Mathematical Analysis of Attacking Methods for Elliptic Curve Systems
Over the last two or three decades, elliptic curves have been playing an increasingly significant role not only in number theory but also in related fi:elds such as cryptography. For instance, in the 1980s, elliptic curves started being used in cryptography and elliptic curve techniques were developed for factorization and primality testing. This techniques leads into the discrete logarithm problem on elliptic curves. The goal of the present book is to improve and invent the theory of elliptic curves assuming only modest backgrounds in elementary number theory and in groups and fi:elds, approximately what would be covered in a strong undergraduate or beginning postgraduate abstract number theory course. The book provides an introduction to both the cryptographic side and the number theoretic side of elliptic curves.
*An electronic version of a printed book that can be read on a computer or handheld device designed specifically for this purpose.
Formats for this Ebook
Required Software | Any PDF Reader, Apple Preview |
---|---|
Supported Devices | Windows PC/PocketPC, Mac OS, Linux OS, Apple iPhone/iPod Touch. |
# of Devices | Unlimited |
Flowing Text / Pages | Pages |
Printable? | Yes |

Book details
- PDF | 128 pages
- Ammar Ali Neamah Alrammahi (Author)
- Noor Publishing (8 Oct. 2016)
- English
- 4
- Science Nature
Review Text
Name: | |
The message text: | |
|
|
- Log in to post comments