After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.
Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.
Features & Benefits:
* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems
* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology
* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic
* Distills complex mathematics and algorithms for easy understanding
* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools
This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.
"Sinopsis" puede pertenecer a otra edición de este libro.
<p> </p><p>After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. </p><p></p><p>Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, side-channel attacks and countermeasures, and efficient parameter generation. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge on efficient application. <br><br>Features:</p><p></p><p>*Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems</p><p><br>*Describes important protocols developed by industry and government, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology<br><br>*Provides full exposition on key techniques for efficiently implementing finite-field and elliptic curve arithmetic<br><br>*Distills complex mathematics and algorithms for easy understanding, yet total subject integration<br><br>*Includes useful literature references in each chapter, as well as a list of algorithms and appendixes on sample parameters, ECC standards, and software tools<br><br>This all-embracing and highly focused reference offers a unique overview and strategic viewpoint for one of the most widely used cryptosystems in wireless devices and smart cards today. It is an indispensable resource for any practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.</p><p></p><p>Darrel Hankerson is an industry consultant and author of books on cryptography and data compression. </p><p>Alfred Menezes is co-director of the University of Waterloo’s Center for Applied Cryptographic Research, leader of an ECC algorithm standardization committee, and author of books on cryptography and cryptosystems.</p><p>Scott Vanstone coauthored an applied cryptography handbook with A. Menezes and is founder of Certicom Corp. (Canada), a leading ECC company.</p><p></p><p> </p><p> </p><p> </p><p>Key topics:</p><p></p><p>>> Public-key cryptography</p><p></p><p>>> Cryptographic protocols</p><p></p><p>>> Attacks and secure implementation</p><p></p><p>>> Domain parameters</p><p></p><p>>> Signature schemes</p><p></p><p>>> Key establishment</p><p></p><p>>> ECC standards</p><p></p><p>>> Finite- and binary-field arithmetic</p><p></p><p> </p><p>____________________________________</p><p></p><p>-- Security / Cryptography</p><p></p><p>-- Beginning / Intermediate Level<br></p>
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 6,00 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoEUR 25,89 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoLibrería: medimops, Berlin, Alemania
Condición: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Nº de ref. del artículo: M0038795273X-V
Cantidad disponible: 2 disponibles
Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Hardcover. Condición: Good. No Jacket. Missing dust jacket; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.6. Nº de ref. del artículo: G038795273XI3N01
Cantidad disponible: 1 disponibles
Librería: Studibuch, Stuttgart, Alemania
hardcover. Condición: Gut. 332 Seiten; 9780387952734.3 Gewicht in Gramm: 1. Nº de ref. del artículo: 817047
Cantidad disponible: 1 disponibles
Librería: Bay State Book Company, North Smithfield, RI, Estados Unidos de America
Condición: good. The book is in good condition with all pages and cover intact, including the dust jacket if originally issued. The spine may show light wear. Pages may contain some notes or highlighting, and there might be a "From the library of" label. Boxed set packaging, shrink wrap, or included media like CDs may be missing. Nº de ref. del artículo: BSM.NF8Z
Cantidad disponible: 1 disponibles
Librería: BooksRun, Philadelphia, PA, Estados Unidos de America
Hardcover. Condición: Good. 2004. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Nº de ref. del artículo: 038795273X-11-1
Cantidad disponible: 1 disponibles
Librería: thebookforest.com, San Rafael, CA, Estados Unidos de America
Condición: LikeNew. Page block firm and clean, binding unblemished, boards straight, without markings of any kind. Fine, like new condition. Supporting Bay Area Friends of the Library since 2010. Well packaged and promptly shipped. Nº de ref. del artículo: 1LAUHV002Y4R
Cantidad disponible: 1 disponibles
Librería: Toscana Books, AUSTIN, TX, Estados Unidos de America
Hardcover. Condición: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Nº de ref. del artículo: Scanned038795273X
Cantidad disponible: 1 disponibles
Librería: Your Online Bookstore, Houston, TX, Estados Unidos de America
hardcover. Condición: New. Nº de ref. del artículo: 038795273X-11-32309539
Cantidad disponible: 1 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Nº de ref. del artículo: 5912433
Cantidad disponible: Más de 20 disponibles
Librería: Mispah books, Redhill, SURRE, Reino Unido
Hardcover. Condición: Like New. Like New. book. Nº de ref. del artículo: ERICA773038795273X6
Cantidad disponible: 1 disponibles