URL to the relevant course
https://quantum.cloud.ibm.com/learning/en/courses/quantum-safe-cryptography/asymmetric-key-cryptography#basic-principles-of-elliptic-curve-cryptography
Select all that apply
Describe the fix or the content request.
In panes 1 & 2 & 3 of the first figure in this section it would be useful to illustrate the full operation P + Q = -R and 2Q = -P and Q = -P respectively on the elliptical curve graphs, so that repeat operations to calculate Q = nP would more clearly land on the elliptical curve.
For new content requests - if the request is accepted, do you want to write the content?
I will write (or already have written) a draft of the proposed content
URL to the relevant course
https://quantum.cloud.ibm.com/learning/en/courses/quantum-safe-cryptography/asymmetric-key-cryptography#basic-principles-of-elliptic-curve-cryptography
Select all that apply
Describe the fix or the content request.
In panes 1 & 2 & 3 of the first figure in this section it would be useful to illustrate the full operation P + Q = -R and 2Q = -P and Q = -P respectively on the elliptical curve graphs, so that repeat operations to calculate Q = nP would more clearly land on the elliptical curve.
For new content requests - if the request is accepted, do you want to write the content?
I will write (or already have written) a draft of the proposed content