Elliptic curves in cryptography / (Record no. 90725)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01616nam a22002297a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 230417b1999 |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780521653749 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 BLA-I |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Blake, Ian and others |
245 ## - TITLE STATEMENT | |
Title | Elliptic curves in cryptography / |
Statement of responsibility, etc. | Ian Blake |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | United Kingdom |
Name of publisher, distributor, etc. | Cambridge University Press |
Date of publication, distribution, etc. | 1999 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 204 p. |
365 ## - TRADE PRICE | |
Price type code | GBP |
Price amount | 58.99 |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE | |
Title | London Mathematical Society Lecture Note Series |
Volume/sequential designation | 265 |
500 ## - GENERAL NOTE | |
General note | In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more important in the commercial world the use of elliptic curve-based signatures will become all pervasive. This book summarizes knowledge built up within Hewlett-Packard over a number of years, and explains the mathematics behind practical implementations of elliptic curve systems. Due to the advanced nature of the mathematics there is a high barrier to entry for individuals and companies to this technology. Hence this book will be invaluable not only to mathematicians wanting to see how pure mathematics can be applied but also to engineers and computer scientists wishing (or needing) to actually implement such systems. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Curves, Elliptic--Data processing |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Curves, Elliptic--Data processing |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Seroussi, Gadiel |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Smart, Nigel |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
Withdrawn status |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | 003-007 | BITS Pilani Hyderabad | BITS Pilani Hyderabad | Text & Reference Section (Student cannot borrow these books) | 17/04/2023 | 58.99 | 005.82 BLA-I | 47015 | 13/07/2024 | 17/04/2023 | Course Text Book |