TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Identifying the boundaries of acceptability for cryptographic standards: BADA55

2 pointsby opengearsover 1 year ago

1 comment

opengearsover 1 year ago
I know this has been posted already in the past, but because of the recent different related threads it makes sense to point readers to this initiative from bernstein et al.<p>Other recent YC posts are<p>* How were the NIST ECDSA curve parameters generated? &lt;<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37706958">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37706958</a>&gt;<p>* NIST Elliptic Curves Seeds Bounty &lt;<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37784499">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37784499</a>&gt;