Cover image

Number theory with applications to cryptography / edited by Stefano Spezia.

Contributor(s): Spezia, Stefano, editorMaterial type: TextTextPublisher: Oakville, Ontario : Arcler Press, c2020Description: xxi, 309 pages : color illustrationsContent type: text Media type: computer Carrier type: online resourceSubject(s): Number theory | Cryptography | Coinage, International | CryptocurrenciesLOC classification: EBOP QA 241 | N86 2020Online resources: Electronic Resources https://www.bibliotex.com/product/number-theory-applications-to-cryptography
Contents:
Chapter 1 : A Disaggregation Approach for Solving Linear Diophantine Equations Chapter 2 : Diophantine Equations, Elementary Methods Chapter 3 : Diophantine Equations, Elementary Methods II Chapter 4 : Almost and Nearly Isosceles Pythagorean Triples Chapter 5 : A Public Key Cryptosystem based on DIophantine Equations of Degree Increasing Type Chapter 6 : Hamiltonian for the Zeros of the Riemann Zeta Function Chapter 7 : Fractional Parts and their Relations to the Values of the Riemann Zeta Function Chapter 8 : 11-Dissection and Modulo 11 Congruences Properties for Partition Generating Function Chapter 9 : Effective Congruences for Mock Theta Functions Chapter 10 : On Integer Solutions of the Cubic Equations Over Certain Fields Chapter 11 : Iterative Sliding Window Method for Shorter Number of Operations in Modular Exponentiation and Scalar Chapter 12 : Implementation of Pollard Rho overbinary fields using Brent Cycle Detection Algorithm Chapter 13 : Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside S Chapter 14 : Research on Attacking a Special Elliptic Curve Discrete Logarithm Problem Chapter 15 : Are matrices Useful in Public-Key Cryptography? Chapter 16 : An application of Fibonacci Sequence on Continued Fractions Chapter 17 : On the QuantitativeMetric Theory of Continued Fractions in Positive Characteristic Chapter 18 : Some New Continued Fraction Sequence Convergent to the Somos Quadratfic Reccurance Constant
Summary: Number Theory with Applications to Cryptography takes into account the application of number theory in the field of cryptography. It comprises elementary methods of Diophantine equations, the basic theorem of arithmetic and the Riemann Zeta function. This book also discusses about Congruences and their use in mock theta functions, Method of Iterative Sliding Window for Shorter Number of Operations in case of Modular Exponentiation and Scalar Multiplication, Discrete log problem, elliptic curves, matrices and public-key cryptography and Implementation of Pollard Rho over binary fields using Brent Cycle Detection Algorithm. It also provides the reader with the significant insights of number theory to the practice of cryptography in order to understand discrete log problem, matrices, elliptic curves and public-key cryptography and the applications of Fibonacci sequence on continued fractions.EBOP0000015
List(s) this item appears in: Newly Acquired E-Books
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Shelving location Call number Copy number Status Date due Barcode
E-Books E-Books Cavite State University - CCAT Campus
Electronic Resources ER EBOP QA 241 N86 2020 (Browse shelf) 1 copy Available EBOP0000016

To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required).

Includes bibliography references and index.

Chapter 1 : A Disaggregation Approach for Solving Linear Diophantine Equations
Chapter 2 : Diophantine Equations, Elementary Methods
Chapter 3 : Diophantine Equations, Elementary Methods II
Chapter 4 : Almost and Nearly Isosceles Pythagorean Triples
Chapter 5 : A Public Key Cryptosystem based on DIophantine Equations of Degree Increasing Type
Chapter 6 : Hamiltonian for the Zeros of the Riemann Zeta Function
Chapter 7 : Fractional Parts and their Relations to the Values of the Riemann Zeta Function
Chapter 8 : 11-Dissection and Modulo 11 Congruences Properties for Partition Generating Function
Chapter 9 : Effective Congruences for Mock Theta Functions
Chapter 10 : On Integer Solutions of the Cubic Equations Over Certain Fields
Chapter 11 : Iterative Sliding Window Method for Shorter Number of Operations in Modular Exponentiation and Scalar
Chapter 12 : Implementation of Pollard Rho overbinary fields using Brent Cycle Detection Algorithm
Chapter 13 : Cryptanalysis of a Proposal Based on the Discrete Logarithm Problem Inside S
Chapter 14 : Research on Attacking a Special Elliptic Curve Discrete Logarithm Problem
Chapter 15 : Are matrices Useful in Public-Key Cryptography?
Chapter 16 : An application of Fibonacci Sequence on Continued Fractions
Chapter 17 : On the QuantitativeMetric Theory of Continued Fractions in Positive Characteristic
Chapter 18 : Some New Continued Fraction Sequence Convergent to the Somos Quadratfic Reccurance Constant

Number Theory with Applications to Cryptography takes into account the application of number theory in the field of cryptography. It comprises elementary methods of Diophantine equations, the basic theorem of arithmetic and the Riemann Zeta function. This book also discusses about Congruences and their use in mock theta functions, Method of Iterative Sliding Window for Shorter Number of Operations in case of Modular Exponentiation and Scalar Multiplication, Discrete log problem, elliptic curves, matrices and public-key cryptography and Implementation of Pollard Rho over binary fields using Brent Cycle Detection Algorithm. It also provides the reader with the significant insights of number theory to the practice of cryptography in order to understand discrete log problem, matrices, elliptic curves and public-key cryptography and the applications of Fibonacci sequence on continued fractions.EBOP0000015

EBOP00016 1

In English text.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Powered by Koha