1. Yarom Y, Falkner K. Flush+reload: a high resolution, low noise, L3 cache side-channel attack. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, 2014. 719–732
2. Yarom Y, Benger N. Recovering OpenSSL ECDSA nonces using the FLUSH + RELOAD cache sidechannel attack. IACR Cryptology ePrint Archive, 2014, 2014: 140
3. State Cryptography Administration of China. Public key cryptographic algorithm SM2 based on elliptic curves. GM/T 0003-2012. http://www.oscca.gov.cn/UpFile/2010122214822692.pdf
4. Nguyen P Q, Shparlinski I E. The insecurity of the ellipitc curve digital signature algorithm with partially known nonces. Design Code Cryptogr, 2003, 30: 151–176
5. Liu M, Chen J. Partially known nonces and fault injection attacks on SM2 signature algorithm. In: Proceedings of Information Security and Cryptology, Guangzhou, 2013. 343–358