Elliptic curves: prime-order curves
Written by Dominik Joe Pantůček on 2018-04-26
As we have shown last time, just mapping elliptic curve in simple Weierstrass form over a finite field does not make the curve automatically practical for cryptography. Using just a few points from the whole set cannot be very secure. Today we present two important properties the curve must possess in order to be of some practical use.