
| Implementing Elliptic Curve Cryptography Michael Rosing 1998 | 330 pages ISBN: 1884777694 |
|||
| Out of print | $47.95 | Softbound print book | |
RESOURCES
DESCRIPTION
Implementing Elliptic Curve Cryptography proceeds step-by-step to explain basic number theory, polynomial mathematics, normal basis mathematics and elliptic curve mathematics. With these in place, applications to cryptography are introduced. The book is filled with C code to illustrate how mathematics is put into a computer, and the last several chapters show how to implement several cryptographic protocols. The most important is a description of P1363, an IEEE draft standard for public key cryptography.
The main purpose of Implementing Elliptic Curve Cryptography is to help "crypto engineers" implement functioning, state-of-the-art cryptographic algorithms in the minimum time. With detailed descriptions of the mathematics, the reader can expand on the code given in the book and develop optimal hardware or software for their own applications.
Implementing Elliptic Curve Cryptography assumes the reader has at least a high school background in algebra, but it explains, in stepwise fashion, what has been considered to be a topic only for graduate-level students.
WHAT THE EXPERTS SAY ABOUT THIS BOOK...
"The book provides all the theory and working programs needed to create real applications based on the latest IEEE P1363 standard."
--Reviewed in Cryptologia
ABOUT THE AUTHOR...
With a background that includes nuclear engineering, hardware computer design, and telephony, Michael Rosing has seen how cryptography plays an important role in military and commercial applications. At present he is employed building DSP hardware for brain research at the University of Wisconsin in Madison.
Sample Chapters
The formulas and images in Elliptic Curve Cryptography make conversion to HTML impractical, so we've converted Chapter 5 to PDF format for you to sample.
You can read PDF files with Adobe's Acrobat Reader version 3 or better, available at
http://www.adobe.com/prodindex/acrobat/readstep.html.
WHAT REVIEWERS ARE SAYING
"You do not require an advanced degree in math to read or use this
book...If you want to explore the mathematics of elliptic-curve
cryptography or if you must implement it in a communication system,
consider this book a good place to start."
--ECN Magazine
"This book provides excellent coverage of its topic. All the source code is
available form a web site (despite the fact that you can use it to produce very
strong, munitions grade, cryptography). The author covers enough theory to help
you understand the mechanism and provides copious explanations of the actual
cryptographic tools. He also has his feet firmly planted on the ground as relates
to the difference between hard-to-break cryptography and security."
--C Vu, the Journal of the ACCU
Source code
The source code from Implementing Elliptic Curve Cryptography is contained in single zip archive, size 282 kilobytes. Free unzip programs for most platforms are available at http://www.download.com.
Download the source code.
