Skip to main content
Article thumbnail
Location of Repository


By Troels Eriksen


In the later years cryptosystems using elliptic curves have shown up and are claimed to be just as secure as a system like RSA with much smaller key sizes. This makes it faster and less resource demanding, and hence allows implementation in a wide array of applications. It is generally accepted [1

Year: 2009
OAI identifier: oai:CiteSeerX.psu:
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • (external link)
  • http://modular.math.washington... (external link)
  • Suggested articles

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.