• Elliptic-Curve Cryptography, Simplified

    Part 2 of 2 in the Series — Zero to 30
    As both standalone and networked computing capabilities continue to grow in-line with Moore’s law, key sizes for the most widely used public-key cryptographic systems have to grow disproportionately fast. This trend makes a switch to elliptic-curve cryptography (ECC) more and more attractive. Unfortunately, ECC has a reputation for being difficult to understand. And this reputation, deserved or not, deters many

        in General