Make us homepage
Add to Favorites
FAIL (the browser should render some flash content, not this).

Main page » Non-Fiction » Science literature » Guide to Elliptic Curve Cryptography

Guide to Elliptic Curve Cryptography


After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography, this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. This all-embracing and highly focused reference is a unique and indispensable resource for practitioners, professionals, and researchers in computer science, computer engineering, network design, and network data security.

Purchase Guide to Elliptic Curve Cryptography from
Dear user! You need to be registered and logged in to fully enjoy We recommend registering or logging in.
Tags: implementation, network, efficient, publickey, practical, arise, software