A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
The Code Book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography
Abstract Algebra Applications with Maple
Abstract Algebra Applications with Maple
Cryptological Mathematics
Mathematics and Computer Education
Hi-index | 0.00 |
It is possible to implement the ElGamal cryptosystem using elliptic curves over finite fields, thereby creating the potential for an extremely secure public-key cryptosystem. In this article, we show two things that may be somewhat surprising. First, the algorithms necessary to perform the computations required to generate elliptic curves over finite fields can easily be programmed into a TI-83 graphics calculator. Second, other TI-83 programs can be written to aid in the implementation of basic elliptic curve cryptosystems.