
Cryptography
Elliptic curve attacks - from small subgroup attack to invalid curve attack
Discussion of two attack methods when the code does not check if an EC point is actually on the curve.
ret2basic.eth
April 12, 2024
30 min read
Read More
Deep dive into DeFi security research, vulnerability analysis, and best practices from the Taichi Audit team.
Understanding Rust's elegant method chaining pattern and how it creates readable, efficient data transformation pipelines.
Discussion of two attack methods when the code does not check if an EC point is actually on the curve.