椭圆曲线密码学 (Chinese Wikipedia)

Analysis of information sources in references of the Wikipedia article "椭圆曲线密码学" in Chinese language version.

refsWebsite
Global rank Chinese rank
1st place
1st place
2nd place
23rd place
low place
7,987th place
5,032nd place
5,199th place
low place
low place
6th place
4th place
26th place
113th place
low place
low place
8,888th place
6,251st place
7th place
31st place
24th place
29th place
69th place
254th place
low place
low place

archive.org (Global: 6th place; Chinese: 4th place)

arxiv.org (Global: 69th place; Chinese: 254th place)

  • Roetteler, Martin; Naehrig, Michael; Svore, Krysta M.; Lauter, Kristin. Quantum resource estimates for computing elliptic curve discrete logarithms. 2017. arXiv:1706.06752可免费查阅 [quant-ph]. 

doi.org (Global: 2nd place; Chinese: 23rd place)

iacr.org (Global: 5,032nd place; Chinese: 5,199th place)

eprint.iacr.org

iacr.org

jstor.org (Global: 26th place; Chinese: 113th place)

keylength.com (Global: low place; Chinese: low place)

nytimes.com (Global: 7th place; Chinese: 31st place)

bits.blogs.nytimes.com

openssl.org (Global: low place; Chinese: low place)

wiki.openssl.org

schneier.com (Global: 8,888th place; Chinese: 6,251st place)

seclists.org (Global: low place; Chinese: low place)

  • Cohen, Cfir. AMD-SEV: Platform DH key recovery via invalid curve attack (CVE-2019-9836). Seclist Org. 2019-06-25 [2019-07-04]. (原始内容存档于2019-07-02). The SEV elliptic-curve (ECC) implementation was found to be vulnerable to an invalid curve attack. At launch-start command, an attacker can send small order ECC points not on the official NIST curves, and force the SEV firmware to multiply a small order point by the firmware’s private DH scalar. 

web.archive.org (Global: 1st place; Chinese: 1st place)

webcitation.org (Global: 24th place; Chinese: 29th place)

yp.to (Global: low place; Chinese: 7,987th place)

blog.cr.yp.to

rump2007.cr.yp.to

safecurves.cr.yp.to