Return to Article Details Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields Download Download PDF