Author: Robert Rolland
Publisher: World Scientific
ISBN: 9814471666
Category : Mathematics
Languages : en
Pages : 530
Book Description
This volume covers many topics, including number theory, Boolean functions, combinatorial geometry, and algorithms over finite fields. It contains many new, theoretical and applicable results, as well as surveys that were presented by the top specialists in these areas. New results include an answer to one of Serre's questions, posted in a letter to Top; cryptographic applications of the discrete logarithm problem related to elliptic curves and hyperelliptic curves; construction of function field towers; construction of new classes of Boolean cryptographic functions; and algorithmic applications of algebraic geometry.
Algebraic Geometry And Its Applications: Dedicated To Gilles Lachaud On His 60th Birthday - Proceedings Of The First Saga Conference
Author: Robert Rolland
Publisher: World Scientific
ISBN: 9814471666
Category : Mathematics
Languages : en
Pages : 530
Book Description
This volume covers many topics, including number theory, Boolean functions, combinatorial geometry, and algorithms over finite fields. It contains many new, theoretical and applicable results, as well as surveys that were presented by the top specialists in these areas. New results include an answer to one of Serre's questions, posted in a letter to Top; cryptographic applications of the discrete logarithm problem related to elliptic curves and hyperelliptic curves; construction of function field towers; construction of new classes of Boolean cryptographic functions; and algorithmic applications of algebraic geometry.
Publisher: World Scientific
ISBN: 9814471666
Category : Mathematics
Languages : en
Pages : 530
Book Description
This volume covers many topics, including number theory, Boolean functions, combinatorial geometry, and algorithms over finite fields. It contains many new, theoretical and applicable results, as well as surveys that were presented by the top specialists in these areas. New results include an answer to one of Serre's questions, posted in a letter to Top; cryptographic applications of the discrete logarithm problem related to elliptic curves and hyperelliptic curves; construction of function field towers; construction of new classes of Boolean cryptographic functions; and algorithmic applications of algebraic geometry.
Boolean Functions for Cryptography and Coding Theory
Author: Claude Carlet
Publisher: Cambridge University Press
ISBN: 1108473806
Category : Computers
Languages : en
Pages : 577
Book Description
A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.
Publisher: Cambridge University Press
ISBN: 1108473806
Category : Computers
Languages : en
Pages : 577
Book Description
A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.
Algebraic Geometry and Its Applications
Author: Jean Chaumine
Publisher: World Scientific
ISBN: 9812793437
Category : Mathematics
Languages : en
Pages : 530
Book Description
This volume covers many topics, including number theory, Boolean functions, combinatorial geometry, and algorithms over finite fields. It contains many new, theoretical and applicable results, as well as surveys that were presented by the top specialists in these areas. New results include an answer to one of Serre''s questions, posted in a letter to Top; cryptographic applications of the discrete logarithm problem related to elliptic curves and hyperelliptic curves; construction of function field towers; construction of new classes of Boolean cryptographic functions; and algorithmic applications of algebraic geometry. Sample Chapter(s). Chapter 1: Fast addition on non-hyperelliptic genus 3 curves (424 KB). Contents: Symmetric Cryptography and Algebraic Curves (F Voloch); Galois Invariant Smoothness Basis (J-M Couveignes & R Lercier); Fuzzy Pairing-Based CL-PKC (M Kiviharju); On the Semiprimitivity of Cyclic Codes (Y Aubry & P Langevin); Decoding of Scroll Codes (G H Hitching & T Johnsen); An Optimal Unramified Tower of Function Fields (K Brander); On the Number of Resilient Boolean Functions (S Mesnager); On Quadratic Extensions of Cyclic Projective Planes (H F Law & P P W Wong); Partitions of Vector Spaces over Finite Fields (Y Zelenyuk); and other papers. Readership: Mathematicians, researchers in mathematics (academic and industry R&D).
Publisher: World Scientific
ISBN: 9812793437
Category : Mathematics
Languages : en
Pages : 530
Book Description
This volume covers many topics, including number theory, Boolean functions, combinatorial geometry, and algorithms over finite fields. It contains many new, theoretical and applicable results, as well as surveys that were presented by the top specialists in these areas. New results include an answer to one of Serre''s questions, posted in a letter to Top; cryptographic applications of the discrete logarithm problem related to elliptic curves and hyperelliptic curves; construction of function field towers; construction of new classes of Boolean cryptographic functions; and algorithmic applications of algebraic geometry. Sample Chapter(s). Chapter 1: Fast addition on non-hyperelliptic genus 3 curves (424 KB). Contents: Symmetric Cryptography and Algebraic Curves (F Voloch); Galois Invariant Smoothness Basis (J-M Couveignes & R Lercier); Fuzzy Pairing-Based CL-PKC (M Kiviharju); On the Semiprimitivity of Cyclic Codes (Y Aubry & P Langevin); Decoding of Scroll Codes (G H Hitching & T Johnsen); An Optimal Unramified Tower of Function Fields (K Brander); On the Number of Resilient Boolean Functions (S Mesnager); On Quadratic Extensions of Cyclic Projective Planes (H F Law & P P W Wong); Partitions of Vector Spaces over Finite Fields (Y Zelenyuk); and other papers. Readership: Mathematicians, researchers in mathematics (academic and industry R&D).
Introduction to Public Key Infrastructures
Author: Johannes A. Buchmann
Publisher: Springer Science & Business Media
ISBN: 3642406572
Category : Computers
Languages : en
Pages : 206
Book Description
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
Publisher: Springer Science & Business Media
ISBN: 3642406572
Category : Computers
Languages : en
Pages : 206
Book Description
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates. Although PKC does not require the confidential exchange of secret keys, proper management of the private and public keys used in PKC is still of vital importance: the private keys must remain private, and the public keys must be verifiably authentic. So understanding so-called public key infrastructures (PKIs) that manage key pairs is at least as important as studying the ingenious mathematical ideas underlying PKC. In this book the authors explain the most important concepts underlying PKIs and discuss relevant standards, implementations, and applications. The book is structured into chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical aspects of PKI. This is a suitable textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related disciplines, complementing introductory courses on cryptography. The authors assume only basic computer science prerequisites, and they include exercises in all chapters and solutions in an appendix. They also include detailed pointers to relevant standards and implementation guidelines, so the book is also appropriate for self-study and reference by industrial and academic researchers and practitioners.
The Development of the Number Field Sieve
Author: Arjen K. Lenstra
Publisher: Springer
ISBN: 3540478922
Category : Mathematics
Languages : en
Pages : 138
Book Description
The number field sieve is an algorithm for finding the prime factors of large integers. It depends on algebraic number theory. Proposed by John Pollard in 1988, the method was used in 1990 to factor the ninth Fermat number, a 155-digit integer. The algorithm is most suited to numbers of a special form, but there is a promising variant that applies in general. This volume contains six research papers that describe the operation of the number field sieve, from both theoretical and practical perspectives. Pollard's original manuscript is included. In addition, there is an annotated bibliography of directly related literature.
Publisher: Springer
ISBN: 3540478922
Category : Mathematics
Languages : en
Pages : 138
Book Description
The number field sieve is an algorithm for finding the prime factors of large integers. It depends on algebraic number theory. Proposed by John Pollard in 1988, the method was used in 1990 to factor the ninth Fermat number, a 155-digit integer. The algorithm is most suited to numbers of a special form, but there is a promising variant that applies in general. This volume contains six research papers that describe the operation of the number field sieve, from both theoretical and practical perspectives. Pollard's original manuscript is included. In addition, there is an annotated bibliography of directly related literature.
Ergodic Theory
Author: I. P. Cornfeld
Publisher: Springer Science & Business Media
ISBN: 1461569273
Category : Mathematics
Languages : en
Pages : 487
Book Description
Ergodic theory is one of the few branches of mathematics which has changed radically during the last two decades. Before this period, with a small number of exceptions, ergodic theory dealt primarily with averaging problems and general qualitative questions, while now it is a powerful amalgam of methods used for the analysis of statistical properties of dyna mical systems. For this reason, the problems of ergodic theory now interest not only the mathematician, but also the research worker in physics, biology, chemistry, etc. The outline of this book became clear to us nearly ten years ago but, for various reasons, its writing demanded a long period of time. The main principle, which we adhered to from the beginning, was to develop the approaches and methods or ergodic theory in the study of numerous concrete examples. Because of this, Part I of the book contains the description of various classes of dynamical systems, and their elementary analysis on the basis of the fundamental notions of ergodicity, mixing, and spectra of dynamical systems. Here, as in many other cases, the adjective" elementary" i~ not synonymous with "simple. " Part II is devoted to "abstract ergodic theory. " It includes the construc tion of direct and skew products of dynamical systems, the Rohlin-Halmos lemma, and the theory of special representations of dynamical systems with continuous time. A considerable part deals with entropy.
Publisher: Springer Science & Business Media
ISBN: 1461569273
Category : Mathematics
Languages : en
Pages : 487
Book Description
Ergodic theory is one of the few branches of mathematics which has changed radically during the last two decades. Before this period, with a small number of exceptions, ergodic theory dealt primarily with averaging problems and general qualitative questions, while now it is a powerful amalgam of methods used for the analysis of statistical properties of dyna mical systems. For this reason, the problems of ergodic theory now interest not only the mathematician, but also the research worker in physics, biology, chemistry, etc. The outline of this book became clear to us nearly ten years ago but, for various reasons, its writing demanded a long period of time. The main principle, which we adhered to from the beginning, was to develop the approaches and methods or ergodic theory in the study of numerous concrete examples. Because of this, Part I of the book contains the description of various classes of dynamical systems, and their elementary analysis on the basis of the fundamental notions of ergodicity, mixing, and spectra of dynamical systems. Here, as in many other cases, the adjective" elementary" i~ not synonymous with "simple. " Part II is devoted to "abstract ergodic theory. " It includes the construc tion of direct and skew products of dynamical systems, the Rohlin-Halmos lemma, and the theory of special representations of dynamical systems with continuous time. A considerable part deals with entropy.
Integration in Finite Terms
Author: Joseph Fels Ritt
Publisher:
ISBN: 9780231915960
Category : Calculus, Integral
Languages : en
Pages : 0
Book Description
Gives an account of Liouville's theory of integration in finite terms -- his determination of the form which the integral of an algebraic function must have when the integral can be expressed with the operations of elementary mathematical analysis, carried out a finite number of times -- and the work of some of his followers.
Publisher:
ISBN: 9780231915960
Category : Calculus, Integral
Languages : en
Pages : 0
Book Description
Gives an account of Liouville's theory of integration in finite terms -- his determination of the form which the integral of an algebraic function must have when the integral can be expressed with the operations of elementary mathematical analysis, carried out a finite number of times -- and the work of some of his followers.
Chaos-based Cryptography
Author: Ljupco Kocarev
Publisher: Springer Science & Business Media
ISBN: 3642205410
Category : Computers
Languages : en
Pages : 400
Book Description
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Publisher: Springer Science & Business Media
ISBN: 3642205410
Category : Computers
Languages : en
Pages : 400
Book Description
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Elliptic Curve Public Key Cryptosystems
Author: Alfred J. Menezes
Publisher: Springer Science & Business Media
ISBN: 1461531985
Category : Technology & Engineering
Languages : en
Pages : 139
Book Description
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an up-to-date and self-contained treatment of elliptic curve-based public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject.
Publisher: Springer Science & Business Media
ISBN: 1461531985
Category : Technology & Engineering
Languages : en
Pages : 139
Book Description
Elliptic curves have been intensively studied in algebraic geometry and number theory. In recent years they have been used in devising efficient algorithms for factoring integers and primality proving, and in the construction of public key cryptosystems. Elliptic Curve Public Key Cryptosystems provides an up-to-date and self-contained treatment of elliptic curve-based public key cryptology. Elliptic curve cryptosystems potentially provide equivalent security to the existing public key schemes, but with shorter key lengths. Having short key lengths means smaller bandwidth and memory requirements and can be a crucial factor in some applications, for example the design of smart card systems. The book examines various issues which arise in the secure and efficient implementation of elliptic curve systems. Elliptic Curve Public Key Cryptosystems is a valuable reference resource for researchers in academia, government and industry who are concerned with issues of data security. Because of the comprehensive treatment, the book is also suitable for use as a text for advanced courses on the subject.
The Integration of Functions of a Single Variable
Author: G H Hardy
Publisher:
ISBN: 9781074116385
Category :
Languages : en
Pages : 78
Book Description
From the PREFACETHIS tract has been long out of print, and there is still some demand for it. I did not publish a second edition before, because I intended to incorporate its contents in a larger treatise on the subject which I had arranged to write in collaboration with Dr. Bromwich. Four or five years have passed, and it seems very doubtful whether either of us will ever find the time to carry out our intention. I have therefore decided to republish the tract.The new edition differs from the first in one important point only. In the first edition I reproduced a proof of Abel's which Mr. J. E. Littlewood afterwards discovered to be invalid. The correction of this error has led me to rewrite a few sections (pp. 36-41 of the present edition) completely. The proof which I give now is due to Mr. H. T. J. Norton. I am also indebted to Mr. Norton, and to Mr. S. Pollard, for many other criticisms of a less important character.--G. H. H
Publisher:
ISBN: 9781074116385
Category :
Languages : en
Pages : 78
Book Description
From the PREFACETHIS tract has been long out of print, and there is still some demand for it. I did not publish a second edition before, because I intended to incorporate its contents in a larger treatise on the subject which I had arranged to write in collaboration with Dr. Bromwich. Four or five years have passed, and it seems very doubtful whether either of us will ever find the time to carry out our intention. I have therefore decided to republish the tract.The new edition differs from the first in one important point only. In the first edition I reproduced a proof of Abel's which Mr. J. E. Littlewood afterwards discovered to be invalid. The correction of this error has led me to rewrite a few sections (pp. 36-41 of the present edition) completely. The proof which I give now is due to Mr. H. T. J. Norton. I am also indebted to Mr. Norton, and to Mr. S. Pollard, for many other criticisms of a less important character.--G. H. H