Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /

Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

Saved in:
Bibliographic Details
Main Authors: Enge, Andreas. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Boston, MA : Springer US : Imprint: Springer, 1999
Subjects:Computer science., Computer communication systems., Data structures (Computer science)., Data encryption (Computer science)., Computers., Management information systems., Geometry., Computer Science., Data Structures, Cryptology and Information Theory., Data Encryption., Theory of Computation., Computer Communication Networks., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/978-1-4615-5207-9
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:202621
record_format koha
spelling KOHA-OAI-TEST:2026212018-07-30T23:30:24ZElliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction / Enge, Andreas. author. SpringerLink (Online service) textBoston, MA : Springer US : Imprint: Springer,1999.engSince their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.1. Public Key Cryptography -- 2. The Group Law on Elliptic Curves -- 3. Elliptic Curves over Finite Fields -- 4. The Discrete Logarithm Problem -- 5. Counting Points on Elliptic Curves -- References.Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.Computer science.Computer communication systems.Data structures (Computer science).Data encryption (Computer science).Computers.Management information systems.Geometry.Computer Science.Data Structures, Cryptology and Information Theory.Data Encryption.Geometry.Theory of Computation.Computer Communication Networks.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/978-1-4615-5207-9URN:ISBN:9781461552079
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Computers.
Management information systems.
Geometry.
Computer Science.
Data Structures, Cryptology and Information Theory.
Data Encryption.
Geometry.
Theory of Computation.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Computers.
Management information systems.
Geometry.
Computer Science.
Data Structures, Cryptology and Information Theory.
Data Encryption.
Geometry.
Theory of Computation.
Computer Communication Networks.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Computers.
Management information systems.
Geometry.
Computer Science.
Data Structures, Cryptology and Information Theory.
Data Encryption.
Geometry.
Theory of Computation.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Computers.
Management information systems.
Geometry.
Computer Science.
Data Structures, Cryptology and Information Theory.
Data Encryption.
Geometry.
Theory of Computation.
Computer Communication Networks.
Management of Computing and Information Systems.
Enge, Andreas. author.
SpringerLink (Online service)
Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /
description Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.
format Texto
topic_facet Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Computers.
Management information systems.
Geometry.
Computer Science.
Data Structures, Cryptology and Information Theory.
Data Encryption.
Geometry.
Theory of Computation.
Computer Communication Networks.
Management of Computing and Information Systems.
author Enge, Andreas. author.
SpringerLink (Online service)
author_facet Enge, Andreas. author.
SpringerLink (Online service)
author_sort Enge, Andreas. author.
title Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /
title_short Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /
title_full Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /
title_fullStr Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /
title_full_unstemmed Elliptic Curves and Their Applications to Cryptography [electronic resource] : An Introduction /
title_sort elliptic curves and their applications to cryptography [electronic resource] : an introduction /
publisher Boston, MA : Springer US : Imprint: Springer,
publishDate 1999
url http://dx.doi.org/10.1007/978-1-4615-5207-9
work_keys_str_mv AT engeandreasauthor ellipticcurvesandtheirapplicationstocryptographyelectronicresourceanintroduction
AT springerlinkonlineservice ellipticcurvesandtheirapplicationstocryptographyelectronicresourceanintroduction
_version_ 1756267726166294528