Possibly, but they have reasons to recommend methods that they believe foreign governments cannot break. The equation of the P-384…

Continue Reading# elliptic

## Isogeny-based encryption

If and when large quantum computers become practical, all currently widely deployed method for public key cryptography will break. Even…

Continue Reading## All elliptic curves over fields of order 2 and 3

Sometimes, but not usually. Lenstra and Pila [1] proved that two elliptic curves can be equal as sets but not…

Continue Reading## What is an elliptic curve?

Elliptic curves are pure and applied, concrete and abstract, simple and complex. Elliptic curves have been studied for many years…

Continue Reading## Addition on Curve1174

I’ve written about elliptic curve and alluded to the fact that there’s a special kind of addition for points on the…

Continue Reading## Naming elliptic curves used in cryptography

There are an infinite number of elliptic curves, but a small number that are used in cryptography, and these special…

Continue Reading