Difference between revisions of "Curve25519"
Jump to navigation
Jump to search
↑ https://www.wireguard.com/papers/wireguard.pdf
Line 9: | Line 9: | ||
* [[KexAlgorithms]]: <code>ssh -Q kex SERVER</code> | * [[KexAlgorithms]]: <code>ssh -Q kex SERVER</code> | ||
* [[Ed25519]] is the [[EdDSA]] signature scheme using [[SHA-512]] ([[SHA-2]]) and [[Curve25519]]. | * [[Ed25519]] is the [[EdDSA]] signature scheme using [[SHA-512]] ([[SHA-2]]) and [[Curve25519]]. | ||
+ | * [[Daniel J. Bernstein]] | ||
== See also == | == See also == |
Revision as of 05:56, 30 August 2022
This article is a Draft. Help us to complete it.
Computing Curve25519 point multiplication is CPU intensive.[1]
Related terms
- KexAlgorithms:
ssh -Q kex SERVER
- Ed25519 is the EdDSA signature scheme using SHA-512 (SHA-2) and Curve25519.
- Daniel J. Bernstein
See also
Advertising: