References
FIPS 186-2 (2000). Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-2. National Institute of Standards and Technology, Gaithersburg, MD.
FIPS 186-2 (2000). Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-2. National Institute of Standards and Technology, Gaithersburg, MD.
Fouquet, M., P. Gaudry, and R. Harley (2000). “An extension of Satoh's algorithm and its implementation.” Journal of the Ramanujan Mathematical Society, 15, 281–318.
Gaudry, P. (2002). “A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2.” Advances in Cryptography—ASIACRYPT 2002, Lecture Notes in Computer Science, vol. 2501, ed. Y. Zheng. Springer-Verlag, Berlin, 311–327.
Satoh, T. (2000). “The canonical lift of an ordinary elliptic curve over a prime field and its point counting.” Journal of the Ramanujan Mathematical Society, 15, 247–270.
Schoof, R. (1985). “Elliptic curves over finite fields and the computation of square roots mod p.” Mathematics of Computation, 44, 483–494.
Skjernaa, B. (2003). “Satoh's algorithm in characteristic 2.” Mathematics of Computation, 72, 477–487.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Hankerson, D., Menezes, A. (2005). Elliptic Curve Keys. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_134
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_134
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering