Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would like to add the thought of looking at where these elliptic curves are deployed, things like embedded devices and implementations bitcoin-core libraries for say secp256k1 [0].

Ref:

[0] Optimized C library for EC operations on curve secp256k1

https://github.com/bitcoin-core/secp256k1



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: