![]() |
Bitcoin Core 22.99.0
P2P Digital Currency
|
Go to the source code of this file.
Macros | |
| #define | ECMULT_CONST_TABLE_GET_GE(r, pre, n, w) |
Functions | |
| static int | secp256k1_wnaf_const (int *wnaf, const secp256k1_scalar *scalar, int w, int size) |
| Convert a number to WNAF notation. More... | |
| static void | secp256k1_ecmult_const (secp256k1_gej *r, const secp256k1_ge *a, const secp256k1_scalar *scalar, int size) |
| #define ECMULT_CONST_TABLE_GET_GE | ( | r, | |
| pre, | |||
| n, | |||
| w | |||
| ) |
Definition at line 16 of file ecmult_const_impl.h.
|
static |
Definition at line 135 of file ecmult_const_impl.h.
|
static |
Convert a number to WNAF notation.
The number becomes represented by sum(2^{wi} * wnaf[i], i=0..WNAF_SIZE(w)+1) - return_val. It has the following guarantees:
Adapted from The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks, Okeya and Tagaki. M. Joye (Ed.) CT-RSA 2003, LNCS 2612, pp. 328-443, 2003. Springer-Verlag Berlin Heidelberg 2003
Numbers reference steps of Algorithm SPA-resistant Width-w NAF with Odd Scalar on pp. 335
Definition at line 55 of file ecmult_const_impl.h.