| [1]Johnson D, Menezes A, Vanstone S A. The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001, 1(1): 3663[2]Gruss D, Maurice C, Wagner K, et al. Flush+Flush: A fast and stealthy cache attack[C] Proc of the 13th Int Conf on DIMVA. Berlin: Springer, 2016: 279299[3]Jain H, Balaraju D A, Rebeiro C. Spy cartel: Parallelizing evict+timebased cache attacks on lastlevel caches[J]. Journal of Hardware and Systems Security, 2019, 3: 147163[4]Moghimi D, Sunar B, Eisenbarth T, et al. TPMFAIL: TPM meets timing and lattice attacks[C] Proc of the 29th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2020: 20572073[5]Purnal A, Turan F, Verbauwhede I. Prime+Scope: Overcoming the observer effect for highprecision cache contention attacks[C] Proc of the 2021 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2021: 29062920[6]Shusterman A, Agarwal A, O’Connell S, et al. Prime+Probe 1, JavaScript 0: Overcoming browserbased sidechannel defenses[C] Proc of the 30th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2021: 28632880[7]Weiser S, Schrammel D, Bodner L, et al. Big numbersbig troubles: Systematically analyzing nonce leakage in (EC) DSA implementations[C] Proc of the 29th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2020: 17671784[8]Yarom Y, Falkner K. FLUSH+RELOAD: A high resolution, low noise, L3 cache sidechannel attack[C] Proc of the 23rd USENIX Security Symposium. Berkeley, CA: USENIX Association, 2014: 719732[9]Boneh D, DeMillo R A, Lipton R J. On the importance of eliminating errors in cryptographic computations[J]. Journal of Cryptology, 2001, 14: 101119[10]Liu Mingjie, Chen Jiazhe, Li Hexin. Partially known nonces and fault injection attacks on SM2 signature algorithm[C] Proc of the 9th Int Conf on Information Security and Cryptology (Inscrypt 2013). Berlin: Springer, 2013: 343358[11]Mus K, Dorz Y, Tol M C, et al. Jolt: Recovering TLS signing keys via rowhammer faults[C] Proc of the 2023 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2023: 17191736[12]Naccache D, Nguyen P Q, Tunstall M, et al. Experimenting with faults, lattices and the DSA[C] Proc of the 8th Int Workshop on Theory and Practice in Public Key Cryptography(PKC 2005). Berlin: Springer, 2005: 1628[13]Ryan K. Return of the hidden number problem: A widespread and novel key extraction attack on ECDSA and DSA[J]. IACR Trans on Cryptographic Hardware and Embedded Systems, 2019 (1): 146168[14]Schmidt J M, Medwed M. A fault attack on ECDSA[C] Proc of 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC). Piscataway, NJ: IEEE, 2009: 9399[15]Benger N, van de Pol J, Smart N P, et al. Ooh Aah… Just a little bit: A small amount of side channel can go a long way[C] Proc of Cryptographic Hardware and Embedded Systems (CHES 2014). Berlin: Springer, 2014: 7592[16]Fan Shuqin, Wang Wenbo, Cheng Qingfeng. Attacking OpenSSL implementation of ECDSA with a few signatures[C] Proc of the 2016 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2016: 5051515[17]Sun C, Espitau T, Tibouchi M, et al. Guessing bits: Improved lattice attacks on (EC) DSA with nonce leakage[J]. IACR Trans on Cryptographic Hardware and Embedded Systems, 2022 (1): 391413[18]Wang Leizhang, Xia Wenwen, Wang Geng, et al. Improved pump and jump BKZ by sharp simulator[EBOL]. 2022 [20220501]. https:eprint.iacr.org2022468[19]Wang Wenbo, Fan Shuqin. Attacking OpenSSL ECDSA with a smallamount of sidechannel information[J]. Science China Information Sciences, 2018, 61(3): 100121[20]Ma Ziqiang, Li Shuaigang, Lin Jingqiang, et al. Another lattice attack against ECDSA with the wNAFto recover more bits per signature[C] Proc of the 18th EAI Int Conf on Security and Privacy in Communication Networks. Berlin: Springer, 2022: 111129[21]Thibault J P, O’Flynn C, Dewar A. Ark of the ECC: An opensource ECDSA power analysis attack on a FPGA based curve P256 implementation [EBOL]. 2021 [20250507]. https:eprint.iacr.org20211520.pdf[22]Lomne V, Roche T. A side journey to titan.[EBOL]. 2021 [20250507]. https:ninjalab.iowpcontentuploads202101a side journey to titan.pdf[23]Jancar J, Sedlacek V, Svenda P, et al. Minerva: Thecurse of ECDSA nonces systematic analysis of lattice attacks on noisy leakageof bitlength of ECDSA nonces[J]. IACR Trans on Cryptographic Hardwareand Embedded Systems, 2020 (4): 281308[24]Zhao Z N, Morrison A, Fletcher C W, et al. Lastlevel cache sidechannel attacks are feasible in the modern public cloud[C] Proc of the 29th ACM Int Conf on Architectural Support for Programming Languages and Operating Systems(ASPLOS’24). New York: ACM, 2024: 582600[25]Nguyen P Q, Shparlinski I E. The insecurity of the elliptic curve digital signature algorithm with partially known nonces[J].Designs, Codes and Cryptography, 2003, 30(2): 201217[26]van de Pol J, Smart N P, Yarom Y. Just a little bit more[C] Proc of the Cryptographer’s Track at the RSA Conf on Topics in Cryptology(CTRSA 2015). Berlin: Springer, 2015: 321[27]Boneh D, Venkatesan R. Hardness of computing the most significant bits of secret keys in DiffieHellman and related schemes[C] Proc of the 16th Annual Int Cryptology Conf on Advances in Cryptology(CRYPTO’96). Berlin: Springer, 1996: 129142[28]Nguyen P Q, Shparlinski I E. The insecurity of the digital signature algorithm with partially known nonces[J]. Journal of Cryptology, 2002 (3): 151176[29]Hlavác M, Rosa T. Extended hidden number problem and its cryptanalytic applications[C] Proc of the 13th Int Workshop on Selected Areas in Cryptography. 2006: 114133[30]Cao Jinzheng, Weng Jian, Pan Yanbin, et al. Generalized attack on ECDSA: Known bits in arbitrary positions[J]. Designs, Codes and Cryptography, 2023, 91(11): 38033823[31]Laarhoven T, Mariano A. Progressive lattice sieving[C] Proc of Int Conf on PostQuantum Cryptography. Berlin:Springer, 2018: 292311[32]Li Shuaigang, Fan Shuqin, Lu Xianhui. Attacking ECDSA leaking discrete bits with a more efficient lattice[C] Proc of the 17th Int Conf on Information Security and Cryptology(Inscrypt 2021). Berlin: Springer, 2021: 251266[33]Micheli G D, Piau R, Pierrot C. A tale of three signatures: Practical attack of ECDSA with wNAF[C] Proc of the 12th Int Conf on Cryptology in Africa. Berlin: Springer, 2020: 361381[34]Nguyen P Q, Vallée B. The LLL Algorithm—Survey and Applications[M]. Berlin: Springer, 2009: 100140[35]Albrecht M, Ducas L, Herold G, et al. The general sieve kernel and new records in lattice reduction[C] Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2019: 717746[36]Aono Y, Wang Y, Hayashi T, et al. Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator[C] Proc of the 35th Annual Int Conf on the Theory and Applications of Cryptographic Techniques(EUROCRYPT 2016). Berlin: Springer, 2016: 789819[37]De Micheli G. Discrete logarithm cryptanalyses: Number field sieve and lattice tools for sidechannel attacks[D]. Nancy, France: Université de Lorraine, 2021[38]Ducas L, Stevens M, van Woerden W. Advanced lattice sieving on GPUs, with tensor cores[C] Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2021: 249279[39]Ducas L, Stevens M, van Woerden W. Advanced lattice sieving on GPUs, with tensor cores[C] Advances in Cryptology—EUROCRYPT 2021. Berlin: Springer, 2021: 249279[40]Zhao Ziyu, Ding Jintai. Practical improvements on BKZ algorithm[C] Proc of Int Symp on Cyber Security, Cryptology, and Machine Learning. Berlin: Springer, 2023: 273284[41]Alkim E, Ducas L, Pppelmann T, et al. Postquantum key exchange—A new hope[C] Proc of the 25th USENIX Security Symposium (USENIX Security 16). Berkeley, CA: USENIX Association, 2016: 327343[42]Albrecht M R, Heninger N. On bounded distance decoding with predicate: Breaking the “lattice barrier” for the hidden number problem[C] Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2021: 528558[43]Aranha D F, Novaes F R, Takahashi A, et al. LadderLeak: Breaking ECDSA with less than one bit of nonce leakage[C] Proc of the 2020 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2020: 225242[44]Ducas L. Shortest vector from lattice sieving: A few dimensions for free[C] Proc of Annual Int Conf on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2018: 125145[45]Gao Y, Wang J, Hu H, et al. Attacking ECDSA with nonce leakage by lattice sieving: Bridging the gap with fourier analysisbased attacks[C] Advances in Cryptology—ASIACRYPT 2024. Berlin: Springer, 2024: 334[46]Allan T, Brumley B B, Falkner K, et al. Amplifying side channels through performance degradation[C] Proc of the 32nd Annual Conf on Computer Security Applications(ACSAC 2016). New York: ACM, 2016: 422435 |