Sure it's a bad way to sell AI, and misleading of how much better it can already be.
But I think it serves as a reminder of the subtle stupidity behind even the most advanced models. :-)
Sure it's a bad way to sell AI, and misleading of how much better it can already be.
But I think it serves as a reminder of the subtle stupidity behind even the most advanced models. :-)
* Digicert claims (docs.digicert.com/en/certcentr...) that we could use ECC P-256-bit key size.
* Yubico timings (support.yubico.com/hc/en-us/art...) indicate that ECDSA-P256-SHA256 could be more than facto 10 faster than RSA-4096. (Factor 6 for RSA-3072)
* Digicert claims (docs.digicert.com/en/certcentr...) that we could use ECC P-256-bit key size.
* Yubico timings (support.yubico.com/hc/en-us/art...) indicate that ECDSA-P256-SHA256 could be more than facto 10 faster than RSA-4096. (Factor 6 for RSA-3072)
* Signing all binaries of our CI release builds is dead-slow with RSA 4096 (850 msec per File on our YubiHSM2), and ...
* Signing all binaries of our CI release builds is dead-slow with RSA 4096 (850 msec per File on our YubiHSM2), and ...
Seeing ECC unsupported on the Root however is not exactly encouraging.
Seeing ECC unsupported on the Root however is not exactly encouraging.