Explore >> Select a destination


You are here

keymaterial.net
| | blog.trailofbits.com
2.5 parsecs away

Travel
| | The elliptic curve digital signature algorithm (ECDSA) is a common digital signature scheme that we see in many of our code reviews. It has some desirable properties, but can also be very fragile. For example, LadderLeak was published just a couple of weeks ago, which demonstrated the feasibility of key recovery with a side channel [...]
| | rareskills.io
2.7 parsecs away

Travel
| | The intuition behind elliptic curve digital signatures (ECDSA) This article explains how the ECDSA (Elliptic Curve Digital Signature Algorithm) works as well as why it works. We will incrementally "rediscover" the algorithm from first principles in this tutorial. Prerequisites We assume prior knowledge of Elliptic Curve Arithmetic Elliptic Curve Arithmetic in Finite Fields Digital Signature...
| | www.wpsoftware.net
3.0 parsecs away

Travel
| | [AI summary] This technical article explains a mathematical method to simulate Bitcoin covenants and transaction introspection by abusing the algebra of Schnorr signatures and a hypothetical CAT opcode.
| | www.quintessencelabs.com
28.4 parsecs away

Travel
| Written by Cloud Security Alliance Quantum Safe Security Working Group. A mysterious paper A research paper titled "Quantum Supremacy Using a Programmable Super