Advances in Elliptic Curve Cryptography 2nd Edition by Ian F Blake – Ebook PDF Instant Download/Delivery: 052160415X, 9780521604154
Full download Advances in Elliptic Curve Cryptography 2nd Edition after payment
Product details:
ISBN 10: 052160415X
ISBN 13: 9780521604154
Author: Ian F Blake
Advances in Elliptic Curve Cryptography 2nd Table of contents:
CHAPTER I Introduction
I.1. Cryptography Based on Groups
I.2. What Types of Group are Used
I.3. What it Means in Practice
CHAPTER II Finite Field Arithmetic
II.1 Fields of Odd Characteristic
II.2. Fields of Characteristic Two
CHAPTER III Arithmetic on an Elliptic Curve
III.1. General Elliptic Curves
III.2. The Group Law
III.3. Elliptic Curves over Finite Fields
III.4. The Division Polynomials
III.5. The Weil Pairing
III.6. Isogenies, Endomorphisms and Torsion
III.7. Various Functions and q-Expansions
III.8. Modular Polynomials and Variants
CHAPTER IV Efficient Implementation of Elliptic Curves
IV.1. Point Addition
IV.2. Point Multiplication
IV.3. Frobenius Expansions
IV.4. Point Compression
CHAPTER V The Elliptic Curve Discrete Logarithm Problem
V.1. The Simplification of Pohlig and Hellman
V.2. The MOV Attack
V.3. The Anomalous Attack
V.4. Baby Step/Giant Step
V.5. Methods based on Random Walks
V.6. Index Calculus Methods
V.7. Summary
CHAPTER VI Determining the Group Order
VI.1. Main Approaches
VI.2. Checking the Group Order
VI.3. The Method of Shanks and Mestre
VI.5. Searching for Good Curves
CHAPTER VII Schoof’s Algorithm and Extensions
VII.1. Schoof’s Algorithm
VII.2. Beyond Schoof
VII.3. More on the Modular Polynomials
VIl.4. Finding Factors of Division Polynomials through Isogenies: Odd Characteristic
VII.5. Finding Factors of Division Polynomials through Isogenies: Characteristic Two
VII.6. Determining the Trace Modulo a Prime Power
VII.7. The Elkies Procedure
VII.8. The Atkin Procedure
VII.9. Combining the Information from Elkies and Atkin Primes
VII.10. Examples
VII.11. Further Discussion
CHAPTER VIII Generating Curves using Complex Multiplication
VIlI.1. The Theory of Complex Multiplication
VIII.2. Generating Curves over Large Prime Fields using CM
VIII.3. Weber Polynomials
VIll.4. Further Discussion
CHAPTER IX Other Applications of Elliptic Curves
IX.1. Factoring Using Elliptic Curves
IX.2. The Pocklington-Lehmer Primality Test
IX.3. The ECPP Algorithm
IX.4. Equivalence between DLP and DHP
CHAPTER X Hyperelliptic Cryptosystems
X.1. Arithmetic of Hyperelliptic Curves
X.2. Generating Suitable Curves
X.3. The Hyperelliptic Discrete Logarithm Problem
APPENDIX A Curve Examples
A.1. Odd Characteristic
A.2. Characteristic Two
People also search for Advances in Elliptic Curve Cryptography 2nd:
advantages of elliptic curve cryptography
what is elliptic curve cryptography
application of elliptic curve cryptography
elliptic curve cryptography book
advances in elliptic curve cryptography pdf
Tags:
Ian F Blake,Elliptic Curve,Cryptography