Advances in Elliptic Curve CryptographySince the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers. |
Cosa dicono le persone - Scrivi una recensione
Nessuna recensione trovata nei soliti posti.
Sommario
IV | 3 |
V | 4 |
VI | 8 |
VII | 12 |
VIII | 18 |
IX | 21 |
X | 23 |
XI | 32 |
XLIV | 144 |
XLV | 146 |
XLVI | 149 |
XLVII | 151 |
L | 153 |
LI | 166 |
LII | 173 |
LIII | 175 |
XII | 33 |
XIII | 36 |
XIV | 41 |
XV | 42 |
XVI | 50 |
XVII | 58 |
XVIII | 61 |
XIX | 69 |
XX | 70 |
XXI | 71 |
XXII | 72 |
XXIII | 77 |
XXIV | 84 |
XXV | 87 |
XXVI | 88 |
XXVII | 92 |
XXVIII | 97 |
XXIX | 98 |
XXX | 100 |
XXXI | 103 |
XXXII | 104 |
XXXIII | 105 |
XXXIV | 115 |
XXXV | 121 |
XXXVI | 128 |
XXXVII | 132 |
XXXVIII | 133 |
XLI | 136 |
XLII | 140 |
XLIII | 142 |
Altre edizioni - Visualizza tutto
Advances in Elliptic Curve Cryptography Ian F. Blake,Gadiel Seroussi,Nigel P. Smart Anteprima limitata - 2005 |
Parole e frasi comuni
addition algorithm analysis apply assume attacker bits Boneh break called challenge Chapter characteristic choose chosen ciphertext complexity compute consider construction cryptographic decryption defined definition denote derivation divides divisor ECDSA ECIES efficient element elliptic curve encryption entity equal equation example exists extension factor field finite field follows forger Frobenius function genus give given hash function Hence identity identity-based implementation input integer isogeny Lemma lift means methods modulo multiplication Note obtain operations oracle OUTPUT pairing parameters particular polynomial possible prime private key probability problem proof properties protocol public key queries random reduced requires result Return root runs satisfies scheme secret selective shows side-channel signature signature scheme simple solve standard step subgroup symmetric takes techniques Theorem trace
Brani popolari
Pagina 267 - 95, pages 171-183, 1995. [2] P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. In Proceedings of 19th International Advances in Cryptology Conference - CRYPTO '99, pages 388-397, 1999. [3] JJ. Quisquater and D. Samyde. Electromagnetic analysis (ema): Measures and counter-measures for smart cards.
Pagina 267 - A. SCHONHAGE AND V. STRASSEN, Schnelle Multiplikation grosser Zahlen, Computing (Arch. Elektron. Rechnen), 7 (1971), pp.