Hacker News with Generative AI: Elliptic Curves

Eccfrog512ck2: An Enhanced 512-Bit Weierstrass Elliptic Curve [pdf] (arxiv.org)
Whilst many key exchange and digital signature methods use the NIST P256 (secp256r1) and secp256k1 curves, there is often a demand for increased security.
A new rare high-rank elliptic curve, and an orchard of Diophantine equations (wordpress.com)
Elligator: Elliptic-curve points indistinguishable from uniform random strings (2013) (dl.acm.org)