Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The implementation of elliptic curve cryptosystems
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Fast Key Exchange with Elliptic Curve Systems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
I: Basic technologies: TESS: A security system based on discrete exponentiation
Computer Communications
Hi-index | 0.00 |
For public key cryptosystems multiplication on elliptic curves can be used instead of exponentiation in finite fields. One attack to such a system is embedding the elliptic curve group into the multiplicative group of a finite field via weilpairing; calculating the discrete logarithm on the curve by solving the discrete logarithm in the finite field. This attack can be avoided by constructing curves so that every embedding in a multiplicative group of a finite field requires a field of very large size.