Primality Testing and Abelian Varieties Over Finite Fields

Primality Testing and Abelian Varieties Over Finite Fields PDF Author: Leonard M. Adleman
Publisher: Springer
ISBN: 3540470212
Category : Mathematics
Languages : en
Pages : 149

Get Book Here

Book Description
From Gauss to G|del, mathematicians have sought an efficient algorithm to distinguish prime numbers from composite numbers. This book presents a random polynomial time algorithm for the problem. The methods used are from arithmetic algebraic geometry, algebraic number theory and analyticnumber theory. In particular, the theory of two dimensional Abelian varieties over finite fields is developed. The book will be of interest to both researchers and graduate students in number theory and theoretical computer science.

Primality Testing and Abelian Varieties Over Finite Fields

Primality Testing and Abelian Varieties Over Finite Fields PDF Author: Leonard M. Adleman
Publisher: Springer
ISBN: 3540470212
Category : Mathematics
Languages : en
Pages : 149

Get Book Here

Book Description
From Gauss to G|del, mathematicians have sought an efficient algorithm to distinguish prime numbers from composite numbers. This book presents a random polynomial time algorithm for the problem. The methods used are from arithmetic algebraic geometry, algebraic number theory and analyticnumber theory. In particular, the theory of two dimensional Abelian varieties over finite fields is developed. The book will be of interest to both researchers and graduate students in number theory and theoretical computer science.

Primality Testing and Abelian Varieties Over Finite Fields

Primality Testing and Abelian Varieties Over Finite Fields PDF Author: Leonard M. Adleman
Publisher:
ISBN: 9783662170595
Category :
Languages : en
Pages : 152

Get Book Here

Book Description


Computational Arithmetic Geometry

Computational Arithmetic Geometry PDF Author: Kristin Estella Lauter
Publisher: American Mathematical Soc.
ISBN: 0821843206
Category : Mathematics
Languages : en
Pages : 146

Get Book Here

Book Description
With the recent increase in available computing power, new computations are possible in many areas of arithmetic geometry. To name just a few examples, Cremona's tables of elliptic curves now go up to conductor 120,000 instead of just conductor 1,000, tables of Hilbert class fields are known for discriminant up to at least 5,000, and special values of Hilbert and Siegel modular forms can be calculated to extremely high precision. In many cases, these experimental capabilities haveled to new observations and ideas for progress in the field. They have also led to natural algorithmic questions on the feasibility and efficiency of many computations, especially for the purpose of applications in cryptography. The AMS Special Session on Computational Arithmetic Geometry, held onApril 29-30, 2006, in San Francisco, CA, gathered together many of the people currently working on the computational and algorithmic aspects of arithmetic geometry. This volume contains research articles related to talks given at the session. The majority of articles are devoted to various aspects of arithmetic geometry, mainly with a computational approach.

Finite Fields: Theory and Computation

Finite Fields: Theory and Computation PDF Author: Igor Shparlinski
Publisher: Springer Science & Business Media
ISBN: 940159239X
Category : Mathematics
Languages : en
Pages : 532

Get Book Here

Book Description
This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, finding irreducible and primitive polynomials, the distribution of these primitive polynomials and of primitive points on elliptic curves, constructing bases of various types and new applications of finite fields to other areas of mathematics. For completeness we in clude two special chapters on some recent advances and applications of the theory of congruences (optimal coefficients, congruential pseudo-random number gener ators, modular arithmetic, etc.) and computational number theory (primality testing, factoring integers, computation in algebraic number theory, etc.). The problems considered here have many applications in Computer Science, Cod ing Theory, Cryptography, Numerical Methods, and so on. There are a few books devoted to more general questions, but the results contained in this book have not till now been collected under one cover. In the present work the author has attempted to point out new links among different areas of the theory of finite fields. It contains many very important results which previously could be found only in widely scattered and hardly available conference proceedings and journals. In particular, we extensively review results which originally appeared only in Russian, and are not well known to mathematicians outside the former USSR.

Handbook of Elliptic and Hyperelliptic Curve Cryptography

Handbook of Elliptic and Hyperelliptic Curve Cryptography PDF Author: Henri Cohen
Publisher: CRC Press
ISBN: 1420034987
Category : Mathematics
Languages : en
Pages : 843

Get Book Here

Book Description
The discrete logarithm problem based on elliptic and hyperelliptic curves has gained a lot of popularity as a cryptographic primitive. The main reason is that no subexponential algorithm for computing discrete logarithms on small genus curves is currently available, except in very special cases. Therefore curve-based cryptosystems require much smaller key sizes than RSA to attain the same security level. This makes them particularly attractive for implementations on memory-restricted devices like smart cards and in high-security applications. The Handbook of Elliptic and Hyperelliptic Curve Cryptography introduces the theory and algorithms involved in curve-based cryptography. After a very detailed exposition of the mathematical background, it provides ready-to-implement algorithms for the group operations and computation of pairings. It explores methods for point counting and constructing curves with the complex multiplication method and provides the algorithms in an explicit manner. It also surveys generic methods to compute discrete logarithms and details index calculus methods for hyperelliptic curves. For some special curves the discrete logarithm problem can be transferred to an easier one; the consequences are explained and suggestions for good choices are given. The authors present applications to protocols for discrete-logarithm-based systems (including bilinear structures) and explain the use of elliptic and hyperelliptic curves in factorization and primality proving. Two chapters explore their design and efficient implementations in smart cards. Practical and theoretical aspects of side-channel attacks and countermeasures and a chapter devoted to (pseudo-)random number generation round off the exposition. The broad coverage of all- important areas makes this book a complete handbook of elliptic and hyperelliptic curve cryptography and an invaluable reference to anyone interested in this exciting field.

Cryptography and Coding

Cryptography and Coding PDF Author: Michael Walker
Publisher: Springer Science & Business Media
ISBN: 354066887X
Category : Computers
Languages : en
Pages : 323

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 7th IMA Conference on Cryptography and Coding held in Cirencester, UK, in December 1999. The 35 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics covered are error-correcting coding, arithmetic coding for data compression and encryption, image coding, biometric authentication, broadcast channel access, graph and trellis decoding, turbo codes, convolution codes, Reed Solomon codes, elliptic curve cryptography, primality testing, finite-field arithmetic, and cryptographic protocols.

Elliptic Curves in Cryptography

Elliptic Curves in Cryptography PDF Author: Ian F. Blake
Publisher: Cambridge University Press
ISBN: 9780521653749
Category : Computers
Languages : en
Pages : 228

Get Book Here

Book Description
This book summarizes knowledge built up within Hewlett-Packard over a number of years, and explains the mathematics behind practical implementations of elliptic curve systems. Due to the advanced nature of the mathematics there is a high barrier to entry for individuals and companies to this technology. Hence this book will be invaluable not only to mathematicians wanting to see how pure mathematics can be applied but also to engineers and computer scientists wishing (or needing) to actually implement such systems.

Primality Testing in Polynomial Time

Primality Testing in Polynomial Time PDF Author: Martin Dietzfelbinger
Publisher: Springer Science & Business Media
ISBN: 3540403442
Category : Mathematics
Languages : en
Pages : 153

Get Book Here

Book Description
A self-contained treatment of theoretically and practically important efficient algorithms for the primality problem. The text covers the randomized algorithms by Solovay-Strassen and Miller-Rabin from the late 1970s as well as the recent deterministic algorithm of Agrawal, Kayal and Saxena. The volume is written for students of computer science, in particular those with a special interest in cryptology, and students of mathematics, and it may be used as a supplement for courses or for self-study.

Algorithmic Number Theory

Algorithmic Number Theory PDF Author: Henri Cohen
Publisher: Springer Science & Business Media
ISBN: 9783540615811
Category : Computers
Languages : en
Pages : 422

Get Book Here

Book Description
This book constitutes the refereed post-conference proceedings of the Second International Algorithmic Number Theory Symposium, ANTS-II, held in Talence, France in May 1996. The 35 revised full papers included in the book were selected from a variety of submissions. They cover a broad spectrum of topics and report state-of-the-art research results in computational number theory and complexity theory. Among the issues addressed are number fields computation, Abelian varieties, factoring algorithms, finite fields, elliptic curves, algorithm complexity, lattice theory, and coding.

Computational Number Theory and Modern Cryptography

Computational Number Theory and Modern Cryptography PDF Author: Song Y. Yan
Publisher: John Wiley & Sons
ISBN: 1118188586
Category : Computers
Languages : en
Pages : 432

Get Book Here

Book Description
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical concepts. The book also presents topics from number theory, which are relevant for applications in public-key cryptography, as well as modern topics, such as coding and lattice based cryptography for post-quantum cryptography. The author further covers the current research and applications for common cryptographic algorithms, describing the mathematical problems behind these applications in a manner accessible to computer scientists and engineers. Makes mathematical problems accessible to computer scientists and engineers by showing their immediate application Presents topics from number theory relevant for public-key cryptography applications Covers modern topics such as coding and lattice based cryptography for post-quantum cryptography Starts with the basics, then goes into applications and areas of active research Geared at a global audience; classroom tested in North America, Europe, and Asia Incudes exercises in every chapter Instructor resources available on the book’s Companion Website Computational Number Theory and Modern Cryptography is ideal for graduate and advanced undergraduate students in computer science, communications engineering, cryptography and mathematics. Computer scientists, practicing cryptographers, and other professionals involved in various security schemes will also find this book to be a helpful reference.