id-GostR3410-2001-CryptoPro-B-ParamSet
256-bit prime field Weierstrass curve.RFC4357
Parameters
SAGE
p = 0x8000000000000000000000000000000000000000000000000000000000000c99K = GF(p)a = K(0x8000000000000000000000000000000000000000000000000000000000000c96)b = K(0x3e1af419a269a5f866a7d3c25c3df80ae979259373ff2b182f49d4ce7e1bbc8b)E = EllipticCurve(K, (a, b))G = E(0x01, 0x3fa8124359f96680b83d1c3eb2c070e5c545c9858d03ecfb744bf8d717717efc)E.set_order(0x800000000000000000000000000000015f700cfff1a624e5e497161bcc8a198f * 0x1)
PARI/GP
p = 0x8000000000000000000000000000000000000000000000000000000000000c99a = Mod(0x8000000000000000000000000000000000000000000000000000000000000c96, p)b = Mod(0x3e1af419a269a5f866a7d3c25c3df80ae979259373ff2b182f49d4ce7e1bbc8b, p)E = ellinit([a, b])E[16][1] = 0x800000000000000000000000000000015f700cfff1a624e5e497161bcc8a198f * 0x1G = [Mod(0x01, p), Mod(0x3fa8124359f96680b83d1c3eb2c070e5c545c9858d03ecfb744bf8d717717efc, p)]
JSON
{"name": "id-GostR3410-2001-CryptoPro-B-ParamSet","desc": "RFC4357","form": "Weierstrass","field": {"type": "Prime","p": "0x8000000000000000000000000000000000000000000000000000000000000c99","bits": 256},"params": {"a": {"raw": "0x8000000000000000000000000000000000000000000000000000000000000c96"},"b": {"raw": "0x3e1af419a269a5f866a7d3c25c3df80ae979259373ff2b182f49d4ce7e1bbc8b"}},"generator": {"x": {"raw": "0x01"},"y": {"raw": "0x3fa8124359f96680b83d1c3eb2c070e5c545c9858d03ecfb744bf8d717717efc"}},"order": "0x800000000000000000000000000000015f700cfff1a624e5e497161bcc8a198f","cofactor": "0x1"}