Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to Elliptic Curve Cryptography (Springer Professional Computing)

Buy
The study of elliptic curves by algebraists, algebraic geometers and number theorists
dates back to the middle of the nineteenth century. There now exists an extensive literature
that describes the beautiful and elegant properties of these marvelous objects. In
1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies
on properties of elliptic curves. This discovery prompted researchers to investigate
other applications of elliptic curves in cryptography and computational number theory.

Public-key cryptography was conceived in 1976 by Whitfield Diffie andMartin Hellman.
The first practical realization followed in 1977 when Ron Rivest, Adi Shamir and
Len Adleman proposed their now well-known RSA cryptosystem, in which security is
based on the intractability of the integer factorization problem. Elliptic curve cryptography
(ECC) was discovered in 1985 by Neal Koblitz and Victor Miller. Elliptic curve
cryptographic schemes are public-key mechanisms that provide the same functionality
as RSA schemes. However, their security is based on the hardness of a different
problem, namely the elliptic curve discrete logarithm problem (ECDLP). Currently
the best algorithms known to solve the ECDLP have fully exponential running time,
in contrast to the subexponential-time algorithms known for the integer factorization
problem. This means that a desired security level can be attained with significantly
smaller keys in elliptic curve systems than is possible with their RSA counterparts.
For example, it is generally accepted that a 160-bit elliptic curve key provides the same
level of security as a 1024-bit RSA key. The advantages that can be gained from smaller
key sizes include speed and efficient use of power, bandwidth, and storage.
(HTML tags aren't allowed.)

Pro iOS Continuous Integration
Pro iOS Continuous Integration

Pro iOS Continuous Integration teaches you how to utilize the strengths of continuous integration in your everyday work. CI is more popular now than ever, as iOS developers realize how time-consuming building and deploying an application for testing purposes and quality assurance can be. This book shows you how to make your...

Three-Dimensional Model Analysis and Processing (Advanced Topics in Science and Technology in China)
Three-Dimensional Model Analysis and Processing (Advanced Topics in Science and Technology in China)

With the increasing popularization of the Internet, together with the rapid development of 3D scanning technologies and modeling tools, 3D model databases have become more and more common in fields such as biology, chemistry, archaeology and geography. People can distribute their own 3D works over the Internet, search and download 3D...

The Book of Weeds: How to Deal with Plants that Behave Badly
The Book of Weeds: How to Deal with Plants that Behave Badly

Finally, from the author of Compost, fascinating information and advice on handling weeds - how to recognize them, how to control them, and how to exploit them. The first step is to know your enemy, so weeds are identified and the survival strategies of various types is explained to enable you to get rid of them more easily. Finally,...


Roxio Easy Media Creator For Dummies
Roxio Easy Media Creator For Dummies
Your guide to Roxio’s fully integrated digital media toolbox

Capture video, pictures, and sound, edit photos, store data files, and burn CDs or DVDs

What do you want to do with CDs and DVDs? Share home movies? Create a music library? Preserve your business records? Roxio’s Easy Media Creator can do it all and with this...

The Fujifilm X-T1: 111 X-Pert Tips to Get the Most Out of Your Camera
The Fujifilm X-T1: 111 X-Pert Tips to Get the Most Out of Your Camera

In this book, popular Fuji Rumors "X-Pert Corner" columnist Rico Pfirstinger teaches about the little-known capabilities of the X-T1, which he's discovered through months of in-depth research and experimentation with the camera. After a brief overview of the camera's basic functions, Rico cuts to the chase and...

Processing Fruits: Science and Technology, Second Edition
Processing Fruits: Science and Technology, Second Edition
The 2nd edition of this book provides comprehensive and current information on a wide variety of fruits and processing techniques plus advances in scientific research and regulatory requirements.
- Food Science and Technology Abstracts, Vol. 37 (1), 2005

This thorough and well-documented work deserves a place in the library of any
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy