Difference between revisions of "Curve25519"
Jump to navigation
Jump to search
↑ https://www.wireguard.com/papers/wireguard.pdf
Line 8: | Line 8: | ||
== Related terms == | == Related terms == | ||
* [[KexAlgorithms]]: <code>ssh -Q kex SERVER</code> | * [[KexAlgorithms]]: <code>ssh -Q kex SERVER</code> | ||
− | * [[Ed25519]] is the [[EdDSA]] signature scheme using [[SHA-512]] (SHA-2) and [[Curve25519]]. | + | * [[Ed25519]] is the [[EdDSA]] signature scheme using [[SHA-512]] ([[SHA-2]]) and [[Curve25519]]. |
== See also == | == See also == |
Revision as of 12:55, 7 March 2021
This article is a Draft. Help us to complete it.
Computing Curve25519 point multiplication is CPU intensive.[1]
Related terms
- KexAlgorithms:
ssh -Q kex SERVER
- Ed25519 is the EdDSA signature scheme using SHA-512 (SHA-2) and Curve25519.
See also
Advertising: