In this paper we introduce elliptic curves and their arithmetic. We show how such mathematical objects are realised in a computer and then go on to describe some of the cryptographic protocols one can implement with elliptic curves. Since elliptic curves are particularly interesting in constrained environments such as smart cards we also describe some of the side-channel defences which have been proposed for elliptic curve systems.
|Translated title of the contribution||Elliptic curve cryptography|
|Title of host publication||Handbook of Information Security|
|Publication status||Published - 2006|
Bibliographical noteOther page information: -
Other identifier: 2000419