Our systems are now restored following recent technical disruption, and we’re working hard to catch up on publishing. We apologise for the inconvenience caused. Find out more

Recommended product

Popular links

Popular links


Number Theory and Cryptography

Number Theory and Cryptography

Number Theory and Cryptography

J. H. Loxton
April 1990
Available
Paperback
9780521398770
£36.99
GBP
Paperback
USD
eBook

    In this volume, originally published in 1990, are included papers presented at two meetings; one a workshop on Number Theory and Cryptography, and the other, the annual meeting of the Australian Mathematical Society. Questions in number theory are of military and commercial importance for the security of communication, as they are related to codes and code-breaking. Papers in the volume range from problems in pure mathematics whose study has been intensified by this connection, through interesting theoretical and combinatorial problems which arise in the implementation, to practical questions that come from banking and telecommunications. The contributors are prominent within their field. The whole volume will be an attractive purchase for all number theorists, 'pure' or 'applied'.

    Product details

    April 1990
    Paperback
    9780521398770
    248 pages
    229 × 152 × 14 mm
    0.355kg
    Available

    Table of Contents

    • List of contributors
    • Introduction
    • Part I. Number Theoretic Aspects of Cryptology:
    • 1. Some mathematical aspects of recent advances in cryptology R. Lidl
    • 2. Quadratic fields and cryptography J. Buchmann and H. C. Williams
    • 3. Parallel algorithms for integer factorisation R. P. Brent
    • 4. An open architecture number sieve A. J. Stephens and H. C. Williams
    • 5. Algorithms for finite fields H. W. Lenstra, Jr.
    • 6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten
    • Part II. Cryptographic Devices and Applications:
    • 7. Security in telecommunication services over the next decade J. Snare
    • 8. Linear feedback shift registers and stream ciphers E. Dawson
    • 9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli
    • 10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry
    • 11. Privacy for MANCET M. Warner
    • 12. Authentication B. Newman
    • 13. Insecurity of the knapsack one-time pad R. T. Worley
    • 14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters
    • 15. Reed–Solomon coding in the complex field M. Rudolph
    • Part III. Diophantine Analysis:
    • 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams
    • 17. Number theoretic problems involving two independent bases T. Kamae
    • 18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa
    • 19. Notes on uniform distribution G. Myerson and A. Pollington
    • 20. Thue equations and multiplicative independence B. Brizinda
    • 21. A number theoretic crank associated with open bosonic strings F. G. Garvan
    • 22. Universal families of abelian varieties A. Silverberg.
      Contributors
    • R. Lidl, J. Buchmann, H. C. Williams, R. P. Brent, A. J. Stephens, H. W. Lenstra, Jr., A. J. Van der Poorten, J. Snare, E. Dawson, H. Gustaphson, W. Caelli, R. S. Safavi-Naini, J. R. Seberry, M. Warner, B. Newman, R. T. Worley, L. Peters, M. Rudolph, R. A. Mollin, T. Kamae, Y. -N. Nakai, I. Shiokawa, G. Myerson, A. Pollington, B. Brizinda, F. G. Garvan, A. Silverberg

    • Author
    • J. H. Loxton