Return to Article Details Elliptic Curve Cryptography: an Overview