News

Within five years the math for cracking encryption algorithms could become so efficient that it may render today's commonly used RSA public key cryptography algorithm obsolete, Black Hat attendees ...
Behind the hype lies a grounded, strategic reality: transitioning to post-quantum cryptography is about preparation, not panic.
Elliptic Curve Cryptography and Pairing Algorithms Publication Trend The graph below shows the total number of publications each year in Elliptic Curve Cryptography and Pairing Algorithms.
The time when currently encrypted data can be decrypted using quantum technology is closer than many people think. However, ...
Introduction Elliptic curve cryptography (ECC) is a public key cryptography method, which evolved form Diffie Hellman. To understanding how ECC works, lets start by understanding how Diffie Hellman ...
This chapter excerpted from Hardware Implementation of Finite-Field Arithmetic, gives an example of finite-field application namely, the implementation of the scalar product (point multiplication) ...
One algorithm is heavily used in public-key cryptography: Rivest-Shamir-Adleman (RSA), the original public-key cryptography algorithm from 1978. The Digital Signature Algorithm, or DSA, based on a ...
A scientist from MSU developed an algorithm increasing the speed of calculation of cryptographic transformations based on elliptical curves that requires little computational power. An algorithm ...
In a previous blog post we gave a gentle introduction to elliptic curve cryptography. We talked about how this class of curves can be used for encryption and digital signature algorithms.