Flush-reload cache timing attack on SM2 digital signature algorithm

被引:0
|
作者
Zhou, Ping [1 ,2 ]
Wang, Tao [1 ]
Zhang, Fan [3 ,4 ]
Zhao, Xinjie [5 ]
机构
[1] Department of Information Engineering, Ordnance Engineering College, Shijiazhuang,050003, China
[2] PLA Unit 69016, Urumqi,830049, China
[3] College of Information Science & Electronics Engineering, Zhejiang University, Hangzhou,310027, China
[4] Science and Technology on Communication Security Laboratory, China Electronics Technology Group Corporation, Chengdu,610041, China
[5] The Institute of North Electronic Equipment, Beijing,100083, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Public key cryptography
引用
收藏
页码:24 / 29
相关论文
共 50 条
  • [41] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [42] Fabric Blockchain Design Based on Improved SM2 Algorithm
    Fu, Jinhua
    Zhou, Wenhui
    Zhang, Suzhi
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [43] The Software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System
    Zheng, Xin
    Xu, Chongyao
    Hu, Xianghong
    Zhang, Yun
    Xiong, Xiaoming
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (10) : 2055 - 2066
  • [44] Non-interactive SM2 threshold signature scheme with identifiable abort
    Liang, Huiqiang
    Chen, Jianhua
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [45] Optimized Implementation of the SM2 Algorithm on the GmSSL Cryptographic Library
    Qiao, Han
    Wang, An
    Wang, Bo
    Su, Chang-Shan
    Li, Gen
    Tang, Yu-Xing
    Zhu, Lie-Huang
    Jisuanji Xuebao/Chinese Journal of Computers, 2025, 48 (02): : 463 - 476
  • [46] Secure Multi-party SM2 Signature Based on SPDZ Protocol
    Li, Xiaotong
    Wang, Hao
    Chen, Jiyang
    Li, Shikuan
    Sun, Yuxiang
    Su, Ye
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 85 - 103
  • [47] Research on Cache Timing Attack Against RSA with Sliding Window Exponentiation Algorithm
    Chen, Caisen
    Xiang, Yangxia
    DengLiu, Yuqin
    Zhou, Zeyun
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2016, 8 (02) : 88 - 95
  • [48] Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks
    Zhang, Zhenfeng
    Yang, Kang
    Zhang, Jiang
    Chen, Cheng
    SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 140 - 153
  • [49] Optimization of reconfigurable SM2 algorithm over prime filed
    Li B.
    Zhou Q.
    Chen X.
    Feng F.
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 30 - 41
  • [50] A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center
    Yan Jie
    Lu Yu
    Chen Li-yun
    Nie Wei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 897 - 913