Explore >> Select a destination


You are here

blog.intothesymmetry.com
| | andrea.corbellini.name
1.9 parsecs away

Travel
| | [AI summary] This technical blog post explains the mathematical principles, key generation, and implementation details of Elliptic Curve Cryptography (ECC) covering domain parameters, verifiably random curves, ECDH key exchange, and ECDSA signatures.
| | www.zend.com
3.5 parsecs away

Travel
| | Libsodium is a modern cryptography library. Learn how you can use the Libsodium cryptography library for PHP encryption.
| | www.jeremykun.com
3.0 parsecs away

Travel
| | So far in this series we've seen elliptic curves from many perspectives, including the elementary, algebraic, and programmatic ones. We implemented finite field arithmetic and connected it to our elliptic curve code. So we're in a perfect position to feast on the main course: how do we use elliptic curves to actually do cryptography? History As the reader has heard countless times in this series, an elliptic curve is a geometric object whose points have a surprising and well-defined notion of addition.
| | rareskills.io
12.7 parsecs away

Travel
| Elliptic Curves over Finite Fields What do elliptic curves in finite fields look like? It's easy to visualize smooth elliptic curves, but what do elliptic curves over a finite field look like? The following is a plot of $y² = x³ + 3 \pmod {23}$ Because we only allow integer inputs (more specifically, finite field...