On 25-08-2013 13:38, Alexander Klimov wrote:
> There was a ECC program from the previous century that worked as you 
> described: the private key was derived solely from the user password. 
> Unfortunately, I cannot recall its name (and I suspect it already 
> vanished from the net since it was not secure due to its use of EC 
> over binary composite field, Weil descent attack), but I guess someone 
> here remembers its name, since at that time it was a rare example of 
> ECC software.

The name was Pegwit:
http://www.george-barwood.pwp.blueyonder.co.uk/hp/v8/pegwit.htm

_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to