EUR 163,51
  • Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Guide to Elliptic Curve C... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Guide to Elliptic Curve Cryptography (Anglais) Broché – 4 octobre 2013

5 étoiles sur 5 1 commentaire client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 163,51
EUR 160,49 EUR 201,02

Offres spéciales et liens associés

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.




Détails sur le produit


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
1
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
Voir le commentaire client
Partagez votre opinion avec les autres clients

Meilleurs commentaires des clients

Format: Relié Achat vérifié
Ce livre d'occasion est comme neuf avec seulement une page cornée. Bravo pour "nearfine"
Livré avec exactitude.
Niveau maths sup.
Pour comprendre la cryptographie par courbes elliptique qui tendent à remplacer progressivement le système RSA avec des clefs beaucoup plus petites.
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x9897b2d0) étoiles sur 5 5 commentaires
13 internautes sur 13 ont trouvé ce commentaire utile 
HASH(0x9852ee4c) étoiles sur 5 fabulous introduction to implementing ECC 11 août 2005
Par Joseph Adler - Publié sur Amazon.com
Format: Relié Achat vérifié
I bought this book because I was designing a cryptographic protocol, and wanted to know if I could use ECC in my design. It begins with an explanation of "traditional" public key cryptography (i.e., cryptography over prime fields), introduces binary fields and elliptic curves, shows how to perform computations over elliptic curves, puts this together into ECC protocols, and then includes very useful implementaiton information. This book does a good job explaining not only how to use ECC algorithms, but why they work.

As advertised, this book doesn't go into too much mathematical depth, omitting most proofs. This doesn't mean that there is no math in this book; if you don't have a decent background in algebra (no, not the stuff you learned in seventh grade), you're likely to get confused. However, if you have a little background in theoretical math and cryptography, you'll find this a very readable and easy to understand book.

The one thing that's left out of this book are intellectual property issues. Certicom owns a lot of patents on ECC, and it's not clear which ideas in this book are covered by Certicom patents. This is a minor complaint though; overall, the book is excellent. It's rare to find a book that is so exactly on target. Highly recommeneded.
11 internautes sur 12 ont trouvé ce commentaire utile 
HASH(0x985310b4) étoiles sur 5 Detailed and practical 17 mai 2005
Par wiredweird - Publié sur Amazon.com
Format: Relié Achat vérifié
This is the only source I've found that goes into the nuts and bolts of elliptic curve (EC) cryptography. The mathematical content is rich, although proofs are generally in references rather than in the text itself. The real value is in its many and detailed algorithm examples, and in the way it builds up to them.

Before it even gets into the text, Hankerson et al have created a model of clarity. In addition to the usual, front matter includes a list of abbreviations. If you've ever choked on the alphabet soup in other books, you'll appreciate how this makes the discussion much easier to absorb. There's also a list of the algorithms presented - what the practitioner wanted in the first place.

After an introductory chapter, the authors present finite field arithmetic in a thorough but readable way. First they present prime fields over the integers, then optimal extension fields and (most importantly) binary fields. There's nothing here for the cut&paste programmer, but dozens of algorithms help the thoughtful developer work through material that is immensely complicated in other presentations. Other goodies, like Karatsuba-Ofman fast multiplication appear here as well.

The third chapter is the book's real payload: EC techniques. I've been looking for years for a book that was so explicit in the how-to, without watering down the technical content. This is practical stuff - not just the theory of EC operations, but the techniques that make EC calculations practical for high-speed implementations.

The rest of the book - about half - discusses what to do with EC codes. That includes protocols for choosing parameters, public-key and signature algorithms, and standard kinds of attacks. It also includes hardware-level description of possible implementations, down to specific instruction sets and cache structures and different kinds of chip implementations. That leads to another set of discussions on attacks, the kind that go in through the power supply or RF emissions. Appendices provide or point to pragmatic details such as parameters to use or software support available.

The only thing that could be improved in this book is the index - it's just too brief, and lacks the thoroughness the rest of the book led me to expect. I hope you realize just how small a complaint that is. In all other ways, this book meets the highest expectations.

Highly recommended for anyone who needs to understand exactly how EC cryptography works, right down to the bit level.

//wiredweird
4 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x98531078) étoiles sur 5 Way too expensive, yet incomplete 4 janvier 2012
Par J. Katz - Publié sur Amazon.com
Format: Broché
$100 for a book about implementing elliptic-curve cryptography (ECC) that doesn't discuss point counting algorithms!? The book is a hodgepodge: the first chapter talks about general crypto algorithms, the second discusses finite fields, and only the third chapter is really about elliptic-curve implementation. (The 4th chapter is about crypto protocols in general, not really specific to ECC; the last chapter is about general implementation issues but, again, not about ECC specifically.) The book would be reasonable at 1/3 the price. At this price, do yourself a favor and buy a different book.
3 internautes sur 4 ont trouvé ce commentaire utile 
HASH(0x98531654) étoiles sur 5 Good idea badly excuted!! 22 septembre 2011
Par N. Jaber - Publié sur Amazon.com
Format: Relié
The good:
1) touches on thing other books seems to ignore.
2) will not overwhelm you with the math

The bad/not so good:
1) the authors writing style is awful:
a) they don't care about the "logical" line of thought. they lead the reader somewhere then suddenly abandoned to wander what just happened and why.
b) they don't know when to start a new line. by cramming too much information in a paragraph sometimes combined with math forces the reader to go back and forth multiple times to make sure you didn't miss anything.

2) chapters don't stand on their own.
3) lack of figure to help convey the message in certain locations.
3 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x98531870) étoiles sur 5 A very nice introduction to the field 6 août 2004
Par Jim - Publié sur Amazon.com
Format: Relié
This book is a must have if you are interested in implementing elliptic curve cryptography. It does not have any of the juicy ellpitic curve mathematics, but that is okay as this book is directed towards engineers and others who want to learn about how elliptic curve cryptosystems are being deployed.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?