Edwards-Curve Digital Signature Algorithm
GPTKB entity
Statements (69)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:award
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:JEP_339
|
gptkbp:based_on |
gptkb:Mathematician
Edwards curves mathematical principles of elliptic curves twisted Edwards curves |
gptkbp:defines |
gptkb:RFC_8032
|
gptkbp:developed_by |
gptkb:D._J._Bernstein
|
gptkbp:has_programs |
secure communications
|
https://www.w3.org/2000/01/rdf-schema#label |
Edwards-Curve Digital Signature Algorithm
|
gptkbp:is_adopted_by |
gptkb:Educational_Institution
various organizations secure software development |
gptkbp:is_compatible_with |
gptkb:RFC_8032
various programming languages X448 |
gptkbp:is_considered |
a modern signature scheme
a robust signature scheme efficient for large-scale systems |
gptkbp:is_effective_against |
computational resources
|
gptkbp:is_evaluated_by |
performance metrics
security properties cryptographic researchers |
gptkbp:is_implemented_in |
gptkb:chess_match
various libraries various programming libraries |
gptkbp:is_opposed_by |
ECDSA
|
gptkbp:is_part_of |
secure online transactions
secure data transmission digital identity verification secure voting systems secure messaging systems post-quantum cryptography research cryptographic frameworks modern cryptographic practices secure file sharing systems |
gptkbp:is_recognized_by |
gptkb:NIST
cryptography standards organizations |
gptkbp:is_recognized_for |
its efficiency
its simplicity |
gptkbp:is_related_to |
gptkb:X25519
|
gptkbp:is_standardized_by |
gptkb:IETF
|
gptkbp:is_supported_by |
gptkb:academic_research
cryptographic hardware |
gptkbp:is_used_by |
cryptographic protocols
|
gptkbp:is_used_for |
authentication
digital signatures |
gptkbp:is_used_in |
gptkb:software_framework
identity management systems digital rights management cryptographic applications Io T security solutions |
gptkbp:is_utilized_in |
data integrity verification
secure communications digital currencies secure cloud services |
gptkbp:is_vulnerable_to |
side-channel attacks
|
gptkbp:offers |
high performance
|
gptkbp:provides |
digital signatures
high security level |
gptkbp:security_features |
quantum attacks
|
gptkbp:speed |
traditional signature algorithms
|
gptkbp:suitable_for |
low-resource environments
its performance and security DSA and ECDSA |
gptkbp:supports |
various key sizes
deterministic signatures |
gptkbp:uses |
Edwards curves
|