Aug. 4, 2022, 1:20 a.m. | Kunal Abhishek, E. George Dharma Prakash Raj

cs.CR updates on arXiv.org arxiv.org

The survey presents the evolution of Short Weierstrass elliptic curves after
their introduction in cryptography. Subsequently, this evolution resulted in
the establishment of present elliptic curve computational standards. We discuss
the chronology of attacks on Elliptic Curve Discrete Logarithm Problem and
investigate their countermeasures to highlight the evolved selection criteria
of cryptographically safe elliptic curves. Further, two popular deterministic
and random approaches for selection of Short Weierstrass elliptic curve for
cryptography are evaluated from computational, security and trust perspectives
and …

computational cryptography elliptic

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Triage Analyst

@ Peraton | Linthicum, MD, United States

Associate DevSecOps Engineer

@ LinQuest | Los Angeles, California, United States

DORA Compliance Program Manager

@ Resillion | Brussels, Belgium

Head of Workplace Risk and Compliance

@ Wise | London, United Kingdom