MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Elliptic curve public key cryptosystems / Alfred Menezes ; foreword by Neal Koblitz.

By: Menezes, A. J. (Alfred J.), 1965-.
Material type: materialTypeLabelBookSeries: Kluwer international series in engineering and computer science ; SECS 234.Publisher: Boston : Kluwer Academic Publishers, 1993Description: xii,128p ; 25cm + hbk.ISBN: 0792393686 .Subject(s): Computers -- Access control | CryptographyDDC classification: 005.82
Contents:
Introduction to public key cryptography -- Introduction to elliptic curves -- Isomorphism classes of elliptic curves over finite fields -- The discrete logarithm problem -- The elliptic curve logarithm problem -- Implementation of elliptic curve cryptosystems -- Counting points on elliptic curves over F2m.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.82 (Browse shelf(Opens below)) 1 Available 00114032
General Lending MTU Bishopstown Library Lending 005.82 (Browse shelf(Opens below)) 1 Available 00015598
Total holds: 0

Enhanced descriptions from Syndetics:

Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an up-to-date and self-contained treatment of elliptic curve-based public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject.

Bibliography: (pages 117-126) and index.

Introduction to public key cryptography -- Introduction to elliptic curves -- Isomorphism classes of elliptic curves over finite fields -- The discrete logarithm problem -- The elliptic curve logarithm problem -- Implementation of elliptic curve cryptosystems -- Counting points on elliptic curves over F2m.

Powered by Koha