{"id":"https://openalex.org/W4323319969","doi":"https://doi.org/10.46586/tches.v2023.i2.568-586","title":"Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate","display_name":"Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate","publication_year":2023,"publication_date":"2023-03-06","ids":{"openalex":"https://openalex.org/W4323319969","doi":"https://doi.org/10.46586/tches.v2023.i2.568-586"},"language":"en","primary_location":{"id":"doi:10.46586/tches.v2023.i2.568-586","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i2.568-586","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10294/9744","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://tches.iacr.org/index.php/TCHES/article/download/10294/9744","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101246879","display_name":"Luyao Xu","orcid":"https://orcid.org/0009-0005-6997-5687"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Luyao Xu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012449734","display_name":"Zhengyi Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengyi Dai","raw_affiliation_strings":["College of Computer, National University of Defense Technology, Changsha 410073, China"],"affiliations":[{"raw_affiliation_string":"College of Computer, National University of Defense Technology, Changsha 410073, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101715026","display_name":"Baofeng Wu","orcid":"https://orcid.org/0000-0002-6567-9216"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baofeng Wu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, ChineseAcademy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, ChineseAcademy of Sciences, Beijing 100093, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, ChineseAcademy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, ChineseAcademy of Sciences, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008820992","display_name":"Dongdai Lin","orcid":"https://orcid.org/0000-0002-3951-7889"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongdai Lin","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China","School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210156404"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China","institution_ids":["https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101246879"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.5175,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69651965,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"568","last_page":"586"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9828000068664551,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptographic-nonce","display_name":"Cryptographic nonce","score":0.9064558744430542},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.6060115098953247},{"id":"https://openalex.org/keywords/lattice","display_name":"Lattice (music)","score":0.5531229376792908},{"id":"https://openalex.org/keywords/predicate","display_name":"Predicate (mathematical logic)","score":0.5306004285812378},{"id":"https://openalex.org/keywords/lattice-reduction","display_name":"Lattice reduction","score":0.5208002328872681},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5147747993469238},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3635098338127136},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3414791524410248},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.24430736899375916},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14897915720939636},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.13302457332611084}],"concepts":[{"id":"https://openalex.org/C9996903","wikidata":"https://www.wikidata.org/wiki/Q1749235","display_name":"Cryptographic nonce","level":3,"score":0.9064558744430542},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.6060115098953247},{"id":"https://openalex.org/C2781204021","wikidata":"https://www.wikidata.org/wiki/Q6497091","display_name":"Lattice (music)","level":2,"score":0.5531229376792908},{"id":"https://openalex.org/C140146324","wikidata":"https://www.wikidata.org/wiki/Q1144319","display_name":"Predicate (mathematical logic)","level":2,"score":0.5306004285812378},{"id":"https://openalex.org/C44274781","wikidata":"https://www.wikidata.org/wiki/Q6497132","display_name":"Lattice reduction","level":4,"score":0.5208002328872681},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5147747993469238},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3635098338127136},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3414791524410248},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.24430736899375916},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14897915720939636},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.13302457332611084},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C207987634","wikidata":"https://www.wikidata.org/wiki/Q176862","display_name":"MIMO","level":3,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.46586/tches.v2023.i2.568-586","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i2.568-586","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10294/9744","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ae526f4636ea47a0a59f4214e702d3e3","is_oa":true,"landing_page_url":"https://doaj.org/article/ae526f4636ea47a0a59f4214e702d3e3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 2 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.46586/tches.v2023.i2.568-586","is_oa":true,"landing_page_url":"https://doi.org/10.46586/tches.v2023.i2.568-586","pdf_url":"https://tches.iacr.org/index.php/TCHES/article/download/10294/9744","source":{"id":"https://openalex.org/S4210207404","display_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","issn_l":"2569-2925","issn":["2569-2925"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Transactions on Cryptographic Hardware and Embedded Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1258056322","display_name":null,"funder_award_id":"B18054","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1690741484","display_name":null,"funder_award_id":"2020YFB1805402","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1882683931","display_name":null,"funder_award_id":"61936008","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1939292014","display_name":null,"funder_award_id":"6197239","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4355271718","display_name":null,"funder_award_id":"2020YFB1805402","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4882583639","display_name":null,"funder_award_id":"62172427","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5132393186","display_name":null,"funder_award_id":"61972393","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5361398898","display_name":null,"funder_award_id":"61872359","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5517038434","display_name":null,"funder_award_id":"2020YFB","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5555541602","display_name":null,"funder_award_id":"B18054","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6058138561","display_name":null,"funder_award_id":", No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7033253288","display_name":null,"funder_award_id":"Grants","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8099725802","display_name":null,"funder_award_id":"61936008","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8863666567","display_name":null,"funder_award_id":"and No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G940792598","display_name":null,"funder_award_id":"61872359","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4323319969.pdf"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W998470930","https://openalex.org/W1192290872","https://openalex.org/W1447686308","https://openalex.org/W1490468194","https://openalex.org/W1547036183","https://openalex.org/W1572143270","https://openalex.org/W1580599221","https://openalex.org/W1766548092","https://openalex.org/W1845765495","https://openalex.org/W2007712808","https://openalex.org/W2021907057","https://openalex.org/W2026129593","https://openalex.org/W2058546698","https://openalex.org/W2136635506","https://openalex.org/W2136724222","https://openalex.org/W2155178472","https://openalex.org/W2161110873","https://openalex.org/W2162903136","https://openalex.org/W2295744963","https://openalex.org/W2400700555","https://openalex.org/W2584914299","https://openalex.org/W2789825276","https://openalex.org/W2794791038","https://openalex.org/W2795008797","https://openalex.org/W2894911182","https://openalex.org/W2920734175","https://openalex.org/W2952033682","https://openalex.org/W2985947210","https://openalex.org/W3048896543","https://openalex.org/W3096664316","https://openalex.org/W3114185936","https://openalex.org/W3149570512","https://openalex.org/W3211507582","https://openalex.org/W4239672913","https://openalex.org/W4300599472"],"related_works":["https://openalex.org/W2042331445","https://openalex.org/W2170273857","https://openalex.org/W2024289192","https://openalex.org/W2354930811","https://openalex.org/W2950467063","https://openalex.org/W2167709639","https://openalex.org/W2381112272","https://openalex.org/W3140499740","https://openalex.org/W1975398469","https://openalex.org/W1893277061"],"abstract_inverted_index":{"Lattice":[0],"reduction":[1,43],"algorithms":[2,44,58,73],"have":[3],"been":[4],"proved":[5],"to":[6,53,101,128,144,234],"be":[7],"one":[8],"of":[9,133,182],"the":[10,54,80,104,120,131,146,156,193,197,205,220],"most":[11],"powerful":[12],"and":[13,48,69,78,124,172,187,204],"versatile":[14],"tools":[15],"in":[16,89,108,180,243],"public":[17],"key":[18],"cryptanalysis.":[19],"In":[20],"this":[21],"work,":[22],"we":[23,113,137,218],"primarily":[24],"concentrate":[25],"on":[26,41,142,196],"lattice":[27,42,57,72,81,106,158,194,222],"attacks":[28,159],"against":[29,224],"(EC)DSA":[30],"with":[31,75,116,119,200,208,226,239],"nonce":[32,64,166,174,202,210,229,241],"leakage":[33,167,175,203,211,242],"via":[34],"some":[35],"sidechannel":[36],"analysis.":[37],"Previous":[38],"works":[39],"relying":[40],"such":[45,163],"as":[46,164],"LLL":[47],"BKZ":[49],"will":[50],"finally":[51],"lead":[52],"\u201clattice":[55],"barrier\u201d:":[56],"become":[59],"infeasible":[60,215],"when":[61],"only":[62],"fewer":[63],"is":[65],"known.":[66],"Recently,":[67],"Albrecht":[68],"Heninger":[70],"introduced":[71],"augmented":[74],"a":[76,94,109,139,151,169,177,227,236],"predicate":[77,97,117],"broke":[79],"barrier":[82],"(Eurocrypt":[83],"2021).":[84],"We":[85,190],"improve":[86,130],"their":[87],"work":[88],"several":[90],"aspects.We":[91],"first":[92,221],"propose":[93],"more":[95],"efficient":[96],"algorithm":[98,118,154],"which":[99,212,231],"aims":[100],"search":[102],"for":[103,122,160,168,176],"target":[105],"vector":[107],"large":[110],"database.":[111],"Then,":[112],"combine":[114],"sieving":[115],"\u201cdimensions":[121],"free\u201d":[123],"\u201cprogressive":[125],"sieving\u201d":[126],"techniques":[127],"further":[129],"performance":[132],"our":[134,153],"attacks.":[135],"Furthermore,":[136],"give":[138,219],"theoretic":[140],"analysis":[141],"how":[143],"choose":[145],"optimal":[147],"Kannan":[148],"embedding":[149],"factor.As":[150],"result,":[152],"outperforms":[155],"state-of-the-art":[157],"existing":[161],"records":[162,195],"3-bit":[165,201],"256-bit":[170,206],"curve":[171,179,199,207,238],"2-bit":[173,209],"160-bit":[178],"terms":[181],"running":[183],"time,":[184],"sample":[185],"numbers":[186],"success":[188],"probability.":[189],"also":[191],"break":[192,235],"384-bit":[198],"are":[213],"thought":[214],"previously.":[216],"Finally,":[217],"attack":[223],"ECDSA":[225],"single-bit":[228],"leakage,":[230],"enables":[232],"us":[233],"112-bit":[237],"1-bit":[240],"practical":[244],"time.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-13T07:58:08.660418","created_date":"2025-10-10T00:00:00"}
