Labels

ACO (3) AdaBoost (2) Ant Colony Optimization (2) Backpropagation (2) binary constraint graph (1) blockchain (2) brute force (1) brute force algorithm (1) Class Scheduling (12) conditional independence (1) conference cheduling (1) conference scheduling (2) constraint satisfaction problem (3) cryptocurrency (3) csp (3) cyclic group (1) data mining (3) decision trees (12) derive equations (1) DHKE (6) Diffie Hellman Problem (1) Diffie-Hellman Key Exchange (2) Digital Signature Algorithm (1) Discrete Logarithm Problem (1) double and add algorithm (1) download source code (1) DSA (1) ecc (1) ECDH (1) ECDSA (1) Elgamal (1) Elgamal Digital Signature (1) Elliptic Curve (1) Elliptic Curve Diffie–Hellman key exchange (1) Elliptic Curve Cryptography (1) Elliptic Curve Digital Signature Algorithm (1) Encryption (1) euler phi function (1) extended euclidean algorithm (1) generalized discrete logarithm problem (1) generate rules (3) Genetic Algorithm (5) Genetic Algorithms (19) gradient descent (2) group (1) group generator (1) grow xml tree (1) Handle Underflow (1) hashing (1) hill climbing (7) hopfield network (2) independence (1) info gain (1) information gain (2) java (84) javafx (1) k-nearest neighbors (2) Laplace Smoothing (2) linear algebra (3) Linear Regression (2) logical operators (1) logistic regression (4) map coloring (1) message authenticity (1) message confidentiality (1) message integrity (1) multi-party Diffie-Hellman Key Exchange (1) Naive Bayes (6) nearest neighbor (1) nearest neighbors (1) Neural Networks (10) node splitting (1) Normal Equation (2) numpy (1) P2P (10) Peer to Peer (5) peer-to-peer (2) point addition (1) point doubling (1) pow (3) probability (2) proof of work (3) proof-of-work (1) public key cryptography (9) Public Key Cryptography + DHKE w/ Encryption + JAVA (1) Python (18) random restart hill climbing (2) robotics (1) rsa (1) RSA Digital Signature (1) Scala (1) Sentiment Classification (4) Sequential Minimal Optimization (2) sha-256 (1) simulated annealing (2) SMO (2) sqlite (21) stochastic gradient descent (2) Support Vector Machines (2) SVM (2) Traveling Salesman Problem (1) TSP (13) underflow handling (1) use rules (3) workshops scheduling (2)

Blog Archive

Monday, July 13, 2020

Elliptic Curve Cryptography (ECC) - Public Key Cryptography w/ JAVA (08)


Elliptic Curve Cryptography (ECC) - Public Key Cryptography w/ JAVA (tutorial 08)

prototypeprj.com = zaneacademy.com (version 2.0)

00:05 demo prebuilt version of the application

01:05 find all points that satisfy elliptic curve equation

03:05 show cyclic behavior of a generator point in a small group

04:05 use double and add algorithm for fast point hopping

04:45 quick intro to elliptic curves

05:20 singular versus nonsingular elliptic curves


06:00 elliptic curve in cryptography

09:55 equations for elliptic curve point addition and doubling

12:02 what is a field
13:35 elliptic curve group operations

14:02 associativity proof for elliptic curve point addition

15:30 elliptic curve over prime fields

16:35 code the application

19:46 check if curve to be instantiated is singular

24:06 implement point addition and doubling

25:59 find all points that satisfy elliptic curve equation

28:00 check if 2 points are inverse of each other

29:15 explain elliptic curve order, subgroup size n, and cofactor h

32:53 implement double and add algorithm

35:09 test run the application
40:20 what does 'Points on elliptic curve + O have cyclic subgroups' mean
40:45 when do all points on an elliptic curve form a cyclic group
-----------------------------------------------------------------------------------------------------------------------------
quickly download, import into Eclipse, and run zip file for
'Elliptic Curve Cryptography (ECC) - Public Key Cryptography w/ JAVA (tutorial 08)'
-----------------------------------------------------------------------------------------------------------------------------



-----------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------


No comments:

Post a Comment