Our systems are now restored following recent technical disruption, and we’re working hard to catch up on publishing. We apologise for the inconvenience caused. Find out more

Recommended product

Popular links

Popular links


Advances in Elliptic Curve Cryptography

Advances in Elliptic Curve Cryptography

Advances in Elliptic Curve Cryptography

Ian F. Blake, University of Toronto
Gadiel Seroussi, Hewlett-Packard Laboratories, Palo Alto, California
Nigel P. Smart, Hewlett-Packard Laboratories, Bristol
May 2005
Paperback
9780521604154
AUD$125.95
inc GST
Paperback
USD
eBook

    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.

    • Provides an up-to-date treatment of critical topics in cryptography
    • The chapters are written by the leading international experts in each area
    • The topics are made accessible for the first time outside of research journals

    Product details

    May 2005
    Paperback
    9780521604154
    298 pages
    229 × 152 × 17 mm
    0.44kg
    7 b/w illus. 11 tables
    Available

    Table of Contents

    • Part I. Protocols:
    • 1. Elliptic curve base protocols N. P. Smart
    • 2. On the provable security of ECDSA D. Brown
    • 3. Proofs of security for ECIES A. W. Dent
    • Part II. Implementation Techniques:
    • 4. Side channel analysis E. Oswald
    • 5. Defenses against side-channel analysis M. Joye
    • Part III. Mathematical Foundations:
    • 6. Advances in point counting F. Vercauteren
    • 7. Hyperelliptic curves and the HCDLP P. Guadry
    • 8. Weil descent attacks F. Hess
    • Part IV. Pairing Based Techniques:
    • 9. Pairings S. Galbraith
    • 10. Cryptography from pairings K. G. Paterson.
    Resources for
    Type
      Contributors
    • N. P. Smart, D. Brown, A. W. Dent, E. Oswald, M. Joye, F. Vercauteren, P. Gaudry, F. Hess, S. Galbraith, K. G. Paterson