MPHELL  5.0.0
Data Fields
ecdsa_sig Struct Reference

Define an ECDSA signature. More...

Collaboration diagram for ecdsa_sig:
Collaboration graph
[legend]

Data Fields

number * r
 
number * s
 
ec_point R
 

Detailed Description

Define an ECDSA signature.

Define an ECGDSA signature.

Some documents to get more informations about ECDSA standard and hash standard functions [FIPS-180] FIPS 180-4: Secure Hash Standard by the National Institute of Standards and Technology, august 2015, http://dx.doi.org/10.6028/NIST.FIPS.180-4
[FIPS-186] FIPS 186-4: Digital Signature Standard by the National Institute of Standards and Technology, july 2013, http://dx.doi.org/10.6028/NIST.FIPS.186-4
[FIPS-202] FIPS 202: SHA 3 Standard: Permutation based hash and extendable output functions by the National Institute of Standards and Technology, august 2015, http://dx.doi.org/10.6028/NIST.FIPS.202 [SP-800] SP 800-107 Recommendation for application using approved hash algorithms by Quynh Dang of the National Institute of Standards and Technology, august 2012, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf

Some documents to get more informations about ECGDSA standard and hash standard functions [BSI-TR-03111] Technical guideline BSI TR-03111 Elliptic Curve Cryptography of Bundesamt fur Sicherheit in der Informationstechnik, june 2018, https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03111/BSI-TR-03111_V-2-1_pdf.pdf?__blob=publicationFile&v=2#cite.iso-15946-2 [FIPS-180] FIPS 180-4: Secure Hash Standard by the National Institute of Standards and Technology, august 2015, http://dx.doi.org/10.6028/NIST.FIPS.180-4
[FIPS-186] FIPS 186-4: Digital Signature Standard by the National Institute of Standards and Technology, july 2013, http://dx.doi.org/10.6028/NIST.FIPS.186-4
[FIPS-202] FIPS 202: SHA 3 Standard: Permutation based hash and extendable output functions by the National Institute of Standards and Technology, august 2015, http://dx.doi.org/10.6028/NIST.FIPS.202 [SP-800] SP 800-107 Recommendation for application using approved hash algorithms by Quynh Dang of the National Institute of Standards and Technology, august 2012, https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf

Definition at line 49 of file mphell_tuto_ecdsa.c.

Field Documentation

◆ r

number * r

First signature number, belongs to [1, n-1]

Definition at line 51 of file mphell_tuto_ecdsa.c.

◆ s

number * s

Second signature number, belongs to [1, n-1]

Definition at line 52 of file mphell_tuto_ecdsa.c.


The documentation for this struct was generated from the following files: