Synopses & Reviews
Since the appearance of the authors' first volume on elliptic curve cryptography in 1999, spectacular progress in some topics, particularly point counting, has occurred. This second volume addresses these advances and brings the reader up-to-date. Prominent contributors to relevant research literature have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography.
Synopsis
This second volume addresses tremendous progress in elliptic curve cryptography since the first volume.
Table of Contents
Part I. Protocols: 1. Elliptic curve base protocols N. P. Smart; 2. On the provable security of ECDSA D. Brown; 3. Proofs of security for ECIES A. W. Dent; Part II. Implementation Techniques: 4. Side channel analysis E. Oswald; 5. Defenses against side-channel analysis M. Joye; Part III. Mathematical Foundations: 6. Advances in point counting F. Vercauteren; 7. Hyperelliptic curves and the HCDLP P. Guadry; 8. Weil descent attacks F. Hess; Part IV. Pairing Based Techniques: 9. Pairings S. Galbraith; 10. Cryptography from pairings K. G. Paterson.