TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

An Introduction to the Theory of Elliptic Curves [pdf]

108 pointsby sr2almost 8 years ago

3 comments

dsaccoalmost 8 years ago
If this interested you, you might want to check out SafeCurves[1]. I didn&#x27;t see it mentioned in these slides (likely because it approaches the material at a higher&#x2F;theoretical level), but ECDLP is not the only determining factor in elliptic curve safety; there are also implementation difficulties that can make ECC unsafe even though attackers cannot solve the ECDLP.<p>DJ Bernstein maintains the SafeCurves website and explains the foregoing in greater detail; the site also tracks security assessments on specific curves. Some are actively used and others are either not well-studied or are just toy examples.<p>_________<p>1. <a href="http:&#x2F;&#x2F;safecurves.cr.yp.to" rel="nofollow">http:&#x2F;&#x2F;safecurves.cr.yp.to</a>
AnkhMorporkianalmost 8 years ago
For someone with no real interest in cryptography, do elliptic curves have any other interesting applications in computer science?
评论 #14436684 未加载
essetialmost 8 years ago
tell me that there&#x27;s a video of the presentation..