Safe curves for elliptic-curve cryptography

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

3 Downloads (Pure)

Abstract

This paper surveys interactions between choices of elliptic curves and the security of elliptic-curve cryptography. Attacks considered include not just discrete-logarithm computations but also attacks exploiting common implementation pitfalls.

Original languageEnglish
Title of host publicationInformation Security in a Connected World
Subtitle of host publicationCelebrating the Life and Work of Ed Dawson
EditorsColin Boyd, Reihaneh Safavi-Naini, Leonie Simpson
PublisherSpringer
Pages124-191
Number of pages68
ISBN (Electronic)978-3-031-83490-5
ISBN (Print)978-3-031-83489-9
DOIs
Publication statusPublished - 13 Mar 2025

Publication series

NameLecture Notes in Computer Science
Volume15600 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Bibliographical note

Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.

Fingerprint

Dive into the research topics of 'Safe curves for elliptic-curve cryptography'. Together they form a unique fingerprint.

Cite this