Possibly, but they have reasons to recommend methods that they believe foreign governments cannot break. The equation of the P-384…
Continue Readingelliptic
Isogeny-based encryption
If and when large quantum computers become practical, all currently widely deployed method for public key cryptography will break. Even…
Continue ReadingAll elliptic curves over fields of order 2 and 3
Sometimes, but not usually. Lenstra and Pila [1] proved that two elliptic curves can be equal as sets but not…
Continue ReadingWhat is an elliptic curve?
Elliptic curves are pure and applied, concrete and abstract, simple and complex. Elliptic curves have been studied for many years…
Continue ReadingAddition on Curve1174
I’ve written about elliptic curve andĀ alluded to the fact that there’s a special kind of addition for points on the…
Continue ReadingNaming elliptic curves used in cryptography
There are an infinite number of elliptic curves, but a small number that are used in cryptography, and these special…
Continue Reading