• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Guide to Elliptic Curve Cryptography (2004)

Cached

  • Download as a PDF

Download Links

  • [www.cs.nthu.edu.tw]
  • [www.qrst.de]
  • [www.cacr.math.uwaterloo.ca]
  • [www.williamstein.org]
  • [modular.math.washington.edu]
  • [sage.math.washington.edu]
  • [wstein.org]
  • [www-rcf.usc.edu]
  • [www-rcf.usc.edu]
  • [cdn.preterhuman.net]
  • [www.iac.rm.cnr.it]
  • [cdn.preterhuman.net]
  • [www.cacr.math.uwaterloo.ca]
  • [www.math.uwaterloo.ca]
  • [cacr.uwaterloo.ca]
  • [cacr.uwaterloo.ca]
  • [www.math.uwaterloo.ca]
  • [www.cse.iitk.ac.in]
  • [www.cacr.math.uwaterloo.ca]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Aleksandar Jurisic , Alfred J. Menezes
Citations:609 - 18 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@ARTICLE{Jurisic04guideto,
    author = {Aleksandar Jurisic and Alfred J. Menezes},
    title = {Guide to Elliptic Curve Cryptography},
    journal = {},
    year = {2004},
    volume = {19},
    pages = {173--193}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Elliptic curves have been intensively studied in number theory and algebraic geometry for over 100 years and there is an enormous amount of literature on the subject. To quote the mathematician Serge Lang: It is possible to write endlessly on elliptic curves. (This is not a threat.) Elliptic curves also figured prominently in the recent proof of Fermat's Last Theorem by Andrew Wiles. Originally pursued for purely aesthetic reasons, elliptic curves have recently been utilized in devising algorithms for factoring integers, primality proving, and in public-key cryptography. In this article, we aim to give the reader an introduction to elliptic curve cryptosystems, and to demonstrate why these systems provide relatively small block sizes, high-speed software and hardware implementations, and offer the highest strength-per-key-bit of any known public-key scheme.

Keyphrases

elliptic curve    elliptic curve cryptography    known public-key scheme    public-key cryptography    andrew wile    algebraic geometry    recent proof    small block size    number theory    mathematician serge lang    high-speed software    elliptic curve cryptosystems    primality proving    hardware implementation    last theorem    enormous amount    aesthetic reason   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University