- Membership
- Publications
- Meetings
- Competitions
- Community
- Programs
- Students
- High School Teachers
- Faculty and Departments
- Underrepresented Groups
- MAA Awards
- MAA Grants
- News
- About MAA

Part I. Protocols: 1. Elliptic curve base protocols N. P. Smart; 2. On the provable security of ECDSA D. Brown; 3. Proofs of security for ECIES A. W. Dent; Part II. Implementation Techniques: 4. Side channel analysis E. Oswald; 5. Defenses against side-channel analysis M. Joye; Part III. Mathematical Foundations: 6. Advances in point counting F. Vercauteren; 7. Hyperelliptic curves and the HCDLP P. Guadry; 8. Weil descent attacks F. Hess; Part IV. Pairing Based Techniques; 9. Pairings S. Galbraith; 10. Cryptography from pairings K. G. Paterson.