Hacker News new | past | comments | ask | show | jobs | submit login

Regarding the SHA-1 constants:

http://crypto.stackexchange.com/questions/10829/why-initiali...

Your latter example seems to be about the Dual-EC RNG, which is not an ECC encryption algorithm.




Ah that is good to know. Yes the latter example was not exactly on point, just meant as a general illustration of possible vulnerabilties.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: