Teri Radichel<p>Reviewing NIST Guidance for ECC Curves for GPG Encryption Keys<br>~~<br>Ensuring you are configuring encryption algorithms correctly using security standards<br>~~<br><a href="https://infosec.exchange/tags/encyryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encyryption</span></a> <a href="https://infosec.exchange/tags/nist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nist</span></a> <a href="https://infosec.exchange/tags/ecc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ecc</span></a></p><p><a href="https://medium.com/cloud-security/reviewing-nist-guidance-for-ecc-curves-for-gpg-encryption-keys-d1520306fbcf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloud-security/revi</span><span class="invisible">ewing-nist-guidance-for-ecc-curves-for-gpg-encryption-keys-d1520306fbcf</span></a></p>