaran, T.
    Harshitha, R.S.
    2023 Global Conference on Information Technologies and Communications, GCITC 2023, 2023,
  • [37] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [38] A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
    Yudi Zhang
    Debiao He
    Mingwu Zhang
    Kim-Kwang Raymond Choo
    Frontiers of Computer Science, 2020, 14
  • [39] A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
    Zhang, Yudi
    He, Debiao
    Zhang, Mingwu
    Choo, Kim-Kwang Raymond
    FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (03)
  • [40] Chosen Ciphertext Combined Attack Based on Round-Reduced Fault Against SM2 Decryption Algorithm
    Li H.-Y.
    Han X.-C.
    Cao W.-Q.
    Wang J.
    Chen H.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (11): : 3187 - 3198