Explore >> Select a destination


You are here

andrea.corbellini.name
| | www.jeremykun.com
1.2 parsecs away

Travel
| | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.
| | www.johndcook.com
0.7 parsecs away

Travel
| | The Bitcoin key mechanism is based on elliptic curve cryptography over a finite field. This post gives a brief overview.
| | unorde.red
1.2 parsecs away

Travel
| |
| | berty.tech
57.7 parsecs away

Travel
| Cryptography in one form or other is everywhere online, from banking sites to personal communication apps. But it's not a modern invention. When exactly did it arise? And what developments has it undergone over the years? The history of cryptography runs parallel to the development of new communication methods and safer transactions. Learn more about it to understand just how important it has become.