Cryptography Calculator-based cryptography- keeping other classmates from reading your notes |
- Calculator-based cryptography- keeping other classmates from reading your notes
- ed25519 public key +/- sign
- offline password vault
- I NEED ASSISTANCE
- Proposal of WEP operation with strong IV and its implementation (2016)
Calculator-based cryptography- keeping other classmates from reading your notes Posted: 08 Oct 2018 09:34 AM PDT |
Posted: 08 Oct 2018 09:20 AM PDT Sorry for this noob question. I understand that ed25519 uses elliptic curve multiplication to go from private key to public key. I believe the public key is a point on the elliptic curve, that has X,Y coordinates. But you can make it's representation shorter by storing only the X and the sign of the Y coordinate, without the actual Y coordinate, because you can recreate the Y from the X using the curve equation, then you only need the sign to determine which of the two possibilities it is. Am I on the right track? Is the sign kept, or is it discarded? If it is kept, where is it stored according to this ed25519 standard. It's possible I have totally misunderstood something, if so apologies. [link] [comments] |
Posted: 08 Oct 2018 06:33 PM PDT Hi there, I was wondering what people thought about these devices. I'm weary of devices like mooltipass (https://www.themooltipass.com) because they connect with other devices. The obvious downside is that one will use less complex passwords just because you have to read and enter them. Another would be the robustness of encryption on the device itself if it was stolen by someone. Would appreciate any thoughts. https://www.amazon.com/John-N-Hansen-595-Password/dp/B00FDZVBYG Edit: Just read a bunch of reviews for these and they all seem to not be super reliable. It would be a pain to have to re-enter passwords. [link] [comments] |
Posted: 08 Oct 2018 04:41 PM PDT I was inspired by Unknown 9 to start a book, so I am writing a book about secret societies and I need some form of encryption and codes to use in the story. I was wondering if anyone had the names of certain encryption styles or codes and maybe examples if it isn't to much to ask for. DM's are open to code suggestions as well. -N [link] [comments] |
Proposal of WEP operation with strong IV and its implementation (2016) Posted: 08 Oct 2018 02:51 AM PDT |
You are subscribed to email updates from Cryptography news and discussions. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment