\textbf{Elliptic Curves} (see section \ref{section:EllipticCurveCryptography})
required by current TLS standards only consist of the so-called NIST-curves
(\texttt{secp256r1} and \texttt{secp384r1}) which may be weak because the
-parameters that led to their generation weren't properly explained (by the
-NSA)\cite{DJBSC}. \\ Disabling support for Elliptic Curves leads to no
+parameters that led to their generation weren't properly explained by the
+authors\cite{DJBSC}. \\ Disabling support for Elliptic Curves leads to no
ephemeral key exchange being available for the Windows platform. When you
decide to use Elliptic Curves despite the uncertainty, make sure to at least
use the stronger curve of the two supported by all clients