Follow

I found this a very interesting read on the topic of the potential for backdooring ECC via non- or fake- NUMS parameter generation. By Dan Bernstein et al:

bada55.cr.yp.to/bada55-2015092

Sign in to participate in the conversation
unidentified instance

(instance image by мøтħer ¢røω)