Jeffrey Walton-3 wrote:
>
>> I've already implemented the ECDSA scheme in my application:
>> using SHA-1 and secp160k1.
> In that case, consider using ECDSA.
>
What about RSA with a 704-bits key and the SHA-256?
Jeffrey Walton-3 wrote:
>
>> Is there any real implementation who can show me
Jeffrey Walton-3 wrote:
>
>> 1. For how many days can I use a 512-bit key?
> 0
>
Does a individual hackers have the NASA's PC? lol, I mean I'm looking about
the integer factorization problem and, from a SW point of view, I think only
a comunity of PCs can solve the problem in few time (less t
Hello people,
since all of you seem quite familiary with criptography and its tools I
would like to ask u something.
I'm implementing a server/client application: the client has to collect data
and send them to the server in a frame format (unidirectional connection).
In any frame, I added a spe