Zhang Fangguo, Wang Changjie, Wang Yumin . The selection of secure elliptic curves and their base points over GF(p)[J]. Journal of Electronics & Information Technology, 2002, 24(3): 377-381.
Citation:
Zhang Fangguo, Wang Changjie, Wang Yumin . The selection of secure elliptic curves and their base points over GF(p)[J]. Journal of Electronics & Information Technology, 2002, 24(3): 377-381.
Zhang Fangguo, Wang Changjie, Wang Yumin . The selection of secure elliptic curves and their base points over GF(p)[J]. Journal of Electronics & Information Technology, 2002, 24(3): 377-381.
Citation:
Zhang Fangguo, Wang Changjie, Wang Yumin . The selection of secure elliptic curves and their base points over GF(p)[J]. Journal of Electronics & Information Technology, 2002, 24(3): 377-381.
The study and realization of elliptic curve cryptography have become to be the mainstream of the study on public cryptography, and the selection of secure elliptic curves in cipher and their base points is the basis of the implementing of the elliptic curves cryptography. In this paper, the selection algorithm of the secure elliptic curves and their base point over large prime number is discussed, further more, the algorithm is implemented successfully in C language using the MIRACL system.