Skip to main content

Elliptic Curve Cryptography

  • Reference work entry
Book cover Encyclopedia of Cryptography and Security

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Blake, I., G. Seroussi, and N. Smart (1999). Elliptic Curves in Cryptography. Cambridge University Press.

    Google Scholar 

  2. Hankerson, D., A. Menezes, and S. Vanstone (2003). Guide to Elliptic Curve Cryptography. Springer-Verlag, Berlin.

    MATH  Google Scholar 

  3. Koblitz, N. (1987). “Elliptic curve cryptosystems.” Mathematics of Computation, 48, 203–209.

    MATH  MathSciNet  Google Scholar 

  4. Menezes, A. (1993). Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston, MA.

    MATH  Google Scholar 

  5. Miller, V. (1986). “Use of elliptic curves in cryptography.” Advances in Cryptology—CRYPTO'85, Lecture Notes in Computer Science, vol. 218, ed. H.C. Williams. Springer-Verlag, Berlin, 417–426.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Hankerson, D., Menezes, A. (2005). Elliptic Curve Cryptography. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_131

Download citation

Publish with us

Policies and ethics