File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/s11432-013-5048-6
- Scopus: eid_2-s2.0-84897745344
- WOS: WOS:000332351000016
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
Title | Fault attacks on hyperelliptic curve discrete logarithm problem over binary field |
---|---|
Authors | |
Keywords | binary field cryptosystem discrete logarithm genus hyperelliptic curve |
Issue Date | 2014 |
Citation | Science China Information Sciences, 2014, v. 57, n. 3, p. 1-17 How to Cite? |
Abstract | In this paper, we present invalid-curve attacks that apply to the hyperelliptic curve scalar multiplication (HECSM) algorithm proposed by Avanzi et al. on the genus 2 hyperelliptic curve over binary field. We observe some new properties of the HECSM. Our attacks are based on these new properties and the observation that the parameters f 0 and f 1 of the hyperelliptic curve equation are not utilized for the HECSM. We show that with different "values" for curve parameters f 0, f 1, there exsit cryptographically weak groups in the Koblitz hyperelliptic curve. Also, we compute the theoretical probability of getting a weak Jacobian group of hyperelliptic curve whose cardinality is an smooth integer. © 2014 Science China Press and Springer-Verlag Berlin Heidelberg. |
Persistent Identifier | http://hdl.handle.net/10722/311985 |
ISSN | 2023 Impact Factor: 7.3 2023 SCImago Journal Rankings: 1.882 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Ming Qiang | - |
dc.contributor.author | Xue, Hai Yang | - |
dc.contributor.author | Zhan, Tao | - |
dc.date.accessioned | 2022-04-06T04:31:55Z | - |
dc.date.available | 2022-04-06T04:31:55Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Science China Information Sciences, 2014, v. 57, n. 3, p. 1-17 | - |
dc.identifier.issn | 1674-733X | - |
dc.identifier.uri | http://hdl.handle.net/10722/311985 | - |
dc.description.abstract | In this paper, we present invalid-curve attacks that apply to the hyperelliptic curve scalar multiplication (HECSM) algorithm proposed by Avanzi et al. on the genus 2 hyperelliptic curve over binary field. We observe some new properties of the HECSM. Our attacks are based on these new properties and the observation that the parameters f 0 and f 1 of the hyperelliptic curve equation are not utilized for the HECSM. We show that with different "values" for curve parameters f 0, f 1, there exsit cryptographically weak groups in the Koblitz hyperelliptic curve. Also, we compute the theoretical probability of getting a weak Jacobian group of hyperelliptic curve whose cardinality is an smooth integer. © 2014 Science China Press and Springer-Verlag Berlin Heidelberg. | - |
dc.language | eng | - |
dc.relation.ispartof | Science China Information Sciences | - |
dc.subject | binary field | - |
dc.subject | cryptosystem | - |
dc.subject | discrete logarithm | - |
dc.subject | genus | - |
dc.subject | hyperelliptic curve | - |
dc.title | Fault attacks on hyperelliptic curve discrete logarithm problem over binary field | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/s11432-013-5048-6 | - |
dc.identifier.scopus | eid_2-s2.0-84897745344 | - |
dc.identifier.volume | 57 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 17 | - |
dc.identifier.isi | WOS:000332351000016 | - |