# Evervault Papers

### Crypto means cryptography

The most important cryptography papers spanning the past, present, and future of cryptosystems & cryptology.

###### On the (Im)possibility of Obfuscating Programs

###### Computer Systems Established, Maintained and Trusted by Mutually Suspicious Groups

###### A Digital Signature Based on a Conventional Encryption Function

###### The Knowledge Complexity of Interactive Proof-Systems

###### Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security

###### CryptDB: Protecting Confidentiality with Encrypted Query Processing

###### Protocols for Secure Computations

###### Bitcoin: A Peer-to-Peer Electronic Cash System

###### A fully homomorphic encryption scheme

###### On Data Banks and Privacy Homomorphisms

###### A fast quantum mechanical algorithm for database search

###### Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer

###### Use of Elliptic Curves in Cryptography

#### Use of Elliptic Curves in Cryptography

Victor Miller — Published August 1985

This paper, along with Elliptic Curve Cryptosystems, independently proposed the use of elliptic curves in cryptography.

Unlike other public-key cryptosystems — like RSA, which relies on the fact that factoring large integers is slow and multiplication is fast (the Prime Factorization Problem) — elliptic curve cryptography (ECC) depends on the difficulty of the Elliptic Curve Discrete Logarithm Problem: given two points, P and Q, on an elliptic curve, find the integer n, if it exists, such that Q = nP.

ECC provides similar security guarantees compared to RSA, but with significantly reduced key sizes and more efficient computation. ECC — specifically, Elliptic Curve Diffie-Hellman (ECDH) — is now the preferred authentication mechanism for secure web browsing over SSL/TLS.

Download PDF