Elliptic Curve Cryptography Tutorial - Understanding ECC through the Diffie-Hellman Key Exchange

Elliptic Curve Cryptography Tutorial - Understanding ECC through the Diffie-Hellman Key Exchange

Fullstack Academy

7 лет назад

102,938 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

John Kent
John Kent - 28.01.2018 23:05

Great lecture

Ответить
Frans Mulder
Frans Mulder - 17.01.2018 10:35

Great presentation

Ответить
Terry M
Terry M - 15.01.2018 00:38

Is that a dot product?

Ответить
Steven Kifer
Steven Kifer - 30.08.2017 01:17

Great job. Thank you for the primer on elliptic curve cryptography. When you mentioned vulnerabilities of the DH key exchange, I was expecting you to mention the vulnerabilities of a MiTM attack where an attacker intercepts and throws away the shared values and passes along it's own made up values to each recipient. I wasn't aware of an attack vector that uses algorithms to make crunching the key easier. I'll have to look into that.

Ответить