From beba5c99fd7bb882f35aa5020d66e319b184e4e6 Mon Sep 17 00:00:00 2001 From: Orson Peters Date: Mon, 1 Apr 2013 22:17:13 +0300 Subject: [PATCH 1/3] Update readme.md --- readme.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/readme.md b/readme.md index 955bbfe..306f953 100644 --- a/readme.md +++ b/readme.md @@ -31,8 +31,9 @@ The speeds on other machines may vary. Sign/verify times will be higher with longer messages. The implementation significantly benefits from 64 bit architectures, if possible compile as 64 bit. -As a comparison, RSA-2048 (which has a lower security level than Ed25519) got -143 signatures per second and 4644 verifications per second on the same machine. +As a comparison, OpenSSL's RSA-2048 implementation (which has a lower security +level than Ed25519) got 143 signatures per second and 4644 verifications per +second on the same machine. Usage From 8dfa4ed615e311106c766f00971a55a0acd9bbdc Mon Sep 17 00:00:00 2001 From: Orson Peters Date: Thu, 11 Apr 2013 19:34:36 +0300 Subject: [PATCH 2/3] Update readme.md --- readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/readme.md b/readme.md index 306f953..9d379aa 100644 --- a/readme.md +++ b/readme.md @@ -11,7 +11,7 @@ generation which uses standard OS cryptography APIs (`CryptGenRandom` on Windows, `/dev/urandom` on nix). If you wish to be entirely portable define `ED25519_NO_SEED`. This disables the `ed25519_create_seed` function, so if your application requires key generation you must supply your own seeding function -(which is simply a 256 byte cryptographic random number generator). +(which is simply a 256 bit cryptographic random number generator). Performance From 3136c81928f2ab19b6000d8e5468a2f29f52e1b0 Mon Sep 17 00:00:00 2001 From: Orson Peters Date: Thu, 11 Apr 2013 19:35:02 +0300 Subject: [PATCH 3/3] Update readme.md --- readme.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/readme.md b/readme.md index 9d379aa..cc40b36 100644 --- a/readme.md +++ b/readme.md @@ -11,7 +11,7 @@ generation which uses standard OS cryptography APIs (`CryptGenRandom` on Windows, `/dev/urandom` on nix). If you wish to be entirely portable define `ED25519_NO_SEED`. This disables the `ed25519_create_seed` function, so if your application requires key generation you must supply your own seeding function -(which is simply a 256 bit cryptographic random number generator). +(which is simply a 256 bit (32 byte) cryptographic random number generator). Performance