Abstract
This paper surveys interactions between choices of elliptic curves and the security of elliptic-curve cryptography. Attacks considered include not just discrete-logarithm computations but also attacks exploiting common implementation pitfalls.
| Original language | English |
|---|---|
| Title of host publication | Information Security in a Connected World |
| Subtitle of host publication | Celebrating the Life and Work of Ed Dawson |
| Editors | Colin Boyd, Reihaneh Safavi-Naini, Leonie Simpson |
| Publisher | Springer |
| Pages | 124-191 |
| Number of pages | 68 |
| ISBN (Electronic) | 978-3-031-83490-5 |
| ISBN (Print) | 978-3-031-83489-9 |
| DOIs | |
| Publication status | Published - 13 Mar 2025 |
Publication series
| Name | Lecture Notes in Computer Science |
|---|---|
| Volume | 15600 LNCS |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Bibliographical note
Publisher Copyright:© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
Fingerprint
Dive into the research topics of 'Safe curves for elliptic-curve cryptography'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver