William Stein
Date: Math 124 HARVARD UNIVERSITY Fall 2001
Today's lecture is about an application of elliptic curves to cryptography.
Disclaimer: I do not endorse breaking laws, and give the examples
below as a pedagogical tool in the hope of making the mathematics in
our course more fun and relevant to everyday life. I don't think I
have violated the Digital Millenium Copyright Act, because I have
given very few details about Microsoft's actual protocols, and I've
given absolutely no source code.