000 -LEADER |
fixed length control field |
03783nam a22003497a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220904203823.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
a|||||r|||| 00| 0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
tu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220220b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Qualifying information |
9781774074176 (e-book) |
040 ## - CATALOGING SOURCE |
Language of cataloging |
English. |
Transcribing agency |
CvSU-CCAT Campus Library. |
Description conventions |
rda. |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
EBOP QA 241 |
Item number |
N86 2020 |
245 ## - TITLE STATEMENT |
Title |
Number theory with applications to cryptography / |
Statement of responsibility, etc. |
edited by Stefano Spezia. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Oakville, Ontario : |
Name of publisher, distributor, etc. |
Arcler Press, |
Date of publication, distribution, etc. |
c2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxi, 309 pages : |
Other physical details |
color illustrations |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
computer |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
online resource |
500 ## - GENERAL NOTE |
Materials specified |
To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required). |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliography references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1 : A Disaggregation Approach for Solving Linear Diophantine Equations<br/>Chapter 2 : Diophantine Equations, Elementary Methods<br/>Chapter 3 : Diophantine Equations, Elementary Methods II<br/>Chapter 4 : Almost and Nearly Isosceles Pythagorean Triples<br/>Chapter 5 : A Public Key Cryptosystem based on DIophantine Equations of Degree Increasing Type<br/>Chapter 6 : Hamiltonian for the Zeros of the Riemann Zeta Function<br/>Chapter 7 : Fractional Parts and their Relations to the Values of the Riemann Zeta Function<br/>Chapter 8 : 11-Dissection and Modulo 11 Congruences Properties for Partition Generating Function<br/>Chapter 9 : Effective Congruences for Mock Theta Functions<br/>Chapter 10 : On Integer Solutions of the Cubic Equations Over Certain Fields<br/>Chapter 11 : Iterative Sliding Window Method for Shorter Number of Operations in Modular Exponentiation and Scalar<br/>Chapter 12 : Implementation of Pollard Rho overbinary fields using Brent Cycle Detection Algorithm<br/>Chapter 13 : Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside S<br/>Chapter 14 : Research on Attacking a Special Elliptic Curve Discrete Logarithm Problem<br/>Chapter 15 : Are matrices Useful in Public-Key Cryptography?<br/>Chapter 16 : An application of Fibonacci Sequence on Continued Fractions<br/>Chapter 17 : On the QuantitativeMetric Theory of Continued Fractions in Positive Characteristic<br/>Chapter 18 : Some New Continued Fraction Sequence Convergent to the Somos Quadratfic Reccurance Constant<br/> |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Number Theory with Applications to Cryptography takes into account the application of number theory in the field of cryptography. It comprises elementary methods of Diophantine equations, the basic theorem of arithmetic and the Riemann Zeta function. This book also discusses about Congruences and their use in mock theta functions, Method of Iterative Sliding Window for Shorter Number of Operations in case of Modular Exponentiation and Scalar Multiplication, Discrete log problem, elliptic curves, matrices and public-key cryptography and Implementation of Pollard Rho over binary fields using Brent Cycle Detection Algorithm. It also provides the reader with the significant insights of number theory to the practice of cryptography in order to understand discrete log problem, matrices, elliptic curves and public-key cryptography and the applications of Fibonacci sequence on continued fractions.EBOP0000015 |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Accession number |
EBOP00016 |
Extent |
1 |
546 ## - LANGUAGE NOTE |
Materials specified |
In English text. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Number theory. |
9 (RLIN) |
3705 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography. |
9 (RLIN) |
4553 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Coinage, International. |
9 (RLIN) |
4554 |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptocurrencies. |
9 (RLIN) |
4555 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Spezia, Stefano, editor. |
9 (RLIN) |
4682 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Electronic name |
Bibliotex. |
Materials specified |
Electronic Resources |
Public note |
<a href="https://www.bibliotex.com/product/number-theory-applications-to-cryptography">https://www.bibliotex.com/product/number-theory-applications-to-cryptography</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
E-Books |
Classification part |
QA 241 N86 2020 |
Call number prefix |
EBOP |