Cloud services are adopted by both start-ups and enterprises in recent years. However, it comes security issues. At this point, … More
Category: Cryptography
Key Exchange: From Carrying Handcuffed Briefcases To Modern Cryptosystems
You should be familiar to handcuffed briefcases in spy movies. Most probably, shared secret key is in the briefcase and the … More
Double and Add Method
Computing a new point on an elliptic curve Q = kP for given k and P could be performed by combination … More
The Math Behind Elliptic Curves in Koblitz Form
In the previous post, we’ve mention the math behind addition law for elliptic curves over Galois Field GF(p) – prime … More
The Math Behind Elliptic Curves in Weierstrass Form
The most of cryptography resources mention elliptic curve cryptography, but they often ignore the math behind elliptic curve cryptography and … More