On 25-08-2013 13:38, Alexander Klimov wrote: > There was a ECC program from the previous century that worked as you > described: the private key was derived solely from the user password. > Unfortunately, I cannot recall its name (and I suspect it already > vanished from the net since it was not secure due to its use of EC > over binary composite field, Weil descent attack), but I guess someone > here remembers its name, since at that time it was a rare example of > ECC software.
The name was Pegwit: http://www.george-barwood.pwp.blueyonder.co.uk/hp/v8/pegwit.htm _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography