January 2019
Beginner to intermediate
372 pages
11h 17m
English
Elliptic curves used in cryptography are curves that are constructed in a finite field. They have the following form:
y2 = x3 + ax + b mod (p)
The modulus operation on p indicates that the curve is over a finite field of prime numbers of the order p. We need to understand some terminology and operations of elliptic curves before moving on to the cryptographic applications.
All the elements used in ECC must be agreed upon by the cryptography actors. These elements are called elliptical curve domain parameters. ...