{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T05:52:32Z","timestamp":1770357152091,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Basic Research Program of China (973 Program)","award":["2013CB338003"],"award-info":[{"award-number":["2013CB338003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978400","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"1505-1515","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Attacking OpenSSL Implementation of ECDSA with a Few Signatures"],"prefix":"10.1145","author":[{"given":"Shuqin","family":"Fan","sequence":"first","affiliation":[{"name":"State Key Laboratory of Cryptology, Beijing, China"}]},{"given":"Wenbo","family":"Wang","sequence":"additional","affiliation":[{"name":"Luoyang University of Foreign Languages, Luoyang, Henan, China"}]},{"given":"Qingfeng","family":"Cheng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, Shanxi, China"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The openssl project. OpenSSL -- cryptography and SSL\/TLS toolkit. http:\/\/www.openssl.org.  The openssl project. OpenSSL -- cryptography and SSL\/TLS toolkit. http:\/\/www.openssl.org."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1266999"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_5"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10366-7_39"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041225.2041252"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25385-0_1"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","first-page":"282","volume-title":"Advances in Cryptology -- Proceedings of ICICS","author":"Cohen H.","year":"1997","unstructured":"H. Cohen , A. Miyaji , and T. Ono . Efficient elliptic curve exponentiation . In Advances in Cryptology -- Proceedings of ICICS 1997 , volume 1334 of Lecture Notes in Computer Science , pages 282 -- 290 . Springer Berlin Heidelberg , 1997. H. Cohen, A. Miyaji, and T. Ono. Efficient elliptic curve exponentiation. In Advances in Cryptology -- Proceedings of ICICS 1997, volume 1334 of Lecture Notes in Computer Science, pages 282--290. Springer Berlin Heidelberg, 1997."},{"key":"e_1_3_2_1_8_1","volume-title":"National Institude of Standards and Technology (NIST)","author":"P.","year":"2013","unstructured":"P. FIPS. 186--4 digital signature standard (DSS) . National Institude of Standards and Technology (NIST) , 2013 . P. FIPS. 186--4 digital signature standard (DSS). National Institude of Standards and Technology (NIST), 2013."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788417"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756516.1756529"},{"key":"e_1_3_2_1_11_1","volume-title":"Die \u00f6sterreichische b\u00fcrgerkarte","author":"Hollosi A.","year":"2008","unstructured":"A. Hollosi , G. Karlinger , T. Rossler , M. Centner , and Die \u00f6sterreichische b\u00fcrgerkarte , 2008 . A. Hollosi, G. Karlinger, T. Rossler, M. Centner, and et al. Die \u00f6sterreichische b\u00fcrgerkarte, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011214926272"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714625"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_16_1","volume-title":"Advances in Cryptology - CRYPTO 1992","volume":"740","author":"Koyama K.","year":"1992","unstructured":"K. Koyama and Y. Tsuruoka . Speeding up elliptic curve cryptosystems using a signed binary windows method . In Advances in Cryptology - CRYPTO 1992 , volume 740 of Lecture Notes in Computer Science, pages 345--357. Springer Berlin Heidelberg , 1992 . K. Koyama and Y. Tsuruoka. Speeding up elliptic curve cryptosystems using a signed binary windows method. In Advances in Cryptology - CRYPTO 1992, volume 740 of Lecture Notes in Computer Science, pages 345--357. Springer Berlin Heidelberg, 1992."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01457454"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36095-4_19"},{"key":"e_1_3_2_1_19_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system , 2008 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-002-0021-3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025436905711"},{"key":"e_1_3_2_1_22_1","volume-title":"Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive","author":"Page D.","year":"2002","unstructured":"D. Page . Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive , 2002 :169, 2002. D. Page. Theoretical use of cache memory as a cryptanalytic side-channel. IACR Cryptology ePrint Archive, 2002:169, 2002."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/647895.740436"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008306223194"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16715-2_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/129902.129905"},{"key":"e_1_3_2_1_28_1","unstructured":"Y. Yarom and N. Benger. Recovering OpenSSL ECDSA nonces using the F\\textsclush  Y. Yarom and N. Benger. Recovering OpenSSL ECDSA nonces using the F\\textsclush"},{"key":"e_1_3_2_1_29_1","volume-title":"IACR Cryptology ePrint Archive","year":"2014","unstructured":"R\\textsceload cache side-channel attack. IACR Cryptology ePrint Archive , 2014 :140, 2014. R\\textsceload cache side-channel attack. IACR Cryptology ePrint Archive, 2014:140, 2014."},{"key":"e_1_3_2_1_30_1","first-page":"719","volume-title":"23rd USENIX Security Symposium (USENIX Security 2014","author":"Yarom Y.","year":"2014","unstructured":"Y. Yarom and K. Falkner . Flush+Reload: a high resolution, low noise, L3 cache side-channel attack . In 23rd USENIX Security Symposium (USENIX Security 2014 ), pages 719 -- 732 , San Diego, CA , Aug. 2014 . USENIX Association. Y. Yarom and K. Falkner. Flush+Reload: a high resolution, low noise, L3 cache side-channel attack. In 23rd USENIX Security Symposium (USENIX Security 2014), pages 719--732, San Diego, CA, Aug. 2014. USENIX Association."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382230"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978400","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:15Z","timestamp":1750218015000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978400"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":31,"alternative-id":["10.1145\/2976749.2978400","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978400","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}