Digital signatures: Schnorr, ECDSA and how PS3 was hacked
In the previous post, we built up to the key equation: Public Key = x * G. A private key x, a generator point G, and a public key P that anyone can see but nobody can reverse. This post picks up exactly where that left off.
What is a digital signat...
luk3tech.hashnode.dev11 min read