From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the “Elliptic Curve Cryptosystem” which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in “Coding Theory” of Abstract algebra which offers an additional shield for the transmitted message.
"synopsis" may belong to another edition of this title.
Miss. B. A. Kasuni Welihinda has obtained her B. Sc. (Special) Degree in Mathematics from the University of Sri Jayewardenepura, Sri Lanka in 2015. She is currently working at the University and hopes to continue studies in Abstract Algebra.
"About this title" may belong to another edition of this title.
US$ 7.25 shipping within U.S.A.
Destination, rates & speedsUS$ 27.09 shipping from Germany to U.S.A.
Destination, rates & speedsSeller: The Book Garden, Bountiful, UT, U.S.A.
Trade Paperback. Condition: Very Good - Cash. Light reader wear and rubbing to the edges, corners, covers, and pages. The book is in great condition! Stock photos may not look exactly like the book. Seller Inventory # 1110505
Quantity: 1 available
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the 'Elliptic Curve Cryptosystem' which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in 'Coding Theory' of Abstract algebra which offers an additional shield for the transmitted message. 116 pp. Englisch. Seller Inventory # 9783330323278
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the 'Elliptic Curve Cryptosystem' which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in 'Coding Theory' of Abstract algebra which offers an additional shield for the transmitted message. Seller Inventory # 9783330323278
Quantity: 1 available
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 116 pages. 8.66x5.91x0.27 inches. In Stock. Seller Inventory # 3330323272
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Welihinda B. A. KasuniMiss. B. A. Kasuni Welihinda has obtained her B. Sc. (Special) Degree in Mathematics from the University of Sri Jayewardenepura, Sri Lanka in 2015. She is currently working at the University and hopes to continu. Seller Inventory # 151237961
Quantity: Over 20 available
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. Neuware -From the earliest days of history, the requirement for methods of secret communication and protection of information had been present. Cryptography is such an important field of science developed to facilitate secret communication and safeguard information. Cryptography is based on mathematics. Private key cryptography and Public key cryptography are the two main types of cryptography. Public key cryptosystems offer more security and convenience for the users. The main objective of this study is to explore the possibilities of further improvement of Elliptic Curve Cryptography (ECC) by studying the mathematical aspects behind the ¿Elliptic Curve Cryptosystem¿ which is one of the latest of this kind and develop a computer program to generate the cyclic subgroup of a given elliptic curve defined over a finite field Zp, where p is a prime, which is the major requirement to perform ECC and then use the same to illustrate how data security is achieved from this. Moreover this study proposes an improvement for the encryption of a message through utilization of a concept in ¿Coding Theory¿ of Abstract algebra which offers an additional shield for the transmitted message.Books on Demand GmbH, Überseering 33, 22297 Hamburg 116 pp. Englisch. Seller Inventory # 9783330323278
Quantity: 2 available