{"title":"基于椭圆曲线的公钥密码体制","authors":"J. Botes, W. Penzhorn","doi":"10.1109/COMSIG.1993.365883","DOIUrl":null,"url":null,"abstract":"We discuss the use of elliptic curves in cryptography. Compared to the difficulty of solving the classical discrete logarithm problem, it appears that the elliptic curve analog of the discrete logarithm problem is at least as difficult to solve, especially over GF (2/sup m/). Furthermore, elliptic curve cryptosystems might prove to have a higher bit-rate operation than conventional cryptosystems.<<ETX>>","PeriodicalId":398160,"journal":{"name":"1993 IEEE South African Symposium on Communications and Signal Processing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1993-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Public-key cryptosystems based on elliptic curves\",\"authors\":\"J. Botes, W. Penzhorn\",\"doi\":\"10.1109/COMSIG.1993.365883\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We discuss the use of elliptic curves in cryptography. Compared to the difficulty of solving the classical discrete logarithm problem, it appears that the elliptic curve analog of the discrete logarithm problem is at least as difficult to solve, especially over GF (2/sup m/). Furthermore, elliptic curve cryptosystems might prove to have a higher bit-rate operation than conventional cryptosystems.<<ETX>>\",\"PeriodicalId\":398160,\"journal\":{\"name\":\"1993 IEEE South African Symposium on Communications and Signal Processing\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1993-08-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"1993 IEEE South African Symposium on Communications and Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSIG.1993.365883\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"1993 IEEE South African Symposium on Communications and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSIG.1993.365883","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We discuss the use of elliptic curves in cryptography. Compared to the difficulty of solving the classical discrete logarithm problem, it appears that the elliptic curve analog of the discrete logarithm problem is at least as difficult to solve, especially over GF (2/sup m/). Furthermore, elliptic curve cryptosystems might prove to have a higher bit-rate operation than conventional cryptosystems.<>