Elliptic Curves and Their Applications to Cryptography
From MaRDI portal
Publication:2803681
DOI10.1007/978-1-4615-5207-9zbMath1335.11002MaRDI QIDQ2803681
Publication date: 2 May 2016
Full work available at URL: https://doi.org/10.1007/978-1-4615-5207-9
94A60: Cryptography
11G09: Drinfel'd modules; higher-dimensional motives, etc.
14G50: Applications to coding theory and cryptography of arithmetic geometry
11-01: Introductory exposition (textbooks, tutorial papers, etc.) pertaining to number theory
94-01: Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory
Related Items
Satoh's algorithm in characteristic 2, Linearizing torsion classes in the Picard group of algebraic curves over finite fields, Constructing elliptic curves over finite fields using double eta-quotients, Oblivious Transfer Using Elliptic Curves, Binary sequences from a pair of elliptic curves, Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves, On the Connection between Kloosterman Sums and Elliptic Curves