EllipticCurve   24

Million Dollar Curve
Time has come to get rid of arbitrary choices. By using publicly verifiable randomness produced in February 2016 by many national lotteries from all around the world, we propose to generate a cryptographically secure elliptic curve for the ECDH cryptosystem as an alternative to the NIST P-256 and the Curve25519 curves. It is designed so that nobody (even us!) can put a trap in it.
ellipticcurve  cryptography  security. 
february 2016 by wjy

related tags

1977  1985  aclu  adishamir  algorithm  arstechnica  article  asymmetric-key  bitcoin  bitcoins  blackberry  blockchain  blogcomment  bruceschneier  cats  ccc  certicom  christophersoghoian  cloudflare  computing  crypto  cryptography  diffiehellman  djb  dnscurve  drbg  dublin  ec  ecc  ecdsa  economist  education  edwardsnowden  ellipticcurve  encryption  ethereum  explanation  factoring  flaw  fun  google  guardian  https  ietf  ifttt  internet  kennwhite  leonardadleman  livejournal  martinhellman  math  mathematics  maths  matthewgreen  mikejanke  networking  nicksullivan  nist  nsa  nytimes  pki  poster  privacy  programming  protocol  publickey  randomnumbers  read  rng  ronrivest  rsa  secp256k  security.  security  silentcircle  smartcontracts  solidity  specification  stephenfarrell  technology  theory  trinitycollege  truecrypt  tutorial  unread  vancouver  whitfielddiffie  yahoo 

Copy this bookmark: