References
Yarom Y, Falkner K. Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 719–732
Yarom Y, Benger N. Recovering OpenSSL ECDSA nonces using the FLUSH + RELOAD cache sidechannel attack. IACR Cryptology ePrint Archive, 2014, 2014: 140
State Cryptography Administration of China. Public key cryptographic algorithm SM2 based on elliptic curves. GM/T 0003-2012. http://www.oscca.gov.cn/UpFile/2010122214822692.pdf
Nguyen P Q, Shparlinski I E. The insecurity of the ellipitc curve digital signature algorithm with partially known nonces. Design Code Cryptogr, 2003, 30: 151–176
Liu M, Chen J. Partially known nonces and fault injection attacks on SM2 signature algorithm. In: Proceedings of Information Security and Cryptology, Guangzhou, 2013. 343–358
Acknowledgements
This work was supported in part by National Basic Research Program of China (973 Program) (Grant No. 2013CB338004) and National Natural Science Foundation of China (Grant Nos. 61272491, 61309021, 61472357, 61571063).
Author information
Authors and Affiliations
Corresponding author
Additional information
The authors declare that they have no conflict of interest.
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Zhou, P., Wang, T., Lou, X. et al. Efficient flush-reload cache attack on scalar multiplication based signature algorithm. Sci. China Inf. Sci. 61, 039102 (2018). https://doi.org/10.1007/s11432-017-9108-3
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9108-3