{"blog_title":"\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093","description":"CTF\u306b\u304a\u3051\u308bCrypto\u5165\u9580\u3068\u307e\u3068\u3081\u306e1\u3064\u3067\u3059\u3002 \u6955\u5186\u66f2\u7dda \u6955\u5186\u66f2\u7dda\u6697\u53f7: ECC: Elliptic Curve Cryptography \u3068\u6955\u5186\u66f2\u7dda\u4e0a\u306e\u96e2\u6563\u5bfe\u6570\u554f\u984c ECDLP: Elliptic Curve Discrete Logarithm Problem ECDLP \u6955\u5186\u66f2\u7dda\u306b\u304a\u3051\u308b\u96e2\u6563\u5bfe\u6570\u554f\u984c MOV / FR Reduction Singular Curve Point Decompression Attack Invalid Curve Attack / Small-Subgroup Attack \u4ed6\u3001\u8cc7\u6599 ECDH\u9375\u5171\u6709: ECDH, \u6955\u5186ElGamal\u6697\u53f7 ECDSA\u7f72\u2026","categories":["Security"],"provider_url":"https://hatena.blog","image_url":null,"blog_url":"https://blog.hamayanhamayan.com/","version":"1.0","url":"https://blog.hamayanhamayan.com/entry/2025/11/26/233607","author_url":"https://blog.hatena.ne.jp/hamayanhamayan/","title":"CTF\u306eCrypto\u306b\u304a\u3051\u308b\u6955\u5186\u66f2\u7dda\u307e\u3068\u3081 [EC, isogeny]","provider_name":"Hatena Blog","width":"100%","height":"190","published":"2025-11-26 23:36:07","author_name":"hamayanhamayan","type":"rich","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblog.hamayanhamayan.com%2Fentry%2F2025%2F11%2F26%2F233607\" title=\"CTF\u306eCrypto\u306b\u304a\u3051\u308b\u6955\u5186\u66f2\u7dda\u307e\u3068\u3081 [EC, isogeny] - \u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\u306f\u307e\u3084\u3093\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}