xample with finite fields set B = 0 and it's easy
to fool the verification step; a similar idea can be applied to
elliptic curves (if validation is free then not on curve25519). I'm
not familiar with how exactly Tor handles registration, but can come
up with a few "reason
ing X \in G of
course). This will kill any multiples coming from the cofactor 8. If I
recall correctly something along these lines is going on in SP800-56A
for ECMQV.
- BU
--
Berkant Ustaoglu
http://cryptolounge.net
___
tor-dev mailing list
tor-dev@lists.torproject.org
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev