Elliptic-curve cryptosystems

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter consists of short descriptions of a few elliptic-curve cryptosystems. Examples of three types of cryptosystem are given: message encryption, key agreement, and digital signatures. The descriptions are intended to provide no more than a context for the arithmetic, and the reader who wishes to properly learn about the systems should consult the relevant literature.

Cite

CITATION STYLE

APA

R. Omondi, A. (2020). Elliptic-curve cryptosystems. In Advances in Information Security (Vol. 77, pp. 243–252). Springer. https://doi.org/10.1007/978-3-030-34142-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free