You are on page 1of 5

24/7/2021 Manning Implementing Elliptic Curve Cryptography

The Wayback Machine - https://web.archive.org/web/20060202030211/http://manning.com:80/books/rosing/errata

Home |
Ordering Info |
Shopping Cart |
Manage My Account |
Login

Implementing Elliptic Curve


Cryptography Implementing Elliptic Curve Cryptography
Michael Rosing
Inside the book
Sample Chapters
1998 | 330 pages
ISBN: 1884777694
Table of Contents
Errata $47.95 Softbound print book  
Index
Preface ERRATA
Book Reviews
Source code This page is used to list and correct known errors in Implementing Elliptic Curve Cryptograpy. We apologize for any inconvenience.
Author Online

Page 14

The words:
Search
factoring program

should read:

set of subroutines

Manning Blog
Why small is sweet? just before 2.1.

Author Blogs
Dave Crane
Page 34
more...
Equation 2.26 should be changed from:
Author Calendar v3=13

Upcoming Events
to:
Catalog
Java v3=130

.NET
Perl Note: there are 4 more steps, 2.27 becomes
XML
q=1

All by Subject
All by Title 2.28 and subsequent steps go as follows in the order u1, u2, u3, v1, v2, v3

https://web.archive.org/web/20060202030211/http://manning.com:80/books/rosing/errata 1/5
24/7/2021 Manning Implementing Elliptic Curve Cryptography

About... (-37, 55, 130, 72,-107, 91)

Manning q = 1

Contact Us
(72, -107, 91, -109, 162, 39)
q = 2

Ordering
(-109, 162, 39, 290, -431, 13)

FAQs
q = 3

ebooks
(290, -431, 13, -870, 1455, 0)

Covers
Sandbox Forums This will change all equation numbers, too.
Distributors
Manning Early Access
Program (MEAP) Page 79
Affiliate Program
Academia/Publicity In equation 4.12, the subscript
User Group Program
ijk

Press Releases
Jobs should be in italics.

Manning Publications Co.


209 Bruce Park Avenue Also in equation 4.13,
Greenwich, CT 06830
k

should become

ck

Page 88

In table 4.5, row i = 5, column

j2 = 5

should be

j2 = 7

Page 93

In equation 4.40,

should become

ck

https://web.archive.org/web/20060202030211/http://manning.com:80/books/rosing/errata 2/5
24/7/2021 Manning Implementing Elliptic Curve Cryptography
Page 110

Equation 5.26:

y3 = theta(x1 + x3) - y1

should be changed to:

y3 = theta(x1 + x3) + x3 + y1

Page 126

The phrase

Arithmentic of Elliptic Curves

in Ref. 1 should be chaged to:

Arithmetic of elliptic curves

Page 144

The word

equaiton

should be changed to

equation

six lines from the top.

Page 172

In equation 7.2

0 X 100020001 > #E > 0 X FFFE0001

should be changed to

0x1000000200000001 > #E > 0xFFFFFFFFE0000001

In equation 7.3

1.844674407 x 1019 > #E > 1.8446744 x 1019

should be changed to

https://web.archive.org/web/20060202030211/http://manning.com:80/books/rosing/errata 3/5
24/7/2021 Manning Implementing Elliptic Curve Cryptography

18446744082299486209 > #E > 18446744065119617025

Page 226

a^2 and a^6

should be changed to

a_2 and a_6

Page 230

g[3] = g[0] + g[1]

should be changed to

g[2] = g[0] + g[1]

Page 263

int_to_field( &sig;_value, &signature-;>d);

Should be changed to the following:

int_to_field( &temp;, &signature-;>d);

DESCRIPTION

Implementing Elliptic Curve Cryptography proceeds step-by-step


to explain basic number theory, polynomial mathematics, normal
basis
mathematics and elliptic curve mathematics. With these in place,
applications to cryptography are introduced. The book is filled
with
C code to illustrate how mathematics is put into a computer, and the
last several chapters show how to implement several
cryptographic
protocols. The most important is a description of P1363, an IEEE
draft standard for public key cryptography.

The main purpose of Implementing Elliptic Curve Cryptography is


to help "crypto engineers" implement functioning, state-of-the-art
cryptographic algorithms in the minimum time. With detailed
descriptions of the mathematics, the reader can expand on the code
given in
the book and develop optimal hardware or software for their
own applications.

Implementing Elliptic Curve Cryptography assumes the reader has


at least a high school background in algebra, but it explains, in
stepwise fashion, what has been considered to be a topic only for
graduate-level students.

WHAT THE EXPERTS SAY ABOUT THIS BOOK...

"The book provides all the theory and working programs needed to create real applications based on the latest IEEE P1363 standard."
--Reviewed in Cryptologia

ABOUT THE AUTHOR...

https://web.archive.org/web/20060202030211/http://manning.com:80/books/rosing/errata 4/5
24/7/2021 Manning Implementing Elliptic Curve Cryptography
With a background that includes nuclear engineering, hardware computer
design, and telephony, Michael Rosing has seen how
cryptography
plays an important role in military and commercial applications. At
present he is employed building DSP hardware for brain
research at the
University of Wisconsin in Madison.

Home |
Catalog |
Privacy Policy |
About Manning

© 2003-2005 Manning Publications Co.

https://web.archive.org/web/20060202030211/http://manning.com:80/books/rosing/errata 5/5

You might also like