Modern Cryptography and Elliptic Curves : A Beginner's Guide

Modern Cryptography and Elliptic Curves : A Beginner's Guide

by Thomas R. Shemanske
English | 2017 | ISBN: 1470435829 | 265 Pages | PDF | 3.16 MB

This book offers the beginning undergraduate student some of the vista of modern mathematics by developing and presenting the tools needed to gain an understanding of the arithmetic of elliptic curves over finite fields and their applications to modern cryptography. This gradual introduction also makes a significant effort to teach students how to produce or discover a proof by presenting mathematics as an exploration, and at the same time, it provides the necessary mathematical underpinnings to investigate the practical and implementation side of elliptic curve cryptography (ECC). Elements of abstract algebra, number theory, and affine and projective geometry are introduced and developed, and their interplay is exploited. Algebra and geometry combine to characterize congruent numbers via rational points on the unit circle, and group law for the set of points on an elliptic curve arises from geometric intuition provided by Bezout's theorem as well as the construction of projective space. The structure of the unit group of the integers modulo a prime explains RSA encryption, Pollard's method of factorization, Diffie-Hellman key exchange, and ElGamal encryption, while the group of points of an elliptic curve over a finite field motivates Lenstra's elliptic curve factorization method and ECC. The only real prerequisite for this book is a course on one-variable calculus; other necessary mathematical topics are introduced on-the-fly. Numerous exercises further guide the exploration.

Download:

http://longfiles.com/5nk3jtdtgbt4/Modern_Cryptography_and_Elliptic_Curves_A_Beginner's_Guide.pdf.html

[Fast Download] Modern Cryptography and Elliptic Curves : A Beginner's Guide


Ebooks related to "Modern Cryptography and Elliptic Curves : A Beginner's Guide" :
Advances in Cryptology -- CRYPTO 2015, Part II
Technology and Practice of Passwords: 9th International Conference, PASSWORDS 2015, Cambridge, UK, D
Udemy: Cryptography and Encryption - Made Easy - 2018
Advances in Cryptology -- CRYPTO 2015, Part I
Hacking Vim 7.2
The Story of Decipherment
Modern Cryptanalysis: Techniques for Advanced Code Breaking
Hacking Vim 7.2
Mining Intelligence and Knowledge Exploration: 4th InternationalConference,MIKE 2016(Lecture Notes i
Trends in Social Network Analysis: Information Propagation, User Behavior Modeling, Forecasting
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.