diff options
| author | J08nY | 2018-06-30 18:27:41 +0200 |
|---|---|---|
| committer | J08nY | 2018-06-30 18:27:41 +0200 |
| commit | 632ba7f154bd90b3528ed39b2bc01cb2cfa10dd0 (patch) | |
| tree | ee37e374c59f3e5449fc972106b35cb75d098070 /docs | |
| parent | 6c29f55b0e3c5a866c7589393db9259950db811b (diff) | |
| download | ECTester-632ba7f154bd90b3528ed39b2bc01cb2cfa10dd0.tar.gz ECTester-632ba7f154bd90b3528ed39b2bc01cb2cfa10dd0.tar.zst ECTester-632ba7f154bd90b3528ed39b2bc01cb2cfa10dd0.zip | |
Diffstat (limited to 'docs')
| -rw-r--r-- | docs/TESTS.md | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/docs/TESTS.md b/docs/TESTS.md index c62234b..59bd27b 100644 --- a/docs/TESTS.md +++ b/docs/TESTS.md @@ -59,7 +59,7 @@ Tests on a category of wrong curves. These curves are not really curves as they - non-prime field in the prime-field case - reducible polynomial as the field polynomial in the binary case -This test suite also does some additional tests with corrupting the field parameter: +This test suite also does some additional tests with corrupting the parameters: - Fp: - p = 0 - p = 1 @@ -87,6 +87,9 @@ Tests using curves that don't have a prime order/nearly prime order. These tests should generally fail, a success here implies the card will use a non-secure curve if such curve is set by the applet. Operations over such curves are susceptible to small-subgroup attacks. + - r = p * q + - \[r\]G = infinity but r != |G|, so |G| divides r + For example: ```bash java -jar ECTester.jar -t composite |
