Explore >> Select a destination


You are here

cronokirby.com
| | www.johndcook.com
1.9 parsecs away

Travel
| | The Bitcoin key mechanism is based on elliptic curve cryptography over a finite field. This post gives a brief overview.
| | soatok.blog
1.5 parsecs away

Travel
| | Recently, it occurred to me that there wasn't a good, focused resource that covers commitments in the context of asymmetric cryptography. I had covered confused deputy attacks in my very short (don't look at the scroll bar) blog post on database cryptography., and that's definitely relevant. I had also touched on the subject of commitment...
| | andrea.corbellini.name
1.4 parsecs away

Travel
| | [AI summary] The text provides an in-depth explanation of elliptic curve cryptography (ECC), covering fundamental concepts such as elliptic curves over finite fields, point addition, cyclic subgroups, subgroup orders, and the discrete logarithm problem. It also discusses practical aspects like finding base points, cofactors, and the importance of choosing subgroups with high order for cryptographic security. The text emphasizes that ECC relies on the difficulty of solving the discrete logarithm problem on elliptic curves, which is considered computationally hard and forms the basis for secure cryptographic protocols like ECDH and ECDSA.
| | dgroshev.com
22.7 parsecs away

Travel
| [AI summary] The author discusses the challenges and solutions for implementing a secure, privacy-preserving BitTorrent connectivity testing tool using cryptographic techniques like asymmetric encryption and HMAC to protect user IP addresses.