Knowledge

Talk:Elliptic Curve Digital Signature Algorithm

Source 📝

1486:
usage. Example of actual usage makes a different point, the noteworthiness of the technology, since it is used so often, by so many people. In other words, it is notable not just because it is interesting, it is in some standards, it is in some crypto libraries, it is in various protocols and products, but many devices are actually using it frequently, in the past and still today. In fact your device just used it, to verify the current WP page, to bring home the point, as a small but easily replicable sample. Perhaps, it would be clearer, and stabler to show the WP certificate, instead of a summary report of a single ephemeral TLS session. So, I propose restoring the example usage, although improvements and clarifications would help greatly.
242: 232: 211: 532: 341: 320: 440: 409: 508: 179: 119: 92: 61: 32: 594: 1571:
The Digital Signature Algorithm (DSA) operates over any cyclic group and is fairly straight forward. EC-DSA is simply the DSA, but over an elliptic curve group -- the algorithm itself is identical with that in mind. This EC-DSA article should have been a subsection in the DSA article, not a separate
1551:
The RSA encryption method, which is also asymmetric, permits a series of simplified explanations, based on the difficulty of calculating two large prime numbers given their product, and explaining how and why modulo operations are used. Why can't this article build up from a similar simple statement
836:
was calculated by applying a symmetric cipher to the HASH value; if the attacker does not know the symmetric key which was used for this, then this should not help the attacker (?), because for a secure symmetric cipher, the output should be unpredictable if you do not know the symmetric key for the
719:
I am new to ECC. It seems to me that the given signature scheme (the one with (mod n)) still is a little bit dangerous: If you sign two different messages (with hashes e_1 and e_2), with the same "random" number k, then an attacker will be able to reconstruct "d_A" (the secret key) without problems:
1485:
The example usage section has been removed, on the the grounds that it is does not show how ECDSA works, and possibly on the grounds that the algorithm could change at any time (and perhaps also on the grounds that alternatives to ECDSA are deemed preferable). Well, that's not the point of example
787:
For RSA you only need to generate a secure key (meaning that the key has to be "real" random). Then for signatures, there is not much more you can do wrong. So I think RSA is the easier to use scheme, in the sense that you do not need an additional cryptographically secure random number generator.
1372:
Currently, the wikipedia web site seems to be using TLS 1.2: TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1035_SHA256, 256 bit keys, So, browsers show the lock icon because wikipedia signed something with ECDSA, and browser has verified the signature (and validate the certificate for the ECDSA signing key).
1469:
Using WP (or any other website) as an example doesn't seem like a great idea - it's inherently at the mercy of configuration changes. A better example might be a specific root certificate, or a some more slowly evolving system. For example the UK smart metering infrastructure mandates ECDSA over
795:
certainly is something that must be implemented very carefully in ECDSA. However, RSA has its share of pitfalls too. E.g., the private key might be leaked if a miscalculation occurs during a signature generation. Proper padding must be used, etc. Often standards do help to address potential
1306:
It's just a convention to talk about n-bits of security. From there you can estimate, for example, that 80-bit security is in the "possible to brute force, but at great expense" ballpark. But you're right, there are more informative ways to discuss specific aspects of resistance to attack.
1290:
There may be other problems as well. Finding the private key is the most devastating attack, but far from the only one. For example, if it takes only, say, 2 effort to find a collision, then arguably the system has only 40-bit security no matter how expensive finding the key is.
1286:
would be more useful and does seem possible; that is how the level is defined in other contexts. For example breaking a block cipher with an n-bit key by brute force takes 2 encryptions on average. The minimum is 1 and the maximum 2, but those numbers are not usually mentioned.
893:
The issue is variously addressed in the literature, I don't know how it is in the standard. And correcting it here might require modifications to other pages too. It is a huge task, I don't have time now to even start to list all the pages affected (in the several languages).
692:
then the secret key leaks from the signatures. What you describe is a variant of ECDSA that does indeed not need modular reductions and hencecan be used with elliptic curves with unknown order. This variant has several disadvantages however. E.g., the random number
889:
The elliptic curve coordinates are defined on any finite field, so computing mod n does not make any sense. For example the field might be of characteristic 2. It might seem straightforward for large prime fields, but it is incorrect always unless specified.
1175:
I realize that this is a very dense topic, but this article is barely readable. The jargon should be trimmed down, and perhaps we can add some more encyclopedic content, like present-day usage of ECDSA (technologies like WAP and SSL to name a couple).
885:
For Alice to sign a message {\displaystyle m} , she follows these steps: .... 4. Calculate the curve point {\displaystyle (x_{1},y_{1})=k\times G} . 5. Calculate {\displaystyle r=x_{1}\,{\bmod {\,}}n} . If {\displaystyle r=0} , go back to step 3.
1154:
Feel free to edit the article to clear this up! My suggestion is to not dive too deep into the math in the article, but rather just emphasize the prime-field case and add footnotes where important for the characteristic-2 field case.
780:
I understand. Still: This basically means that you have to be extremely careful with how you generate your "k". If an attacker has only the slightest idea of the value "k", which was chosen for a signature, then you are definitely in
1270:
Current text mentions "a security level of 80 bits (meaning an attacker requires a maximum of about 2 80 {\displaystyle 2^{80}} 2^{80} operations to find the private key)". That seems badly flawed to me. I'd like to be able to say
927:
You are right, this is straightforward for prime fields but it's vague for characteristic-2 fields. The go-to document for ECDSA (in my opinion) is Daniel R. L. Brown's SEC1, which is referenced in the Further Reading section. In
1521:
the signature size is the same for both DSA and ECDSA: approximately 4 t {\displaystyle 4t} 4t bits, where t {\displaystyle t} t is the security level measured in bits, that is, about 320 bits for a security level of 80 bits.
737:
From this it is easy to calculate kInv. With kInv you get k. With k you get d_A. This basically means you must never sign two different messages with the same random numbers of "k". Correct ? (Of course since "n" should be :
820:. Of kourse this means, that you must keep the symmetric key secret (in the same way you keep your private ECC key secret). Is there an obvious flaw in such a scheme ? To me it seems the most important thing about 1054: 897:
One needs to specify a map from the elliptic curve to the integers, and this might be straightforward in some cases but how to define the map and which properties are needed for security is not clear.
1737: 391: 169: 785:
For the ECC DSA scheme, you basically need a private key, a private random seed file and a real good (cryptographically secure!) random number generator; otherwise the whole scheme is compromised.
1687: 381: 663:
a function to convert a point to an integer (by example returning coordinate x) G generator point a secret key (integer) P pubic key point (P=aG) h hash of message (integer) k random number
1220:
It is a common error to use the complete hash value with modular reduction in signature computation. The standards require instead a truncation (cf. the references given in the article).
625: 1003: 1575:
For a simplified explanation, first look at DSA. Now swap out 'modular exponentiation' with 'scalar multiplication of a point on an elliptic curve' and you are essentially done.
1717: 1682: 1732: 1652: 546: 193: 42: 1139: 1105: 969: 709:
do not leak useful information about the secret key. Hence signing and verifying signatures are less efficient. Moreover, the signatures are longer in this variant.
1657: 1642: 159: 1449:
This may be partly due to the way openssl TLS client negotiates the cryptography. Maybe a more thorough analysis should be done before updating the article.
1692: 302: 1727: 1672: 1336: 292: 1201:
article, for further consistency. For example, the hash function notation (HASH(m) here, H(m) in the other article) and the modulo notation are different.
1702: 1662: 1647: 1151:
and a formal procedure is included as well. You can also see that the conversion of hash bytes to an integer is more precisely defined (it's big-endian).
498: 488: 1712: 1677: 1501:
I agree with the other editor that it was a bad example, for the reasons they gave. I suggested a couple of alternatives; you could use one of those?
522: 357: 1341: 1742: 812:
Just an idea: If I pick a symmetric cipher (twofish,aes) and create a "private" symmetric key for the cipher, would it make sense to generate the
559: 541: 423: 135: 783:
The same is (for example) not true for the RSA based signature scheme. There you do not need a random number, which makes the application easier.
1525:
Huh? Just below it says: "The signature is the **pair** ( r , s ) {\displaystyle (r,s)} (r,s)", i.e., twice the curve order size, not 4 times.
1637: 268: 188: 102: 1667: 816:
out of the HASH value, by applying the symmetric cipher to the HASH value ? This would guarantee, that different HASH values get different
464: 348: 325: 1552:
of how and why elliptic curve encryption works? Or at least refer to such an explanation with a prominent wikilink ("full article at") to
1697: 1183: 844: 1707: 740: 126: 97: 858:
It might indeed work, but wikipedia isn't the right place to discuss new constructions. Some deterministic algorithms for generating
1532: 863: 255: 216: 797: 1747: 1010: 767: 447: 414: 1722: 796:
weaknesses. E.g., NIST's digital signature standard does include pseudorandom number generators that can be used with ECDSA.
517: 419: 1143: 1058: 1076: 938: 1618: 1337:
https://stackoverflow.com/questions/19665491/how-do-i-get-an-ecdsa-public-key-from-just-a-bitcoin-signature-sec1-4-1-6-k
72: 1553: 1198: 672:
what the heck is "the" 160 bit prime field? there are many primes p between 2^159 and 2^160-1, so Z/pZ is ambiguous
1391: 754:
This is a well known property of many signature schemes based on discrete logarithms. It implies that a new random
634:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
38: 1342:
https://crypto.stackexchange.com/questions/18105/how-does-recovering-the-public-key-from-an-ecdsa-signature-work
1331: 608: 848: 1622: 1584: 1565: 1561: 1540: 1510: 1495: 1479: 1460: 1413: 1409: 1395: 1362: 1316: 1300: 1260: 1240:
Is it possible to show an example (with smaller numbers, of course) to demonstrate what operations are done?
1229: 1210: 1191: 1187: 1164: 914: 871: 852: 805: 775: 748: 744: 713: 1536: 867: 1419:
Just checked this again. Now wikipedia is using TLS 1.3, not TLS 1.2, but still seems to be using ECDSA:
1225: 801: 460: 1580: 882:
There is a very serious error in this page (the same error appears in several languages). In the lines
771: 1206: 974: 910: 902: 78: 1221: 1614: 739:
100 bits, the probability of getting two similar k's is not that high, but still I do not like it...)
1606: 1528: 1379: 1179: 840: 766:
is 1/(n-1). An attacker could just guess the private key with the same small probability of success.
710: 1576: 60: 31: 1202: 922: 906: 898: 463:
on Knowledge. If you would like to participate, please visit the project page, where you can join
356:
on Knowledge. If you would like to participate, please visit the project page, where you can join
267:
on Knowledge. If you would like to participate, please visit the project page, where you can join
134:
on Knowledge. If you would like to participate, please visit the project page, where you can join
1610: 1557: 1405: 1256: 247: 231: 210: 1601: 1556:? The article needs a diagram showing an ellipse and explaining how it is used for encryption. 1141:
first convert the binary polynomial to a bit string then convert the bit string to an integer.
1502: 1471: 1358: 1312: 1296: 1110: 603: 1160: 1083: 947: 1491: 1456: 1387: 353: 17: 676:
Nope, the algorithm is described correctly. In particular the modular reductions (mod
637:
Find editors who have shown interest in this subject and ask them to take a look here.
1631: 1506: 1475: 1252: 1598:
Please consider adding OpenZeppelin to the list of libraries that implement ECDSA.
1354: 1308: 1292: 340: 319: 131: 531: 1156: 260: 1376:
Is this fact worth putting into the main article (with a proper explanation)?
507: 439: 408: 662:
This article is not correct. Operations are made with no modulos. int() -: -->
264: 237: 1487: 1452: 1383: 1332:
https://crypto.stackexchange.com/questions/42134/ecdsa-pubkey-recovery-issue
456: 1279:
to define the security level, but I do not see how that would be possible.
1067: 929: 762:
are chosen at random then the probability of two signatures using the same
178: 731:
Now an attacker only needs to reconstruct k (or kInv) which he can do by:
452: 828:
is generated with a (secure) symmetric cipher, then I would assume that
118: 91: 593: 824:
is, that it must not be guessed and it must not be reconstructed. If
1197:
Also, I think that this article should use the same notation as the
1073: 935: 54: 26: 1602:
https://docs.openzeppelin.com/contracts/2.x/api/cryptography
592: 530: 506: 177: 1049:{\displaystyle r={\overline {x_{R}}}\operatorname {mod} n} 1368:
Example, this page (currently) authenticated using ECDSA
1005:
using the conversion routine specified in Section 2.3.9.
832:
meets this criterion. An attacker then only knows that
680:) are neccessary for the security of the algorithm. If 585: 580: 575: 570: 1346: 1113: 1086: 1013: 977: 950: 1738:
C-Class Computer Security articles of Mid-importance
451:, a collaborative effort to improve the coverage of 352:, a collaborative effort to improve the coverage of 259:, a collaborative effort to improve the coverage of 130:, a collaborative effort to improve the coverage of 1247:
bits, how can the public key be calculated from it?
1688:Mid-importance WikiProject Cryptocurrency articles 1133: 1099: 1048: 997: 963: 615:Review importance and quality of existing articles 1243:if the private key is just a "random number" of 618:Identify categories related to Computer Security 1446:New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 1428:$ openssl s_client -connect wikipedia.org:443 1107:no conversion is required, and if the field is 932:the signing process is described unambiguously: 758:must be chosen for every new signature. If the 1080:Informally the idea is that, if the field is 8: 1718:C-Class software articles of Low-importance 1683:C-Class WikiProject Cryptocurrency articles 697:has to be chosen significantly larger than 1526: 1377: 1323:Public key can be recovered from signature 862:have been proposed (see e.g. IEEE P1363). 624:Identify articles for creation (see also: 554: 403: 314: 205: 86: 1733:Mid-importance Computer Security articles 1653:High-importance Computer science articles 1123: 1118: 1112: 1091: 1085: 1026: 1020: 1012: 984: 978: 976: 955: 949: 606:. Please allow some days for processing. 905:) 11:46, 27 November 2020 (UTC)garweyne 405: 316: 207: 88: 58: 1658:WikiProject Computer science articles 1643:High-importance Cryptography articles 1470:P256. I'm sure otehr examples exist. 7: 445:This article is within the scope of 366:Knowledge:WikiProject Cryptocurrency 346:This article is within the scope of 253:This article is within the scope of 124:This article is within the scope of 1693:WikiProject Cryptocurrency articles 998:{\displaystyle {\overline {x_{R}}}} 930:section 4.1.3 (starting on page 50) 734:s_1 - s_2 = kInv*(e_1 - e_2) mod n 372:WikiProject Cryptocurrency articles 369:Template:WikiProject Cryptocurrency 77:It is of interest to the following 1728:C-Class Computer Security articles 1673:Low-importance numismatic articles 1440:Server Temp Key: X25519, 253 bits 1327:More information please refer to 791:No doubt there. The generation of 144:Knowledge:WikiProject Cryptography 25: 1703:Low-importance Computing articles 1663:WikiProject Cryptography articles 1648:C-Class Computer science articles 1235:Example computation, like in RSA? 631:Identify articles for improvement 277:Knowledge:WikiProject Numismatics 147:Template:WikiProject Cryptography 1713:Low-importance software articles 1678:WikiProject Numismatics articles 1349:dot org/index.php?topic=783694.0 1216:Use the hash value $ e$ or not? 438: 407: 339: 318: 280:Template:WikiProject Numismatics 240: 230: 209: 117: 90: 59: 30: 725:s_2 = kInv*(e_2 + r*d_A) mod n 493:This article has been rated as 473:Knowledge:WikiProject Computing 386:This article has been rated as 297:This article has been rated as 164:This article has been rated as 41:on 14 June 2008. The result of 37:This article was nominated for 1743:All Computer Security articles 1480:16:17, 23 September 2021 (UTC) 1461:23:48, 21 September 2021 (UTC) 1261:16:46, 14 September 2014 (UTC) 723:s_1 = kInv*(e_1 + r*d_A) mod n 476:Template:WikiProject Computing 1: 1638:C-Class Cryptography articles 1566:15:09, 2 September 2020 (UTC) 1547:Simplified explanation needed 1425:Tue Sep 21 19:33:46 EDT 2021 1414:15:11, 2 September 2020 (UTC) 1396:19:23, 24 November 2017 (UTC) 1363:03:37, 20 November 2017 (UTC) 1165:20:27, 27 November 2020 (UTC) 944:2. Convert the field element 915:11:46, 27 November 2020 (UTC) 872:10:40, 20 November 2007 (UTC) 853:10:00, 20 November 2007 (UTC) 806:14:46, 18 November 2007 (UTC) 776:14:05, 17 November 2007 (UTC) 749:03:23, 17 November 2007 (UTC) 602:will be generated shortly by 560:WikiProject Computer Security 542:WikiProject Computer Security 539:This article is supported by 515:This article is supported by 467:and see a list of open tasks. 360:and see a list of open tasks. 271:and see a list of open tasks. 186:This article is supported by 138:and see a list of open tasks. 1541:17:01, 19 January 2019 (UTC) 1434:Peer signing digest: SHA256 1032: 990: 189:WikiProject Computer science 1668:C-Class numismatic articles 1623:01:52, 30 August 2022 (UTC) 1554:Elliptic-curve cryptography 1517:Size of signature is wrong? 1437:Peer signature type: ECDSA 1301:16:51, 28 August 2017 (UTC) 1199:Digital Signature Algorithm 1764: 1698:C-Class Computing articles 1211:13:33, 24 April 2008 (UTC) 499:project's importance scale 349:WikiProject Cryptocurrency 303:project's importance scale 1708:C-Class software articles 1511:20:07, 5 April 2022 (UTC) 1496:16:16, 4 April 2022 (UTC) 1230:13:03, 17 June 2009 (UTC) 1192:00:30, 2 April 2008 (UTC) 1134:{\displaystyle F_{2^{m}}} 666:Sign: r=int(kG)+h s=k-ar 553: 538: 514: 492: 433: 385: 334: 296: 225: 185: 163: 112: 85: 1317:08:42, 9 June 2018 (UTC) 714:14:52, 6 July 2007 (UTC) 669:Verify: h==r-int(sG+rP) 658:Correctness of algorithm 127:WikiProject Cryptography 1594:OpenZeppellin and ECDSA 1585:21:23, 3 May 2022 (UTC) 728:with k*kInv = 1 mod n 688:are not reduced modulo 256:WikiProject Numismatics 18:Talk:Elliptic Curve DSA 1748:All Computing articles 1135: 1101: 1050: 999: 965: 597: 535: 511: 461:information technology 182: 67:This article is rated 1723:All Software articles 1136: 1102: 1100:{\displaystyle F_{p}} 1051: 1000: 966: 964:{\displaystyle x_{R}} 837:cipher (correct ?). 596: 534: 510: 448:WikiProject Computing 181: 150:Cryptography articles 1171:Jargon / readability 1111: 1084: 1011: 975: 948: 621:Tag related articles 558:Things you can help 518:WikiProject Software 1347:https://bitcointalk 609:More information... 283:numismatic articles 1131: 1097: 1046: 995: 961: 598: 536: 512: 479:Computing articles 248:Numismatics portal 183: 73:content assessment 1609:comment added by 1543: 1531:comment added by 1398: 1382:comment added by 1194: 1182:comment added by 1148: 1147: 1063: 1062: 1035: 993: 855: 843:comment added by 655: 654: 651: 650: 647: 646: 643: 642: 402: 401: 398: 397: 313: 312: 309: 308: 204: 203: 200: 199: 53: 52: 16:(Redirected from 1755: 1625: 1177: 1140: 1138: 1137: 1132: 1130: 1129: 1128: 1127: 1106: 1104: 1103: 1098: 1096: 1095: 1074: 1055: 1053: 1052: 1047: 1036: 1031: 1030: 1021: 1004: 1002: 1001: 996: 994: 989: 988: 979: 970: 968: 967: 962: 960: 959: 936: 926: 838: 626:Article requests 611: 555: 481: 480: 477: 474: 471: 442: 435: 434: 429: 426: 411: 404: 392:importance scale 374: 373: 370: 367: 364: 343: 336: 335: 330: 322: 315: 285: 284: 281: 278: 275: 250: 245: 244: 243: 234: 227: 226: 221: 213: 206: 170:importance scale 152: 151: 148: 145: 142: 121: 114: 113: 108: 105: 103:Computer science 94: 87: 70: 64: 63: 55: 34: 27: 21: 1763: 1762: 1758: 1757: 1756: 1754: 1753: 1752: 1628: 1627: 1604: 1596: 1549: 1523: 1519: 1370: 1325: 1268: 1237: 1218: 1173: 1119: 1114: 1109: 1108: 1087: 1082: 1081: 1022: 1009: 1008: 980: 973: 972: 951: 946: 945: 920: 660: 612: 607: 590: 478: 475: 472: 469: 468: 427: 417: 371: 368: 365: 362: 361: 328: 282: 279: 276: 273: 272: 246: 241: 239: 219: 194:High-importance 166:High-importance 149: 146: 143: 140: 139: 107:High‑importance 106: 100: 71:on Knowledge's 68: 23: 22: 15: 12: 11: 5: 1761: 1759: 1751: 1750: 1745: 1740: 1735: 1730: 1725: 1720: 1715: 1710: 1705: 1700: 1695: 1690: 1685: 1680: 1675: 1670: 1665: 1660: 1655: 1650: 1645: 1640: 1630: 1629: 1595: 1592: 1590: 1588: 1587: 1573: 1548: 1545: 1520: 1518: 1515: 1514: 1513: 1483: 1482: 1465: 1417: 1416: 1369: 1366: 1351: 1350: 1344: 1339: 1334: 1324: 1321: 1320: 1319: 1267: 1266:Security level 1264: 1249: 1248: 1241: 1236: 1233: 1217: 1214: 1172: 1169: 1168: 1167: 1152: 1146: 1145: 1142: 1126: 1122: 1117: 1094: 1090: 1078: 1072: 1071: 1066:In turn, that 1061: 1060: 1057: 1045: 1042: 1039: 1034: 1029: 1025: 1019: 1016: 1006: 992: 987: 983: 971:to an integer 958: 954: 943: 940: 934: 933: 881: 879: 878: 877: 876: 875: 874: 810: 809: 808: 786: 784: 782: 724: 717: 716: 659: 656: 653: 652: 649: 648: 645: 644: 641: 640: 639: 638: 635: 632: 629: 622: 619: 616: 600:Article alerts 591: 589: 588: 583: 578: 573: 567: 564: 563: 551: 550: 547:Mid-importance 537: 527: 526: 523:Low-importance 513: 503: 502: 495:Low-importance 491: 485: 484: 482: 465:the discussion 443: 431: 430: 428:Low‑importance 412: 400: 399: 396: 395: 388:Mid-importance 384: 378: 377: 375: 363:Cryptocurrency 358:the discussion 354:cryptocurrency 344: 332: 331: 329:Mid‑importance 326:Cryptocurrency 323: 311: 310: 307: 306: 299:Low-importance 295: 289: 288: 286: 269:the discussion 252: 251: 235: 223: 222: 220:Low‑importance 214: 202: 201: 198: 197: 184: 174: 173: 162: 156: 155: 153: 136:the discussion 122: 110: 109: 95: 83: 82: 76: 65: 51: 50: 43:the discussion 35: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1760: 1749: 1746: 1744: 1741: 1739: 1736: 1734: 1731: 1729: 1726: 1724: 1721: 1719: 1716: 1714: 1711: 1709: 1706: 1704: 1701: 1699: 1696: 1694: 1691: 1689: 1686: 1684: 1681: 1679: 1676: 1674: 1671: 1669: 1666: 1664: 1661: 1659: 1656: 1654: 1651: 1649: 1646: 1644: 1641: 1639: 1636: 1635: 1633: 1626: 1624: 1620: 1616: 1612: 1608: 1603: 1599: 1593: 1591: 1586: 1582: 1578: 1574: 1570: 1569: 1568: 1567: 1563: 1559: 1558:David Spector 1555: 1546: 1544: 1542: 1538: 1534: 1530: 1516: 1512: 1508: 1504: 1500: 1499: 1498: 1497: 1493: 1489: 1481: 1477: 1473: 1468: 1467: 1466: 1463: 1462: 1458: 1454: 1450: 1447: 1444: 1441: 1438: 1435: 1432: 1429: 1426: 1423: 1420: 1415: 1411: 1407: 1406:David Spector 1404: 1401: 1400: 1399: 1397: 1393: 1389: 1385: 1381: 1374: 1367: 1365: 1364: 1360: 1356: 1348: 1345: 1343: 1340: 1338: 1335: 1333: 1330: 1329: 1328: 1322: 1318: 1314: 1310: 1305: 1304: 1303: 1302: 1298: 1294: 1288: 1285: 1280: 1278: 1274: 1265: 1263: 1262: 1258: 1254: 1246: 1242: 1239: 1238: 1234: 1232: 1231: 1227: 1223: 1215: 1213: 1212: 1208: 1204: 1200: 1195: 1193: 1189: 1185: 1184:70.172.221.26 1181: 1170: 1166: 1162: 1158: 1153: 1150: 1149: 1124: 1120: 1115: 1092: 1088: 1079: 1075: 1069: 1068:section 2.3.9 1065: 1064: 1043: 1040: 1037: 1027: 1023: 1017: 1014: 985: 981: 956: 952: 941: 937: 931: 924: 919: 918: 917: 916: 912: 908: 904: 900: 895: 891: 887: 883: 873: 869: 865: 861: 857: 856: 854: 850: 846: 845:213.70.137.67 842: 835: 831: 827: 823: 819: 815: 811: 807: 803: 799: 794: 790: 789: 779: 778: 777: 773: 769: 765: 761: 757: 753: 752: 751: 750: 746: 742: 735: 732: 729: 726: 721: 715: 712: 708: 704: 700: 696: 691: 687: 683: 679: 675: 674: 673: 670: 667: 664: 657: 636: 633: 630: 627: 623: 620: 617: 614: 613: 610: 605: 601: 595: 587: 584: 582: 579: 577: 574: 572: 569: 568: 566: 565: 561: 557: 556: 552: 548: 545:(assessed as 544: 543: 533: 529: 528: 524: 521:(assessed as 520: 519: 509: 505: 504: 500: 496: 490: 487: 486: 483: 466: 462: 458: 454: 450: 449: 444: 441: 437: 436: 432: 425: 421: 416: 413: 410: 406: 393: 389: 383: 380: 379: 376: 359: 355: 351: 350: 345: 342: 338: 337: 333: 327: 324: 321: 317: 304: 300: 294: 291: 290: 287: 270: 266: 262: 258: 257: 249: 238: 236: 233: 229: 228: 224: 218: 215: 212: 208: 195: 192:(assessed as 191: 190: 180: 176: 175: 171: 167: 161: 158: 157: 154: 137: 133: 129: 128: 123: 120: 116: 115: 111: 104: 99: 96: 93: 89: 84: 80: 74: 66: 62: 57: 56: 48: 44: 40: 36: 33: 29: 28: 19: 1605:— Preceding 1600: 1597: 1589: 1550: 1527:— Preceding 1524: 1484: 1464: 1451: 1448: 1445: 1442: 1439: 1436: 1433: 1430: 1427: 1424: 1421: 1418: 1402: 1378:— Preceding 1375: 1371: 1352: 1326: 1289: 1283: 1281: 1276: 1272: 1269: 1250: 1244: 1222:Annie Yousar 1219: 1196: 1174: 896: 892: 888: 884: 880: 859: 833: 829: 825: 821: 817: 813: 792: 763: 759: 755: 741:84.154.9.170 736: 733: 730: 727: 722: 718: 706: 702: 698: 694: 689: 685: 681: 677: 671: 668: 665: 661: 599: 540: 516: 494: 446: 387: 347: 298: 254: 187: 165: 141:Cryptography 132:Cryptography 125: 98:Cryptography 79:WikiProjects 46: 1533:45.2.119.34 1275:instead of 1178:—Preceding 864:85.2.41.154 839:—Preceding 274:Numismatics 261:numismatics 217:Numismatics 47:speedy keep 1632:Categories 798:85.2.68.87 781:trouble... 711:85.2.26.40 701:, so that 265:currencies 1577:Jannaston 1282:However, 768:85.2.63.5 604:AAlertBot 470:Computing 457:computing 453:computers 415:Computing 1619:contribs 1607:unsigned 1529:unsigned 1422:$ date 1392:contribs 1380:unsigned 1253:RokerHRO 1203:Cherullo 1180:unsigned 923:Garweyne 907:Garweyne 899:Garweyne 841:unsigned 424:Security 420:Software 39:deletion 1355:Jackzhp 1309:Maghnus 1293:Pashley 1284:average 1277:maximum 1273:minimum 1007:3. Set 576:history 497:on the 390:on the 301:on the 168:on the 69:C-class 1611:Smdear 1403:Agree. 1157:Nanite 1056:. ... 707:s=k-ar 459:, and 75:scale. 1353:Jack 1070:says: 586:purge 581:watch 562:with: 1615:talk 1581:talk 1572:one. 1562:talk 1537:talk 1507:talk 1492:talk 1488:DRLB 1476:talk 1457:talk 1453:DRLB 1443:... 1431:... 1410:talk 1388:talk 1384:DRLB 1359:talk 1313:talk 1297:talk 1257:talk 1226:talk 1207:talk 1188:talk 1161:talk 911:talk 903:talk 868:talk 849:talk 802:talk 772:talk 745:talk 705:and 684:and 571:edit 263:and 160:High 45:was 1503:Ewx 1472:Ewx 1038:mod 942:... 738:--> 489:Low 382:Mid 293:Low 1634:: 1621:) 1617:• 1583:) 1564:) 1539:) 1509:) 1494:) 1478:) 1459:) 1412:) 1394:) 1390:• 1361:) 1315:) 1299:) 1259:) 1251:-- 1228:) 1209:) 1190:) 1163:) 1155:-- 1144:” 1077:“ 1059:” 1041:⁡ 1033:¯ 991:¯ 939:“ 913:) 870:) 851:) 804:) 774:) 747:) 699:ar 549:). 525:). 455:, 422:/ 418:: 196:). 101:: 1613:( 1579:( 1560:( 1535:( 1505:( 1490:( 1474:( 1455:( 1408:( 1386:( 1357:( 1311:( 1295:( 1255:( 1245:n 1224:( 1205:( 1186:( 1159:( 1125:m 1121:2 1116:F 1093:p 1089:F 1044:n 1028:R 1024:x 1018:= 1015:r 986:R 982:x 957:R 953:x 925:: 921:@ 909:( 901:( 866:( 860:k 847:( 834:k 830:k 826:k 822:k 818:k 814:k 800:( 793:k 770:( 764:k 760:k 756:k 743:( 703:r 695:k 690:n 686:s 682:r 678:n 628:) 501:. 394:. 305:. 172:. 81:: 49:. 20:)

Index

Talk:Elliptic Curve DSA
Articles for deletion
deletion
the discussion

content assessment
WikiProjects
WikiProject icon
Cryptography
Computer science
WikiProject icon
WikiProject Cryptography
Cryptography
the discussion
High
importance scale
Taskforce icon
WikiProject Computer science
High-importance
WikiProject icon
Numismatics
WikiProject icon
Numismatics portal
WikiProject Numismatics
numismatics
currencies
the discussion
Low
project's importance scale
WikiProject icon

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.