Advances in elliptic curve cryptography:
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Cambridge [u.a.]
Cambridge University Press
2005
|
Schriftenreihe: | London Mathematical Society: London Mathematical Society lecture note series
317 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XVI, 281 S. |
ISBN: | 052160415X 9780521604154 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV019696178 | ||
003 | DE-604 | ||
005 | 20240513 | ||
007 | t | ||
008 | 050214s2005 xxu |||| 00||| eng d | ||
010 | |a 2004054519 | ||
020 | |a 052160415X |c alk. paper |9 0-521-60415-X | ||
020 | |a 9780521604154 |c pbk. |9 978-0-521-60415-4 | ||
035 | |a (OCoLC)55878010 | ||
035 | |a (DE-599)BVBBV019696178 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-91G |a DE-355 |a DE-19 |a DE-83 |a DE-11 |a DE-188 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a SI 320 |0 (DE-625)143123: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 94A60 |2 msc | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in elliptic curve cryptography |c edited by Ian F. Blake ... |
264 | 1 | |a Cambridge [u.a.] |b Cambridge University Press |c 2005 | |
300 | |a XVI, 281 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a London Mathematical Society: London Mathematical Society lecture note series |v 317 | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Cryptographie à clé publique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a aComputer security | |
650 | 4 | |a aPublic key cryptography | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Public-Key-Kryptosystem |0 (DE-588)4209133-0 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Blake, Ian F. |e Sonstige |4 oth | |
830 | 0 | |a London Mathematical Society: London Mathematical Society lecture note series |v 317 |w (DE-604)BV000000130 |9 317 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013023851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805066815462703104 |
---|---|
adam_text |
LONDON MATHEMATICAL SOCIETY LECTURE NOTE SERIES. 317 ADVANCES IN
ELLIPTIC CURVE CRYPTOGRAPHY EDITED BY IAN F. BLAKE UNIVERSITY OF TORONTO
GADIEL SEROUSSI HEWLETT-PACKARD LABORATORIES NIGEL P. SMART UNIVERSITY
OF BRISTOL CAMBRIDGE UNIVERSITY PRESS CONTENTS PREFACE ABBREVIATIONS AND
STANDARD NOTATION AUTHORS PART 1. PROTOCOLS CHAPTER I. EUIPTIC CURVE
BASED PROTOCOLS N.R SMART 1.1. INTRODUCTION 1.2. ECDSA 1.3. ECDH/ECMQV
1.4. ECIES 1.5. OTHER CONSIDERATIONS CHAPTER II. ON THE PROVABLE
SECURITY OF ECDSA D. BROWN II. 1. INTRODUCTION 11.2. DEFINITIONS AND
CONDITIONS 11.3. PROVABLE SECURITY RESULTS 11.4. PROOF SKETCHES 11.5.
FURTHER DISCUSSION CHAPTER III. PROOFS OF SECURITY FOR ECIES A.W.DENT
III. 1. DEFINITIONS AND PRELIMINARIES 111.2. SECURITY PROOFS FOR ECIES
111.3. OTHER ATTACKS AGAINST ECIES 111.4. ECIES-KEM V VI CONTENTS PART
2. IMPLEMENTATION TECHNIQUES CHAPTER IV. SIDE-CHANNEL ANALYSIS E. OSWALD
69 IV. 1. CRYPTOGRAPHIC HARDWARE 70 IV.2. ACTIVE ATTACKS 71 IV.3.
PASSIVE ATTACKS 72 IV.4. SIMPLE SCA ATTACKS ON POINT MULTIPLICATIONS 77
IV.5. DIFFERENTIAL SCA ATTACKS ON POINT MULTIPLICATIONS 84 CHAPTER V.
DEFENCES AGAINST SIDE-CHANNEL ANALYSIS M. JOYE 87 V.L. INTRODUCTION 87
V.2. INDISTINGUISHABLE POINT ADDITION FORMULAE 88 V.3. REGULAER POINT
MULTIPLICATION ALGORITHMS 93 V.4. BASE-POINT RANDOMIZATION TECHNIQUES 97
V.5. MULTIPLIER RANDOMIZATION TECHNIQUES 98 V.6. PREVENTING SIDE-CHANNEL
ANALYSIS 100 PART 3. MATHEMATICAL FOUNDATIONS CHAPTER VI. ADVANCES IN
POINT COUNTING F. VERCAUTEREN 103 VI.L. P-ADIC FIELDS AND EXTENSIONS 104
VI.2. SATOH'S ALGORITHM 105 VI.3. ARITHMETIC GEOMETRIE MEAN 115 VI.4.
GENERALIZED NEWTON ITERATION 121 VI.5. NORM COMPUTATION 128 VI.6.
CONCLUDING REMARKS 132 CHAPTER VII. HYPERELLIPTIC CURVES AND THE HCDLP
P. GAUDRY 133 VII. 1. GENERALITIES ON HYPERELLIPTIC CURVES 133 VII.2.
ALGORITHMS FOR COMPUTING THE GROUP LAW 136 VII.3. CLASSICAL ALGORITHMS
FOR HCDLP 140 VII.4. SMOOTH DIVISORS 142 VII.5. INDEX-CALCULUS ALGORITHM
FOR HYPERELLIPTIC CURVES 144 VII.6. COMPLEXITY ANALYSIS 146 VII.7.
PRACTICAL CONSIDERATIONS 149 CHAPTER VIII. WEIL DESCENT ATTACKS F.HESS
151 VIII. 1. INTRODUCTION - THE WEIL DESCENT METHODOLOGY 151 VIII.2. THE
GHS ATTACK 153 VIII.3. EXTENDING THE GHS ATTACK USING ISOGENIES 166
CONTENTS VII VIII.4. SUMMARY OF PRACTICAL IMPLICATIONS 173 VIII.5.
FURTHER TOPICS 175 PART 4. PAIRING BASED TECHNIQUES CHAPTER IX. PAIRINGS
S. GALBRAITH 183 IX.L. BILINEAR PAIRINGS 183 IX.2. DIVISORS AND WEIL
RECIPROCITY 184 IX.3. DEFINITION OF THE TAETE PAIRING 185 IX.4.
PROPERTIES OF THE TAETE PAIRING 187 IX.5. THE TAETE PAIRING OVER FINITE
FIELDS 189 IX.6. THE WEIL PAIRING 191 IX.7. NON-DEGENERACY,
SELF-PAIRINGS AND DISTORTION MAPS 192 IX.8. COMPUTING THE TAETE PAIRING
USING MILLER'S ALGORITHM 196 IX.9. THE MOV/FREY-RUECK ATTACK ON THE ECDLP
197 IX. 10. SUPERSINGULAR ELLIPTIC CURVES 198 IX.L 1. APPLICATIONS AND
COMPUTATIONAL PROBLEMS FROM PAIRINGS 201 IX. 12. PARAMETER SIZES AND
IMPLEMENTATION CONSIDERATIONS 203 IX. 13. SUITABLE SUPERSINGULAR
ELLIPTIC CURVES 204 IX. 14. EFFICIENT COMPUTATION OF THE TAETE PAIRING
205 IX.15. USING ORDINARY CURVES 208 APPENDIX: PROOF OF WEIL RECIPROCITY
212 CHAPTER X. CRYPTOGRAPHY FROM PAIRINGS K.G. PATERSON 215 X.L.
INTRODUCTION 215 X.2. KEY DISTRIBUTION SCHEMES 218 X.3. IDENTITY-BASED
ENCRYPTION 221 X.4. SIGNATURE SCHEMES 228 X.5. HIERARCHICAL
IDENTITY-BASED CRYPTOGRAPHY AND RELATED TOPICS 235 X.6. MORE KEY
AGREEMENT PROTOCOLS 240 X.7. APPLICATIONS AND INFRASTRUCTURES 242 X.8.
CONCLUDING REMARKS 250 BIBLIOGRAPHY 253 SUMMARY OF MAJOR LNCS
PROCEEDINGS 271 AUTHOR INDEX 273 SUBJECT INDEX 277 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV019696178 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SI 320 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)55878010 (DE-599)BVBBV019696178 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV019696178</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240513</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050214s2005 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2004054519</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">052160415X</subfield><subfield code="c">alk. paper</subfield><subfield code="9">0-521-60415-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521604154</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-0-521-60415-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55878010</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019696178</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SI 320</subfield><subfield code="0">(DE-625)143123:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in elliptic curve cryptography</subfield><subfield code="c">edited by Ian F. Blake ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 281 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">London Mathematical Society: London Mathematical Society lecture note series</subfield><subfield code="v">317</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie à clé publique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aComputer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">aPublic key cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Blake, Ian F.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">London Mathematical Society: London Mathematical Society lecture note series</subfield><subfield code="v">317</subfield><subfield code="w">(DE-604)BV000000130</subfield><subfield code="9">317</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013023851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
id | DE-604.BV019696178 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T03:24:20Z |
institution | BVB |
isbn | 052160415X 9780521604154 |
language | English |
lccn | 2004054519 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013023851 |
oclc_num | 55878010 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-83 DE-11 DE-188 DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-83 DE-11 DE-188 DE-706 |
physical | XVI, 281 S. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Cambridge University Press |
record_format | marc |
series | London Mathematical Society: London Mathematical Society lecture note series |
series2 | London Mathematical Society: London Mathematical Society lecture note series |
spelling | Advances in elliptic curve cryptography edited by Ian F. Blake ... Cambridge [u.a.] Cambridge University Press 2005 XVI, 281 S. txt rdacontent n rdamedia nc rdacarrier London Mathematical Society: London Mathematical Society lecture note series 317 Includes bibliographical references and index Cryptographie à clé publique Sécurité informatique aComputer security aPublic key cryptography Computersicherheit (DE-588)4274324-2 gnd rswk-swf Public-Key-Kryptosystem (DE-588)4209133-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Public-Key-Kryptosystem (DE-588)4209133-0 s DE-604 Blake, Ian F. Sonstige oth London Mathematical Society: London Mathematical Society lecture note series 317 (DE-604)BV000000130 317 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013023851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in elliptic curve cryptography London Mathematical Society: London Mathematical Society lecture note series Cryptographie à clé publique Sécurité informatique aComputer security aPublic key cryptography Computersicherheit (DE-588)4274324-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4209133-0 |
title | Advances in elliptic curve cryptography |
title_auth | Advances in elliptic curve cryptography |
title_exact_search | Advances in elliptic curve cryptography |
title_full | Advances in elliptic curve cryptography edited by Ian F. Blake ... |
title_fullStr | Advances in elliptic curve cryptography edited by Ian F. Blake ... |
title_full_unstemmed | Advances in elliptic curve cryptography edited by Ian F. Blake ... |
title_short | Advances in elliptic curve cryptography |
title_sort | advances in elliptic curve cryptography |
topic | Cryptographie à clé publique Sécurité informatique aComputer security aPublic key cryptography Computersicherheit (DE-588)4274324-2 gnd Public-Key-Kryptosystem (DE-588)4209133-0 gnd |
topic_facet | Cryptographie à clé publique Sécurité informatique aComputer security aPublic key cryptography Computersicherheit Public-Key-Kryptosystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013023851&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000130 |
work_keys_str_mv | AT blakeianf advancesinellipticcurvecryptography |