Number-Theoretic Methods in Cryptology
Title | Number-Theoretic Methods in Cryptology PDF eBook |
Author | Jerzy Kaczorowski |
Publisher | Springer |
Pages | 287 |
Release | 2018-03-09 |
Genre | Computers |
ISBN | 3319766201 |
This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.The 15 revised full papers presented in this book together with 3 invited talks were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on elliptic curves in cryptography; public-key cryptography; lattices in cryptography; number theory; pseudorandomness; and algebraic structures and analysis.
Number Theoretic Methods in Cryptography
Title | Number Theoretic Methods in Cryptography PDF eBook |
Author | Igor Shparlinski |
Publisher | Birkhäuser |
Pages | 181 |
Release | 2012-12-06 |
Genre | Mathematics |
ISBN | 3034886640 |
The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of • polynomials; • algebraic functions; • Boolean functions; • linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.
Cryptanalysis of Number Theoretic Ciphers
Title | Cryptanalysis of Number Theoretic Ciphers PDF eBook |
Author | Samuel S. Wagstaff, Jr. |
Publisher | CRC Press |
Pages | 336 |
Release | 2019-08-22 |
Genre | Mathematics |
ISBN | 1420057693 |
At the heart of modern cryptographic algorithms lies computational number theory. Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory to the inner workings of ciphers and protocols. First, the book provides the mathematical background needed in cryptography as well as definitions and simple examples from cryptography. It includes summaries of elementary number theory and group theory, as well as common methods of finding or constructing large random primes, factoring large integers, and computing discrete logarithms. Next, it describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. For each attack method the author lists the systems it applies to and tells how they may be broken with it. Computational number theorists are some of the most successful cryptanalysts against public key systems. Cryptanalysis of Number Theoretic Ciphers builds a solid foundation in number theory and shows you how to apply it not only when breaking ciphers, but also when designing ones that are difficult to break.
Cryptographic Applications of Analytic Number Theory
Title | Cryptographic Applications of Analytic Number Theory PDF eBook |
Author | Igor Shparlinski |
Publisher | Springer Science & Business Media |
Pages | 434 |
Release | 2003-02-12 |
Genre | Computers |
ISBN | 9783764366544 |
The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.
Number Theory and Cryptography
Title | Number Theory and Cryptography PDF eBook |
Author | J. H. Loxton |
Publisher | Cambridge University Press |
Pages | 249 |
Release | 1990-04-19 |
Genre | Mathematics |
ISBN | 0521398770 |
Papers presented by prominent contributors at a workshop on Number Theory and Cryptography, and the annual meeting of the Australian Mathematical Society.
A Course in Number Theory and Cryptography
Title | A Course in Number Theory and Cryptography PDF eBook |
Author | Neal Koblitz |
Publisher | Springer Science & Business Media |
Pages | 245 |
Release | 2012-09-05 |
Genre | Mathematics |
ISBN | 1441985921 |
This is a substantially revised and updated introduction to arithmetic topics, both ancient and modern, that have been at the centre of interest in applications of number theory, particularly in cryptography. As such, no background in algebra or number theory is assumed, and the book begins with a discussion of the basic number theory that is needed. The approach taken is algorithmic, emphasising estimates of the efficiency of the techniques that arise from the theory, and one special feature is the inclusion of recent applications of the theory of elliptic curves. Extensive exercises and careful answers are an integral part all of the chapters.
Computational Number Theory and Modern Cryptography
Title | Computational Number Theory and Modern Cryptography PDF eBook |
Author | Song Y. Yan |
Publisher | John Wiley & Sons |
Pages | 432 |
Release | 2013-01-29 |
Genre | Computers |
ISBN | 1118188586 |
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical concepts. The book also presents topics from number theory, which are relevant for applications in public-key cryptography, as well as modern topics, such as coding and lattice based cryptography for post-quantum cryptography. The author further covers the current research and applications for common cryptographic algorithms, describing the mathematical problems behind these applications in a manner accessible to computer scientists and engineers. Makes mathematical problems accessible to computer scientists and engineers by showing their immediate application Presents topics from number theory relevant for public-key cryptography applications Covers modern topics such as coding and lattice based cryptography for post-quantum cryptography Starts with the basics, then goes into applications and areas of active research Geared at a global audience; classroom tested in North America, Europe, and Asia Incudes exercises in every chapter Instructor resources available on the book’s Companion Website Computational Number Theory and Modern Cryptography is ideal for graduate and advanced undergraduate students in computer science, communications engineering, cryptography and mathematics. Computer scientists, practicing cryptographers, and other professionals involved in various security schemes will also find this book to be a helpful reference.