News

This chapter excerpted from Hardware Implementation of Finite-Field Arithmetic, gives an example of finite-field application namely, the implementation of the scalar product (point multiplication) ...
The elliptic curve discrete logarithm problem (ECDLP) lies at the heart of modern public-key cryptography. It concerns the challenge of determining an unknown scalar multiplier given two points on ...
A Note on Elliptic Curves Over Finite Fields, Mathematics of Computation, Vol. 49, No. 179 (Jul., 1987), pp. 301-304 ...
This paper is devoted to the description and analysis of a new algorithm to factor positive integers. It depends on the use of elliptic curves. The new method is obtained from Pollard's (p-1)-method ...
Unless, of course, Bitcoin’s elliptic curve is compromised. Many crypto experts have noticed that Bitcoin’s choice of secp256k1 elliptic curve was unusual for its time, as it was not yet well ...
Ottawa, Canada, May 9, 2007 - Security IP provider Elliptic today announced that it has completed the 2.0 release of its Ellipsys security software. This release upgrades the algorithms implemented to ...
PsiQuantum’s latest paper describes a more efficient method to break Elliptic Curve Cryptography (ECC) which is widely used for secure communications. This approach uses techniques especially ...
November 17, 2004 – Ottawa, Canada: Elliptic Semiconductor today announced the launch of a new acceleration engine - the CLP-17 designed in response to the elliptic curve cryptography (ECC) ...