menu
{ "item_title" : "Elliptic Curve Cryptography for Constrained Devices", "item_author" : [" Sandeep S. Kumar "], "item_description" : "This book is a step towards showing the practicability of Public Key Cryptography (PKC) and in particular Elliptic Curve Cryptography (ECC) on low-end constrained devices like sensor nodes and RF-ID chips. The book presents the flexibility that ECC provides in the choice of parameters and algorithms at different hierarchies for efficient implementations on constrained platforms like 8-bit micro-processors. Architectural enhancements with software/hardware co-design including instruction set extensions were investigated for low-level finite field arithmetic used in ECC. Finally, a highly area opti-mized ASIC implementation of an ECC co-processor using standard 0.35um CMOS libraries is presented using an innovative arithmetic and architectural design. The book is intended for students and researchers involved in realizing practical public-key cryptographic implementations on constrained devices used in ambient intelligent (AmI) environments, sensor networks and RF-ID applications.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/63/906/859/3639068599_b.jpg", "price_data" : { "retail_price" : "63.72", "online_price" : "63.72", "our_price" : "63.72", "club_price" : "63.72", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Elliptic Curve Cryptography for Constrained Devices|Sandeep S. Kumar

Elliptic Curve Cryptography for Constrained Devices

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book is a step towards showing the practicability of Public Key Cryptography (PKC) and in particular Elliptic Curve Cryptography (ECC) on low-end constrained devices like sensor nodes and RF-ID chips. The book presents the flexibility that ECC provides in the choice of parameters and algorithms at different hierarchies for efficient implementations on constrained platforms like 8-bit micro-processors. Architectural enhancements with software/hardware co-design including instruction set extensions were investigated for low-level finite field arithmetic used in ECC. Finally, a highly area opti-mized ASIC implementation of an ECC co-processor using standard 0.35um CMOS libraries is presented using an innovative arithmetic and architectural design. The book is intended for students and researchers involved in realizing practical public-key cryptographic implementations on constrained devices used in ambient intelligent (AmI) environments, sensor networks and RF-ID applications.

This item is Non-Returnable

Details

  • ISBN-13: 9783639068597
  • ISBN-10: 3639068599
  • Publisher: VDM Verlag Dr. Mueller E.K.
  • Publish Date: August 2008
  • Dimensions: 9 x 6 x 0.34 inches
  • Shipping Weight: 0.49 pounds
  • Page Count: 160

Related Categories

You May Also Like...

    1

BAM Customer Reviews