Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
45
views
0
references
Top references
cited by
71
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,558
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Elliptic Curves in Cryptography
monograph
Author(s):
I. Blake
,
G. Seroussi
,
N. Smart
Publication date
(Online):
August 05 2013
Publisher:
Cambridge University Press
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Author and book information
Book
ISBN (Print):
9780521653749
ISBN (Electronic):
9781107360211
Publication date (Online):
August 05 2013
Publication date (Print):
July 08 1999
DOI:
10.1017/CBO9781107360211
SO-VID:
7fd20661-6f22-4c14-a5e5-00f827396d33
License:
https://www.cambridge.org/core/terms
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. v
Dedication
pp. xi
Preface
pp. 1
Introduction
pp. 11
Finite Field Arithmetic
pp. 29
Arithmetic on an Elliptic Curve
pp. 57
Efficient Implementation of Elliptic Curves
pp. 79
The Elliptic Curve Discrete Logarithm Problem
pp. 101
Determining the Group Order
pp. 109
Schoof's Algorithm and Extensions
pp. 149
Generating Curves using Complex Multiplication
pp. 159
Other Applications of Elliptic Curves
pp. 171
Hyperelliptic Cryptosystems
pp. 191
Bibliography
Similar content
1,558
Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography
Authors:
G. Shushuev
,
N. Kolomeec
,
V. Idrisova
…
Disorder generated by interacting neural networks: application to econophysics and cryptography
Authors:
Wolfgang Kinzel
,
Ido Kanter
Optimal Multisecret Image Sharing Using Lightweight Visual Sign-Cryptography Scheme With Optimal Key Generation for Gray/Color Images
Authors:
Pramod M. Bachiphale
,
Nitish Zulpe
See all similar
Cited by
71
Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks
Authors:
Hsiao-Hwa Chen
,
Xiaojiang Du
,
Yang Xiao
…
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Authors:
Dan Boneh
,
Xavier Boyen
Cryptographic Hash Functions from Expander Graphs
Authors:
Kristin E. Lauter
,
Eyal Goren
,
Denis X. Charles
See all cited by