1
|
Chen A, Hong C, Shang X, Jing H, Xu S. Timing leakage to break SM2 signature algorithm. Journal of Information Security and Applications 2022; 67:103210. [DOI: 10.1016/j.jisa.2022.103210] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
|
2
|
Ma Z, Cai Q, Lin J, Luo B, Jing J. Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. JCS 2019. [DOI: 10.3233/jcs-191296] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Affiliation(s)
- Ziqiang Ma
- State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails: , ,
- Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China
- School of Cyber Security, University of Chinese Academy of Sciences, China
| | - Quanwei Cai
- State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails: , ,
- Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China
| | - Jingqiang Lin
- State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, China. E-mails: , ,
- Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China
- School of Cyber Security, University of Chinese Academy of Sciences, China
| | - Bo Luo
- Department of Electrical Engineering and Computer Science, University of Kansas, USA. E-mail:
| | - Jiwu Jing
- Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, China
- School of Computer Science, University of Chinese Academy of Sciences, China. E-mail:
| |
Collapse
|
3
|
Affiliation(s)
| | - Raad Bahmani
- Technische Universität Darmstadt, Germany. E-mails: , ,
| | | | | | | | | |
Collapse
|
4
|
Genkin D, Pachmanov L, Pipman I, Tromer E. ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. Topics in Cryptology - CT-RSA 2016 2016. [DOI: 10.1007/978-3-319-29485-8_13] [Citation(s) in RCA: 28] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
|
5
|
|