--- Log opened Thu Mar 26 00:00:34 2020 00:11 -!- kcalvinalvinn [~kcalvinal@37.120.210.172] has joined #secp256k1 00:12 -!- kcalvinalvin [~kcalvinal@ec2-52-79-199-97.ap-northeast-2.compute.amazonaws.com] has quit [Ping timeout: 260 seconds] 00:15 -!- kcalvinalvinn [~kcalvinal@37.120.210.172] has quit [Client Quit] 00:28 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has quit [Quit: ZNC - http://znc.sourceforge.net] 00:29 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has joined #secp256k1 01:06 -!- Netsplit *.net <-> *.split quits: real_or_random, midnight 01:08 -!- real_or_random [~real_or_r@173.249.7.254] has joined #secp256k1 03:47 -!- jonatack_ [~jon@37.167.7.26] has quit [Read error: Connection reset by peer] 03:51 -!- jonatack_ [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has joined #secp256k1 04:04 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has quit [Remote host closed the connection] 04:04 -!- afk11 [~afk11@gateway/tor-sasl/afk11] has quit [Remote host closed the connection] 04:05 -!- afk11 [~afk11@gateway/tor-sasl/afk11] has joined #secp256k1 04:11 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has joined #secp256k1 04:45 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has quit [Ping timeout: 240 seconds] 04:45 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has joined #secp256k1 05:50 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has quit [Remote host closed the connection] 05:51 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has joined #secp256k1 07:31 -!- dongcarl [~dongcarl@unaffiliated/dongcarl] has quit [Read error: Connection reset by peer] 10:07 -!- jonatack_ [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has quit [Quit: jonatack_] 10:07 -!- jonatack [~jon@2a01:e0a:53c:a200:bb54:3be5:c3d0:9ce5] has joined #secp256k1 11:15 -!- ddustin [~ddustin@unaffiliated/ddustin] has joined #secp256k1 11:21 -!- ddustin [~ddustin@unaffiliated/ddustin] has quit [Ping timeout: 240 seconds] 12:54 < real_or_random> andytoshi: were you aware of https://cyberleninka.org/article/n/627978.pdf when you looked at mod inverse algorithms? 12:57 < sipa> In elliptic curve cryptosystems the data to be encrypted is 12:57 < sipa> represented by a point P on a chosen curve. Encryption by 12:57 < sipa> the key k is performed by computing Q = P + P + · · · + P = 12:57 < sipa> k · P. 12:57 < sipa> wut. 12:59 -!- midnight [~midnight@unaffiliated/midnightmagic] has joined #secp256k1 13:02 < real_or_random> yeah the paper looks weird (okay I haven't seen this sentence) 13:02 < real_or_random> I found it interesting that he has implemented all of the described approaches in C 13:03 < real_or_random> but it's probably too old too be interesting, and the implementation uses gmp 14:57 -!- jtimon [~quassel@206.160.134.37.dynamic.jazztel.es] has joined #secp256k1 15:03 < andytoshi> real_or_random: no i don't think i've ever seen that paper 17:13 < elichai2> real_or_random: yeah most of the papers on mod inverse algorithms(basically those by Zimmermann hehe) that have implementions are implemented using gmp's internals 19:37 -!- dongcarl [~dongcarl@unaffiliated/dongcarl] has joined #secp256k1 22:50 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has quit [Ping timeout: 240 seconds] 22:50 -!- afk11 [~afk11@gateway/tor-sasl/afk11] has quit [Ping timeout: 240 seconds] 22:55 -!- afk11 [~afk11@gateway/tor-sasl/afk11] has joined #secp256k1 23:09 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has joined #secp256k1 --- Log closed Fri Mar 27 00:00:35 2020