Ваш любимый книжный интернет-магазин
Перейти на
GlavKniga.SU
Ваш город: Алматы
Ваше местоположение – Алматы
 Да 
От вашего выбора зависит время и стоимость доставки
Корзина: пуста
Авторизация 
  Логин
  
  Пароль
  
Регистрация  Забыли пароль?

Поиск по каталогу 
(строгое соответствие)
ISBN
Фраза в названии или аннотации
Автор
Язык книги
Год издания
с по
Электронный носитель
Тип издания
Вид издания
Отрасли экономики
Отрасли знаний
Сферы деятельности
Надотраслевые технологии
Разделы каталога
худ. литературы

Elliptic Curve Cryptography and Coding Theory.

В наличии
Местонахождение: АлматыСостояние экземпляра: новый
Бумажная
версия
Автор: B. A. Kasuni Welihinda and R. Sanjeewa
ISBN: 9783330323278
Год издания: 2017
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 116
Издательство: LAP LAMBERT Academic Publishing
Цена: 21810 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:
Код товара: 173553
Способы доставки в город Алматы *
комплектация (срок до отгрузки) не более 2 рабочих дней
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK)
Курьерская доставка CDEK из города Москва
Доставка Почтой России из города Москва
      Аннотация: From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the “Elliptic Curve Cryptosystem” which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in “Coding Theory” of Abstract algebra which offers an additional shield for the transmitted message.
Ключевые слова: AES, ECDSA, abelian group, cyclic subgroup, ECDH
Похожие издания
Отрасли знаний: Точные науки -> Математика
Dr. Ankur Nehra
Some Vedic Mathematics Sutras for Elliptic Curve Cryptography. Some Efficient Computing Techniques of Ancient Indian Vedic Mathematics (AIVM) for Elliptic Curve Cryptography (ECC).
1905 г.,  340 стр.,  мягкий переплет
Ancient Indian Vedic Mathematics (AIVM) and Elliptic Curve Cryptography (ECC) are the fundamental branches of Mathematics, this book aims to serve as a reference book for researchers. It can also be read with great interest by students of engineering and UG & PG courses in mathematics and computer science. The book's material has been arranged...

60742 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Dr.Sonali Ridhorkar
Elliptic Curve Cryptography: Implementation Issues. Key Establishment Protocol.
1905 г.,  152 стр.,  мягкий переплет
Recently numerous IBC (Identity Based Cryptography) based authentic key establishment procedure constructed on the top of the usage of ECC (Elliptic Curve Cryptography) suggested and proposed. Such key agreement/establishment protocols that are vulnerable to many active attacks and passive attacks such as temporary information attack...

37125 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
S. Karthika Jayaraman and M. Gobi
The Cloud Data Security using Elliptic Curve Cryptography. .
2018 г.,  108 стр.,  мягкий переплет
Cloud Computing is a boon to IT and related businesses. However security is the crucial and inevitable problem there. Though numerous solutions are there to protect the cloud data, still there is a lack. This is a step ahead to provide the required security for the data in the cloud. This methodology will provide considerable security over the...

29753 тг
Бумажная версия
Отрасли знаний: Точные науки -> Математика
Rishivarman Ramachandran
Elliptic Curve Cryptography-A Network Security. .
2017 г.,  144 стр.,  мягкий переплет
Cryptography is an interdisciplinary field of great practical importance. The subfield of public key cryptography has notable applications, such as digital signatures. The security of a public key cryptosystem depends on the difficulty of certain computational problems in mathematics . A deep understanding of the security and efficient...

33936 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Obaidur Rahaman
Data and Information Security by using Elliptic Curve Cryptography. .
2017 г.,  56 стр.,  мягкий переплет
This top-level data and information security policy is a key component of organisations overall data and information security by using elliptic cryptography and should be considered alongside more detailed data and information security documentation including, system level security policies, security guidance and protocols or procedures. Any of...

21130 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Kshitija B. Chutke,Arif M. Khan and Rajendra Purohit
Comparative Analysis of Elliptic Curve Cryptography. .
2016 г.,  80 стр.,  мягкий переплет
Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. ECC generates keys through the properties of the elliptic curve equation instead of the traditional method of generation as the product of very large prime...

21983 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Gunendra Bikram Bidari and Rabindra Bista
An Algorithmic Approach to Elliptic Curve Cryptography. .
2015 г.,  76 стр.,  мягкий переплет
The current research trend shows three categories of public-key cryptographic systems for the next generation that are efficient and secure. Based on the corresponding mathematical foundation, they are Elliptic Curve Cryptosystem, Integer Factorization Systems and Discrete Logarithm Systems. This thesis emphasizes in using the Cryptosystem based...

21841 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Satarupa Chakraborty,Subarna Laha and Ankana Dhar
GSM Security Using Elliptic Curve Cryptography. .
2013 г.,  164 стр.,  мягкий переплет
Elliptic curve cryptography , a new and most improved cryptographic algorithm of the era. This book concern about how efficiently one can imposed this algorithm in GSM network. Unlike any wired telephone network GSM is most widely used telephone network in which security is always a great issue. So this book contains detailed discussion about RSA...

40503 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Nizamud Din
Signcryption Schemes Based on Hyper Elliptic Curve Cryptography. .
2013 г.,  72 стр.,  мягкий переплет
Signcryption is an emerging cryptographic technique provides the functionality of digital signature and encryption with significant less cost. Hyperelliptic curve cryptography is on its way from pure academic interest to industrial applications due to its efficiency and high security per bit. In this book we present six signcryption schemes based...

28039 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Nivethaa Shree and Latha Parthiban
Elliptic Curve Cryptography for Digital Signature Authentication. Algorithm for Banking Applications.
2013 г.,  60 стр.,  мягкий переплет
Elliptic curve cryptosystem provides greater security for any key size, when compared to integer factorization and discrete logarithm system. Generally in digital signature scheme, signature (r, s) along with message will be sent to the receiver but in this approach, signature alone is sent and message will be recovered from signature. This...

27613 тг
Бумажная версия