Analysis of information sources in references of the Wikipedia article "椭圆曲线密码学" in Chinese language version.
|journal=
被忽略 (帮助)|journal=
被忽略 (帮助)|journal=
被忽略 (帮助)The SEV elliptic-curve (ECC) implementation was found to be vulnerable to an invalid curve attack. At launch-start command, an attacker can send small order ECC points not on the official NIST curves, and force the SEV firmware to multiply a small order point by the firmware’s private DH scalar.
|journal=
被忽略 (帮助)The SEV elliptic-curve (ECC) implementation was found to be vulnerable to an invalid curve attack. At launch-start command, an attacker can send small order ECC points not on the official NIST curves, and force the SEV firmware to multiply a small order point by the firmware’s private DH scalar.