Elliptic curves and their applications to cryptography. An introduction.

*(English)*Zbl 1335.11002
Boston, MA: Kluwer Academic Publishers (ISBN 978-0-7923-8589-9/hbk; 978-1-4613-7372-8/pbk; 978-1-4615-5207-9/ebook). xvi, 164 p. (1999).

Publisher’s description: Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.

The book provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention.

The book has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

The book provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention.

The book has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.

##### MSC:

11-01 | Introductory exposition (textbooks, tutorial papers, etc.) pertaining to number theory |

94-01 | Introductory exposition (textbooks, tutorial papers, etc.) pertaining to information and communication theory |

11G09 | Drinfel’d modules; higher-dimensional motives, etc. |

14G50 | Applications to coding theory and cryptography of arithmetic geometry |

94A60 | Cryptography |