Efficient generation of secure elliptic curves

Abstract

In many cryptographic applications it is necessary to generate elliptic curves (ECs) whose order possesses certain properties. The method that is usually employed for the generation of such ECs is the so-called Complex Multiplication method. This method requires the use of the roots of certain class field polynomials defined on a specific parameter called… (More)
DOI: 10.1007/s10207-006-0009-3

Topics

14 Figures and Tables

Slides referencing similar topics