000 02810nam a22003978i 4500
001 CR9781107360211
003 UkCbUP
005 20200124160223.0
006 m|||||o||d||||||||
007 cr||||||||||||
008 130311s1999||||enk o ||1 0|eng|d
020 _a9781107360211 (ebook)
020 _z9780521653749 (paperback)
040 _aUkCbUP
_beng
_erda
_cUkCbUP
050 0 0 _aQA76.9.A25
_b.B57 1999
082 0 0 _a005.8/2
_221
100 1 _aBlake, Ian F.,
_eauthor.
245 1 0 _aElliptic curves in cryptography /
_cI.F. Blake, G. Seroussi, N.P. Smart.
264 1 _aCambridge :
_bCambridge University Press,
_c1999.
300 _a1 online resource (xv, 204 pages) :
_bdigital, PDF file(s).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLondon Mathematical Society lecture note series ;
_v265
500 _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015).
505 0 _aCh. I. Introduction -- Ch. II. Finite Field Arithmetic -- Ch. III. Arithmetic on an Elliptic Curve -- Ch. IV. Efficient Implementation of Elliptic Curves -- Ch. V. The Elliptic Curve Discrete Logarithm Problem -- Ch. VI. Determining the Group Order -- Ch. VII. Schoof's Algorithm and Extensions -- Ch. VIII. Generating Curves using Complex Multiplication -- Ch. IX. Other Applications of Elliptic Curves -- Ch. X. Hyperelliptic Cryptosystems -- App. A. Curve Examples.
520 _aIn the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-based signatures will become all pervasive. This book summarizes knowledge built up within Hewlett-Packard over a number of years, and explains the mathematics behind practical implementations of elliptic curve systems. Due to the advanced nature of the mathematics there is a high barrier to entry for individuals and companies to this technology. Hence this book will be invaluable not only to mathematicians wanting to see how pure mathematics can be applied but also to engineers and computer scientists wishing (or needing) to actually implement such systems.
650 0 _aComputer security.
650 0 _aCryptography.
650 0 _aCurves, Elliptic
_xData processing.
700 1 _aSeroussi, G.
_q(Gadiel),
_d1955-
_eauthor.
700 1 _aSmart, Nigel P.
_q(Nigel Paul),
_d1967-
_eauthor.
776 0 8 _iPrint version:
_z9780521653749
830 0 _aLondon Mathematical Society lecture note series ;
_v265.
856 4 0 _uhttps://doi.org/10.1017/CBO9781107360211
999 _c516930
_d516928