Elliptic Curve Cryptosystem: Theory of Elliptic Curves, Elliptic Curve Encryption & Decryption Algorithms, Security of Elliptic Curves Cryptography, Elliptic Curve Factorization.

7

9

Digital Signatures: Authentication Protocols, Digital Signature Standards (DSS). Proxy Signatures.

3

Total

40

Discrete Mathematics and Algorithms.

Introduction to Algorithms: T. H. Cormen, C. E. Leiserson, R. Rivest and
C. Stein Prentice Hall India, 2^{nd} Edition, 2002.

A Course in Number Theory and Cryptography: Neal Koblitz, Springer-
Verlag, New York Inc. May 2001.

Cryptography and Network security: Principles and Practice, William
Stallings, Pearson Education, 2002.

Introduction to Cryptography with Coding Theory, Second Edition, W.
Trappe and L. C. Washington, Pearson Education 2007.

Cryptography: Theory and Practice, Douglas R. Stinson, CRC Press.

Randomized Algorithms, R. Motwani and P. Raghavan, Cambridge University
Press, 1995.

Important: Please enable javascript in your browser and download Adobe Flash player to view this site
Site Maintained by Web Studio, IIT Madras. Contact Webmaster: nptel@iitm.ac.in