Efficient generation of secure elliptic curves


In many cryptographic applications it is necessary to generate elliptic curves (ECs) whose order possesses certain properties. The method that is usually employed for the generation of such ECs is the so-called Complex Multiplication method. This method requires the use of the roots of certain class field polynomials defined on a specific parameter called… (More)
DOI: 10.1007/s10207-006-0009-3


14 Figures and Tables

Slides referencing similar topics