1994-12-13 - Re: What, exactly is elliptic encryption?

Header Data

From: eric@remailer.net (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 62a6832bdabc932547c9d0f85f7d4c40589693c815e60afd2da3e555eca53e09
Message ID: <199412131842.KAA02350@largo.remailer.net>
Reply To: <9412131447.AA12121@snark.imsi.com>
UTC Datetime: 1994-12-13 17:45:10 UTC
Raw Date: Tue, 13 Dec 94 09:45:10 PST

Raw message

From: eric@remailer.net (Eric Hughes)
Date: Tue, 13 Dec 94 09:45:10 PST
To: cypherpunks@toad.com
Subject: Re: What, exactly is elliptic encryption?
In-Reply-To: <9412131447.AA12121@snark.imsi.com>
Message-ID: <199412131842.KAA02350@largo.remailer.net>
MIME-Version: 1.0
Content-Type: text/plain


   From: "Perry E. Metzger" <perry@imsi.com>

   Basically, there are ways of extending public key methods into fields
   other than the integers modulo some prime

Small correction.  While integer modulo a prime are fields (i.e. they
have division), elliptic curve solutions only have a group structure,
which is usually written as addition.

Eric






Thread