From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 62a6832bdabc932547c9d0f85f7d4c40589693c815e60afd2da3e555eca53e09
Message ID: <199412131842.KAA02350@largo.remailer.net>
Reply To: <9412131447.AA12121@snark.imsi.com>
UTC Datetime: 1994-12-13 17:45:10 UTC
Raw Date: Tue, 13 Dec 94 09:45:10 PST
From: eric@remailer.net (Eric Hughes)
Date: Tue, 13 Dec 94 09:45:10 PST
To: cypherpunks@toad.com
Subject: Re: What, exactly is elliptic encryption?
In-Reply-To: <9412131447.AA12121@snark.imsi.com>
Message-ID: <199412131842.KAA02350@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain
From: "Perry E. Metzger" <perry@imsi.com>
Basically, there are ways of extending public key methods into fields
other than the integers modulo some prime
Small correction. While integer modulo a prime are fields (i.e. they
have division), elliptic curve solutions only have a group structure,
which is usually written as addition.
Eric
Return to December 1994
Return to ““Perry E. Metzger” <perry@imsi.com>”