An algorithm to select a secure twisted elliptic curve in cryptography
Tóm tắt
Từ khóa
#tấn công fault #đường cong xoắn #hang Montgomery #mật mã đường cong Elliptic IntroductionTài liệu tham khảo
Dinh Quoc Tien, Do Dai Chi, “Về tấn công gây lỗi trên hệ mật đường cong elliptic dựa vào đường cong xoắn", Journal Journal of Science and Technology on Information security, No 2. 2016.
Accredited Standards Committee X9. "American National Standard X9.62-2005, Public key cryptography for the financial services industry: the elliptic curve digital signature algorithm (ECDSA)." 2005
B. Black, J. Bos, C. Costello, P. Longa, M. Naehrig, “Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation”, https://datatracker.ietf.org/doc/html/draft-black-numscurves-02
Certicom Research. " SEC 1: Elliptic Curve Cryptography, Version 2.0." May 21, 2009.
Certicom Research, “SEC 2: Recommended Elliptic Curve Domain Parameters”, 2010.
Daniel J. Bernstein, Tanja Lange, And Peter Schwabe, “On the correct use of the negation map in the Pollard rho method” , https://eprint.iacr.org/2011/003.pdf
Diego F. Aranha, Paulo S. L. M. Barreto, Geovandro C. C. F. Pereira, And Jefferson E. Ricardini, “A note on high-security general-purpose elliptic curves”, 2013, https://eprint.iacr.org/2013/647.pdf
ECC Brainpool, “ECC Brainpool Standard Curves and Curve Generation”, 2010.
Hoheisel, G., Primzahlprobleme in der Analysis. Sitz. Preuss. Akad. Wiss. 33 (1930), 580—588.
P.-A. Fouque, R. Lercier, D. Réal and F. Valette, “Fault attack on elliptic curve Montgomery ladder implementation, Fault Diagnosis and Tolerance in Cryptography”, 2008. FDTC'08. 5th Workshop on, IEEE,, 2008.
RFC 7836, “Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012”,
https://datatracker.ietf.org/doc/rfc7836/
Roberto M. Avanzi, Henri Cohen, Christophe Doche, Gerhard Frey, Tanja Lange, Kim Nguyen, Frederik Vercauteren, “Handbook of Elliptic and Hyperelliptic Curve Cryptography”, 2005.
U.S. Department of Commerce/National Institute of Standards and Technology, “Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters”, FIPS-186-6 (draft) 2019.
https://safecurves.cr.yp.to/
Miracl, Miracl Cryptographic SDK, https://github.com/miracl/MIRACL, Accessed on 10/9/2020
B. Buhrow. (2010) yafu. Available: http://sourceforge.net/projects/yafu/
Edlyn Teske (2000), “On Random Walks for Pollard’s Rho Method”, Mathematichs of Computation, Vol. 70, No. 234, pp. 809-825.