1. Is squaring equivalent to shifting in the normal basis representation of an extension field over the prime field?

  2. Key size and finite fields in ECC (References)

  3. Can you help me understand pairing $e:G \times G \to G_T$ and ( Decision) BDH assumption?
  4. When adding two points on an elliptic curve, why flip over the x-axis?

  5. Time to brute-force a SHA256 + Curve25519 secret passphrase
  6. Best (minimum field multiplications) algorithm for elliptic curve addition over a binary field

  7. Frobenius Map on BN Curve sextic twist?

  8. EC point addition - Wrong or right answer?

  9. Why is there the option to use NIST P-256 in gnupg?

  10. How does ECDHE_RSA key exchange mechanism work?
  11. Elliptic-curve Diffie-Hellman [Example]

  12. pgpdump alternative for gnupg 2.x

  13. When is public-key crypto used / when is symmetric crypto used?

  14. Is this ECC based messaging method secure?
  15. Pairings over elliptic curves on rings

  16. Is there a 3-D alternative for elliptic curves?
  17. How can I calculate the security level provided by a supersingular Elliptic Curve?

  18. How would I convert committed coordinates $x$ and $y$ to a commitment of the EC point without revealing the point (in Zero Knowledge) or vice versa?
  19. How did someone discover N, order of G for SECP256k1?
  20. How close to pure math is cryptographic theory?
  21. Are there stenography benefits to a "n-prime"?
  22. question about curve secp112r1
  23. Quantum algorithm for elliptic curve's private keys

  24. Reasons for Chinese SM2 Digital Signature Algorithm
  25. Obtain Information about hash algorithm from ECDSA public key
  26. Asymmetric key derivation – Who derives the new pub key can't know the new private key?
  27. What are the coordinates of a generator point?

  28. Can you help me understand multiplication of points when using Curve25519?

  29. Diffie Hellman Private Set Intersection with Radix Merkle Tree instead of Bloom Filter
  30. How is the precomputed table for 25519 Elliptic curve generated?

  31. Can deterministic ECDSA be protected against fault attacks?

  32. Can I use 128 bits of entropy and a KDF to make a 256-bit ECC key?

  33. What is the correct elliptic curve representation?
  34. What is customizable in ECDSA signature and verification?

  35. finding a from a*G

  36. Can I use a random number generator with seed for key derivation?
  37. Can I reuse e(P1,P2) of Sakai-Kasahara setup?

  38. How can Shor's Algorithm be applied to ECC?

  39. Can someone give me an idea of active areas relating to pairing based cryptography, and what they involve?
  40. How are Elliptic Curve private and public keys actually used to encrypt or sign data?

  41. EC curve selection

  42. Why is c25519 in the GPG “expert” options?
  43. Elliptic curve trapdoor function without modular arithmetic?

  44. Can I apply "encrypt with public key and decrypt with private key concept" using ECC certificate?

  45. What's wrong with this construction? ECDHE+AES

  46. Why does Smart's attack only work on anomalous curves?

  47. What are the fastest attacks on ECDLP?

  48. What is the high level procedure to use ECDSA?
  49. What pairings are used in PBC and charm-crypto with the proposed elliptic curves?
  50. Why do elliptic curves require fewer bits for the same security level?

  51. ECDSA: What is the purpose of adding a hash of the used certificate to the signed data?

  52. SHA256 and RIPEMD160 collisions
  53. Integrity of standalone public keys vs digital certificates during DH
  54. Base Point on elliptic curve
  55. Elliptic Curves and ElGamal

  56. CECPQ1 key exchange functionality
  57. How to interpret the article claiming NIST P-256 curve to be unsafe?
  58. Question about the location of the r-torsion in the quotient group used in the Tate pairing
  59. Why equation Y^2=X^3 +AX+B can't work with finte field of charateristic 2?
  60. ECDH check points

  61. What is the difference between encrypting and signing in ECC asymmetric algorithm?

  62. Why is elliptic curve cryptography not widely used, compared to RSA?
  63. An efficient SPEKE protocol with curve25519

  64. An efficient PACE protocol with curve25519

  65. Can two elliptic curve point multiplications have a same resulted point?

  66. Why do curve25519 implementations only have ge_frombytes_negate_vartime, and not a regular ge_frombytes method?
  67. How to use a random 32 byte sequence as a curve25519 public key
  68. How to convert from curve25519 33 byte to 32 byte representation

  69. Why can't you hijack someone's public key

  70. How can I split a packed Ed25519 public signing key into its X and Y coordinates?

  71. What does the $\|$ operation mean in cryptographic notation?

  72. point addition for elliptical curves

  73. What's wrong with this curve (generation algorithm)?

  74. What are the differences between the elliptic curve equations?

  75. Does the backdoor in Dual_EC_DRBG work like that?

  76. Why Curve25519 for encryption but Ed25519 for signatures?

  77. HD (Hierarchical Deterministic) Keys using Safe Curves?

  78. Which safe elliptic curves allow for the fastest scalar multiplication

  79. In a safe finite field elliptic curve, why is p not n?

  80. In finite field elliptical curve, is the addition of any two points on the curve guaranteed to land on the curve?

  81. Are all possible EC private keys valid?

  82. how to choose a random secret key for ECDH
  83. Is EC integrated encryption scheme used in practice?
  84. What is the relationship between p (prime), n (order) and h (cofactor) of an elliptic curve?

  85. Shor's algorithm for elliptic curve discrete logarithm problem

  86. Usage of twists at pairing-based cryptography

  87. In EC with key chaining, is it possible to verify signature made by root private key using public key of derived keypair?

  88. How should ECDSA handle the null hash?

  89. Schnorr signatures: multisignature support

  90. Bilinear Form: Weil pairing
  91. Elliptic curve point addition

  92. are all elements of ZpxZp in ECC definite over Zp

  93. Is ECC over real numbers possible?
  94. Getting coefficients of Curve25519
  95. ECDSA public key generated with constant prefix?

  96. How can I find the generator of a composite group and $Z_p*$?
  97. Can elliptic curve (25519) be used to encrypt file?
  98. Is the openssl implementation of ECDH missing something?

  99. Could a C25519/ED25519 cryptographic module be FIPS certified?

  100. Finding if two points on elliptic curve are related