Analysis of SM2 Encryption and Decryption Vulnerability in OpenSSL
LIU Zhenya1,2, LIN Jingqiang1,2,3()
1. University of Science and Technology, Hefei 230027, China 2. Key Laboratory of Electromagnetic Space Information, Hefei 230027, China 3. Beijing Research Institute of USTC, Beijing 100193, China
GM/T 0003. 4-2012. Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves-Part 4: Public Key Encryption Algorithm[S].BeiJing: China Cryptography Administration, 2012.
RANDAL E B, HALLARON D R. Computer Systems: A Programmer’s Perspective Third Edition[M]. BeiJing: China Machine Press, 2016.
兰德尔, 奥哈拉伦. 深入理解计算机系统[M]. 北京: 机械工业出版社, 2016.
[11]
DHAVAL K. Heap-Exploitation[EB/OL]. [2022-06-16].
[12]
BARKER E, KELSEY J. NIST SP 800-90 A Rev. 1 Recommendation for Random Number Generation Using Deterministic Random Bit Generators[EB/OL]. [2022-06-10]. https://dl.acm.org/doi/book/10.5555/2206302.