Guide to elliptic curve cryptography [Perpetual access]
By: Darrel Hankerson.
Contributor(s): Menezes, Alfred | Vanstone, Scott.
Series: Springer professional computing. Publisher: New York Springer 2004Description: xx, 312p.ISBN: 9780387218465.Subject(s): Public key cryptography | Computer security | Coding theoryDDC classification: 005.82 | H194g Online resources: Click here to access online Summary: After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application.Item type | Current location | Collection | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
E books | PK Kelkar Library, IIT Kanpur | Electronic Resources | 005.82 H194g (Browse shelf) | Available | EBK10740 |
Browsing PK Kelkar Library, IIT Kanpur Shelves , Collection code: Electronic Resources Close shelf browser
005.73 V449d Data structures using Python [Perpetual access till February 2028] | 005.74 Si32d7 Database system concepts [7th ed.] [Perpetual access] | 005.8 M896h Hardware security [Perpetual access] | 005.82 H194g Guide to elliptic curve cryptography [Perpetual access] | 005.82 R241t Timing channels in cryptography [Perpetual access] | 006.3 P133s Soft computing with MATLAB [Perpetual access till February 2028] | 006.3 R911a Artificial Intelligence [Perpetual access till 2028] |
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application.
There are no comments for this item.