[147337] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA equivalent key length/strength

daemon@ATHENA.MIT.EDU (Taral)
Mon Sep 30 10:04:33 2013

X-Original-To: cryptography@metzdowd.com
In-Reply-To: <20130930041550.GM29796@mournblade.imrryr.org>
From: Taral <taralx@gmail.com>
Date: Sun, 29 Sep 2013 22:55:42 -0700
To: Cryptography List <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Sun, Sep 29, 2013 at 9:15 PM, Viktor Dukhovni
<cryptography@dukhovni.org> wrote:
> On Mon, Sep 30, 2013 at 10:07:14AM +1000, James A. Donald wrote:
>> Therefore, everyone should use Curve25519, which we have every
>> reason to believe is unbreakable.
>
> Superceded by the improved Curve1174.

Hardly. Elligator 2 works fine on curve25519.

-- 
Taral <taralx@gmail.com>
"Please let me know if there's any further trouble I can give you."
    -- Unknown
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post