Number Theoretic Methods In Cryptography


Download Number Theoretic Methods In Cryptography PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Number Theoretic Methods In Cryptography book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Number-Theoretic Methods in Cryptology


Number-Theoretic Methods in Cryptology

Author: Jerzy Kaczorowski

language: en

Publisher: Springer

Release Date: 2018-03-09


DOWNLOAD





This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.The 15 revised full papers presented in this book together with 3 invited talks were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on elliptic curves in cryptography; public-key cryptography; lattices in cryptography; number theory; pseudorandomness; and algebraic structures and analysis.

Number Theoretic Methods in Cryptography


Number Theoretic Methods in Cryptography

Author: Igor Shparlinski

language: en

Publisher: Birkhäuser

Release Date: 2012-12-06


DOWNLOAD





The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of • polynomials; • algebraic functions; • Boolean functions; • linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.

Number Theory and Cryptography


Number Theory and Cryptography

Author: J. H. Loxton

language: en

Publisher: Cambridge University Press

Release Date: 1990-04-19


DOWNLOAD





Papers presented by prominent contributors at a workshop on Number Theory and Cryptography, and the annual meeting of the Australian Mathematical Society.