21.4 Elliptic Curves in Characteristic 2
Many applications use elliptic curves mod 2, or elliptic curves defined over the finite fields (these are described in Section 3.11). This is often because mod 2 adapts well to computers. In 1999, NIST recommended 15 elliptic curves for cryptographic uses (see [FIPS 186-2]). Of these, 10 are over finite fields
If we’re working mod 2, the equations for elliptic curves need to be modified slightly. There are many reasons for this. For example, the derivative of is since is the same as 0. This means that the tangent lines we compute are vertical, so for all points A more sophisticated explanation is that the curve has singularities (points where the ...
Get Introduction to Cryptography with Coding Theory, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.