Public-Key Cryptography - TLS Cryptography In-Depth

  • Contact Us

What are elliptic curves? – Elliptic Curves

2022-03-31 Angela Mandeville 0

8.1 What are elliptic curves? Historically, elliptic curves are rooted in so-called Diophantine equations, named after ancient Greek mathematician Diophantus of Alexandria. Diophantine equations are […]

Smoothness – Elliptic Curves

2022-02-25 Angela Mandeville 0

8.1.2 Smoothness Before we can start defining a group operation on the points of an elliptic curve, we need to add one requirement: The curve […]

Projective coordinates – Elliptic Curves

2021-11-11 Angela Mandeville 0

8.1.3 Projective coordinates In order to get to grips with the mysterious point at infinity O, we need to extend the set of points that […]

Elliptic curves as abelian groups – Elliptic Curves

2021-09-30 Angela Mandeville 0

8.2 Elliptic curves as abelian groups Two points P and Q on a smooth elliptic curve E in reduced Weierstrass form can be added to […]

Explicit formulae – Elliptic Curves

2021-07-30 Angela Mandeville 0

8.2.2 Explicit formulae The geometrical viewpoint is nice to get an intuitive picture of point addition, but in order to actually implement things on a […]

Elliptic curves over finite fields – Elliptic Curves

2021-06-22 Angela Mandeville 0

8.3 Elliptic curves over finite fields Now let’s see what elliptic curves over finite fields look like. As we established in the last chapter, there […]

Elliptic curves over 𝔽2k – Elliptic Curves

2021-04-30 Angela Mandeville 0

8.3.2 Elliptic curves over 𝔽2k Although not strictly necessary in the context of TLS, for the sake of completeness, we’ll also briefly discuss here how […]

Discrete logarithms and Diffie-Hellman key exchange protocol – Elliptic Curves

2021-02-15 Angela Mandeville 0

8.3.3 Discrete logarithms and Diffie-Hellman key exchange protocol In Section 7.2, Groups, we defined the discrete logarithm problem for generic groups 𝔾. We repeat the […]

Security of elliptic curves – Elliptic Curves

2021-01-02 Angela Mandeville 0

8.4 Security of elliptic curves The security of cryptographic mechanisms based on elliptic curves relies on the following assumptions: In Chapter 7, Public-Key Cryptography, we […]

Posts pagination

« 1 2 3

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • August 2023
  • July 2023
  • May 2023
  • March 2023
  • January 2023
  • December 2022
  • October 2022
  • August 2022
  • May 2022
  • March 2022
  • February 2022
  • November 2021
  • September 2021
  • July 2021
  • June 2021
  • April 2021
  • February 2021
  • January 2021
June 2025
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  
« Aug    

Categories

  • Authenticity of public keys
  • Certification Exams of IT
  • Elliptic curves over finite fields
  • IT Certification Exams
  • Key pair generation
  • Projective coordinates
  • Security of the RSA algorithm

Copyright © 2025 | WordPress Theme by atkinswill