Abstract
In this paper we introduce elliptic curves and their
arithmetic.
We show how such mathematical objects are realised in
a computer and then go on to describe some of the
cryptographic protocols one can implement with elliptic
curves.
Since elliptic curves are particularly interesting in
constrained environments such as smart cards we also
describe some of the side-channel defences which have
been proposed for elliptic curve systems.
Translated title of the contribution | Elliptic curve cryptography |
---|---|
Original language | English |
Title of host publication | Handbook of Information Security |
Publisher | Wiley |
Pages | ???-??? |
Volume | 2 |
ISBN (Print) | 0471648337 |
Publication status | Published - 2006 |
Bibliographical note
Other page information: -Other identifier: 2000419