datasheets.com EBN.com EDN.com EETimes.com Embedded.com PlanetAnalog.com TechOnline.com  
Events
UBM Tech
UBM Tech
Welcome Guest Log In | Register

An Elliptic Curve Cryptography (ECC) Primer

Authored on: Apr 8, 2005

Technical Paper

0 0
More InfoLess Info
Asymmetric cryptography is a marvellous technology. Its uses are many and varied.

And when you need it, you need it. For many situations in distributed network environments, asymmetric cryptography is a must during communications. If you're taming key distribution issues with a public key infrastructure (PKI), you're using asymmetric cryptography. If you're designing or employing any kind of network protocol or application requiring secure communications, to come up with a practical solution, you're going to have to use asymmetric cryptography.

This paper describes elliptic curve cryptography in greater depth—how it works, and why it offers these advantages over other asymmetric cryptography options. It will begin by discussing the larger subject of asymmetric cryptography in general.



Please disable any pop-up blockers for proper viewing of this paper.

0 comments
write a comment

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page

×

Please Login

You will be redirected to the login page