From: “Perry E. Metzger” <perry@imsi.com>
To: eric@remailer.net (Eric Hughes)
Message Hash: ea6138ec596ef4e00768744be81ee57be22917d67efecc106e5f5178e02bff70
Message ID: <9412131850.AA12653@snark.imsi.com>
Reply To: <199412131842.KAA02350@largo.remailer.net>
UTC Datetime: 1994-12-13 18:51:19 UTC
Raw Date: Tue, 13 Dec 94 10:51:19 PST
From: "Perry E. Metzger" <perry@imsi.com>
Date: Tue, 13 Dec 94 10:51:19 PST
To: eric@remailer.net (Eric Hughes)
Subject: Re: What, exactly is elliptic encryption?
In-Reply-To: <199412131842.KAA02350@largo.remailer.net>
Message-ID: <9412131850.AA12653@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
Eric Hughes says:
> From: "Perry E. Metzger" <perry@imsi.com>
> Basically, there are ways of extending public key methods into fields
> other than the integers modulo some prime
>
> Small correction. While integer modulo a prime are fields (i.e. they
> have division), elliptic curve solutions only have a group structure,
> which is usually written as addition.
I stand corrected...
.pm
Return to December 1994
Return to ““Perry E. Metzger” <perry@imsi.com>”