Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /

Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

Saved in:
Bibliographic Details
Main Authors: Enge, Andreas. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Boston, MA : Springer US : Imprint: Springer, 1999
Subjects:Computer science., Computer communication systems., Data structures (Computer science)., Data encryption (Computer science)., Computers., Management information systems., Geometry., Computer Science., Data Structures, Cryptology and Information Theory., Data Encryption., Theory of Computation., Computer Communication Networks., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/978-1-4615-5207-9
Tags: Add Tag
No Tags, Be the first to tag this record!