Elliptic Curve Cryptography

@article{Easttom2020EllipticCC,
  title={Elliptic Curve Cryptography},
  author={William Easttom},
  journal={Modern Cryptography},
  year={2020}
}

References

SHOWING 1-3 OF 3 REFERENCES
Elliptic Curve Cryptography in Practice
TLDR
It is found that despite the high stakes of money, access and resources protected by ECC, implementations suffer from vulnerabilities similar to those that plague previous cryptographic systems.
Guide to Elliptic Curve Cryptography
TLDR
This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.