Skip to main content

Questions tagged [ed25519]

Ed25519 is an algorithm for producing digital signatures. The algorithm is based on Edwards curves introduced by Bernstein et al. (2007) and named after mathematician Harold M. Edwards.

1 vote
0 answers
42 views

In Coinbase’s kryptology FROST(Ed25519) code, there’s a branch that flips all local nonce scalars if the group commitment R is “negative”: Link: https://github.com/...
pes oves's user avatar
  • 147
0 votes
1 answer
61 views

I will ask the previous question again in a simpler form. Please do not scold me for the formatting. I have a Ristretto encoding, and there is ed25519 (the main subgroup), let's denote the ...
pes oves's user avatar
  • 147
2 votes
1 answer
59 views

I need threshold Ed25519 signatures, but I would like to execute the distributed-key-generation phase in the prime-order Ristretto255 group (to avoid cofactor checks). Suppose I have an oracle that ...
pes oves's user avatar
  • 147
10 votes
3 answers
2k views

I'm reaching out to crypto SE as I would like to get advice from cryptographers, rather than fellow programmers. Thanks for your patience. I am concerned a lot of documention depicting Ed25519 isn't ...
mikemaccana's user avatar
4 votes
1 answer
329 views

I'm writing an application where the users communicating know each others' ED25519 public keys, but are using ECDH to do the encryption handshake, and therefore are receiving an X25519 public key as ...
Jack Lund's user avatar
0 votes
1 answer
77 views

The generateKey() docs states: extractable A boolean value indicating whether it will be possible to export the key using SubtleCrypto.exportKey() or SubtleCrypto....
mikemaccana's user avatar
3 votes
1 answer
374 views

(I searched a lot, but still got something unclear) After search, it says Ed25519 key size is 32 byte, for both private & public key. But from my golang program I generate a key, and it converts ...
Eric's user avatar
  • 167
1 vote
0 answers
191 views

Lets assume the following scenario: We have an Ed25519 secret key generated on a hardware device (like a Yubikey). Lets assume it is protected by the device and cannot be exported. The device can - in ...
raisyn's user avatar
  • 491
1 vote
1 answer
90 views

According to RFC 8032, 5.1.5, Key Generation, key pairs are generated from a 256 bits random seed, with the lowest 3 bits cleared and the upper 2 bits set to (01). This results in values that are ...
Marcus99's user avatar
2 votes
0 answers
86 views

The supercop implementation of ed25519 features a function called sc_reduce that computes the modular operation a % l for a fixed big number l. Here you can see the implementation: https://github.com/...
Theodor Johnson's user avatar
2 votes
0 answers
87 views

The "Similar Questions" section under my title suggest several similar questions on this, but none touched on that explicitly. Because Montgomery curves have birationally equivalent Edwards ...
DannyNiu's user avatar
  • 11.5k
1 vote
0 answers
69 views

Suppose: Alice knows the Ed25519 public key of Bob Bob is using his Ed25519 private key / seed in the usual way for digital signatures Clearly, Alice can verify messages signed by Bob. Is there any ...
mikera's user avatar
  • 141
2 votes
1 answer
334 views

Given the constraints in terms of processing power, memory, and energy, what digital signature schemes are commonly used and efficient for Microcontrollers? I have come across RSA with low public ...
Nawras Hussein's user avatar
1 vote
0 answers
108 views

There are many different ED25519/Curve25519/X25519 implementations around. I focus on two of them: https://github.com/jedisct1/libsodium https://github.com/floodyberry/ed25519-donna The libsodium ...
bebbo's user avatar
  • 156
0 votes
2 answers
163 views

Do we have something proven APPS for generate ssh key from some words? I mean private key(without reason wich type rsa or eleptic curves) generated deterministic from seed I found this fork of ssh-...
Andrew's user avatar
  • 3

15 30 50 per page
1
2 3 4 5
15