Algebraic Curves in Cryptography


Book Description

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sh







Elliptic Curves


Book Description

Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. With additional exercises, this edition offers more comprehensive coverage of the fundamental theory, techniques, and application




Algebraic Curves and Finite Fields


Book Description

Algebra and number theory have always been counted among the most beautiful and fundamental mathematical areas with deep proofs and elegant results. However, for a long time they were not considered of any substantial importance for real-life applications. This has dramatically changed with the appearance of new topics such as modern cryptography, coding theory, and wireless communication. Nowadays we find applications of algebra and number theory frequently in our daily life. We mention security and error detection for internet banking, check digit systems and the bar code, GPS and radar systems, pricing options at a stock market, and noise suppression on mobile phones as most common examples. This book collects the results of the workshops "Applications of algebraic curves" and "Applications of finite fields" of the RICAM Special Semester 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world. They address old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.




Algebraic Geometry in Coding Theory and Cryptography


Book Description

This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields Includes applications to coding theory and cryptography Covers the latest advances in algebraic-geometry codes Features applications to cryptography not treated in other books




Algebraic Curves and Cryptography


Book Description

Focusing on the theme of point counting and explicit arithmetic on the Jacobians of curves over finite fields the topics covered in this volume include Schoof's $\ell$-adic point counting algorithm, the $p$-adic algorithms of Kedlaya and Denef-Vercauteren, explicit arithmetic on the Jacobians of $C_{ab}$ curves and zeta functions.




Algebraic Curves and Their Applications


Book Description

This volume contains a collection of papers on algebraic curves and their applications. While algebraic curves traditionally have provided a path toward modern algebraic geometry, they also provide many applications in number theory, computer security and cryptography, coding theory, differential equations, and more. Papers cover topics such as the rational torsion points of elliptic curves, arithmetic statistics in the moduli space of curves, combinatorial descriptions of semistable hyperelliptic curves over local fields, heights on weighted projective spaces, automorphism groups of curves, hyperelliptic curves, dessins d'enfants, applications to Painlevé equations, descent on real algebraic varieties, quadratic residue codes based on hyperelliptic curves, and Abelian varieties and cryptography. This book will be a valuable resource for people interested in algebraic curves and their connections to other branches of mathematics.




Elliptic Curves in Cryptography


Book Description

This book summarizes knowledge built up within Hewlett-Packard over a number of years, and explains the mathematics behind practical implementations of elliptic curve systems. Due to the advanced nature of the mathematics there is a high barrier to entry for individuals and companies to this technology. Hence this book will be invaluable not only to mathematicians wanting to see how pure mathematics can be applied but also to engineers and computer scientists wishing (or needing) to actually implement such systems.




Algebraic Curves over a Finite Field


Book Description

This book provides an accessible and self-contained introduction to the theory of algebraic curves over a finite field, a subject that has been of fundamental importance to mathematics for many years and that has essential applications in areas such as finite geometry, number theory, error-correcting codes, and cryptology. Unlike other books, this one emphasizes the algebraic geometry rather than the function field approach to algebraic curves. The authors begin by developing the general theory of curves over any field, highlighting peculiarities occurring for positive characteristic and requiring of the reader only basic knowledge of algebra and geometry. The special properties that a curve over a finite field can have are then discussed. The geometrical theory of linear series is used to find estimates for the number of rational points on a curve, following the theory of Stöhr and Voloch. The approach of Hasse and Weil via zeta functions is explained, and then attention turns to more advanced results: a state-of-the-art introduction to maximal curves over finite fields is provided; a comprehensive account is given of the automorphism group of a curve; and some applications to coding theory and finite geometry are described. The book includes many examples and exercises. It is an indispensable resource for researchers and the ideal textbook for graduate students.




Mathematics of Public Key Cryptography


Book Description

This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography.