Skip to content
Paperback Implementing Elliptic Curve Cryptography Book

ISBN: 1884777694

ISBN13: 9781884777691

Implementing Elliptic Curve Cryptography

Implementing Elliptic Curve Cryptography proceeds step-by- step to explain basic number theory, polynomial mathematics, normal basis mathematics and elliptic curve mathematics. With these in place,... This description may be from another edition of this product.

Recommended

Format: Paperback

Condition: Good

$9.99
Save $37.96!
List Price $47.95
Almost Gone, Only 1 Left!

Customer Reviews

4 ratings

Implementing Elliptic Curve

There is a very good description on various codes on BIG INTEGER arithmatic. It is very helpful for the developers . The Book also gives a very good description of the various types of algorithms used in ECC.

Good introduction, but

First of all the book is a great introduction, but sometimes the lack of clear definitions make you feel a little bit lost,it's great for people without math background,so if you want to get serious in Cryp. after you read this i advice you to read "A course in Number Theory and Cryprography" the real thing !

elliptic curve source cord

ellipic curve cryptosystem algorith

A Worthy Effort

Elliptic Curve is the preeminent public key solution for cryptographic problems that are highly constrained in space or time.This is the only well rounded book I have seen on EC and for such a rarefied topic the author crafts a highly readable account. For that reason I give it 5 stars. Frankly, my jaw dropped when I first spotted this book. I would reccommend this, for the most part, to security architects & developers; those with backgrounds in electrical engineering or applied math will benefit the most. I must also highly commend the author's emphasis on the pertinant IEEE standard(s).Now... having said all those nice things, I can let loose with a few paint balls. The book inks some rather gargantuan performance claims that I expect will lead folks to some unsustainable conclusions about what is possible in the real world.The performance of EC and/vs RSA is one area about which I happen to know more than your average circus bear. I have designed and built time constrained systems based on both EC and RSA...and I have scrutinized every aspect of the performance of the underlying cryptographic toolkits down to the milli-second. Bottom line: The raw performance of EC is no substitute for the high craft, skill and insight you apply to the design of your protocols and your systems.Even after this book, it is possible to, unwittingly, design an EC based system that performs worse than its RSA twin.Cheers, Robert Walker
Copyright © 2023 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured