Can Elliptic Curve Cryptography Be Trusted ? A Brief Analysis of the Security of a Popular Cryptosystem

  • Veronika Stolbikova
  • Published 2016

Abstract

Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason. This asymmetric encryption and decryption method is shown by the US National Institute of Standards and Technology (NIST) and third-party studies to significantly outperform its biggest competitors… (More)

Topics

  • Presentations referencing similar topics