Bilibili Tech
Mar 17, 2022 · Information Security
How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques
This article explains why side‑channel attacks threaten SM2, SM3, and SM4 algorithms, describes the vulnerabilities of table‑lookup and double‑and‑add implementations, and presents constant‑time scalar multiplication and selection methods in Go to protect private keys on blockchain platforms.
GoSM2constant-time
0 likes · 13 min read
