1987
DOI: 10.2307/2007884
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptosystems

Abstract: Abstract. We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem on elliptic curves is likely to be harder than the classical discrete logarithm problem, especially over GF(2"). We discuss the question of primitive points on an elliptic curve modulo p, and give a theorem on nonsmoothness of the order of the cyclic s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

1
1,096
0
20

Year Published

2001
2001
2017
2017

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 1,151 publications
(1,119 citation statements)
references
References 5 publications
1
1,096
0
20
Order By: Relevance
“…There are many cryptosystems, such as ElGamal [5], the Digital Signature Standard [15] or Elliptic Curves [10,7], whose security is believed to fundamentally depend on the inability of an attacker to calculate discrete logarithms in certain finite cyclic groups. For such a group G of order p, this is equivalent to the inability of an attacker to find a presentation based on the isomorphism G → Z + p , where Z + p is the additive cyclic group of integers modulo p.…”
Section: Introductionmentioning
confidence: 99%
“…There are many cryptosystems, such as ElGamal [5], the Digital Signature Standard [15] or Elliptic Curves [10,7], whose security is believed to fundamentally depend on the inability of an attacker to calculate discrete logarithms in certain finite cyclic groups. For such a group G of order p, this is equivalent to the inability of an attacker to find a presentation based on the isomorphism G → Z + p , where Z + p is the additive cyclic group of integers modulo p.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, two public-key cryptosystems based on finite fields stand out: elliptic curve (EC) cryptosystems, introduced by Miller and Koblitz [24,19], and hyperelliptic cryptosystems, a generalization of elliptic curves introduced by Koblitz in [20]. Both, prime fields and extension fields, have been proposed for use in such cryptographic systems.…”
Section: Introductionmentioning
confidence: 99%
“…Ever since its invention, in 1986 by Koblitz [9] and Miller [12], elliptic curve cryptography (ECC) has attracted considerable interest since it enables improved security, in the sense of greater perceived strength per bit of key, compared to conventional systems such as RSA, with the added benefit of smaller key sizes, less bandwidth and less computing power, see [4] for a complete treatment of ECC. Various standards bodies, both government sponsored and industry led (for example NIST [2] and SECG [3]), have standardised on elliptic curves defined over fields of the form F 2 p and F p , where p denotes a prime.…”
Section: Introductionmentioning
confidence: 99%