This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.
As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes.
Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes.
As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes.
Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"9311","item_name":"Everyday Cryptography: Fundamental Principles and Applications","item_brand":"Keith Martin","item_category":"Computing & Internet","list":"Product Page","price":"40.60","variant":"","quantity":1},{"item_id":"9082","item_name":"Handbook of Applied Cryptography - Discrete Mathematics and Its Applications","item_brand":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone","item_category":"Computing & Internet","list":"Product Page","price":"88.39","variant":"","quantity":1},{"item_id":"9809","item_name":"Cryptography For Dummies","item_brand":"Chey Cobb","item_category":"Computing & Internet","list":"Product Page","price":"7.06","variant":"","quantity":1},{"item_id":"9973","item_name":"Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto","item_brand":"Roger A. Grimes","item_category":"Computing & Internet","list":"Product Page","price":"13.96","variant":"","quantity":1},{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1},{"item_id":"10959","item_name":"Cryptography InfoSec Pro Guide","item_brand":"Sean-Philip Oriyano","item_category":"Computing & Internet","list":"Product Page","price":"9.29","variant":"","quantity":1},{"item_id":"13018","item_name":"Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings - Security and Cryptology 6061","item_brand":"Nicolas Sendrier","item_category":"Computing & Internet","list":"Product Page","price":"31.49","variant":"","quantity":1},{"item_id":"15820","item_name":"Practical Cryptography","item_brand":"Jamie White","item_category":"Computing & Internet","list":"Product Page","price":"79.45","variant":"","quantity":1}]