Exploring The Math Behind Elliptic Curve ElGamal Public Key Encryption Scheme

Alice and Bob are two parties in a network communication, and they have decided to use the Elliptic Curve based ElGamal Encryption Scheme to communicate securely over a public channel. Consider Alice as the sender and Bob as the receiver. In non-mathematical terms, we can list the steps involved in achieving a secure communication between … Read more