Number theory is a very important cornerstone of cryptography. Modern public key cryptography has been applied to many fields due to its security and flexibility. This paper will focus on elliptic curve cryptography. The paper discusses the formula derivation and encryption method of elliptic curve cryptosystem, and then uses the code to implement the elliptic curve cryptosystem, simulates the whole process of encryption and decryption, and proves the security performance of the elliptic curve cryptosystem.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.