From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the “Elliptic Curve Cryptosystem” which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in “Coding Theory” of Abstract algebra which offers an additional shield for the transmitted message.
"Sinopsis" puede pertenecer a otra edición de este libro.
From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the “Elliptic Curve Cryptosystem” which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in “Coding Theory” of Abstract algebra which offers an additional shield for the transmitted message.
Miss. B. A. Kasuni Welihinda has obtained her B. Sc. (Special) Degree in Mathematics from the University of Sri Jayewardenepura, Sri Lanka in 2015. She is currently working at the University and hopes to continue studies in Abstract Algebra.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 23,77 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 11,00 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoLibrería: The Book Garden, Bountiful, UT, Estados Unidos de America
Trade Paperback. Condición: Very Good - Cash. Light reader wear and rubbing to the edges, corners, covers, and pages. The book is in great condition! Stock photos may not look exactly like the book. Nº de ref. del artículo: 1110505
Cantidad disponible: 1 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the 'Elliptic Curve Cryptosystem' which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in 'Coding Theory' of Abstract algebra which offers an additional shield for the transmitted message. 116 pp. Englisch. Nº de ref. del artículo: 9783330323278
Cantidad disponible: 2 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the 'Elliptic Curve Cryptosystem' which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in 'Coding Theory' of Abstract algebra which offers an additional shield for the transmitted message. Nº de ref. del artículo: 9783330323278
Cantidad disponible: 1 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Welihinda B. A. KasuniMiss. B. A. Kasuni Welihinda has obtained her B. Sc. (Special) Degree in Mathematics from the University of Sri Jayewardenepura, Sri Lanka in 2015. She is currently working at the University and hopes to continu. Nº de ref. del artículo: 151237961
Cantidad disponible: Más de 20 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. Neuware -From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the ¿Elliptic Curve Cryptosystem¿ which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in ¿Coding Theory¿ of Abstract algebra which offers an additional shield for the transmitted message.Books on Demand GmbH, Überseering 33, 22297 Hamburg 116 pp. Englisch. Nº de ref. del artículo: 9783330323278
Cantidad disponible: 2 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 116 pages. 8.66x5.91x0.27 inches. In Stock. Nº de ref. del artículo: 3330323272
Cantidad disponible: 1 disponibles