You are not signed in. Sign in.


Category IT Books

Guide to Elliptic Curve Cryptography » (1st Edition)

Book cover image of Guide to Elliptic Curve Cryptography by Darrel Hankerson

Authors: Darrel Hankerson, Scott Vanstone, Alfred J. Menezes
ISBN-13: 9780387952734, ISBN-10: 038795273X
Format: Hardcover
Publisher: Springer-Verlag New York, LLC
Date Published: April 2008
Edition: 1st Edition

Find Best Prices for This Book »

Author Biography: Darrel Hankerson

Book Synopsis

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism.

Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application.

Features & Benefits:

* Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems

* Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology

* Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic

* Distills complex mathematics and algorithms for easy understanding

* Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools

This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Table of Contents

List of Algorithms
List of Tables
List of Figures
1Introduction and Overview1
2Finite Field Arithmetic25
3Elliptic Curve Arithmetic75
4Cryptographic Protocols153
5Implementation Issues205
ASample Parameters257
BECC Standards267
CSoftware Tools271




No reviews. Submit yours!

Review this book.

We would like to know what you think about this book and publish your thoughts here! (top)

Your Review

  1. You may optionally give a title for this comment.

  2. Worst to best, 1 to 5, what would you rate this one?

  3. The actual content of your comment. No HTML nor whatsoever allowed.

  4. The author of this comment.

  5. Which is warmer, night or day?

    Please answer the question by common sense.