Skip to main content
Article thumbnail
Location of Repository

MATH 168: FINAL PROJECT

By Troels Eriksen

Abstract

In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key sizes. This makes it faster and less resource demanding, and hence allows implementation in a wide array of applications. It is generally accepted [1

Year: 2009
OAI identifier: oai:CiteSeerX.psu:10.1.1.135.9215
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://modular.math.washington... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.