Implementing Elliptic Curve Cryptography proceeds step-by- step to explain basic number theory, polynomial mathematics, normal basis mathematics and elliptic curve mathematics. With these in place,... This description may be from another edition of this product.
There is a very good description on various codes on BIG INTEGER arithmatic. It is very helpful for the developers . The Book also gives a very good description of the various types of algorithms used in ECC.
Good introduction, but
Published by Thriftbooks.com User , 25 years ago
First of all the book is a great introduction, but sometimes the lack of clear definitions make you feel a little bit lost,it's great for people without math background,so if you want to get serious in Cryp. after you read this i advice you to read "A course in Number Theory and Cryprography" the real thing !
elliptic curve source cord
Published by Thriftbooks.com User , 26 years ago
ellipic curve cryptosystem algorith
A Worthy Effort
Published by Thriftbooks.com User , 26 years ago
Elliptic Curve is the preeminent public key solution for cryptographic problems that are highly constrained in space or time.This is the only well rounded book I have seen on EC and for such a rarefied topic the author crafts a highly readable account. For that reason I give it 5 stars. Frankly, my jaw dropped when I first spotted this book. I would reccommend this, for the most part, to security architects & developers; those with backgrounds in electrical engineering or applied math will benefit the most. I must also highly commend the author's emphasis on the pertinant IEEE standard(s).Now... having said all those nice things, I can let loose with a few paint balls. The book inks some rather gargantuan performance claims that I expect will lead folks to some unsustainable conclusions about what is possible in the real world.The performance of EC and/vs RSA is one area about which I happen to know more than your average circus bear. I have designed and built time constrained systems based on both EC and RSA...and I have scrutinized every aspect of the performance of the underlying cryptographic toolkits down to the milli-second. Bottom line: The raw performance of EC is no substitute for the high craft, skill and insight you apply to the design of your protocols and your systems.Even after this book, it is possible to, unwittingly, design an EC based system that performs worse than its RSA twin.Cheers, Robert Walker
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.