Sept. 18, 2023, 5:04 p.m. | Thomas Pornin

NCC Group Research Blog research.nccgroup.com

This post is about a rather technical coding strategy choice that arises when implementing cryptographic algorithms on some elliptic curves, namely how to represent elements of the base field. We will be discussing Curve25519 implementations, in particular as part of Ed25519 signatures, as specified in RFC 8032. The most widely used Rust implementation of these […]

algorithms base coding cryptographic cryptographic algorithms curve25519 ed25519 elliptic implementation limbs rfc rust signatures strategy technical

Technical Support Engineer - Cyber Security

@ Microsoft | Taipei, Taipei City, Taiwan

Senior Security Engineer

@ Workato | Barcelona, Spain

Regional Cybersecurity Specialist

@ Bayer | Singapore, Singapore, SG

Cyber Security Network Engineer

@ Nine | North Sydney, Australia

Professional, IAM Security

@ Ingram Micro | Manila Shared Services Center

Principal Windows Threat & Detection Security Researcher (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel