GPTKB
Browse
Query
Compare
Download
Publications
Contributors
Search
Elliptic curve cryptography
URI:
https://gptkb.org/entity/Elliptic_curve_cryptography
GPTKB entity
Statements (51)
Predicate
Object
gptkbp:instanceOf
public-key cryptography algorithm
gptkbp:abbreviation
gptkb:ECC
gptkbp:advantage
smaller key sizes for equivalent security
gptkbp:alternativeTo
gptkb:RSA
gptkb:DSA
gptkb:Diffie-Hellman
gptkbp:category
mathematical cryptography
asymmetric cryptography
gptkbp:contrastsWith
gptkb:RSA
gptkbp:curveExample
gptkb:P-256
gptkb:P-384
gptkb:P-521
gptkb:secp256k1
gptkb:Curve25519
gptkbp:dependsOn
elliptic curve discrete logarithm problem
gptkbp:example
gptkb:ECIES
gptkb:ECDSA
gptkb:ECDH
https://www.w3.org/2000/01/rdf-schema#label
Elliptic curve cryptography
gptkbp:proposedBy
gptkb:Neal_Koblitz
gptkb:Victor_S._Miller
gptkbp:relatedTo
modular arithmetic
discrete logarithm problem
finite field arithmetic
gptkbp:standardizedBy
gptkb:NIST
gptkb:SECG
gptkbp:supportedBy
gptkb:Java_Cryptography_Architecture
gptkb:OpenSSL
gptkb:Bouncy_Castle
gptkb:GnuPG
gptkb:Microsoft_CryptoAPI
gptkb:Libsodium
gptkbp:usedFor
encryption
digital signatures
key exchange
gptkbp:usedIn
gptkb:Bitcoin
gptkb:cryptocurrency
gptkb:PGP
IoT devices
SSH
digital certificates
TLS
mobile devices
cryptocurrencies
smart cards
secure messaging
gptkbp:uses
elliptic curves over finite fields
gptkbp:vulnerableTo
quantum computers
gptkbp:yearProposed
1985
gptkbp:bfsParent
gptkb:Tate_pairing
gptkbp:bfsLayer
6