Elliptic curve cryptography

GPTKB entity

Statements (51)
Predicate Object
gptkbp:instanceOf public-key cryptography algorithm
gptkbp:abbreviation gptkb:ECC
gptkbp:advantage smaller key sizes for equivalent security
gptkbp:alternativeTo gptkb:RSA
gptkb:DSA
gptkb:Diffie-Hellman
gptkbp:category mathematical cryptography
asymmetric cryptography
gptkbp:contrastsWith gptkb:RSA
gptkbp:curveExample gptkb:P-256
gptkb:P-384
gptkb:P-521
gptkb:secp256k1
gptkb:Curve25519
gptkbp:dependsOn elliptic curve discrete logarithm problem
gptkbp:example gptkb:ECIES
gptkb:ECDSA
gptkb:ECDH
https://www.w3.org/2000/01/rdf-schema#label Elliptic curve cryptography
gptkbp:proposedBy gptkb:Neal_Koblitz
gptkb:Victor_S._Miller
gptkbp:relatedTo modular arithmetic
discrete logarithm problem
finite field arithmetic
gptkbp:standardizedBy gptkb:NIST
gptkb:SECG
gptkbp:supportedBy gptkb:Java_Cryptography_Architecture
gptkb:OpenSSL
gptkb:Bouncy_Castle
gptkb:GnuPG
gptkb:Microsoft_CryptoAPI
gptkb:Libsodium
gptkbp:usedFor encryption
digital signatures
key exchange
gptkbp:usedIn gptkb:Bitcoin
gptkb:cryptocurrency
gptkb:PGP
IoT devices
SSH
digital certificates
TLS
mobile devices
cryptocurrencies
smart cards
secure messaging
gptkbp:uses elliptic curves over finite fields
gptkbp:vulnerableTo quantum computers
gptkbp:yearProposed 1985
gptkbp:bfsParent gptkb:Tate_pairing
gptkbp:bfsLayer 6