home | log | search | bash | stats | wiki


Matches for elliptic, 55 total results Sorted by newest | relevance

Wed Jun 04 01:11:46 UTC 2014  <gribble>   Schneier on Security: Rubber-Hose Cryptanalysis: https://www.schneier.com/blog/archives/2008/10/rubber_hose_cry.html; Loper OS » Practical Cryptoanalysis of Elliptic Curve DSA.: http://www.loper-os.org/?p=1061; Cryptanalysis - Wikipedia, the free encyclopedia: http://en.wikipedia.org/wiki/Cryptanalysis

Sat May 17 12:06:12 UTC 2014  <BingoBoingo>   Yeah, looks like some of the elliptic curve stuff is going to be endangered

Sat May 17 04:39:54 UTC 2014  <BingoBoingo>   Popular choices for the group G in discrete logarithm cryptography are the cyclic groups (Zp)? (e.g. ElGamal encryption, Diffie?Hellman key exchange, and the Digital Signature Algorithm) and cyclic subgroups of elliptic curves over finite fields (see elliptic curve cryptography).

Mon Apr 14 12:51:14 UTC 2014  <ozbot>   Re: Elliptic curves in gnupg status?(ECC support)

Fri Mar 14 08:03:01 UTC 2014  <BingoBoingo>   I mean for the first set you could probably encode information much as RSA does. I don't have enough vodka on hand to speculate if that would be a good idea. Most of Elliptic curve cryptography works on spaces that can be played with in graph theory world though.

Tue Dec 17 04:06:06 UTC 2013  <gribble>   Schneier on Security: Norbt: https://www.schneier.com/blog/archives/2009/11/norbt.html; Loper OS » Practical Cryptoanalysis of Elliptic Curve DSA.: http://www.loper-os.org/?p=1061; Amazon Vows To Fight Government Requests For Data - Slashdot: http://slashdot.org/story/13/06/19/2238212/amazon-vows-to-fight-government-requests-for-data

Wed Dec 04 00:01:41 UTC 2013  <BingoBoingo>   ThickAsThieves`: What's next? Allowing bet creators to specify elliptic curves the bet weight passes through as it degrades over time?

Thu Nov 21 02:12:45 UTC 2013  <BingoBoingo>   asciilifeform: I liken that sort of stuff to the people who support Elliptic curve cryptography because the short keys let minimalist embeded smartcard hardware carry out thousands of operations a second as opposed to hundreds for RSA with appropriately long keys.

Wed Nov 20 20:35:23 UTC 2013  <thestringpuller>   why don't mo niggas use elliptic c curve cryptographyy?

Fri Oct 11 02:44:52 UTC 2013  <BingoBoingo>   Jere_Jones: Well I'm not offering the private key until at least the last BitBet associated with that address resolves. Maybe some elliptic surves intersected at the point of that message. Maybe it is something worse. It is honestly more their problem than mine though I will be happy to offer them information short of the private key. The replication steps are surprisingly short and I imagine unhelpful.

Fri Oct 11 01:58:34 UTC 2013  <BingoBoingo>   The problem is that 1LC9GzYK1zjrG9zAvMPExcwHTP8aPYPMyY could have signed the same message. Maybe it could have signed a more malicious message. Fuck. Just because elliptic curves are sexy doesn't mean they should be used everywhere.

Wed Sep 11 16:11:13 UTC 2013  <ozbot>   Are the NIST Standard Elliptic Curves Back-doored? - Slashdot

Wed Sep 11 16:11:06 UTC 2013  <jurov>   http://it.slashdot.org/story/13/09/11/1224252/are-the-nist-standard-elliptic-curves-back-doored

Sat Aug 10 20:41:03 UTC 2013  <thestringpuller>   Hmm. In crytpo-news: Both RSA and Diffie-Hellman encryption rely on there being no efficient algorithm for that problem, but French math professor Antoine Joux has published two papers in the last six months that suggest one could soon be found. Security researchers that noticed Joux's work recommend companies large and small begin planning to move to elliptic curve cryptography, something the NSA has said is best practice for years. Unfortunat

Thu Jul 04 09:02:19 UTC 2013  <cads>   Namworld: I might be wrong by now, but at one point I learned that creating elliptic curve keys is altogether separate from the Sha hashing that GPUs excel at.

« Previous Page