all InfoSec news
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography. (arXiv:2208.01635v1 [cs.CR])
Aug. 4, 2022, 1:20 a.m. | Kunal Abhishek, E. George Dharma Prakash Raj
cs.CR updates on arXiv.org arxiv.org
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve
Discrete Logarithm Problems was widely used in Cryptographic applications. This
paper introduces a new security notation 'trusted security' for computation
methods of elliptic curves for cryptography. Three additional "trusted security
acceptance criteria" is proposed to be met by the elliptic curves aimed for
cryptography. Further, two cryptographically secure elliptic curves over 256
bit and 384 bit prime fields are demonstrated which are secure from ECDLP, ECC
as well as trust perspectives. …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
EY GDS Internship Program - SAP, Cyber, IT Consultant or Finance Talents with German language
@ EY | Wrocław, DS, PL, 50-086
Security Architect - 100% Remote (REF1604S)
@ Citizant | Chantilly, VA, United States
Network Security Engineer - Firewall admin (f/m/d)
@ Deutsche Börse | Prague, CZ
Junior Cyber Solutions Consultant
@ Dionach | Glasgow, Scotland, United Kingdom
Senior Software Engineer (Cryptography), Bitkey
@ Block | New York City, United States