\footnote{\url{http://arstechnica.com/security/2013/10/a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography}}
\footnote{\url{https://www.imperialviolet.org/2010/12/04/ecc.html}}
\footnote{\url{http://www.isg.rhul.ac.uk/~sdg/ecc.html}}.
-
ECC provides for much stronger security with less computationally expensive
operations in comparison to traditional asymmetric algorithms (See the Section
\ref{section:keylengths}).
-
-
The security of ECC relies on the elliptic curves and curve points chosen as
parameters for the algorithm in question. Well before the NSA-leak scandal
there has been a lot of discussion regarding these parameters and their