Abstract
This chapter is devoted to introducing elliptic curves. Some of the more modern public key systems make use of elliptic curves since they can offer improved efficiency and bandwidth. Since much of this book can be read with just the understanding that an elliptic curve provides another finite abelian group in which one can pose a discrete logarithm problem, you may decide to skip this chapter on an initial reading.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Smart, N.P. (2016). Elliptic Curves. In: Cryptography Made Simple. Information Security and Cryptography. Springer, Cham. https://doi.org/10.1007/978-3-319-21936-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-21936-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21935-6
Online ISBN: 978-3-319-21936-3
eBook Packages: Computer ScienceComputer Science (R0)