Return to Article Details Cryptanalysis of an Encryption Scheme that Uses Elliptic Curve Over Finite Field Download Download PDF