𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Elliptic curves and their applications to cryptography: an introduction

✍ Scribed by Andreas Enge


Book ID
127405587
Publisher
Springer
Year
1999
Tongue
English
Weight
976 KB
Edition
1st
Category
Library
ISBN
0792385896

No coin nor oath required. For personal study only.

✦ Synopsis


Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

✦ Subjects


Криптология и криптография


📜 SIMILAR VOLUMES


Introduction to Cryptography with Maple
✍ Gómez Pardo, José Luis 📂 Article 📅 2012 🏛 Springer Berlin Heidelberg 🌐 German ⚖ 728 KB

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools su

Ramanujan’s class invariants and their u
✍ Elisavet Konstantinou; Aristides Kontogeorgis 📂 Article 📅 2010 🏛 Elsevier Science 🌐 English ⚖ 581 KB

The Complex Multiplication (CM) method is a method frequently used for the generation of elliptic curves (ECs) over a prime field F p . The most demanding and complex step of this method is the computation of the roots of a special type of class polynomials, called Hilbert polynomials. However, ther

Introduction to Cryptography: Principles
✍ Hans Delfs, Helmut Knebl 📂 Library 📅 2007 🏛 Springer 🌐 English ⚖ 3 MB

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.In the first part, this book covers

Introduction to Elliptic Curves and Modu
✍ Neal Koblitz (auth.) 📂 Library 📅 1984 🏛 Springer 🌐 English ⚖ 8 MB

The theory of elliptic curves and modular forms provides a fruitful meeting ground for such diverse areas as number theory, complex analysis, algebraic geometry, and representation theory. This book starts out with a problem from elementary number theory and proceeds to lead its reader into the mode