yet another tiny feature: deterministic ECDSA

Christian Grothoff christian at
Fri Apr 12 13:13:20 CEST 2013

On 04/12/2013 01:06 PM, Vladimir 'φ-coder/phcoder' Serbinenko wrote:
>>> Why not just use a standard protocol? There are loads of standard
>>> protocols for nearly every possible use.
>> But not for what we're doing.  If you want to read up on the
>> details, see
> It sounds like you just need salted hash or HMAC if I understand the
> algorithm
No, that's insufficient as the encrypted message must be verifiable for 
intermediaries that do
not have access to the key, so public key crypto is required.


More information about the Gcrypt-devel mailing list