{"draft":"draft-mcgrew-fundamental-ecc-04","doc_id":"RFC6090","title":"Fundamental Elliptic Curve Cryptography Algorithms","authors":["D. McGrew","K. Igoe","M. Salter"],"format":["ASCII","HTML"],"page_count":"34","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"This note describes the fundamental algorithms of Elliptic Curve\r\nCryptography (ECC) as they were defined in some seminal references\r\nfrom 1994 and earlier. These descriptions may be useful for\r\nimplementing the fundamental algorithms without using any of the\r\nspecialized methods that were developed in following years. Only\r\nelliptic curves defined over fields of characteristic greater than\r\nthree are in scope; these curves are those used in Suite B.\r\nThis document is not an Internet Standards Track specification; it is\r\npublished for informational purposes.","pub_date":"February 2011","keywords":["ECC"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC6090","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc6090"}