Advances in Elliptic Curve Cryptography / Edition 2

Advances in Elliptic Curve Cryptography / Edition 2

ISBN-10:
052160415X
ISBN-13:
9780521604154
Pub. Date:
04/25/2005
Publisher:
Cambridge University Press
ISBN-10:
052160415X
ISBN-13:
9780521604154
Pub. Date:
04/25/2005
Publisher:
Cambridge University Press
Advances in Elliptic Curve Cryptography / Edition 2

Advances in Elliptic Curve Cryptography / Edition 2

Paperback

$83.99 Current price is , Original price is $83.99. You
$83.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.

Product Details

ISBN-13: 9780521604154
Publisher: Cambridge University Press
Publication date: 04/25/2005
Series: London Mathematical Society Lecture Note Series , #317
Edition description: New Edition
Pages: 298
Product dimensions: 5.98(w) x 9.02(h) x 0.67(d)

Table of Contents

Part I. Protocols: 1. Elliptic curve base protocols N. P. Smart; 2. On the provable security of ECDSA D. Brown; 3. Proofs of security for ECIES A. W. Dent; Part II. Implementation Techniques: 4. Side channel analysis E. Oswald; 5. Defenses against side-channel analysis M. Joye; Part III. Mathematical Foundations: 6. Advances in point counting F. Vercauteren; 7. Hyperelliptic curves and the HCDLP P. Guadry; 8. Weil descent attacks F. Hess; Part IV. Pairing Based Techniques: 9. Pairings S. Galbraith; 10. Cryptography from pairings K. G. Paterson.
From the B&N Reads Blog

Customer Reviews