Skip to content
Register Sign in Wishlist
Elliptic Curves in Cryptography

Elliptic Curves in Cryptography

Part of London Mathematical Society Lecture Note Series

  • Authors:
  • I. Blake, University of British Columbia, Vancouver
  • G. Seroussi, Hewlett-Packard Laboratories, Palo Alto, California
  • N. Smart, University of Bristol
  • Date Published: August 1999
  • availability: Available
  • format: Paperback
  • isbn: 9780521653749
Average user rating
(1 review)


Add to wishlist

Other available formats:

Looking for an examination copy?

This title is not currently available for examination. However, if you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact providing details of the course you are teaching.

Product filter button
About the Authors
  • In the past few years elliptic curve cryptography has moved from a fringe activity to a major system in the commercial world. This timely work summarizes knowledge gathered at Hewlett-Packard over a number of years and explains the mathematics behind practical implementations of elliptic curve systems. Since the mathematics is advanced, a high barrier to entry exists for individuals and companies new to this technology. Hence, this book will be invaluable not only to mathematicians but also to engineers and computer scientists who want to actually implement such systems.

    • Indispensable for researchers in this area
    • Authors are top names
    • Covers state of the art results
    Read more

    Reviews & endorsements

    "This book gives a good introduction to the mathematics behind the design of elliptic-curve cryptosystems and their implementation...this work is an important addition to the literature." Computing Reviews

    "This lovely book [Elliptic Curves in Cryptography] has a thorough coverage of bit-counting issues, something that matters greatly when you are thinking of implementing ECC. The text covers valuable background research...[it] is clearly written and brings the reader up to date on current research. It is a gem." Bulletin of the American Mathematical Society

    See more reviews

    Customer reviews

    16th May 2014 by Bhanu

    Elliptic Curve has become a defacto for crypto world and I think this book is ideal for anyone seeking complete info about it.

    Review was not posted due to profanity


    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?


    Product details

    • Date Published: August 1999
    • format: Paperback
    • isbn: 9780521653749
    • length: 224 pages
    • dimensions: 229 x 152 x 13 mm
    • weight: 0.34kg
    • availability: Available
  • Table of Contents

    1. Introduction
    2. Finite field arithmetic
    3. Arithmetic on an elliptic curve
    4. Efficient implementation of elliptic curves
    5. The elliptic curve discrete logarithm problem
    6. Determining the group order
    7. Schoof's algorithm and extensions
    8. Generating curves using complex multiplication
    9. Other applications of elliptic curves
    10. Hyperelliptic curves
    Appendix A. Curve examples
    Author index
    Subject index.

  • Resources for

    Elliptic Curves in Cryptography

    I. Blake, G. Seroussi, N. Smart

    General Resources

    Find resources associated with this title

    Type Name Unlocked * Format Size

    Showing of

    Back to top

    *This title has one or more locked files and access is given only to instructors adopting the textbook for their class. We need to enforce this strictly so that solutions are not made available to students. To gain access to locked resources you either need first to sign in or register for an account.

    These resources are provided free of charge by Cambridge University Press with permission of the author of the corresponding work, but are subject to copyright. You are permitted to view, print and download these resources for your own personal use only, provided any copyright lines on the resources are not removed or altered in any way. Any other use, including but not limited to distribution of the resources in modified form, or via electronic or other media, is strictly prohibited unless you have permission from the author of the corresponding work and provided you give appropriate acknowledgement of the source.

    If you are having problems accessing these resources please email

  • Authors

    I. Blake, University of British Columbia, Vancouver

    G. Seroussi, Hewlett-Packard Laboratories, Palo Alto, California

    N. Smart, University of Bristol

Sign In

Please sign in to access your account


Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner Please see the permission section of the catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.


Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

Please fill in the required fields in your feedback submission.