Hi Pete,
Unless I'm missing something, it sounds like the ~100x performance is on secp***k1 (Koblitz curves) right ? Likely due to this (Link to Google Books <http://books.google.com/books?id=w6b0yhURTkQC&pg=PA355&lpg=PA355&dq=GLV+kob litz&source=bl&ots=0UIsfzcTFU&sig=YnBnJYvM8SKWTA8WWTSTHx11hXM&hl=en&sa=X&ei= lI4DU53aJsG62gXZ7oDwBA&ved=0CEoQ6AEwAw#v=onepage&q=GLV%20koblitz&f=false> )? Or were the improvements generic enough to have that 100x improvement on secp***r1 (Suite B) curves too? Would be helpful to know for those on suite b ciphers. Thanks Sid From: Peter Dettman [mailto:peter.dett...@bouncycastle.org] Sent: Tuesday, February 18, 2014 4:44 AM To: Bouncy Castle Developer List Subject: Re: [dev-crypto-csharp] Latest Git build, issues with isismtt\x509\AdmissionSyntax.cs Hi Chris, If you want the full performance improvements for secp192k1 or secp256k1, from latest code (i.e. beta.1), please use Crypto.EC.CustomNamedCurves.GetByName("secp***k1") to get your curve/parameters (secp160k1 and secp224k1 may be implemented in due course - presently there's also P-192/P-256/P-521 and their secp***r1 equivalents). It is little exaggeration, if any, to say that these "custom" curves are 2 orders of magnitude (100x) faster than what was in 1.7. Regards, Pete Dettman On 14/02/2014 12:20 AM, Mankowski, Chris wrote: Also, thank you for working on the scep***k1 curve improvements. I can't wait to try them out! _____