Advances in elliptic curve cryptography
Author(s)
Bibliographic Information
Advances in elliptic curve cryptography
(London Mathematical Society lecture note series, 317)
Cambridge University Press, 2005
- : paperback
Available at 57 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references (p. 253-270) and indexes
Description and Table of Contents
Description
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
Table of Contents
- Part I. Protocols: 1. Elliptic curve base protocols N. P. Smart
- 2. On the provable security of ECDSA D. Brown
- 3. Proofs of security for ECIES A. W. Dent
- Part II. Implementation Techniques: 4. Side channel analysis E. Oswald
- 5. Defenses against side-channel analysis M. Joye
- Part III. Mathematical Foundations: 6. Advances in point counting F. Vercauteren
- 7. Hyperelliptic curves and the HCDLP P. Guadry
- 8. Weil descent attacks F. Hess
- Part IV. Pairing Based Techniques: 9. Pairings S. Galbraith
- 10. Cryptography from pairings K. G. Paterson.
by "Nielsen BookData"