Fr. 215.00

Guide to Elliptic Curve Cryptography

Inglese · Copertina rigida

Spedizione di solito entro 2 a 3 settimane (il titolo viene stampato sull'ordine)

Descrizione

Ulteriori informazioni

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.

Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems
* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic

* Distills complex mathematics and algorithms for easy understanding

* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools

This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Sommario

and Overview.- Finite Field Arithmetic.- Elliptic Curve Arithmetic.- Cryptographic Protocols.- Implementation Issues.

Riassunto

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.

Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems
* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic

* Distills complex mathematics and algorithms for easy understanding

* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools

This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Testo aggiuntivo

From the reviews:

"It is the first book to give a comprehensive and careful presentation of all the implementation issues involved with ECC. … The book contains chapters on implementing finite field arithmetic … . There is also an extensive chapter on engineering considerations … . is very clearly written and numerous algorithms are presented in a format suitable for easy implementations. The book will be useful for engineers and computer scientists who want to know about the important issues in implementing ECC." (Steven D. Galbraith, Mathematical Reviews, 2005)
"This book is entirely dedicated to elliptic curve cryptography. It starts – after a short overview – with finite field arithmetic … . The book is a guide for security professionals and developers … . It is very carefully written and may serve as a reference book for mathematicians as well." (J. Schoissengeier, Monatshefte für Mathematik, Vol. 144 (1), 2005)
"This is a very useful handbook for anybody who is or must be interested in practical elliptic curve cryptography and its applications. … is presented in a rather non-theoretical way and at a beginner to intermediate level. On the other hand, researchers should find the book useful because of the extensive survey of the related literature (each chapter ends with notes and further references, the bibliography containing almost 500 items)." (EMS Newsletter, September, 2005)

Relazione

From the reviews:

"It is the first book to give a comprehensive and careful presentation of all the implementation issues involved with ECC. ... The book contains chapters on implementing finite field arithmetic ... . There is also an extensive chapter on engineering considerations ... . is very clearly written and numerous algorithms are presented in a format suitable for easy implementations. The book will be useful for engineers and computer scientists who want to know about the important issues in implementing ECC." (Steven D. Galbraith, Mathematical Reviews, 2005)
"This book is entirely dedicated to elliptic curve cryptography. It starts - after a short overview - with finite field arithmetic ... . The book is a guide for security professionals and developers ... . It is very carefully written and may serve as a reference book for mathematicians as well." (J. Schoissengeier, Monatshefte für Mathematik, Vol. 144 (1), 2005)
"This is a very useful handbook for anybody who is or must be interested in practical elliptic curve cryptography and its applications. ... is presented in a rather non-theoretical way and at a beginner to intermediate level. On the other hand, researchers should find the book useful because of the extensive survey of the related literature (each chapter ends with notes and further references, the bibliography containing almost 500 items)." (EMS Newsletter, September, 2005)

Dettagli sul prodotto

Autori Darre Hankerson, Darrel Hankerson, Alfred Menezes, Alfred J Menezes, Alfred J. Menezes, Scot Vanstone, Scott Vanstone, Scott A. Vanstone
Editore Springer, Berlin
 
Lingue Inglese
Formato Copertina rigida
Pubblicazione 01.01.2004
 
EAN 9780387952734
ISBN 978-0-387-95273-4
Pagine 312
Dimensioni 178 mm x 260 mm x 25 mm
Peso 832 g
Illustrazioni XX, 312 p.
Serie Springer Professional Computing
Springer Professional Computing
Categoria Scienze naturali, medicina, informatica, tecnica > Informatica, EDP > Informatica

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.