You are on page 1of 1

Notes on Eliptic Curves

Cryptographic operations that use groups (e.g. DH) are


rewritten to use
the groups of rational points of elliptic curves over finite
fields

Field: has + and ×

Group: just has + (needs identity element)

You might also like