OverviewThebookhasastrongfocusonefficientmethodsforfinitefieldarithmetic(Chapter2)andellipticcurvearithmetic(Chapter3).Next,Chapter4surveystheknownattacksontheECDLP,anddescribesthegenerationandvalidationofdomainparametersandkeypairs,andselectede