<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Business Yield Technology</provider_name><provider_url>https://businessyield.com/tech</provider_url><title>Elliptic Curve Cryptography: What Is It &amp; How Does It Work?</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="268ikeI0wB"&gt;&lt;a href="https://businessyield.com/tech/technology/elliptic-curve-cryptography/"&gt;Elliptic Curve Cryptography: What Is It &amp; How Does It Work?&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://businessyield.com/tech/technology/elliptic-curve-cryptography/embed/#?secret=268ikeI0wB" width="600" height="338" title="&#x201C;Elliptic Curve Cryptography: What Is It &amp; How Does It Work?&#x201D; &#x2014; Business Yield Technology" data-secret="268ikeI0wB" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>http://businessyield.com/tech/wp-content/uploads/sites/2/2023/12/Untitled-design-1-3.jpg</thumbnail_url><thumbnail_width>500</thumbnail_width><thumbnail_height>250</thumbnail_height><description>The basis of ECC is in the theory of elliptic curves, which utilizes the peculiarities of the elliptic curve equation to produce keys. Read more to find out how elliptic curve cryptography works and more about cryptography algorithms and certificates.</description></oembed>
