Guide to elliptic curve cryptography [Perpetual access]
Language: English Series: Springer professional computingPublication details: Springer 2004 New YorkDescription: xx, 312pISBN:- 9780387218465
- 005.82 H194g
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|
![]() |
PK Kelkar Library, IIT Kanpur | Electronic Resources | 005.82 H194g (Browse shelf(Opens below)) | Available | EBK10740 |
Browsing PK Kelkar Library, IIT Kanpur shelves, Collection: Electronic Resources Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.73 V449d Data structures using Python [Perpetual access till February 2028] | 005.74 Si32d7 Database system concepts [7th ed.] [Perpetual access] | 005.8 M896h Hardware security [Perpetual access] | 005.82 H194g Guide to elliptic curve cryptography [Perpetual access] | 005.82 R241t Timing channels in cryptography [Perpetual access] | 006.3 P133s Soft computing with MATLAB [Perpetual access till February 2028] | 006.3 R911a Artificial Intelligence [Perpetual access till 2028] |
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application.
There are no comments on this title.