ALL IN ONE CCFPSM Certified Cyber Forensics Professional Certification, Exam Guide by Easttom Chuck
Author:Easttom, Chuck
Language: eng
Format: epub
Publisher: McGraw-Hill Education
Published: 2014-08-28T16:00:00+00:00
Figure 7-4 Digital signatures
Elliptic Curve
This algorithm was first described in 1985 by Victor Miller (IBM) and Neal Koblitz (University of Washington). Elliptic curve cryptography (ECC) is based on the fact that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base point is difficult to the point of being impractical to do. There are a number of variations, such as ECC-DH (ECC Diffie-Hellman) and ECC-DSA (ECC Digital Signature Algorithm). The real strength of ECC base systems is that you can get just as much security with a smaller key than with other systems, like RSA. For example, a 384-bit ECC key is as strong as a 2048-bit RSA key.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15001)
The Mikado Method by Ola Ellnestam Daniel Brolund(12259)
Hello! Python by Anthony Briggs(12153)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11529)
Dependency Injection in .NET by Mark Seemann(11314)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10528)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10129)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9782)
Grails in Action by Glen Smith Peter Ledbrook(9455)
Hit Refresh by Satya Nadella(9039)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9008)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9004)
The Kubernetes Operator Framework Book by Michael Dame(8473)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8424)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8298)
Robo-Advisor with Python by Aki Ranin(8248)
Practical Computer Architecture with Python and ARM by Alan Clements(8224)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8193)
Building Low Latency Applications with C++ by Sourav Ghosh(8098)