Skip to content
Register Sign in Wishlist
Elliptic Curves in Cryptography

Elliptic Curves in Cryptography

$78.99 (P)

Part of London Mathematical Society Lecture Note Series

  • Authors:
  • I. Blake, University of British Columbia, Vancouver
  • G. Seroussi, Hewlett-Packard Laboratories, Palo Alto, California
  • N. Smart, University of Bristol
  • Date Published: August 1999
  • availability: Available
  • format: Paperback
  • isbn: 9780521653749
Average user rating
(1 review)

$ 78.99 (P)
Paperback

Add to cart Add to wishlist

Other available formats:
eBook


Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

Description
Product filter button
Description
Contents
Resources
Courses
About the Authors
  • In the past few years elliptic curve cryptography has moved from a fringe activity to a major system in the commercial world. This timely work summarizes knowledge gathered at Hewlett-Packard over a number of years and explains the mathematics behind practical implementations of elliptic curve systems. Since the mathematics is advanced, a high barrier to entry exists for individuals and companies new to this technology. Hence, this book will be invaluable not only to mathematicians but also to engineers and computer scientists who want to actually implement such systems.

    • Indispensable for researchers in this area
    • Authors are top names
    • Covers state of the art results
    Read more

    Reviews & endorsements

    "This book gives a good introduction to the mathematics behind the design of elliptic-curve cryptosystems and their implementation...this work is an important addition to the literature." Computing Reviews

    "This lovely book [Elliptic Curves in Cryptography] has a thorough coverage of bit-counting issues, something that matters greatly when you are thinking of implementing ECC. The text covers valuable background research...[it] is clearly written and brings the reader up to date on current research. It is a gem." Bulletin of the American Mathematical Society

    See more reviews

    Customer reviews

    16th May 2014 by Bhanu

    Elliptic Curve has become a defacto for crypto world and I think this book is ideal for anyone seeking complete info about it.

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Date Published: August 1999
    • format: Paperback
    • isbn: 9780521653749
    • length: 224 pages
    • dimensions: 229 x 152 x 13 mm
    • weight: 0.34kg
    • availability: Available
  • Table of Contents

    Preface
    1. Introduction
    2. Finite field arithmetic
    3. Arithmetic on an elliptic curve
    4. Efficient implementation of elliptic curves
    5. The elliptic curve discrete logarithm problem
    6. Determining the group order
    7. Schoof's algorithm and extensions
    8. Generating curves using complex multiplication
    9. Other applications of elliptic curves
    10. Hyperelliptic curves
    Appendix A. Curve examples
    Bibliography
    Author index
    Subject index.

  • Resources for

    Elliptic Curves in Cryptography

    I. Blake, G. Seroussi, N. Smart

    General Resources

    Find resources associated with this title

    Type Name Unlocked * Format Size

    Showing of

    Back to top

    This title is supported by one or more locked resources. Access to locked resources is granted exclusively by Cambridge University Press to instructors whose faculty status has been verified. To gain access to locked resources, instructors should sign in to or register for a Cambridge user account.

    Please use locked resources responsibly and exercise your professional discretion when choosing how you share these materials with your students. Other instructors may wish to use locked resources for assessment purposes and their usefulness is undermined when the source files (for example, solution manuals or test banks) are shared online or via social networks.

    Supplementary resources are subject to copyright. Instructors are permitted to view, print or download these resources for use in their teaching, but may not change them or use them for commercial gain.

    If you are having problems accessing these resources please contact lecturers@cambridge.org.

  • Authors

    I. Blake, University of British Columbia, Vancouver

    G. Seroussi, Hewlett-Packard Laboratories, Palo Alto, California

    N. Smart, University of Bristol

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email lecturers@cambridge.org

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×
warning icon

Turn stock notifications on?

You must be signed in to your Cambridge account to turn product stock notifications on or off.

Sign in Create a Cambridge account arrow icon
×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.

Cancel

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×