Guide to Elliptic Curve Cryptography et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
EUR 163,51
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Guide to Elliptic Curve C... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Guide to Elliptic Curve Cryptography (Anglais) Broché – 4 octobre 2013

Voir les 3 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 163,51
EUR 141,41 EUR 183,67
EUR 163,51 Livraison à EUR 0,01. En stock. Expédié et vendu par Amazon. Emballage cadeau disponible.

Descriptions du produit

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits: * Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems * Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology * Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic * Distills complex mathematics and algorithms for easy understanding * Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Détails sur le produit

  • Broché: 312 pages
  • Editeur : Springer-Verlag New York Inc.; Édition : Softcover reprint of the original 1st ed. 2004 (1 décembre 2010)
  • Collection : Springer Professional Computing
  • Langue : Anglais
  • ISBN-10: 1441929290
  • ISBN-13: 978-1441929297
  • Dimensions du produit: 17,8 x 1,9 x 25,4 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: 790.831 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?

En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Voir le commentaire client
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles

Par kervanoel le 20 mars 2014
Format: Relié Achat vérifié
Ce livre d'occasion est comme neuf avec seulement une page cornée. Bravo pour "nearfine"
Livré avec exactitude.
Niveau maths sup.
Pour comprendre la cryptographie par courbes elliptique qui tendent à remplacer progressivement le système RSA avec des clefs beaucoup plus petites.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire. Si ce commentaire est inapproprié, dites-le nous.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer

Commentaires client les plus utiles sur (beta) 5 commentaires
12 internautes sur 12 ont trouvé ce commentaire utile 
fabulous introduction to implementing ECC 11 août 2005
Par Joseph Adler - Publié sur
Format: Relié Achat vérifié
I bought this book because I was designing a cryptographic protocol, and wanted to know if I could use ECC in my design. It begins with an explanation of "traditional" public key cryptography (i.e., cryptography over prime fields), introduces binary fields and elliptic curves, shows how to perform computations over elliptic curves, puts this together into ECC protocols, and then includes very useful implementaiton information. This book does a good job explaining not only how to use ECC algorithms, but why they work.

As advertised, this book doesn't go into too much mathematical depth, omitting most proofs. This doesn't mean that there is no math in this book; if you don't have a decent background in algebra (no, not the stuff you learned in seventh grade), you're likely to get confused. However, if you have a little background in theoretical math and cryptography, you'll find this a very readable and easy to understand book.

The one thing that's left out of this book are intellectual property issues. Certicom owns a lot of patents on ECC, and it's not clear which ideas in this book are covered by Certicom patents. This is a minor complaint though; overall, the book is excellent. It's rare to find a book that is so exactly on target. Highly recommeneded.
11 internautes sur 12 ont trouvé ce commentaire utile 
Detailed and practical 17 mai 2005
Par wiredweird - Publié sur
Format: Relié Achat vérifié
This is the only source I've found that goes into the nuts and bolts of elliptic curve (EC) cryptography. The mathematical content is rich, although proofs are generally in references rather than in the text itself. The real value is in its many and detailed algorithm examples, and in the way it builds up to them.

Before it even gets into the text, Hankerson et al have created a model of clarity. In addition to the usual, front matter includes a list of abbreviations. If you've ever choked on the alphabet soup in other books, you'll appreciate how this makes the discussion much easier to absorb. There's also a list of the algorithms presented - what the practitioner wanted in the first place.

After an introductory chapter, the authors present finite field arithmetic in a thorough but readable way. First they present prime fields over the integers, then optimal extension fields and (most importantly) binary fields. There's nothing here for the cut&paste programmer, but dozens of algorithms help the thoughtful developer work through material that is immensely complicated in other presentations. Other goodies, like Karatsuba-Ofman fast multiplication appear here as well.

The third chapter is the book's real payload: EC techniques. I've been looking for years for a book that was so explicit in the how-to, without watering down the technical content. This is practical stuff - not just the theory of EC operations, but the techniques that make EC calculations practical for high-speed implementations.

The rest of the book - about half - discusses what to do with EC codes. That includes protocols for choosing parameters, public-key and signature algorithms, and standard kinds of attacks. It also includes hardware-level description of possible implementations, down to specific instruction sets and cache structures and different kinds of chip implementations. That leads to another set of discussions on attacks, the kind that go in through the power supply or RF emissions. Appendices provide or point to pragmatic details such as parameters to use or software support available.

The only thing that could be improved in this book is the index - it's just too brief, and lacks the thoroughness the rest of the book led me to expect. I hope you realize just how small a complaint that is. In all other ways, this book meets the highest expectations.

Highly recommended for anyone who needs to understand exactly how EC cryptography works, right down to the bit level.

4 internautes sur 5 ont trouvé ce commentaire utile 
Way too expensive, yet incomplete 4 janvier 2012
Par J. Katz - Publié sur
Format: Broché
$100 for a book about implementing elliptic-curve cryptography (ECC) that doesn't discuss point counting algorithms!? The book is a hodgepodge: the first chapter talks about general crypto algorithms, the second discusses finite fields, and only the third chapter is really about elliptic-curve implementation. (The 4th chapter is about crypto protocols in general, not really specific to ECC; the last chapter is about general implementation issues but, again, not about ECC specifically.) The book would be reasonable at 1/3 the price. At this price, do yourself a favor and buy a different book.
3 internautes sur 4 ont trouvé ce commentaire utile 
Good idea badly excuted!! 22 septembre 2011
Par N. Jaber - Publié sur
Format: Relié
The good:
1) touches on thing other books seems to ignore.
2) will not overwhelm you with the math

The bad/not so good:
1) the authors writing style is awful:
a) they don't care about the "logical" line of thought. they lead the reader somewhere then suddenly abandoned to wander what just happened and why.
b) they don't know when to start a new line. by cramming too much information in a paragraph sometimes combined with math forces the reader to go back and forth multiple times to make sure you didn't miss anything.

2) chapters don't stand on their own.
3) lack of figure to help convey the message in certain locations.
3 internautes sur 5 ont trouvé ce commentaire utile 
A very nice introduction to the field 6 août 2004
Par Jim - Publié sur
Format: Relié
This book is a must have if you are interested in implementing elliptic curve cryptography. It does not have any of the juicy ellpitic curve mathematics, but that is okay as this book is directed towards engineers and others who want to learn about how elliptic curve cryptosystems are being deployed.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?