{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:20:13Z","timestamp":1742930413112,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030429201"},{"type":"electronic","value":"9783030429218"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42921-8_19","type":"book-chapter","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T15:05:45Z","timestamp":1585926345000},"page":"325-345","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the Cache Side Channel Attacks Against ECDSA"],"prefix":"10.1007","author":[{"given":"Ziqiang","family":"Ma","sequence":"first","affiliation":[]},{"given":"Quanwei","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[]},{"given":"Dingfeng","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Lingjia","family":"Meng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-642-15031-9_8","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"O Ac\u0131i\u00e7mez","year":"2010","unstructured":"Ac\u0131i\u00e7mez, O., Brumley, B.B., Grabher, P.: New results on instruction cache attacks. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 110\u2013124. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-15031-9_8"},{"key":"19_CR2","unstructured":"American National Standards Institute: ANSI X9.62-2005, Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA) (2005)"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Barenghi, A., Bertoni, G., Palomba, A., Susella, R.: A novel fault attack against ECDSA. In: Proceedings of the IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pp. 161\u2013166 (2011)","DOI":"10.1109\/HST.2011.5955015"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-662-44709-3_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2014","author":"N Benger","year":"2014","unstructured":"Benger, N., van de Pol, J., Smart, N.P., Yarom, Y.: \u201cOoh Aah... Just a Little Bit\u201d: a small amount of side channel can go a long way. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 75\u201392. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-44709-3_5"},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-68697-5_11","volume-title":"Advances in Cryptology \u2014 CRYPTO 96","author":"D Boneh","year":"1996","unstructured":"Boneh, D., Venkatesan, R.: Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 129\u2013142. Springer, Heidelberg (1996). \nhttps:\/\/doi.org\/10.1007\/3-540-68697-5_11"},{"key":"19_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-23822-2_20","volume-title":"Computer Security \u2013 ESORICS 2011","author":"BB Brumley","year":"2011","unstructured":"Brumley, B.B., Tuveri, N.: Remote timing attacks are still practical. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 355\u2013371. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-23822-2_20"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-30840-1_19","volume-title":"Information Security and Cryptology - ICISC 2015","author":"W Cao","year":"2016","unstructured":"Cao, W., et al.: Two lattice-based differential fault attacks against ECDSA with wNAF algorithm. In: Kwon, S., Yun, A. (eds.) ICISC 2015. LNCS, vol. 9558, pp. 297\u2013313. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-30840-1_19"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J-S Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292\u2013302. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48059-5_25"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Fan, S., Wang, W., Cheng, Q.: Attacking OpenSSL implementation of ECDSA with a few signatures. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, (CCS), pp. 1505\u20131515 (2016)","DOI":"10.1145\/2976749.2978400"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Fouque, P., Lercier, R., R\u00e9al, D., Valette, F.: Fault attack on elliptic curve montgomery ladder implementation. In: 5th Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 92\u201398 (2008)","DOI":"10.1109\/FDTC.2008.15"},{"issue":"1","key":"19_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"DM Gordon","year":"1998","unstructured":"Gordon, D.M.: A survey of fast exponentiation methods. J. Algorithms 27(1), 129\u2013146 (1998)","journal-title":"J. Algorithms"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/3-540-36288-6_15","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"L Goubin","year":"2003","unstructured":"Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199\u2013211. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-36288-6_15"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-319-69453-5_7","volume-title":"Selected Areas in Cryptography \u2013 SAC 2016","author":"D Goudarzi","year":"2017","unstructured":"Goudarzi, D., Rivain, M., Vergnaud, D.: Lattice attacks against elliptic-curve signatures with blinded scalar multiplication. In: Avanzi, R., Heys, H. (eds.) SAC 2016. LNCS, vol. 10532, pp. 120\u2013139. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-69453-5_7"},{"key":"19_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-74462-7_9","volume-title":"Selected Areas in Cryptography","author":"M Hlav\u00e1\u010d","year":"2007","unstructured":"Hlav\u00e1\u010d, M., Rosa, T.: Extended hidden number problem and its cryptanalytic applications. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 114\u2013133. Springer, Heidelberg (2007). \nhttps:\/\/doi.org\/10.1007\/978-3-540-74462-7_9"},{"issue":"3","key":"19_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1023\/A:1011214926272","volume":"23","author":"NA Howgrave-Graham","year":"2001","unstructured":"Howgrave-Graham, N.A., Smart, N.P.: Lattice attacks on digital signature schemes. Des. Codes Crypt. 23(3), 283\u2013290 (2001)","journal-title":"Des. Codes Crypt."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Callas, J., Donnerhacke, L., Finney, H., Shaw, D., Thayer, R.: OpenPGP Message Format (RFC 4880) (2007)","DOI":"10.17487\/rfc4880"},{"issue":"1","key":"19_CR17","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/3-540-48071-4_25","volume-title":"Advances in Cryptology \u2014 CRYPTO 92","author":"K Koyama","year":"1993","unstructured":"Koyama, K., Tsuruoka, Y.: Speeding up elliptic cryptosystems by using a signed binary window method. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 345\u2013357. Springer, Heidelberg (1993). \nhttps:\/\/doi.org\/10.1007\/3-540-48071-4_25"},{"issue":"4","key":"19_CR19","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"AK Lenstra","year":"1982","unstructured":"Lenstra, A.K., Lenstra, H.W., Lov\u00e1sz, L.: Factoring polynomials with rational coefficients. Math. Ann. 261(4), 515\u2013534 (1982)","journal-title":"Math. Ann."},{"key":"19_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-642-36095-4_19","volume-title":"Topics in Cryptology \u2013 CT-RSA 2013","author":"M Liu","year":"2013","unstructured":"Liu, M., Nguyen, P.Q.: Solving BDD by enumeration: an update. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 293\u2013309. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-36095-4_19"},{"key":"19_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-642-00306-6_2","volume-title":"Information Security Applications","author":"M Medwed","year":"2009","unstructured":"Medwed, M., Oswald, E.: Template attacks on ECDSA. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol. 5379, pp. 14\u201327. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-00306-6_2"},{"key":"19_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/BFb0028484","volume-title":"Information and Communications Security","author":"A Miyaji","year":"1997","unstructured":"Miyaji, A., Ono, T., Cohen, H.: Efficient elliptic curve exponentiation. In: Han, Y., Okamoto, T., Qing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 282\u2013290. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/BFb0028484"},{"issue":"177","key":"19_CR23","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"19_CR24","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). \nhttps:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"19_CR25","unstructured":"National Institute of Standards and Technology: FIPS PUB 186-4 Digital Signature Standard (DSS), 19 July 2013"},{"key":"19_CR26","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/978-3-0348-8295-8_23","volume-title":"Cryptography and Computational Number Theory","author":"PQ Nguyen","year":"2001","unstructured":"Nguyen, P.Q.: The dark side of the hidden number problem: Lattice attacks on DSA. In: Lam, K.Y., Shparlinski, I., Wang, H., Xing, C. (eds.) Cryptography and Computational Number Theory, pp. 321\u2013330. Springer, Basel (2001). \nhttps:\/\/doi.org\/10.1007\/978-3-0348-8295-8_23"},{"issue":"3","key":"19_CR27","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s00145-002-0021-3","volume":"15","author":"PQ Nguyen","year":"2002","unstructured":"Nguyen, P.Q., Shparlinski, I.E.: The insecurity of the digital signature algorithm with partially known nonces. J. Cryptol. 15(3), 151\u2013176 (2002)","journal-title":"J. Cryptol."},{"issue":"2","key":"19_CR28","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1023\/A:1025436905711","volume":"30","author":"PQ Nguyen","year":"2003","unstructured":"Nguyen, P.Q., Shparlinski, I.E.: The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Des. Codes Crypt. 30(2), 201\u2013217 (2003)","journal-title":"Des. Codes Crypt."},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Pereida Garc\u00eda, C., Brumley, B.B., Yarom, Y.: Make sure DSA signing exponentiations really are constant-time. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, (CCS), pp. 1639\u20131650 (2016)","DOI":"10.1145\/2976749.2978420"},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-16715-2_1","volume-title":"Topics in Cryptology \u2014 CT-RSA 2015","author":"J Pol van de","year":"2015","unstructured":"van de Pol, J., Smart, N.P., Yarom, Y.: Just a Little Bit More. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 3\u201321. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-16715-2_1"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Schmidt, J., Medwed, M.: A fault attack on ECDSA. In: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, (FDTC), pp. 93\u201399 (2009)","DOI":"10.1109\/FDTC.2009.38"},{"issue":"1\u20133","key":"19_CR32","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/BF01581144","volume":"66","author":"CP Schnorr","year":"1994","unstructured":"Schnorr, C.P., Euchner, M.: Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Program. 66(1\u20133), 181\u2013199 (1994). \nhttps:\/\/doi.org\/10.1007\/BF01581144","journal-title":"Math. Program."},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"Shanks, D.: Class number, a theory of factorization, and genera. In: Proceedings of the Symposium of Pure Mathematics, vol. 20, pp. 415\u2013440 (1971)","DOI":"10.1090\/pspum\/020\/0316385"},{"issue":"2","key":"19_CR34","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1023\/A:1008306223194","volume":"19","author":"JA Solinas","year":"2000","unstructured":"Solinas, J.A.: Efficient arithmetic on koblitz curves. Des. Codes Crypt. 19(2), 195\u2013249 (2000)","journal-title":"Des. Codes Crypt."},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2 (RFC 5246) (2008)","DOI":"10.17487\/rfc5246"},{"key":"19_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/978-3-030-24268-8_12","volume-title":"Artificial Intelligence and Security","author":"W Wunan","year":"2019","unstructured":"Wunan, W., Hao, C., Jun, C.: The attack case of ECDSA on blockchain based on improved simple power analysis. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICAIS 2019. LNCS, vol. 11635, pp. 120\u2013132. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-24268-8_12"},{"issue":"3","key":"19_CR37","doi-asserted-by":"publisher","first-page":"032105","DOI":"10.1007\/s11432-016-9030-0","volume":"61","author":"W Wang","year":"2017","unstructured":"Wang, W., Fan, S.: Attacking OpenSSL ECDSA with a small amount of side-channel information. Sci. China Inf. Sci. 61(3), 032105 (2017). \nhttps:\/\/doi.org\/10.1007\/s11432-016-9030-0","journal-title":"Sci. China Inf. Sci."},{"key":"19_CR38","unstructured":"Yarom, Y., Benger, N.: Recovering OpenSSL ECDSA nonces using the FLUSH+ RELOAD cache side-channel attack. IACR Cryptology ePrint Archive (2014)"},{"key":"19_CR39","unstructured":"Yarom, Y., Falkner, K.: Flush+Reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Conference on Security Symposium, pp. 719\u2013732 (2014)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42921-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T18:12:42Z","timestamp":1585937562000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-42921-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030429201","9783030429218"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42921-8_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"13 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asclab.nuaa.edu.cn\/inscrypt2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}