[1]Fan Shuqin, Wang Wenbo, Cheng Qingfeng. Attacking OpenSSL implementation of ECDSA with a few signatures[C] Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 15051515[2]Yarom Y, Falkner K. FLUSH+RELOAD: A high resolution, low noise, L3 cache sidechannel attack[C] Proc of the 23rd USENIX Security Symposium. Berkeley, CA: USENIX Association, 2014: 719732[3]Hlavac M, Rosa T. Extended hidden number problem and its cryptanalytic applications[C] Proc of the 13th Int Workshop on Selected Areas in Cryptography (SAC 2006). Berlin: Springer, 2006: 114133[4]Allan T, Brumley B B, Falkner K, et al. Amplifying side channels through performance degradation[C] Proc of the 32nd Annual Conf on Computer Security Applications (ACSAC 2016). New York: ACM, 2016: 422435[5]De Micheli G, Piau R, Pierrot C. A tale of three signatures: Practical attack of ECDSA with wNAF[C] Proc of the 12th Int Conf on Cryptology in Africa (AFRICACRYPT 2020). Berlin: Springer, 2020: 361381[6]Cao Jinzheng, Cheng Qingfeng, Weng Jian. EHNP strikes back:Analyzing SM2 implementations[C] Proc of the 13th Int Conf on Cryptology in Africa (AFRICACRYPT 2022). Berlin: Springer, 2022: 576600[7]Ma Ziqiang, Li Shuaigang, Lin Jingqiang,et al. Another lattice attack against ECDSA with the wNAF to recover more bits per signature[C] Proc of the 18th EAI Int Conf on Security and Privacy in Communication Networks (SecureComm 2022). Berlin: Springer, 2022: 111129[8]Gruss D, Maurice C, Wagner K, et al. Flush+Flush: A fast and stealthy cache attack[C] Proc of the 13th Int Conf on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2016). Berlin: Springer, 2016: 279299