After 18 years of research and development, elliptic curve cryptography has gained widespread exposure and acceptance in the commercial world. Industry, banking, and government standards have been drafted to facilitate widespread deployment.
This book is the first to provide a comprehensive treatment of the practical aspects of elliptic curve cryptography. It explains the basic mathematics, provides detailed descriptions of state-in-the-art in methods for efficient implementation, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. Also considered are some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation.
Written by professors who have extensive experience studying the security of elliptic curve cryptography, its implementation, and industrial applications, this book is an important resource for security professionals, developers, and implementers.
A broad overview and guide to one of the most widely used cryptosystems in wireless devices and smartcards today. The authors are some of the key researchers and developers of the EEC standards technology. Essential reference for any practitioners or professionals incomputer science, computer engineering, network design, and network/data security.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application.
Features:
*Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems
*Describes important protocols developed by industry and government, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology
*Provides full exposition on key techniques for efficiently implementing finite-field and elliptic curve arithmetic
*Distills complex mathematics and algorithms for easy understanding, yet total subject integration
*Includes useful literature references in each chapter, as well as a list of algorithms and appendixes on sample parameters, ECC standards, and software tools
This all-embracing and highly focused reference offers a unique overview and strategic viewpoint for one of the most widely used cryptosystems in wireless devices and smart cards today. It is an indispensable resource for any practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.
Darrel Hankerson is an industryconsultant and author of books on cryptography and data compression.
Alfred Menezes is co-director of the University of Waterloo’s Center for Applied Cryptographic Research, leader of an ECC algorithm standardization committee, and author of books on cryptography and cryptosystems.
Scott Vanstone coauthored an applied cryptography handbook with A. Menezes and is founder of Certicom Corp. (Canada), a leading ECC company.
Key topics:
>> Public-key cryptography
>> Cryptographic protocols
>> Attacks and secure implementation
>> Domain parameters
>> Signature schemes
>> Key establishment
>> ECC standards
>> Finite- and binary-field arithmetic
____________________________________
-- Security / Cryptography
-- Beginning / Intermediate Level
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 64,51 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Codice articolo 4173398
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781441929297_new
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits:\* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems\* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology\* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic\* Distills complex mathematics and algorithms for easy understanding\* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software toolsThis comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security. 336 pp. Englisch. Codice articolo 9781441929297
Quantità: 2 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits: \* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems \* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology \* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic \* Distills complex mathematics and algorithms for easy understanding \* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 336 pp. Englisch. Codice articolo 9781441929297
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits:\* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems\* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology\* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic\* Distills complex mathematics and algorithms for easy understanding\* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software toolsThis comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security. Codice articolo 9781441929297
Quantità: 1 disponibili
Da: BooksRun, Philadelphia, PA, U.S.A.
Paperback. Condizione: Very Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported Softcover reprint of the original 1st ed. 2004. Codice articolo 1441929290-8-1
Quantità: 1 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 654. Codice articolo C9781441929297
Quantità: Più di 20 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar2411530294555
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 336. Codice articolo 2614416349
Quantità: 4 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 331 pages. 8.90x6.10x1.00 inches. In Stock. Codice articolo x-1441929290
Quantità: 2 disponibili