Elliptic curves and cryptography

被引:0
|
作者
Silverman, JH [1 ]
机构
[1] Brown Univ, Dept Math, Providence, RI 02912 USA
来源
Public-Key Cryptography | 2005年 / 62卷
关键词
elliptic curve; elliptic curve cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We give a brief introduction, without proofs, to the theory of elliptic curves, with an emphasis on those aspects that are most relevant to cryptography.
引用
收藏
页码:91 / 112
页数:22
相关论文
共 50 条
  • [21] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [22] Cubic Curves, Finite Geometry and Cryptography
    A. A. Bruen
    J. W. P. Hirschfeld
    D. L. Wehlau
    Acta Applicandae Mathematicae, 2011, 115 : 265 - 278
  • [23] Cubic Curves, Finite Geometry and Cryptography
    Bruen, A. A.
    Hirschfeld, J. W. P.
    Wehlau, D. L.
    ACTA APPLICANDAE MATHEMATICAE, 2011, 115 (03) : 265 - 278
  • [24] On the Algebra of elliptic curves
    Brzezinski, Tomasz
    PROCEEDINGS OF THE EDINBURGH MATHEMATICAL SOCIETY, 2023, 66 (02) : 548 - 556
  • [25] On hashing into elliptic curves
    Farashahi, Reza R.
    Shparlinski, Igor E.
    Voloch, Jose Felipe
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2009, 3 (04) : 353 - 360
  • [26] Twists of Elliptic Curves
    Kronberg, Max
    Soomro, Muhammad Afzal
    Top, Jaap
    SYMMETRY INTEGRABILITY AND GEOMETRY-METHODS AND APPLICATIONS, 2017, 13
  • [27] On the topology of elliptic curves
    Medvedev, N. V.
    Titov, S. S.
    TRUDY INSTITUTA MATEMATIKI I MEKHANIKI URO RAN, 2012, 18 (01): : 242 - 250
  • [28] An exploration of affine group laws for elliptic curves
    Hisil, Huseyin
    Wong, Kenneth Koon-Ho
    Carter, Gary
    Dawson, Ed
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2011, 5 (01) : 1 - 50
  • [29] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1793 - 1807
  • [30] Reconfigurable real number field elliptic curve cryptography to improve the security
    Goo E.-H.
    Lee S.-D.
    Journal of Computer Virology and Hacking Techniques, 2015, 11 (3) : 123 - 128