Guide to Elliptic Curve Cryptography

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the pra...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: Hankerson, Darrel (Συγγραφέας), Vanstone, Scott (Συγγραφέας), Menezes, Alfred (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: New York, NY : Springer New York, 2004.
Σειρά:Springer Professional Computing
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04348nam a22004935i 4500
001 978-0-387-21846-5
003 DE-He213
005 20150520200118.0
007 cr nn 008mamaa
008 100301s2004 xxu| s |||| 0|eng d
020 |a 9780387218465  |9 978-0-387-21846-5 
024 7 |a 10.1007/b97644  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
100 1 |a Hankerson, Darrel.  |e author. 
245 1 0 |a Guide to Elliptic Curve Cryptography  |h [electronic resource] /  |c by Darrel Hankerson, Scott Vanstone, Alfred Menezes. 
264 1 |a New York, NY :  |b Springer New York,  |c 2004. 
300 |a XX, 312 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Springer Professional Computing 
505 0 |a and Overview -- Finite Field Arithmetic -- Elliptic Curve Arithmetic -- Cryptographic Protocols -- Implementation Issues. 
520 |a  After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application. Features: *Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems *Describes important protocols developed by industry and government, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology *Provides full exposition on key techniques for efficiently implementing finite-field and elliptic curve arithmetic *Distills complex mathematics and algorithms for easy understanding, yet total subject integration *Includes useful literature references in each chapter, as well as a list of algorithms and appendixes on sample parameters, ECC standards, and software tools This all-embracing and highly focused reference offers a unique overview and strategic viewpoint for one of the most widely used cryptosystems in wireless devices and smart cards today. It is an indispensable resource for any practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security. Darrel Hankerson is an industry consultant and author of books on cryptography and data compression. Alfred Menezes is co-director of the University of Waterloo’s Center for Applied Cryptographic Research, leader of an ECC algorithm standardization committee, and author of books on cryptography and cryptosystems. Scott Vanstone coauthored an applied cryptography handbook with A. Menezes and is founder of Certicom Corp. (Canada), a leading ECC company. Key topics: >> Public-key cryptography >> Cryptographic protocols >> Attacks and secure implementation >> Domain parameters >> Signature schemes >> Key establishment >> ECC standards >> Finite- and binary-field arithmetic ____________________________________ -- Security / Cryptography -- Beginning / Intermediate Level. 
650 0 |a Computer science. 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Coding and Information Theory. 
700 1 |a Vanstone, Scott.  |e author. 
700 1 |a Menezes, Alfred.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387952734 
830 0 |a Springer Professional Computing 
856 4 0 |u http://dx.doi.org/10.1007/b97644  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)