BS ISO IEC 15946-5 pdf – Information technology — Security techniques — Crytographic technique based on elliptic curves Part 5: Elliptic curve generation

BS ISO IEC 15946-5 pdf – Information technology — Security techniques — Crytographic technique based on elliptic curves Part 5: Elliptic curve generation Set n = n/l and r = rl. ⎯ If n < n min then output ―not nearly prime‖ and stop. 3) Next l. c) Test n for primality. d) If n is prime then output r...