EllipticCurve   20

Million Dollar Curve
Time has come to get rid of arbitrary choices. By using publicly verifiable randomness produced in February 2016 by many national lotteries from all around the world, we propose to generate a cryptographically secure elliptic curve for the ECDH cryptosystem as an alternative to the NIST P-256 and the Curve25519 curves. It is designed so that nobody (even us!) can put a trap in it.
ellipticcurve  cryptography  security. 
february 2016 by wjy
Introduction to CurveCP
djb implements a transport protocol based on ecc keyIDs. magical crypto ponies follow.
security  protocol  programming  crypto  djb  ellipticcurve  networking  from delicious
february 2011 by graydon

related tags

1977  1985  aclu  adishamir  algorithm  arstechnica  article  bitcoin  bitcoins  blackberry  blogcomment  bruceschneier  cats  ccc  certicom  christophersoghoian  cloudflare  computing  crypto  cryptography  diffiehellman  djb  dnscurve  drbg  dublin  ec  ecc  ecdsa  economist  education  edwardsnowden  ellipticcurve  encryption  explanation  factoring  flaw  fun  google  guardian  https  ietf  internet  kennwhite  leonardadleman  livejournal  martinhellman  math  mathematics  maths  matthewgreen  mikejanke  networking  nicksullivan  nist  nsa  nytimes  pki  privacy  programming  protocol  publickey  randomnumbers  read  rng  ronrivest  rsa  security.  security  silentcircle  specification  stephenfarrell  technology  theory  tptacek  trinitycollege  truecrypt  tutorial  vancouver  whitfielddiffie  yahoo 

Copy this bookmark:



description:


tags: