Number theory with applications to cryptography / (Record no. 1525)

000 -LEADER
fixed length control field 03783nam a22003497a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220904203823.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field a|||||r|||| 00| 0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field tu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220220b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Qualifying information 9781774074176 (e-book)
040 ## - CATALOGING SOURCE
Language of cataloging English.
Transcribing agency CvSU-CCAT Campus Library.
Description conventions rda.
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number EBOP QA 241
Item number N86 2020
245 ## - TITLE STATEMENT
Title Number theory with applications to cryptography /
Statement of responsibility, etc. edited by Stefano Spezia.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Oakville, Ontario :
Name of publisher, distributor, etc. Arcler Press,
Date of publication, distribution, etc. c2020.
300 ## - PHYSICAL DESCRIPTION
Extent xxi, 309 pages :
Other physical details color illustrations
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term computer
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term online resource
500 ## - GENERAL NOTE
Materials specified To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required).
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliography references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1 : A Disaggregation Approach for Solving Linear Diophantine Equations<br/>Chapter 2 : Diophantine Equations, Elementary Methods<br/>Chapter 3 : Diophantine Equations, Elementary Methods II<br/>Chapter 4 : Almost and Nearly Isosceles Pythagorean Triples<br/>Chapter 5 : A Public Key Cryptosystem based on DIophantine Equations of Degree Increasing Type<br/>Chapter 6 : Hamiltonian for the Zeros of the Riemann Zeta Function<br/>Chapter 7 : Fractional Parts and their Relations to the Values of the Riemann Zeta Function<br/>Chapter 8 : 11-Dissection and Modulo 11 Congruences Properties for Partition Generating Function<br/>Chapter 9 : Effective Congruences for Mock Theta Functions<br/>Chapter 10 : On Integer Solutions of the Cubic Equations Over Certain Fields<br/>Chapter 11 : Iterative Sliding Window Method for Shorter Number of Operations in Modular Exponentiation and Scalar<br/>Chapter 12 : Implementation of Pollard Rho overbinary fields using Brent Cycle Detection Algorithm<br/>Chapter 13 : Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside S<br/>Chapter 14 : Research on Attacking a Special Elliptic Curve Discrete Logarithm Problem<br/>Chapter 15 : Are matrices Useful in Public-Key Cryptography?<br/>Chapter 16 : An application of Fibonacci Sequence on Continued Fractions<br/>Chapter 17 : On the QuantitativeMetric Theory of Continued Fractions in Positive Characteristic<br/>Chapter 18 : Some New Continued Fraction Sequence Convergent to the Somos Quadratfic Reccurance Constant<br/>
520 ## - SUMMARY, ETC.
Summary, etc. Number Theory with Applications to Cryptography takes into account the application of number theory in the field of cryptography. It comprises elementary methods of Diophantine equations, the basic theorem of arithmetic and the Riemann Zeta function. This book also discusses about Congruences and their use in mock theta functions, Method of Iterative Sliding Window for Shorter Number of Operations in case of Modular Exponentiation and Scalar Multiplication, Discrete log problem, elliptic curves, matrices and public-key cryptography and Implementation of Pollard Rho over binary fields using Brent Cycle Detection Algorithm. It also provides the reader with the significant insights of number theory to the practice of cryptography in order to understand discrete log problem, matrices, elliptic curves and public-key cryptography and the applications of Fibonacci sequence on continued fractions.EBOP0000015
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Accession number EBOP00016
Extent 1
546 ## - LANGUAGE NOTE
Materials specified In English text.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Number theory.
9 (RLIN) 3705
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 4553
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Coinage, International.
9 (RLIN) 4554
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptocurrencies.
9 (RLIN) 4555
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Spezia, Stefano, editor.
9 (RLIN) 4682
856 40 - ELECTRONIC LOCATION AND ACCESS
Electronic name Bibliotex.
Materials specified Electronic Resources
Public note <a href="https://www.bibliotex.com/product/number-theory-applications-to-cryptography">https://www.bibliotex.com/product/number-theory-applications-to-cryptography</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Books
Classification part QA 241 N86 2020
Call number prefix EBOP
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent location Current location Shelving location Date acquired Source of acquisition Coded location qualifier Cost, normal purchase price Full call number Barcode Date last seen Copy number Price effective from Koha item type
          Electronic Resources Cavite State University - CCAT Campus Cavite State University - CCAT Campus ER 02/06/2022 Purchased EBOP 5990.00 EBOP QA 241 N86 2020 EBOP0000016 02/20/2022 1 copy 02/06/2022 E-Books

Powered by Koha