Elliptic curve cryptography.
New curves, implementation techniques, and protocols such as PAKE and signatures.
Subscribe » Archives »
Secure end-to-end messaging.
New approaches to key management, authentication, usability, and deployment.