<we><edit> <!-- questions and answers -->
complexity
elgamal-encryption
brute-force-attack
algorithm-design
known-plaintext-attack
aes
rc4
secret-sharing
cryptocurrency
rsa
hmac
certificates
security-definition
key-reuse
gcm
integrity
number-theory
substitution-cipher
entropy
reference-request
ed25519
chosen-plaintext-attack
nonce
password-based-encryption
salt
elliptic-curves
secp521r1 elliptic curve base point coordinates
elliptic-curves
How does wNAF work with prime finite fields?
elliptic-curves
finite-field
Why "pairings on elliptic curve" are used?
elliptic-curves
pairings
Linear Feedback shift register over integers
elliptic-curves
modular-arithmetic
prime-numbers
lfsr
Does the XML signature standard support Ed25519?
elliptic-curves
dsa
xml-encryption
Why we need ECDSA when we have ECDH?
elliptic-curves
diffie-hellman
dsa
Curve25519 simple key exchange approach
public-key
elliptic-curves
key-exchange
Elliptic Curve point multiplication
encryption
elliptic-curves
ECDH check points
elliptic-curves
What is the relationship between p (prime), n (order) and h (cofactor) of an elliptic curve?
elliptic-curves
elliptic-curve-generation
Key size and finite fields in ECC (References)
elliptic-curves
key-size
finite-field
What is an elliptic curve cofactor?
elliptic-curves
bcprov-jdk16-1.46.jar vs bcpro-ext-jdk15on-159.jar
elliptic-curves
pairing operation using Bouncy castle library
elliptic-curves
pairings
Differential addition on Montgomery curve
elliptic-curves
elliptic curve infinity point implementation returns exception
elliptic-curves
Schnorr signatures: multisignature support
elliptic-curves
signature
schnorr-signature
mbed tls DTLS v1.2 system with -ECDHE-ECDSA, mutual auth and pre-installed public/private keys, no unnecessary messages or ASN.1/X.509 decoding
elliptic-curves
protocol-design
Schnorr Digital Signature
elliptic-curves
signature
schnorr-signature
During ECDSA signing, how do I generate the Recovery ID?
elliptic-curves
dsa
Using a product of a series of curve25519 scalars as a private key
elliptic-curves
What are unified addition and differential addition in elliptic curve point arithmetic?
elliptic-curves
terminology
Group signatures, security and ECDSA
rsa
public-key
elliptic-curves
dsa
org.bouncycastle.crypto.InvalidCipherTextException: invalid MAC
public-key
elliptic-curves
Is there a lower cost cryptography than elliptic-curves based cryptography?
rsa
public-key
elliptic-curves
lightweight
Pairing — Finding points which are depicted in different cyclic subgroups?
elliptic-curves
Are all possible EC private keys valid?
elliptic-curves
keys
key-generation
EC : Important of Domain parameter in client server common shared secret?
elliptic-curves
domain-parameters
Explanation of each of the parameters used in ECC
elliptic-curves
How can a decryption program tell me that a private key is incorrect for RSA and ECC?
rsa
elliptic-curves
What makes ELLI "lightweight"?
elliptic-curves
diffie-hellman
lightweight
E2EE in application practice
elliptic-curves
forward-secrecy
libsodium
Elliptical Curve Cryptography decryption resulting point at infinity
elliptic-curves
Elliptic Curves and Small Message Space
encryption
elliptic-curves
Distribution of randomness in elliptic curve Diffie-Hellman shared secret
key-exchange
diffie-hellman
elliptic-curves
Is there any ECDSA Attack if I have millions of signatures?
elliptic-curves
dsa
pseudo-random-generator
attack
what does the m parameter in XML Signatures for gnBasis characteristic-two curves represent?
elliptic-curves
xml-encryption
Elliptic curve representation
encryption
cryptanalysis
elliptic-curves
discrete-logarithm
Should Diffie-Hellman on Curve25519 be validated?
elliptic-curves
diffie-hellman
Generate unique Proof of Data Integrity with public validator
hash
elliptic-curves
merkle-damgaard
homomorphic-signatures
libsodium x25519 and Ed25519 small order check
elliptic-curves
ed25519
libsodium
ECDSA adding two points
elliptic-curves
How to convert ECDSA P256 curve signature to SECP256K1 curve?
elliptic-curves
dsa
Bob has an EC key pair. How can he receive a small integer in the least compute intensive way?
elliptic-curves
diffie-hellman
Why is Diffie Hellman used alongside public keys?
rsa
public-key
elliptic-curves
ECC/libSodium: encrypt or decrypt using the private key and decrypt using the public key
public-key
elliptic-curves
signature
ed25519
libsodium
How did someone discover N, order of G for SECP256k1?
public-key
elliptic-curves
algorithm-design
Algorithm to generate ECDSA keys with random number generator
elliptic-curves
algorithm-design
random-number-generator
key-generation
trng
Diffie-Hellman based password challenge response scheme
elliptic-curves
authentication
passwords
challenge-response
I cannot understand the concept of a divisor for an elliptic curve
elliptic-curves
abe
How would I convert committed coordinates $x$ and $y$ to a commitment of the EC point without revealing the point (in Zero Knowledge) or vice versa?
elliptic-curves
zero-knowledge-proofs
cryptocurrency
Jpbc secure choice of elliptic curve
elliptic-curves
bls-signature
Why is calculating the discrete logarithm harder than calculating the public key?
elliptic-curves
discrete-logarithm
Elliptic Curve Digital Signature algorithm fails
elliptic-curves
dsa
Can Microsoft's SIDH (Supersingular Isogeny) keypairs be reused for encryption? If not, why?
elliptic-curves
post-quantum-cryptography
isogeny
How to double a point on a secp256k elliptical curve and get valid values?
elliptic-curves
baby-step, giant-step vs Pollard-rho
elliptic-curves
discrete-logarithm
meet-in-the-middle-attack
Elliptic Curve - Divide by 2
elliptic-curves
finite-field
group-theory
EC ECKA-ElGamal Key Agereement availability in Bouncy Castle Java library
elliptic-curves
diffie-hellman
trying to understand the elliptic curve format for XML Signatures
elliptic-curves
xml-encryption
Verify Points on curve secp256k1
elliptic-curves
finite-field
Key lengths of asymmetric encryption: ElGamal and ECC
encryption
elliptic-curves
algorithm-design
When is the public ECC key generated?
public-key
elliptic-curves
keys
The strength of ECDH public keys with small order
public-key
elliptic-curves
diffie-hellman
brute-force-attack
What is the difference between these two TLS suites?
elliptic-curves
tls
ECIES for not shared encryption
encryption
elliptic-curves
ecies
request for data to test deterministic ecdsa signature algorithm for secp256k1
elliptic-curves
dsa
deterministic-encryption
Uncomputing projective coordinates
encryption
elliptic-curves
Establish a secure connection between a Bluetooth Low Energy device and an Android App using ECDH
aes
elliptic-curves
diffie-hellman
ECIES: key derivation function and symmetric encryption scheme
encryption
elliptic-curves
diffie-hellman
secret-sharing
Optimized modular multiplicative inverse for Bitcoin (secp256k1)
elliptic-curves
cryptocurrency
Double spending on a given Blind Signature over ECC protocol
elliptic-curves
blind-signature
Is there an efficient solution? Finding the number of matching items in lists with a threshold
hash
elliptic-curves
zero-knowledge-proofs
Is it safe to use same private key in two or more EC signature algorithms?
elliptic-curves
dsa
ed25519
How does recovering the public key from an ECDSA signature work?
elliptic-curves
dsa
How to find q in a corrupted ECDSA signauture
elliptic-curves
dsa
Simple hexadecimal to 2s complement question
public-key
elliptic-curves
How to compute negative point in EC-DSA?
elliptic-curves
dsa
Why are NaCl secret keys 64 bytes for signing, but 32 bytes for box?
elliptic-curves
ed25519
Can you help me understand pairing $e:G \times G \to G_T$ and ( Decision) BDH assumption?
elliptic-curves
algorithm-design
pairings
When adding two points on an elliptic curve, why flip over the x-axis?
elliptic-curves
Time to brute-force a SHA256 + Curve25519 secret passphrase
elliptic-curves
sha-256
Frobenius Map on BN Curve sextic twist?
elliptic-curves
pairings
EC point addition - Wrong or right answer?
public-key
elliptic-curves
modular-arithmetic
Why is there the option to use NIST P-256 in gnupg?
elliptic-curves
pgp
How does ECDHE_RSA key exchange mechanism work?
public-key
elliptic-curves
pgpdump alternative for gnupg 2.x
elliptic-curves
pgp
When is public-key crypto used / when is symmetric crypto used?
rsa
public-key
elliptic-curves
symmetric
key-exchange
Is this ECC based messaging method secure?
public-key
elliptic-curves
protocol-design
sha-256
protocol-analysis
Pairings over elliptic curves on rings
elliptic-curves
pairings
Is there a 3-D alternative for elliptic curves?
elliptic-curves
How can I calculate the security level provided by a supersingular Elliptic Curve?
elliptic-curves
prime-field
How close to pure math is cryptographic theory?
elliptic-curves
number-theory
Are there stenography benefits to a "n-prime"?
rsa
elliptic-curves
prime-numbers
certificates
safe-prime
question about curve secp112r1
elliptic-curves
Quantum algorithm for elliptic curve's private keys
elliptic-curves
quantum-resistance
Reasons for Chinese SM2 Digital Signature Algorithm
signature
elliptic-curves
dsa
Obtain Information about hash algorithm from ECDSA public key
elliptic-curves
dsa
openssl
Asymmetric key derivation – Who derives the new pub key can't know the new private key?
public-key
elliptic-curves
key-derivation
What are the coordinates of a generator point?
elliptic-curves