File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Fault attacks on hyperelliptic curve discrete logarithm problem over binary field

TitleFault attacks on hyperelliptic curve discrete logarithm problem over binary field
Authors
Keywordsbinary field
cryptosystem
discrete logarithm
genus
hyperelliptic curve
Issue Date2014
Citation
Science China Information Sciences, 2014, v. 57, n. 3, p. 1-17 How to Cite?
AbstractIn this paper, we present invalid-curve attacks that apply to the hyperelliptic curve scalar multiplication (HECSM) algorithm proposed by Avanzi et al. on the genus 2 hyperelliptic curve over binary field. We observe some new properties of the HECSM. Our attacks are based on these new properties and the observation that the parameters f 0 and f 1 of the hyperelliptic curve equation are not utilized for the HECSM. We show that with different "values" for curve parameters f 0, f 1, there exsit cryptographically weak groups in the Koblitz hyperelliptic curve. Also, we compute the theoretical probability of getting a weak Jacobian group of hyperelliptic curve whose cardinality is an smooth integer. © 2014 Science China Press and Springer-Verlag Berlin Heidelberg.
Persistent Identifierhttp://hdl.handle.net/10722/311985
ISSN
2021 Impact Factor: 7.275
2020 SCImago Journal Rankings: 0.557
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorWang, Ming Qiang-
dc.contributor.authorXue, Hai Yang-
dc.contributor.authorZhan, Tao-
dc.date.accessioned2022-04-06T04:31:55Z-
dc.date.available2022-04-06T04:31:55Z-
dc.date.issued2014-
dc.identifier.citationScience China Information Sciences, 2014, v. 57, n. 3, p. 1-17-
dc.identifier.issn1674-733X-
dc.identifier.urihttp://hdl.handle.net/10722/311985-
dc.description.abstractIn this paper, we present invalid-curve attacks that apply to the hyperelliptic curve scalar multiplication (HECSM) algorithm proposed by Avanzi et al. on the genus 2 hyperelliptic curve over binary field. We observe some new properties of the HECSM. Our attacks are based on these new properties and the observation that the parameters f 0 and f 1 of the hyperelliptic curve equation are not utilized for the HECSM. We show that with different "values" for curve parameters f 0, f 1, there exsit cryptographically weak groups in the Koblitz hyperelliptic curve. Also, we compute the theoretical probability of getting a weak Jacobian group of hyperelliptic curve whose cardinality is an smooth integer. © 2014 Science China Press and Springer-Verlag Berlin Heidelberg.-
dc.languageeng-
dc.relation.ispartofScience China Information Sciences-
dc.subjectbinary field-
dc.subjectcryptosystem-
dc.subjectdiscrete logarithm-
dc.subjectgenus-
dc.subjecthyperelliptic curve-
dc.titleFault attacks on hyperelliptic curve discrete logarithm problem over binary field-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/s11432-013-5048-6-
dc.identifier.scopuseid_2-s2.0-84897745344-
dc.identifier.volume57-
dc.identifier.issue3-
dc.identifier.spage1-
dc.identifier.epage17-
dc.identifier.isiWOS:000332351000016-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats