1. secp521r1 elliptic curve base point coordinates

  2. How does wNAF work with prime finite fields?
  3. Why "pairings on elliptic curve" are used?
  4. Linear Feedback shift register over integers

  5. Does the XML signature standard support Ed25519?

  6. Why we need ECDSA when we have ECDH?
  7. Curve25519 simple key exchange approach

  8. Elliptic Curve point multiplication

  9. ECDH check points

  10. What is the relationship between p (prime), n (order) and h (cofactor) of an elliptic curve?

  11. Key size and finite fields in ECC (References)
  12. What is an elliptic curve cofactor?
  13. bcprov-jdk16-1.46.jar vs bcpro-ext-jdk15on-159.jar

  14. pairing operation using Bouncy castle library
  15. Differential addition on Montgomery curve
  16. elliptic curve infinity point implementation returns exception
  17. Schnorr signatures: multisignature support

  18. mbed tls DTLS v1.2 system with -ECDHE-ECDSA, mutual auth and pre-installed public/private keys, no unnecessary messages or ASN.1/X.509 decoding

  19. Schnorr Digital Signature

  20. During ECDSA signing, how do I generate the Recovery ID?

  21. Using a product of a series of curve25519 scalars as a private key

  22. What are unified addition and differential addition in elliptic curve point arithmetic?
  23. Group signatures, security and ECDSA
  24. org.bouncycastle.crypto.InvalidCipherTextException: invalid MAC

  25. Is there a lower cost cryptography than elliptic-curves based cryptography?

  26. Pairing — Finding points which are depicted in different cyclic subgroups?

  27. Are all possible EC private keys valid?
  28. EC : Important of Domain parameter in client server common shared secret?

  29. Explanation of each of the parameters used in ECC
  30. How can a decryption program tell me that a private key is incorrect for RSA and ECC?
  31. What makes ELLI "lightweight"?

  32. E2EE in application practice
  33. Elliptical Curve Cryptography decryption resulting point at infinity

  34. Elliptic Curves and Small Message Space

  35. Distribution of randomness in elliptic curve Diffie-Hellman shared secret

  36. Is there any ECDSA Attack if I have millions of signatures?

  37. what does the m parameter in XML Signatures for gnBasis characteristic-two curves represent?
  38. Elliptic curve representation

  39. Should Diffie-Hellman on Curve25519 be validated?
  40. Generate unique Proof of Data Integrity with public validator

  41. libsodium x25519 and Ed25519 small order check

  42. ECDSA adding two points
  43. How to convert ECDSA P256 curve signature to SECP256K1 curve?

  44. Bob has an EC key pair. How can he receive a small integer in the least compute intensive way?

  45. Why is Diffie Hellman used alongside public keys?

  46. ECC/libSodium: encrypt or decrypt using the private key and decrypt using the public key
  47. How did someone discover N, order of G for SECP256k1?

  48. Algorithm to generate ECDSA keys with random number generator
  49. Diffie-Hellman based password challenge response scheme

  50. I cannot understand the concept of a divisor for an elliptic curve

  51. How would I convert committed coordinates $x$ and $y$ to a commitment of the EC point without revealing the point (in Zero Knowledge) or vice versa?

  52. Jpbc secure choice of elliptic curve

  53. Why is calculating the discrete logarithm harder than calculating the public key?

  54. Elliptic Curve Digital Signature algorithm fails
  55. Can Microsoft's SIDH (Supersingular Isogeny) keypairs be reused for encryption? If not, why?
  56. How to double a point on a secp256k elliptical curve and get valid values?
  57. baby-step, giant-step vs Pollard-rho
  58. Elliptic Curve - Divide by 2
  59. EC ECKA-ElGamal Key Agereement availability in Bouncy Castle Java library

  60. trying to understand the elliptic curve format for XML Signatures
  61. Verify Points on curve secp256k1

  62. Key lengths of asymmetric encryption: ElGamal and ECC
  63. When is the public ECC key generated?
  64. The strength of ECDH public keys with small order
  65. What is the difference between these two TLS suites?
  66. ECIES for not shared encryption

  67. request for data to test deterministic ecdsa signature algorithm for secp256k1

  68. Uncomputing projective coordinates
  69. Establish a secure connection between a Bluetooth Low Energy device and an Android App using ECDH

  70. ECIES: key derivation function and symmetric encryption scheme

  71. Optimized modular multiplicative inverse for Bitcoin (secp256k1)

  72. Double spending on a given Blind Signature over ECC protocol

  73. Is there an efficient solution? Finding the number of matching items in lists with a threshold
  74. Is it safe to use same private key in two or more EC signature algorithms?

  75. How does recovering the public key from an ECDSA signature work?
  76. How to find q in a corrupted ECDSA signauture

  77. Simple hexadecimal to 2s complement question

  78. How to compute negative point in EC-DSA?
  79. Why are NaCl secret keys 64 bytes for signing, but 32 bytes for box?

  80. Can you help me understand pairing $e:G \times G \to G_T$ and ( Decision) BDH assumption?
  81. When adding two points on an elliptic curve, why flip over the x-axis?

  82. Time to brute-force a SHA256 + Curve25519 secret passphrase

  83. Frobenius Map on BN Curve sextic twist?

  84. EC point addition - Wrong or right answer?

  85. Why is there the option to use NIST P-256 in gnupg?
  86. How does ECDHE_RSA key exchange mechanism work?
  87. pgpdump alternative for gnupg 2.x
  88. When is public-key crypto used / when is symmetric crypto used?
  89. Is this ECC based messaging method secure?

  90. Pairings over elliptic curves on rings
  91. Is there a 3-D alternative for elliptic curves?

  92. How can I calculate the security level provided by a supersingular Elliptic Curve?
  93. How close to pure math is cryptographic theory?

  94. Are there stenography benefits to a "n-prime"?

  95. question about curve secp112r1
  96. Quantum algorithm for elliptic curve's private keys

  97. Reasons for Chinese SM2 Digital Signature Algorithm

  98. Obtain Information about hash algorithm from ECDSA public key
  99. Asymmetric key derivation – Who derives the new pub key can't know the new private key?

  100. What are the coordinates of a generator point?