Abstract
A family of elliptic curves for cryptographic use is proposed for which the determination of the order of the corresponding algebraic group is much easier than in the general case. This makes it easier to meet the cryptographic requirement that this order have a large prime factor. Another advantage of this familiy is that the group operation simplifies slightly. Explicit numerical examples are given that are suitable for practical use.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Bibliography
Grosswald, Emil. Topics from the Theory of Numbers. Birkhaeuser Boston 1984.
Hartshorne, Robin. Algebraic Geometry. Springer New York 1983.
Husemoeller, Dale. Elliptic Curves. Springer New York 1987.
Kaliski, Burton S. Jr., “A Pseudo-Random Bit Generator Based on Elliptic Logarithms”. Advances in Cryptography: Proceedings of CRYPTO’ 86. Andrew M. Odlyzko, Ed.. Springer 1987. pp. 84–100.
Koblitz, Neal. A Course in Number Theory and Cryptography. Springer New York 1987.
Lidl, Rudolf; Niederreiter, Harald. Finite Fields. Addison-Wesley Massachusetts 1983.
1983]_Massey, James L..“Logarithms in Finite Cyclic Groups-Cryptographic Issues”. Proc. 4th Benelux Symposion on Information Theory, Leuven, Belgium. May 1983, pp.17–25.
Miller, Victor. “Use of Elliptic Curves in Cryptography”. Advances in Cryptography: Proceedings of CRYPTO’ 85. H.C. Williams, Ed.. Springer 1986. pp. 417–426.
1985]_Schoof, Rene. “Elliptic Curves over Finite Fields and the Computation of Square Roots mod p”. Mathematics of Computation, vol.44 (1985), pp. 483–494.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bender, A., Castagnoli, G. (1990). On the Implementation of Elliptic Curve Cryptosystems. In: Brassard, G. (eds) Advances in Cryptology — CRYPTO’ 89 Proceedings. CRYPTO 1989. Lecture Notes in Computer Science, vol 435. Springer, New York, NY. https://doi.org/10.1007/0-387-34805-0_18
Download citation
DOI: https://doi.org/10.1007/0-387-34805-0_18
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-97317-3
Online ISBN: 978-0-387-34805-6
eBook Packages: Springer Book Archive