Introduction - If you have any usage issues, please Google them yourself
Computer Security Studies in the elliptic curve public key system, c-source input and output: Please enter the elliptic curve equation y ^ 2 = x ^ 3+ cx+ d (mod p) in the c, d, p values: 8,10,23 elliptic curve equation y ^ 2 = x ^ 3+8 x+10 (mod23) Please enter the plaintext x by taking the x1, x2: 19,13 Please enter a choice of elliptic curve point a0 of the x, y: 7,8 Please enter a private key a = 17 select t = 3 encrypted result is (y0, y1, y2) = ((22,22), 20,18) implementation of the decryption: (c1, c2) = (18,12) x1 = 19 x2 = 13