Cryptography Reference
In-Depth Information
Exercise 2. Write a program that adds two points on an elliptic curve in the standard Galois field of size p (over
p ), where p is a prime number.
Exercise 3. Extend your work from the previous exercise to include calculating large multiples (tens of digits)
of points.
Exercise 4. Write a program that encodes an ASCII text message as a point on an elliptic curve.
References
[1] David Bellot. Svg-cards 2.0.1, September 2006; http://david.bellot.free.fr/svg-cards/ .
[2] Henri Cohen. A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics
(Springer-Verlag, New York, 2000).
[3] John Daemen and Vincent Rijmen. The Design of Rijndael: AES - The Advanced Encryption Standard, In-
formation Security and Cryptography (Springer, New York, March 2002).
[4] Institute of Electrical and Electronics Engineers, Inc. and The Open Group. The single unix specification
version 3, 2004; http://www.unix.org/single_unix_specification/ .
[5] Neal Koblitz. Algebraic Aspects of Cryptography, 1st ed., volume 3 of Algorithms and Computation in
Mathematics (Springer, New York, June 2004).
[6] National Institute of Standards and Technology. Recommended elliptic curves for federal government use,
July 1999; http://csrc.nist.gov/CryptoToolkit/dss/ecdsa/NISTReCur.pdf .
[7] National Institute of Standards and Technology. Secure Hash Standard (Federal Information Processing
Standards Publication 180-1, April 1995).
[8] Ronald L. Rivest. The MD5 Message-Digest Algorithm (Network Working Group, Request for Comments:
1321, April 1992).
[9]DanielShanks.Fivenumber-theoreticalgorithms. Congressus Numerantium 7 (UtilitasMathematica, 1973).
[10] Joseph H. Silverman. The Arithmetic of Elliptic Curves, 1st ed., GTM (Springer, New York, December
1985).
[11] Joseph H. Silverman. Rational Points on Elliptic Curves , 2nd ed., UTM (Springer, New York, November
1994).
[12] Kenneth L. Thompson and Dennis M. Ritchie. Unix Programmer's Manual, 1st ed. (Bell Telephone
Laboratories Inc., Murray Hill, NJ, November 1971); http://cm.bell-labs.com/cm/cs/who/dmr/
1stEdman.html .
[13] Lawrence C. Washington. Elliptic Curves: Number Theory and Cryptography (Chapman & Hall/CRC,
Toronto, Canada, May 2003).
[14] Eric W. Weisstein. Elliptic Curve. From MathWorld - A Wolfram Web Resource.; ht-
tp://mathworld.wolfram.com/EllipticCurve.html .
Notes
1 Another optional section. But hopefully a fun one.
 
Search WWH ::




Custom Search