Elliptic curve cryptography

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

Abstract

In this paper we introduce elliptic curves and their arithmetic. We show how such mathematical objects are realised in a computer and then go on to describe some of the cryptographic protocols one can implement with elliptic curves. Since elliptic curves are particularly interesting in constrained environments such as smart cards we also describe some of the side-channel defences which have been proposed for elliptic curve systems.
Translated title of the contributionElliptic curve cryptography
Original languageEnglish
Title of host publicationHandbook of Information Security
PublisherWiley
Pages???-???
Volume2
ISBN (Print)0471648337
Publication statusPublished - 2006

Bibliographical note

Other page information: -
Other identifier: 2000419

Fingerprint Dive into the research topics of 'Elliptic curve cryptography'. Together they form a unique fingerprint.

Cite this