**Peer Review Journal ** DOI on demand of Author (Charges Apply) ** Fast Review and Publicaton Process ** Free E-Certificate to Each Author

Current Issues
     2026:2/3

International Journal of Applied Mathematics and Numerical Research

ISSN: (Print) | 3107-7110 (Online) | Impact Factor: 8.62 | Open Access

Cryptographic Protocols Based on Elliptic Curve Cryptography

Full Text (PDF)

Open Access - Free to Download

Download Full Article (PDF)

Abstract

Elliptic Curve Cryptography (ECC) has emerged as a cornerstone of modern cryptographic protocols, offering robust security with smaller key sizes and improved efficiency compared to classical systems like RSA. By leveraging the mathematical properties of elliptic curves over finite fields, ECC enables secure key exchange, digital signatures, and encryption with reduced computational and bandwidth requirements. This article provides a comprehensive overview of ECC, the mathematical foundations underpinning its security, its key protocols—including ECDH, ECDSA, and ECIES—and its applications in contemporary digital security, from secure web communications to cryptocurrencies. The discussion also addresses practical considerations, implementation challenges, and the future trajectory of ECC in a post-quantum world.

How to Cite This Article

Dr. Terence Tao, Dr. Richard Courant, John von Neumann (2025). Cryptographic Protocols Based on Elliptic Curve Cryptography . International Journal of Applied Mathematics and Numerical Research (IJAMNR), 1(2), 12-14.

Share This Article: