Files
std-curves/nums/curves.json
2026-04-03 00:33:29 +02:00

751 lines
27 KiB
JSON

{
"name": "NUMS",
"desc": "Microsoft Nothing Up My Sleeve (NUMS) curves from: <https://eprint.iacr.org/2014/130> and <https://tools.ietf.org/html/draft-black-numscurves-02>",
"curves": [
{
"name": "numsp256d1",
"category": "nums",
"desc": "",
"sources": [
{
"name": "Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation",
"url": "https://tools.ietf.org/html/draft-black-numscurves-02"
}
],
"field": {
"type": "Prime",
"p": "0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff43",
"bits": 256
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff40"
},
"b": {
"raw": "0x25581"
}
},
"generator": {
"x": {
"raw": "0x01"
},
"y": {
"raw": "0x696f1853c1e466d7fc82c96cceeedd6bd02c2f9375894ec10bf46306c2b56c77"
}
},
"order": "0xffffffffffffffffffffffffffffffffe43c8275ea265c6020ab20294751a825",
"cofactor": "0x01",
"characteristics": {
"cm_disc": "-461806436970513507795776071208962019617834464011805499237102336028251098834763",
"conductor": "1",
"discriminant": "115792089237316195423570985008687907853269984665640564039457583997805596472403",
"j_invariant": "63443586882444752838319511351138587410933807550953792556950236171595237693864",
"embedding_degree": "28948022309329048855892746252171976963308270116406376960317592454814487570953",
"trace_of_frobenius": "36904200015056198187214188655179355935"
}
},
{
"name": "numsp256t1",
"category": "nums",
"desc": "",
"sources": [
{
"name": "Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation",
"url": "https://tools.ietf.org/html/draft-black-numscurves-02"
}
],
"field": {
"type": "Prime",
"p": "0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff43",
"bits": 256
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff42"
},
"d": {
"raw": "0x3bee"
}
},
"generator": {
"x": {
"raw": "0x0d"
},
"y": {
"raw": "0x7d0ab41e2a1276dba3d330b39fa046bfbe2a6d63824d303f707f6fb5331cadba"
}
},
"order": "0x3fffffffffffffffffffffffffffffffbe6aa55ad0a6bc64e5b84e6f1122b4ad",
"cofactor": "0x04"
},
{
"name": "numsp384d1",
"category": "nums",
"desc": "",
"sources": [
{
"name": "Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation",
"url": "https://tools.ietf.org/html/draft-black-numscurves-02"
}
],
"field": {
"type": "Prime",
"p": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffec3",
"bits": 384
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffec0"
},
"b": {
"raw": "0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff77bb"
}
},
"generator": {
"x": {
"raw": "0x02"
},
"y": {
"raw": "0x3c9f82cb4b87b4dc71e763e0663e5dbd8034ed422f04f82673330dc58d15ffa2b4a3d0bad5d30f865bcbbf503ea66f43"
}
},
"order": "0xffffffffffffffffffffffffffffffffffffffffffffffffd61eaf1eeb5d6881beda9d3d4c37e27a604d81f67b0e61b9",
"cofactor": "0x01"
},
{
"name": "numsp384t1",
"category": "nums",
"desc": "",
"sources": [
{
"name": "Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation",
"url": "https://tools.ietf.org/html/draft-black-numscurves-02"
}
],
"field": {
"type": "Prime",
"p": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffec3",
"bits": 384
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffec2"
},
"d": {
"raw": "0x5158a"
}
},
"generator": {
"x": {
"raw": "0x08"
},
"y": {
"raw": "0x749cdaba136ce9b65bd4471794aa619daa5c7b4c930bff8ebd798a8ae753c6d72f003860febabad534a4acf5fa7f5bee"
}
},
"order": "0x3fffffffffffffffffffffffffffffffffffffffffffffffecd7d11ed5a259a25a13a0458e39f4e451d6d71f70426e25",
"cofactor": "0x04"
},
{
"name": "numsp512d1",
"category": "nums",
"desc": "",
"sources": [
{
"name": "Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation",
"url": "https://tools.ietf.org/html/draft-black-numscurves-02"
}
],
"field": {
"type": "Prime",
"p": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdc7",
"bits": 512
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdc4"
},
"b": {
"raw": "0x1d99b"
}
},
"generator": {
"x": {
"raw": "0x02"
},
"y": {
"raw": "0x1c282eb23327f9711952c250ea61ad53fcc13031cf6dd336e0b9328433afbdd8cc5a1c1f0c716fdc724dde537c2b0adb00bb3d08dc83755b205cc30d7f83cf28"
}
},
"order": "0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff5b3ca4fb94e7831b4fc258ed97d0bdc63b568b36607cd243ce153f390433555d",
"cofactor": "0x01"
},
{
"name": "numsp512t1",
"category": "nums",
"desc": "",
"sources": [
{
"name": "Elliptic Curve Cryptography (ECC) Nothing Up My Sleeve (NUMS) Curves and Curve Generation",
"url": "https://tools.ietf.org/html/draft-black-numscurves-02"
}
],
"field": {
"type": "Prime",
"p": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdc7",
"bits": 512
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0xfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffdc6"
},
"d": {
"raw": "0x9baa8"
}
},
"generator": {
"x": {
"raw": "0x20"
},
"y": {
"raw": "0x7d67e841dc4c467b605091d80869212f9ceb124bf726973f9ff048779e1d614e62ae2ece5057b5dad96b7a897c1d72799261134638750f4f0cb91027543b1c5e"
}
},
"order": "0x3fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffa7e50809efdabbb9a624784f449545f0dcea5ff0cb800f894e78d1cb0b5f0189",
"cofactor": "0x04"
},
{
"name": "ed-256-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0xffa7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 256
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0xffa7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe"
},
"d": {
"raw": "0x350a"
}
},
"order": "0x3fe9ffffffffffffffffffffffffffffb154bbafb86733c966d92eded8ec7bab",
"cofactor": "0x04"
},
{
"name": "ed-254-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x3f80ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 254
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0x3f80fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe"
},
"d": {
"raw": "0x367b"
}
},
"order": "0xfe03fffffffffffffffffffffffffffeb95306c8bd62fb0eaf3d3fec46e98c7",
"cofactor": "0x04"
},
{
"name": "ed-255-mers",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd03",
"bits": 255
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd02"
},
"d": {
"raw": "0xea97"
}
},
"order": "0x1fffffffffffffffffffffffffffffffdcf1a785eda6832eac49d1ed0436eb75",
"cofactor": "0x04"
},
{
"name": "ed-384-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0xb0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 384
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0xb0fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe"
},
"d": {
"raw": "0x6f17"
}
},
"order": "0x2c3ffffffffffffffffffffffffffffffffffffffffffffff56d07e24e2749cd9f6b769aec80f6fe06fe4e3a6332489b",
"cofactor": "0x04"
},
{
"name": "ed-382-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x3ffaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 382
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0x3ffafffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe"
},
"d": {
"raw": "0xaf381"
}
},
"order": "0xffebfffffffffffffffffffffffffffffffffffffffffffd31afaa1520dc177d8c1605c481e068269880369e5f3fa61",
"cofactor": "0x04"
},
{
"name": "ed-383-mers",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe5b",
"bits": 383
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe5a"
},
"d": {
"raw": "0x7fed6"
}
},
"order": "0x1ffffffffffffffffffffffffffffffffffffffffffffffff1109704e73d9fbbbcd5687c9eaca2206ffebcec1ba7c81d",
"cofactor": "0x04"
},
{
"name": "ed-512-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0xfe14ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 512
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0xfe14fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe"
},
"d": {
"raw": "0x12a9c"
}
},
"order": "0x3f853fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffcccfd59cdc33470d103060513f6def4d37d9af21b2b2701fa331487ecb8db605",
"cofactor": "0x04"
},
{
"name": "ed-510-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x3eddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 510
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0x3eddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe"
},
"d": {
"raw": "0x8da1e"
}
},
"order": "0xfb77fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd7ced11e7c2f1abf716df42a6c246080b5fcc20917e59a42c85821cdf36d51b1",
"cofactor": "0x04"
},
{
"name": "ed-511-mers",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe1f",
"bits": 511
},
"form": "TwistedEdwards",
"params": {
"a": {
"raw": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe1e"
},
"d": {
"raw": "0x10bf7d"
}
},
"order": "0x1fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffea7c34182e41e2e9baa930e478c489b72542706bec5f32194f7c2e8f8d142f11",
"cofactor": "0x04"
},
{
"name": "w-256-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0xffa7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 256
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0xffa7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc"
},
"b": {
"raw": "0x14e6a"
}
},
"order": "0xffa7fffffffffffffffffffffffffffffc517513e6e5074b9d10c5e1a79857eb",
"cofactor": "0x01",
"characteristics": {
"cm_disc": "-462522475925072085027879645099841527608786562102829859723871355201056468266563",
"conductor": "1",
"discriminant": "115636606695615697602567654828622531023877166082715509571142882659033219954175",
"j_invariant": "85856581630626807860549708050291921260960698897850594880082766057775855794080",
"embedding_degree": "57818303347807848801283827414311265511936136060698314187214315242603326221301",
"trace_of_frobenius": "4893961318881196714252176992726657045"
}
},
{
"name": "w-254-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x3f80ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 254
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0x3f80fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc"
},
"b": {
"raw": "-0x2f72"
}
},
"order": "0x3f80ffffffffffffffffffffffffffffeb818bea0da375c06fa419c4af8df83f",
"cofactor": "0x01",
"characteristics": {
"cm_disc": "-114152451011885661692758747567358720426551428089432073707056005693826821775483",
"conductor": "1",
"discriminant": "28723632732102194046035667469577626311807405711506937402182952014350388763647",
"j_invariant": "1020779965905066122071591264944845800437831983089209932185532175247822250850",
"embedding_degree": "5744726546420438809207133493915525262356032913537750202727813807449695662502",
"trace_of_frobenius": "27241143818186388543882977165641385921"
}
},
{
"name": "w-255-mers",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd03",
"bits": 255
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffd00"
},
"b": {
"raw": "-0x51bd"
}
},
"order": "0x7fffffffffffffffffffffffffffffff864a38283ad2b3dfab8fac983c594aeb",
"cofactor": "0x01",
"characteristics": {
"cm_disc": "-205411265599729320381766099367521569945690409339341388813247842067801178975643",
"conductor": "1",
"discriminant": "57896044618658097711785492504343953926634992332820282019728792003767411190931",
"j_invariant": "46176913415558528862592191480069677879287716767964574463655728463603723997370",
"embedding_degree": "28948022309329048855892746252171976963236605943152161509982249890803503375733",
"trace_of_frobenius": "161780446515958999764292222349558067737"
}
},
{
"name": "w-384-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0xb0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 384
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0xb0fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc"
},
"b": {
"raw": "0x6c96"
}
},
"order": "0xb0ffffffffffffffffffffffffffffffffffffffffffffffba9b7f14ca7512537a4edcd38a7c41da29be4894b298eebb",
"cofactor": "0x01"
},
{
"name": "w-382-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x3ffaffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 382
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0x3ffafffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc"
},
"b": {
"raw": "-0x20a72"
}
},
"order": "0x3ffaffffffffffffffffffffffffffffffffffffffffffffa6eb1cff4bde214d73b321ffd8e82cd160ab86803ebb301d",
"cofactor": "0x01",
"characteristics": {
"cm_disc": "-34618927871335259336999487706342085293022596660341578048304804428035468331396355251253170573929364508633533796261043",
"conductor": "1",
"discriminant": "9847495414592669296538061489872013099874893943953759017552568018617869215322155954045933029003296406254048508042239",
"j_invariant": "1193904783842132576461800304849826730280618418511274336391995846834170990765840242224465394003336793409392233750372",
"embedding_degree": "2461873853648167324134515372468003274968723485988439754387595936104109646247581566367162111452319644609668547791879",
"trace_of_frobenius": "2184274201430630331829688577284583194017827823101929639907"
}
},
{
"name": "w-383-mers",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe5b",
"bits": 383
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe58"
},
"b": {
"raw": "0x17dbc"
}
},
"order": "0x7fffffffffffffffffffffffffffffffffffffffffffffffa9caf814a8a116ad9fb0b4035417aaf319297fc0bb7a439f",
"cofactor": "0x01",
"characteristics": {
"cm_disc": "-74335890621480155989754748787396375367320169623343827664223445845656783833349619164859155948472241645542524819261923",
"conductor": "1",
"discriminant": "19701003098197239606139520050071806902539869635232723333974146702122860885748605305707133127442457820399188403718683",
"j_invariant": "11763417020248336900531851014528852113062851552345693728565095240611454671801552872415821277149082183594513817350077",
"embedding_degree": "19701003098197239606139520050071806902539869635232723333972032908904187686760616563249293103936710601848892201517982",
"trace_of_frobenius": "2113793218673198987988742457840023505747218554421793635005"
}
},
{
"name": "w-512-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0xfe14ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 512
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0xfe14fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc"
},
"b": {
"raw": "0x185ed"
}
},
"order": "0xfe14ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff638a8d792ee750298064aaf0b8498e61df3d3995064ed73b939628f17e98fdc9",
"cofactor": "0x01"
},
{
"name": "w-510-mont",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x3eddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff",
"bits": 510
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0x3eddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffc"
},
"b": {
"raw": "0x988d"
}
},
"order": "0x3eddffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffb9146ccde150ef33747ab29d1e6573d8d22de95e322303f3a00b200986fa9a2d",
"cofactor": "0x01"
},
{
"name": "w-511-mers",
"category": "nums",
"desc": "Curve from https://eprint.iacr.org/2014/130.pdf. No generator present.",
"sources": [
{
"name": "Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis",
"url": "https://eprint.iacr.org/2014/130"
}
],
"field": {
"type": "Prime",
"p": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe1f",
"bits": 511
},
"form": "Weierstrass",
"params": {
"a": {
"raw": "0x7ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffe1c"
},
"b": {
"raw": "0x879da"
}
},
"order": "0x7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff8dbefa3f5ed9d839a2d4fe6ff516e87fa8d3e656a0f99fa1f0105f73b3b9d19f",
"cofactor": "0x01"
}
]
}