|
This article is cited in 7 scientific papers (total in 7 papers)
Good and bad uses of elliptic curves in cryptography
N. I. Koblitz University of Washington
Abstract:
In the first part of this article I describe the construction of cryptosystems using elliptic curves, discuss the Elliptic Curve Discrete Logarithm Problem (upon which the security of all elliptic curve cryptosystems rests), and survey the different types of elliptic curves that can be chosen for cryptographic applications. In the second part I describe three unsuccessful approaches to breaking various cryptosystems by means of liftings to global elliptic curves. I explain how the failure of these attacks is caused by fundamental properties of the global curves.
Key words and phrases:
Public key cryptography, elliptic curve cryptography, discrete logarithm, digital signature, global elliptic curve, index calculus, canonical height, torsion group, uniform boundedness.
Received: February 22, 2002
Citation:
N. I. Koblitz, “Good and bad uses of elliptic curves in cryptography”, Mosc. Math. J., 2:4 (2002), 693–715
Linking options:
https://www.mathnet.ru/eng/mmj69 https://www.mathnet.ru/eng/mmj/v2/i4/p693
|
Statistics & downloads: |
Abstract page: | 481 | References: | 94 |
|