|
|
|||
|
||||
OverviewIn this volume, originally published in 1990, are included papers presented at two meetings; one a workshop on Number Theory and Cryptography, and the other, the annual meeting of the Australian Mathematical Society. Questions in number theory are of military and commercial importance for the security of communication, as they are related to codes and code-breaking. Papers in the volume range from problems in pure mathematics whose study has been intensified by this connection, through interesting theoretical and combinatorial problems which arise in the implementation, to practical questions that come from banking and telecommunications. The contributors are prominent within their field. The whole volume will be an attractive purchase for all number theorists, 'pure' or 'applied'. Full Product DetailsAuthor: J. H. LoxtonPublisher: Cambridge University Press Imprint: Cambridge University Press Volume: 154 ISBN: 9781107325838ISBN 10: 1107325838 Publication Date: 05 May 2013 Audience: Professional and scholarly , Professional & Vocational Format: Undefined Publisher's Status: Active Availability: In stock We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsList of contributors; Introduction; Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl; 2. Quadratic fields and cryptography J. Buchmann and H. C. Williams; 3. Parallel algorithms for integer factorisation R. P. Brent; 4. An open architecture number sieve A. J. Stephens and H. C. Williams; 5. Algorithms for finite fields H. W. Lenstra, Jr.; 6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten; Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare; 8. Linear feedback shift registers and stream ciphers E. Dawson; 9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli; 10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry; 11. Privacy for MANCET M. Warner; 12. Authentication B. Newman; 13. Insecurity of the knapsack one-time pad R. T. Worley; 14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters; 15. Reed–Solomon coding in the complex field M. Rudolph; Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams; 17. Number theoretic problems involving two independent bases T. Kamae; 18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa; 19. Notes on uniform distribution G. Myerson and A. Pollington; 20. Thue equations and multiplicative independence B. Brizinda; 21. A number theoretic crank associated with open bosonic strings F. G. Garvan; 22. Universal families of abelian varieties A. Silverberg.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |