Timeline for curve25519 weak points for contributory behaviour
Current License: CC BY-SA 3.0
9 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Oct 9, 2020 at 22:17 | history | edited | kelalaka | edited tags | |
| Jun 17, 2014 at 20:31 | comment | added | Perseids | @CodesInChaos: Very interesting application… Regarding the discussion there: I'm torn between arguing that this property is not at all a weakness of the implementation and that relying on such notion would be the fault of the protocol (similarly as I would see non-malleability as an unreasonable requirement of a signature scheme). And on the other hand I see the length extension property of the SHA2 family as a weakness and struggle to justify why this property is any different to it and why signature schemes shouldn't also be build as strongly as possible. | |
| Jun 17, 2014 at 14:38 | comment | added | CodesInChaos | Discussion of the effect of weak points on Ed25519 signatures It's possible to forge messages that crypto_sign_open verifies if the public key is zero | |
| Jun 15, 2014 at 22:09 | history | edited | Perseids | CC BY-SA 3.0 | Fixes embarassing typo in the title. |
| Jun 15, 2014 at 21:40 | vote | accept | Perseids | ||
| Jun 15, 2014 at 0:44 | answer | added | Samuel Neves | timeline score: 11 | |
| Jun 14, 2014 at 22:27 | history | tweeted | twitter.com/#!/StackCrypto/status/477940541942804480 | ||
| Jun 14, 2014 at 14:58 | history | edited | Perseids | CC BY-SA 3.0 | Add explanation why only the subgroups of order 8 and 4 should be interesting. |
| Jun 14, 2014 at 14:48 | history | asked | Perseids | CC BY-SA 3.0 |