Practical Invalid Curve Attacks on TLS-ECDH
Elliptic Curve Cryptography (ECC) is based on cyclic groups, where group elements are represented as points in a finite plane. All ECC cryptosystems implicitly assume that only valid group elements will be processed by the different cryptographic algorith
- PDF / 18,620,208 Bytes
- 552 Pages / 439.37 x 666.142 pts Page_size
- 46 Downloads / 219 Views
Data Loading...