Transcription of SEC 1: Elliptic Curve Cryptography
{{id}} {{{paragraph}}}
Standards for Efficient CryptographySEC 1: Elliptic Curve CryptographyCerticom ResearchContact: Daniel R. L. Brown 21, 2009 Version 2009 Certicom to copy this document is granted provided it is identified as Standards for EfficientCryptography 1 ( sec 1 ) , in all material mentioning or referencing 1 Ver. Overview .. Aim .. Compliance .. Document Evolution .. Intellectual Property .. Organization .. 22 Mathematical Finite Fields .. The Finite FieldFp.. The Finite FieldF2m.. Elliptic curves .. Elliptic curves overFp.. Elliptic curves overF2m.. Data Types and Conversions .. Bit-String-to-Octet-String Conversion.
SEC 1 Ver. 2.0 1 Introduction This section gives an overview of this standard, its use, its aims, and its development. 1.1 Overview This document specifies public-key cryptographic schemes based on elliptic curve cryptography
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}