Elliptic Curve Cryptography
Nigel Smart
University of Bristol
I will discuss elliptic curve cryptography and how it is used in
a traditional public key setting. I will go on to explain some of
the attacks against such systems and then show how the existance
of such attacks can be used to develop new identity based
encryption and signature protocols.