Tagged articles
1 articles
Page 1 of 1
Bilibili Tech
Bilibili Tech
Mar 17, 2022 · Information Security

How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques

This article explains why side‑channel attacks threaten SM2, SM3, and SM4 algorithms, describes the vulnerabilities of table‑lookup and double‑and‑add implementations, and presents constant‑time scalar multiplication and selection methods in Go to protect private keys on blockchain platforms.

GoSM2constant-time
0 likes · 13 min read
How to Secure SM2 Elliptic Curve Operations with Constant‑Time Techniques