Ancestors

Written by solrize@lemmy.world on 2024-08-14 at 09:27

Bernstein and Lange -- Safe curves for Elliptic Curve Cryptography [pdf]

https://lemmy.world/post/18631032

=> More informations about this toot | More toots from solrize@lemmy.world

Toot

Written by N0x0n@lemmy.ml on 2024-08-14 at 12:13

Thanks for sharing !! Very difficult to read through and way to much math overhead for my non-educated brain… However, I like reading those kind of statements:

Similarly, regarding the NIST curves, NIST wrote the following in 2019 [183]:

NIST is not aware of any vulnerabilities to attacks on these curves when

they are implemented correctly and used as described in NIST standards

and guidelines.

Regarding better curves, [183] wrote that “their designers claim that they offer

better performance and are easier to implement in a secure manner”; [183] did

not cite any of the literature demonstrating the performance benefits and ease of

secure implementation of these curves, and did not mention the likelihood and

consequences of insecure implementation of the NIST curves.

NSA: “Trust me bro”

=> More informations about this toot | More toots from N0x0n@lemmy.ml

Descendants

Written by Arthur Besse on 2024-08-14 at 14:53

See also Section 7.3 and Appendix C (and the BADA55 Crypto paper that the email in Appendix C refers to).

=> More informations about this toot | More toots from cypherpunks@lemmy.ml

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/112960313648596180
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
267.843835 milliseconds
Gemini-to-HTML Time
0.882284 milliseconds

This content has been proxied by September (3851b).