@ARTICLE{Barański_Marcin_Cryptographically_2021, author={Barański, Marcin and Gliwa, Rafał and Szmidt, Janusz}, volume={vol. 67}, number={No 2}, journal={International Journal of Electronics and Telecommunications}, pages={207-212}, howpublished={online}, year={2021}, publisher={Polish Academy of Sciences Committee of Electronics and Telecommunications}, abstract={The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers. The cryptographically strong elliptic curves are those for which the discrete logarithm problem is computationally hard. The required mathematical conditions are formulated in terms of parameters characterizing the elliptic curves.We present an algorithm to generate such curves. Examples of elliptic curves of prime order are generated with Magma.}, type={Article}, title={Cryptographically Strong Elliptic Curves of Prime Order}, URL={http://www.czasopisma.pan.pl/Content/118887/PDF/30_3224_Szmidt_L_sk_new.pdf}, doi={10.24425/ijet.2021.135966}, keywords={Mersenne primes, elliptic curves, security requirements, search algorithm, Magma}, }