[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

[图书][B] Elliptic curve public key cryptosystems

AJ Menezes - 1993 - books.google.com
Elliptic curves have been intensively studied in algebraic geometry and number theory. In
recent years they have been used in devising efficient algorithms for factoring integers and …

[图书][B] Elliptic curves and their applications to cryptography: an introduction

A Enge - 2012 - books.google.com
Since their invention in the late seventies, public key cryptosystems have become an
indispensable asset in establishing private and secure electronic communication, and this …

[图书][B] Contemporary cryptography

R Oppliger - 2011 - books.google.com
Whether you're new to the field or looking to broaden your knowledge of contemporary
cryptography, this newly revised edition of an Artech House classic puts all aspects of this …

[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

Elliptic curves with the Montgomery-form and their cryptographic applications

K Okeya, H Kurumatani, K Sakurai - … Workshop on Practice and Theory in …, 2000 - Springer
We show that the elliptic curve cryptosystems based on the Montgomery-form EM: BY 2= X
3+ AX 2+ X are immune to the timing-attacks by using our technique of randomized …

[图书][B] Modern cryptography: applied mathematics for encryption and information security

W Easttom - 2022 - Springer
Information Security was first published with McGraw Hill, then later revised and published
with Springer. This is the second edition with Springer. What has changed you might …

[PDF][PDF] Elliptic curves and cryptography

A Jurišic, A Menezes - Dr. Dobb's Journal, 1997 - 212.235.189.46
Elliptic curves also figured prominently in the recent proof of Fermat's Last Theorem by
Andrew Wiles. Originally pursued for purely aesthetic reasons, elliptic curves have recently …

On the quaternion-isogeny path problem

D Kohel, K Lauter, C Petit, JP Tignol - LMS Journal of Computation …, 2014 - cambridge.org
Let-power norm. In practice the algorithm is efficient and, subject to heuristics on expected
distributions of primes, runs in expected polynomial time. This solves the underlying problem …

[图书][B] A classical introduction to cryptography: Applications for communications security

S Vaudenay - 2005 - books.google.com
A Classical Introduction to Cryptography: Applications for Communications Security
introduces fundamentals of information and communication security by providing …