Skip to main content
Log in

Efficient flush-reload cache attack on scalar multiplication based signature algorithm

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Yarom Y, Falkner K. Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 719–732

    Google Scholar 

  2. Yarom Y, Benger N. Recovering OpenSSL ECDSA nonces using the FLUSH + RELOAD cache sidechannel attack. IACR Cryptology ePrint Archive, 2014, 2014: 140

    Google Scholar 

  3. State Cryptography Administration of China. Public key cryptographic algorithm SM2 based on elliptic curves. GM/T 0003-2012. http://www.oscca.gov.cn/UpFile/2010122214822692.pdf

  4. Nguyen P Q, Shparlinski I E. The insecurity of the ellipitc curve digital signature algorithm with partially known nonces. Design Code Cryptogr, 2003, 30: 151–176

    Article  MATH  Google Scholar 

  5. Liu M, Chen J. Partially known nonces and fault injection attacks on SM2 signature algorithm. In: Proceedings of Information Security and Cryptology, Guangzhou, 2013. 343–358

    Google Scholar 

Download references

Acknowledgements

This work was supported in part by National Basic Research Program of China (973 Program) (Grant No. 2013CB338004) and National Natural Science Foundation of China (Grant Nos. 61272491, 61309021, 61472357, 61571063).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Zhang.

Additional information

The authors declare that they have no conflict of interest.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, P., Wang, T., Lou, X. et al. Efficient flush-reload cache attack on scalar multiplication based signature algorithm. Sci. China Inf. Sci. 61, 039102 (2018). https://doi.org/10.1007/s11432-017-9108-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9108-3

Navigation