Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Subjects(RVK)
Access
  • 1
    Book
    Book
    Cambridge [u.a.] :Cambridge University Press,
    Show associated volumes
    UID:
    almafu_BV019696178
    Format: XVI, 281 S.
    ISBN: 0-521-60415-X , 978-0-521-60415-4
    Series Statement: London Mathematical Society: London Mathematical Society lecture note series 317
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Computersicherheit ; Public-Key-Kryptosystem
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    gbv_883350386
    Format: 1 Online-Ressource (xvi, 281 pages) , digital, PDF file(s).
    ISBN: 9780511546570
    Series Statement: London Mathematical Society lecture note series 317
    Content: Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
    Content: Protocols -- Elliptic curve based protocols / N.P. Smart -- On the provable security of ECDSA / D. Brown -- Proofs of security for ECIES / A.W. Dent -- Implementation Techniques -- Side-channel analysis / E. Oswald -- Defenses against side-channel analysis / M. Joye -- Mathematical Foundations -- Advances in point counting / F. Vercauteren -- Hyperelliptic curves and the HCDLP / P. Guadry -- Weil descent attacks / F. Hess -- Pairing Based Techniques -- Pairings / S. Galbraith -- Cryptography from pairings / K.G. Paterson
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015)
    Additional Edition: ISBN 9780521604154
    Additional Edition: ISBN 9780521604154
    Additional Edition: ISBN 9780521604154
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780521604154
    Additional Edition: Erscheint auch als Advances in elliptic curve cryptography Cambridge [u.a.] : Cambridge Univ. Press, 2005 ISBN 9780521604154
    Additional Edition: ISBN 052160415X
    Language: English
    Subjects: Mathematics
    RVK:
    RVK:
    Keywords: Elliptische Kurve ; Public-Key-Kryptosystem ; Computersicherheit ; Elliptische Kurve ; Public-Key-Kryptosystem ; Computersicherheit
    Author information: Smart, Nigel P. 1967-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9948233637202882
    Format: 1 online resource (xvi, 281 pages) : , digital, PDF file(s).
    ISBN: 9780511546570 (ebook)
    Series Statement: London Mathematical Society lecture note series ; 317
    Content: Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015). , Protocols -- Elliptic curve based protocols / N.P. Smart -- On the provable security of ECDSA / D. Brown -- Proofs of security for ECIES / A.W. Dent -- Implementation Techniques -- Side-channel analysis / E. Oswald -- Defenses against side-channel analysis / M. Joye -- Mathematical Foundations -- Advances in point counting / F. Vercauteren -- Hyperelliptic curves and the HCDLP / P. Guadry -- Weil descent attacks / F. Hess -- Pairing Based Techniques -- Pairings / S. Galbraith -- Cryptography from pairings / K.G. Paterson.
    Additional Edition: Print version: ISBN 9780521604154
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cambridge ; : Cambridge University Press,
    UID:
    almafu_9960117070802883
    Format: 1 online resource (xvi, 281 pages) : , digital, PDF file(s).
    ISBN: 1-107-12761-0 , 1-280-41492-8 , 9786610414925 , 0-511-17079-3 , 0-511-11161-4 , 0-511-19630-X , 0-511-29795-5 , 0-511-54657-2 , 0-511-11128-2
    Series Statement: London Mathematical Society lecture note series ; 317
    Content: Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.
    Note: Title from publisher's bibliographic system (viewed on 05 Oct 2015). , Protocols -- Elliptic curve based protocols / N.P. Smart -- On the provable security of ECDSA / D. Brown -- Proofs of security for ECIES / A.W. Dent -- Implementation Techniques -- Side-channel analysis / E. Oswald -- Defenses against side-channel analysis / M. Joye -- Mathematical Foundations -- Advances in point counting / F. Vercauteren -- Hyperelliptic curves and the HCDLP / P. Guadry -- Weil descent attacks / F. Hess -- Pairing Based Techniques -- Pairings / S. Galbraith -- Cryptography from pairings / K.G. Paterson. , English
    Additional Edition: ISBN 0-521-60415-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780520304154?
Did you mean 9780521602754?
Did you mean 9780521603157?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages