The document discusses elliptic curve cryptography and its use on the internet. It describes how ECC provides greater security than RSA for equivalent key sizes due to working in two dimensions rather than one. It also outlines how ECC is supported across cryptographic libraries like OpenSSL and applications including web servers, browsers, SSH, and OpenPGP. Standard curves like NIST P-256 are commonly used and support for newer curves like Curve25519 is growing.
[Defcon Russia #29] Алексей Тюрин - Spring autobindingDefconRussia
В Spring MVC есть классная фича — autobinding. Но если пользоваться ей неправильно, могут появиться «незаметные» уязвимости, иногда с серьёзным импактом. Рассмотрим пару примеров, углубимся в тонкости появления autobinding-багов. Writeup [ENG]: http://agrrrdog.blogspot.ru/2017/03/autobinding-vulns-and-spring-mvc.html
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...DefconRussia
Докладчик покажет, как с помощью bare-metal programming подружить Raspberry Pi с GPIO, памятью и Ethernet, и пояснит, кому и зачем это может понадобиться.
Talk given at Devoxx UK 2014
Caveat - without the video these slides can be taken out of context, see Parleys for the full video.
RSA is the oldest kid in the public-key cryptography playground, and its position of toughest and fastest is under sharp competition from ECC (Elliptic Curve Cryptography). We look at the mathematical difference between the two cryptosystems, showing why ECC is faster and “harder” than RSA, but also very energy efficient hence its unique advantage in the mobile space. We show how to use ECC in your Java and Android applications. Before finally summarising the “state of the union” for RSA and ECC in the light of the Snowden leaks, and the likely near-future for public-key cryptography.
[Defcon Russia #29] Алексей Тюрин - Spring autobindingDefconRussia
В Spring MVC есть классная фича — autobinding. Но если пользоваться ей неправильно, могут появиться «незаметные» уязвимости, иногда с серьёзным импактом. Рассмотрим пару примеров, углубимся в тонкости появления autobinding-багов. Writeup [ENG]: http://agrrrdog.blogspot.ru/2017/03/autobinding-vulns-and-spring-mvc.html
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...DefconRussia
Докладчик покажет, как с помощью bare-metal programming подружить Raspberry Pi с GPIO, памятью и Ethernet, и пояснит, кому и зачем это может понадобиться.
Talk given at Devoxx UK 2014
Caveat - without the video these slides can be taken out of context, see Parleys for the full video.
RSA is the oldest kid in the public-key cryptography playground, and its position of toughest and fastest is under sharp competition from ECC (Elliptic Curve Cryptography). We look at the mathematical difference between the two cryptosystems, showing why ECC is faster and “harder” than RSA, but also very energy efficient hence its unique advantage in the mobile space. We show how to use ECC in your Java and Android applications. Before finally summarising the “state of the union” for RSA and ECC in the light of the Snowden leaks, and the likely near-future for public-key cryptography.
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Time Sensitive Networking in the Linux Kernelhenrikau
Time Sensitive Networking provides mechanisms for sending data accross the network with very low latency, low jitter and low framedrops, opening up a whole range of new applications.
This talk primarily focuses on media, but the driver should be interesting for industrial applications and automotive as well.
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...JPCERT Coordination Center
Recently we’ve seen many vulnerabilities related to improper certificate validation. Those vulnerabilities come from developers’ ignorance or misunderstanding of basic knowledge of certificate validation or insufficient testing of validation code. This presentation starts with the basics of the certificate validation process, surveys several vulnerabilities in the real world, and concludes with lessons learned from real-world vulnerabilities.
This is presented on JavaOne2015.
Threat Modelling - It's not just for developersMITRE ATT&CK
From ATT&CKcon 3.0
By Tim Wadhwa-Brown, Cisco
The purpose of this session will be to look at how you can take public information about threat actors, vulnerabilities, and incidents and use them to build better defenses, utilizing ATT&CK along the way to align your security organization to the people and assets that matter.
Stories are critical to how humans learn, so this session will leverage a story book approach to give the audience some ideas on approaches they could use. Tim will take the audience through 3 real world examples where he has leveraged ATT&CK to drive operational improvement. The premise of each story will be real, although some of the details will be apocryphal to protect the innocent.
One story will focus on defending a network, one will look at adversary detection, while the final one will look at responding to an active attack and in each case, Tim will guide the audience to think about the kinds of data sources that ATT&CK tracks, that they might call upon to achieve a successful outcome.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
More Related Content
Similar to Eliptic-Curve Cryptography and the Internet
The security and confidentiality of information becomes an important factor in communication, the use of cryptography can be a powerful way of securing the information, IDEA (International Data Encryption Algorithm) and WAKE (Word Auto Key Encryption) are some modern symmetric cryptography algorithms with encryption and decryption function are much faster than the asymmetric cryptographic algorithm, with the combination experiment IDEA and WAKE it probable to produce highly secret ciphertext and it hopes to take a very long time for cryptanalyst to decrypt the information without knowing the key of the encryption process.
Time Sensitive Networking in the Linux Kernelhenrikau
Time Sensitive Networking provides mechanisms for sending data accross the network with very low latency, low jitter and low framedrops, opening up a whole range of new applications.
This talk primarily focuses on media, but the driver should be interesting for industrial applications and automotive as well.
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...JPCERT Coordination Center
Recently we’ve seen many vulnerabilities related to improper certificate validation. Those vulnerabilities come from developers’ ignorance or misunderstanding of basic knowledge of certificate validation or insufficient testing of validation code. This presentation starts with the basics of the certificate validation process, surveys several vulnerabilities in the real world, and concludes with lessons learned from real-world vulnerabilities.
This is presented on JavaOne2015.
Threat Modelling - It's not just for developersMITRE ATT&CK
From ATT&CKcon 3.0
By Tim Wadhwa-Brown, Cisco
The purpose of this session will be to look at how you can take public information about threat actors, vulnerabilities, and incidents and use them to build better defenses, utilizing ATT&CK along the way to align your security organization to the people and assets that matter.
Stories are critical to how humans learn, so this session will leverage a story book approach to give the audience some ideas on approaches they could use. Tim will take the audience through 3 real world examples where he has leveraged ATT&CK to drive operational improvement. The premise of each story will be real, although some of the details will be apocryphal to protect the innocent.
One story will focus on defending a network, one will look at adversary detection, while the final one will look at responding to an active attack and in each case, Tim will guide the audience to think about the kinds of data sources that ATT&CK tracks, that they might call upon to achieve a successful outcome.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Eliptic-Curve Cryptography and the Internet
1. Eliptic-Curve Cryptography and the Internet
Dominik Joe Pantucek
joe@joe.cz
Trustica s.r.o.
7.12.2015
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 1 / 35
2. What is EC?
Eliptic curve
Looks nice
1D abelian variety
Forms abelian group over 2D
8. eld
Point addition: C = A + B
Point duplication: B = A + A
Point multiplication: B = n ¡ A
Discrete logarithm problem on the EC group:
Given points A and B,
9. nd n such that B = n ¡ A.
Good luck ...
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 4 / 35
10. Why should we care?
Security parameter:
The bigger the better ...
80bit security is roughly 1024bit RSA
The number of required brute-force attempts is approximately 2n
280 for 1024bit RSA
Size:
The smaller the better ...
1024bit RSA keys and values are 1024 bits long, i.e. 128 bytes
Speed and/or latency impact during key exchange
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 5 / 35
11. Why should we care?
Elliptic-curve cryptography:
security parameter is n
2
n is typically 256 { 256bits per coordinate (2D)
only one coordinate is needed
+1 bit of the other one for checksum calculation
257
8
= 33 bytes for 128-bit security
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 6 / 35
12. What ECC is available?
Curves:
NIST { National Institute of Standards and Technology
SECG { Standards for Ecient Cryptography Group
Independent (Bernstein et al.)
Authentication: ECDSA
Encryption: ECDH/ECDHE
Parameters: p; a; b; G; n
Key pairs: dA; QA and dB; QB with QA = dAG and QB = dBG
Commutativity: dAdBG = dBdAG
Shared secret: dAQB = dBQA
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 7 / 35
13. Standard curves and algorithms
$ o p e n s s l ecparam l i s t c u r v e s
secp112r1 : SECG/WTLS curve over a 112 b i t prime f i e l d
secp112r2 : SECG curve over a 112 b i t prime f i e l d
secp128r1 : SECG curve over a 128 b i t prime f i e l d
secp128r2 : SECG curve over a 128 b i t prime f i e l d
secp160k1 : SECG curve over a 160 b i t prime f i e l d
secp160r1 : SECG curve over a 160 b i t prime f i e l d
secp160r2 : SECG/WTLS curve over a 160 b i t prime f i e l d
secp192k1 : SECG curve over a 192 b i t prime f i e l d
secp224k1 : SECG curve over a 224 b i t prime f i e l d
secp224r1 : NIST/SECG curve over a 224 b i t prime f i e l d
secp256k1 : SECG curve over a 256 b i t prime f i e l d
secp384r1 : NIST/SECG curve over a 384 b i t prime f i e l d
secp521r1 : NIST/SECG curve over a 521 b i t prime f i e l d
. . .
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 8 / 35
14. Alternative curves and algorithms
Curve25519
y2
= x3
+ 486662x2
+ x (mod 2255
19)
Ed25519
x2
+ y2
= 1 121665
121666
x2
y2
(mod 2255
19)
X25519 (DH)
EdDSA
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 9 / 35
15. Library support
OpenSSL
Microsoft Cryptography API: Next Generation
LibreSSL
GNUTLS
NaCl
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 10 / 35
16. OpenSSL
Since 0.9.8 (5 Jul 2005)
ECDSA { ECDSA * *-ECDSA-*
ECDH { ECDH * ECDH-*
Example (con
18. Microsoft Cryptography API: Next Generation
Windows Vista and newer, Windows Server 2008 and newer
ECDSA { BCRYPT ECDSA P256 ALGORITHM
ECDH { BCRYPT ECDH P256 ALGORITHM
Example: TLS ECDHE ECDSA WITH AES 256 CBC SHA P384
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 12 / 35
23. guration strings { called priorities
Example: ECDH-ECDSA-AES256-GCM-SHA384
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 14 / 35
24. NaCl
[Salt]
Daniel J. Bernstein et al.
Ed25519 in the next release
May support NIST-P256/SHA-512-based ECDSA
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 15 / 35
27. HTTP server support
Supported only in TLS 1.0 and higher.
Disabling SSL 2.0 and 3.0 is strongly recommended.
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 18 / 35
28. Apache
mod ssl links against OpenSSL
SSLCipherSuite ECDHE -ECDSA -AES128 -GCM -SHA256
SSLProtocol All -SSLv2 -SSLv3
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 19 / 35
42. SSH/OpenSSH
ECDSA and ECDH supported since version 5.7 [23 Jan 2011]
Ed25519 supported since 7 Dec 2013 snapshots
Ocial support since version 6.5 [2 Feb 2014]
It is preferred type of both server and client keys now
ssh -keygen -t ed25519 -C My -Ed25519 -key -f generated -key
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 28 / 35
43. OpenPGP/GnuPG
Suppors standardized ECC
NIST P-256, P-384, and P-521 curves
Brainpool P-256, P-384, and P-512 curves
Both for signing and encryption
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 29 / 35
44. OpenPGP/GnuPG
Experimental Ed25519/EdDSA support
draft-koch-eddsa-for-openpgp-03 [Aug 28, 2015]
22 is probable id
expires [Feb 29, 2016]
draft-josefsson-eddsa-ed25519-03 [May 12, 2015]
expired [Nov 13, 2015]
draft-irtf-cfrg-eddsa-00 [Oct 7, 2015]
expires [Apr 9, 2016]
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 30 / 35
45. OpenPGP/GnuPG
$ gpg --expert --full -gen -key
. . .
Please s e l e c t what kind of key you want :
. . .
(10) ECC ( sign only )
. . .
Your s e l e c t i o n ? 10
Please s e l e c t which e l l i p t i c curve you want :
(1) Curve 25519
. . .
Your s e l e c t i o n ? 1
gpg : WARNING: Curve25519 i s not yet part of the OpenPG
Use t h i s curve anyway? ( y/N) y
. . .
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 31 / 35
46. Conclusion
By using ECC wisely you...
get bigger security parameter,
get smaller and faster handshakes, and
make sure the future will be pretty twisted.
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 32 / 35
47. Questions
Feel free to ask some ;-)
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 33 / 35
48. References
Elaine Barker, Lily Chen, Allen Roginsky and Miles Smid: NIST
Special Publication 800-56A Revision 2 { Recommendation for
Pair-Wise Key Establishment Schemes Using Discrete Logarithm
Cryptography, May 2013
NIST: FIPS PUB 186-4 { Digital Signature Standard (DSS),
July 2013
IETF work in progress drafts:
W. Koch: EdDSA for OpenPGP (draft-koch-eddsa-for-openpgp-03),
August 28, 2015
S. Josefsson and N. Moeller: EdDSA and Ed25519
(draft-josefsson-eddsa-ed25519-03), May 12, 2015
S. Josefsson and I. Liusvaara: Edwards-curve Digital Signature
Algorithm (EdDSA) (draft-irtf-cfrg-eddsa-00), October 7, 2015
Me et al.: all elliptic curve images presented, December 2015
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 34 / 35
49. Thank you.
Dominik Joe Pantucek (Trustica s.r.o.) Eliptic-Curve Cryptography and the Internet 7.12.2015 35 / 35