Open sokary2004 opened 3 months ago
Thank u for your questions. Addressing the first issue, SageMath inherently handles rational numbers, eliminating the need for the Fraction package. In this scenario, you can modify the assignment to tmpfrac = 2 ** (mr_mu[0][index2] - m) directly. Additionally, ensure to update any subsequent references to tmpfrac accordingly for consistency. Regarding the subsequent issue.
HAPPY男孩 @.***
------------------ 原始邮件 ------------------ 发件人: "JFOER/Lattice-Attacks-on-ECDSA" @.>; 发送时间: 2024年7月25日(星期四) 凌晨5:25 @.>; @.***>; 主题: [JFOER/Lattice-Attacks-on-ECDSA] ٍError : (Issue #2)
sage -python3 'Attack wNAF with invert function.py' Use the signature with index 846 Use the signature with index 854 Use the signature with index 551 The dimension of the lattice is 104 The correct guess is [491, 0] Traceback (most recent call last): File "/root/Desktop/v5/new method/Lattice-Attacks-on-ECDSA-main/Attack wNAF with invert function.py", line 392, in (-l_bkz[i][u - 1 + index2] + 2 * (m - 1)) tmpfrac)
File "sage/rings/integer.pyx", line 1929, in sage.rings.integer.Integer.mul (build/cythonized/sage/rings/integer.c:13450)
File "sage/structure/coerce.pyx", line 1242, in sage.structure.coerce.CoercionModel.bin_op (build/cythonized/sage/structure/coerce.c:11809)
File "/usr/lib/python3.11/fractions.py", line 372, in reverse
return monomorphic_operator(a, b)
^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3.11/fractions.py", line 488, in _mul
g1 = math.gcd(na, db)
another question : you insert 1000 K in txt file Randomly ? if we have K why must use LLL Attack ? please tell me about 1000 R 1000S 1000 z or hash ... and tell us why use K ? and How to make another data like data101 to test script .. thanks
—
Reply to this email directly, view it on GitHub, or unsubscribe.
You are receiving this because you are subscribed to this thread.Message ID: ***@***.***>
if you have telegram id please share . i think we can speak more ... thanks
As this article is currently under review, I cannot disclose my personal information due to the double-blind principle. However, once the article is accepted for publication, I would be happy to further discuss it with you.
HAPPY男孩 @.***
------------------ 原始邮件 ------------------ 发件人: "JFOER/Lattice-Attacks-on-ECDSA" @.>; 发送时间: 2024年7月25日(星期四) 下午3:15 @.>; @.**@.>; 主题: Re: [JFOER/Lattice-Attacks-on-ECDSA] ٍError : (Issue #2)
if you have telegram id please share . i think we can speak more ... thanks
— Reply to this email directly, view it on GitHub, or unsubscribe. You are receiving this because you commented.Message ID: @.***>
sage -python3 'Attack wNAF with invert function.py' Use the signature with index 846 Use the signature with index 854 Use the signature with index 551 The dimension of the lattice is 104 The correct guess is [491, 0] Traceback (most recent call last): File "/root/Desktop/v5/new method/Lattice-Attacks-on-ECDSA-main/Attack wNAF with invert function.py", line 392, in
(-l_bkz[i][u - 1 + index2] + 2 * (m - 1)) tmpfrac)