Since all the fastest known algorithms that allow one to solve the ECDLP (baby-step giant-step, Pollard's rho, etc.), need steps, it follows that the size of the underlying field should be roughly twice the security parameter.
light curve | cryptography | Bézier curve | Cryptography | The Bell Curve | Lorenz curve | elliptic curve | Curve | key (cryptography) | Engel curve | Curve fitting | Curve (band) | bell curve | Water retention curve | Trouble with the Curve | The New Adventures of Curve | The J Curve: A New Way to Understand Why Nations Rise and Fall | The Horseshoe Curve | Singular point of a curve | Selected Areas in Cryptography | Secure Communication based on Quantum Cryptography | Salt (cryptography) | Roulette (curve) | Quantum cryptography | Pseudoholomorphic curve | Phase response curve | Pedal curve | Normal curve equivalent | Melting curve analysis | Lissajous curve |
Victor S. Miller (born 1947), independent co-creator of elliptic curve cryptography