Guide to elliptic curve cryptography [Perpetual access] (Record no. 565141)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01592 a2200253 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780387218465 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | IIT Kanpur |
041 ## - LANGUAGE CODE | |
Language code of text/sound track or separate title | eng |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 |
Item number | H194g |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Darrel Hankerson |
245 ## - TITLE STATEMENT | |
Title | Guide to elliptic curve cryptography [Perpetual access] |
Statement of responsibility, etc | Darrel Hankerson, Alfred Menezes and Scott Vanstone |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher | Springer |
Year of publication | 2004 |
Place of publication | New York |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xx, 312p |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
Title | Springer professional computing |
520 ## - SUMMARY, ETC. | |
Summary, etc | After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Public key cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Coding theory |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Menezes, Alfred |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Vanstone, Scott |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://link.springer.com/book/10.1007%2Fb97644#about |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | E books |
Withdrawn status | Lost status | Damaged status | Not for loan | Collection code | Permanent Location | Current Location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Cost, replacement price | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Electronic Resources | PK Kelkar Library, IIT Kanpur | PK Kelkar Library, IIT Kanpur | 2022-04-28 | 88 | 18373.40 | 005.82 H194g | EBK10740 | 18373.40 | E books |