Elliptic Curve Cryptography for Developers - cover

Elliptic Curve Cryptography for Developers

Michael Rosing

  • 15 november 2024
  • 9781633437944
Wil ik lezen
  • Wil ik lezen
  • Aan het lezen
  • Gelezen
  • Verwijderen

Samenvatting:

Elliptic Curve Cryptography (ECC) is the powerful security protocol used for everything from credit card transitions to the blockchain. This reader-friendly book guides you step-by-step until you're ready to write embedded systems code with advanced mathematical algorithms.



From the Back Cover:

Elliptic Curve Cryptography for Developers teaches you how to turn the advanced math of ECCs into code for your cryptographic applications. Author Mike Rosing expertly helps you to rise to the ECC challenge, dispensing with the deep math and focusing on the minimum theory you need to get the job done.

Each chapter covers new mathematical concepts, all clearly illustrated with graphics, example code, and exercises to build your understanding of the complex ideas. Finally, you'll put all your ideas into action by building two hands-on blockchain software projects. By the time you're done reading, you'll know the basics and be ready to take the step to more advanced capabilities.

About the reader:

For readers with some knowledge of mathematics, such as from high school calculus or an undergraduate engineering degree.



Learn how to implement smaller, more secure public key protocols with this accessible guide to Elliptic Curve Cryptography.

Elliptic Curve Cryptography for Developers introduces a powerful alternative to the prime number-based RSA encryption standard based on the mathematics of elliptic curves. This book empowers anyone who knows basic calculus to implement state-of-the-art cryptographic protocols that are smaller and more secure than RSA-based systems. It gradually introduces the concepts and subroutines you'll need to master with diagrams, flow charts, and accessible language.

Elliptic Curve Cryptography for Developers includes:

  • Clear, well-illustrated introductions to key ECC concepts
  • Implementing efficient digital signature algorithms
  • State of the art zero knowledge proofs
  • Blockchain applications with ECC-backed security

We gebruiken cookies om er zeker van te zijn dat je onze website zo goed mogelijk beleeft. Als je deze website blijft gebruiken gaan we ervan uit dat je dat goed vindt. Ok