Yan - Computational Number Theory and Modern Cryptography
Here you can read online Yan - Computational Number Theory and Modern Cryptography full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Hoboken, year: 2013, publisher: John Wiley & Sons, Inc, genre: Children. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
Computational Number Theory and Modern Cryptography: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Computational Number Theory and Modern Cryptography" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Yan: author's other books
Who wrote Computational Number Theory and Modern Cryptography? Find out the surname, the name of the author of the book and a list of all author's works by series.
Computational Number Theory and Modern Cryptography — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Computational Number Theory and Modern Cryptography" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
INFORMATION SECURITY SERIES
The Wiley-HEP Information Security Series systematically introduces the fundamentals of information security design and application. The goals of the Series are:
- to provide fundamental and emerging theories and techniques to stimulate more research in cryptology, algorithms, protocols, and architectures
- to inspire professionals to understand the issues behind important security problems and the ideas behind the solutions
- to give references and suggestions for additional reading and further study
The Series is a joint project between Wiley and Higher Education Press (HEP) of China. Publications consist of advanced textbooks for graduate students as well as researcher and practitioner references covering the key areas, including but not limited to:
LEAD EDITORS
Song Y. Yan | London, UK |
Moti Yung | Columbia University, USA |
John Rief | Duke University, USA |
EDITORIAL BOARD
Liz Bacon | University of Greenwich, UK |
Kefei Chen | Shanghai Jiaotong University, China |
Matthew Franklin | University of California, USA |
Dieter Gollmann | Hamburg University of Technology, Germany |
Yongfei Han | Beijing University of Technology, China ONETS Wireless & Internet Security Tech. Co., Ltd. Singapore |
Kwangjo Kim | KAIST-ICC, Korea |
David Naccache | Ecole Normale Suprieure, France |
Dingyi Pei | Guangzhou University, China |
Peter Wild | University of London, UK |
This edition first published 2013
2013 Higher Education Press. All rights reserved.
Published by John Wiley & Sons Singapore Pte. Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628, under exclusive license by Higher Education Press in all media and all languages throughout the world excluding Mainland China and excluding Simplified and Traditional Chinese languages.
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com .
All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as expressly permitted by law, without either the prior written permission of the Publisher, or authorization through payment of the appropriate photocopy fee to the Copyright Clearance Center. Requests for permission should be addressed to the Publisher, John Wiley & Sons Singapore Pte. Ltd., 1 Fusionopolis Walk, #07-01 Solaris South Tower, Singapore 138628, tel: 65-66438000, fax: 65-66438008, email: enquiry@wiley.com.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The Publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
Yan, Song Y.
Computational number theory and modern cryptography / Song Y. Yan.
pages cm
Includes bibliographical references and index.
ISBN 978-1-118-18858-3 (hardback)
1. Data encryption (Computer science) 2. Number theoryData processing. I. Title.
QA76.9.A25Y358 2012
005.82dc23
2012032708
ISBN: 9781118188583
ABOUT THE AUTHOR
Professor Song Y. Yan majored in both Computer Science and Mathematics, and obtained a PhD in Number Theory in the Department of Mathematics at the University of York, England. His current research interests include Computational Number Theory, Computational Complexity Theory, Algebraic Coding Theory, Public-Key Cryptography and Information/Network Security. He published, among others, the following five well-received and popular books in computational number theory and public-key cryptography:
Song can be reached by email address songyuanyan@gmail.com anytime.
PREFACE
The book is about number theory and modern cryptography. More specically, it is about computational number theory and modern public-key cryptography based on number theory. It consists of four parts. The first part, consisting of two chapters, provides some preliminaries. Chapter 1 provides some basic concepts of number theory, computation theory, computational number theory, and modern public-key cryptography based on number theory. In chapter 2, a complete introduction to some basic concepts and results in abstract algebra and elementary number theory is given.
The second part is on computational number theory. There are three chapters in this part. Chapter 3 deals with algorithms for primality testing, with an emphasis on the Miller-Rabin test, the elliptic curve test, and the AKS test. Chapter 4 treats with algorithms for integer factorization, including the currently fastest factoring algorithm NFS (Number Field Sieve), and the elliptic curve factoring algorithm ECM (Elliptic Curve Method). Chapter 5 discusses various modern algorithms for discrete logarithms and for elliptic curve discrete logarithms. It is well-known now that primality testing can be done in polynomial-time on a digital computer, however, integer factorization and discrete logarithms still cannot be performed in polynomial-time. From a computational complexity point of view, primality testing is feasible (tractable, easy) on a digital computer, whereas integer factorization and discrete logarithms are infeasible (intractable, hard, difficult). Of course, no-one has yet been able to prove that the integer factorization and the discrete logarithm problems must be infeasible on a digital computer.
Font size:
Interval:
Bookmark:
Similar books «Computational Number Theory and Modern Cryptography»
Look at similar books to Computational Number Theory and Modern Cryptography. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book Computational Number Theory and Modern Cryptography and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.