Number Theory and Cryptography
$49.99
Part of London Mathematical Society Lecture Note Series
 Author: J. H. Loxton
 Date Published: April 1990
 availability: Available
 format: Paperback
 isbn: 9780521398770
$49.99
Paperback
Other available formats:
eBook
Looking for an examination copy?
If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

In this volume, originally published in 1990, are included papers presented at two meetings; one a workshop on Number Theory and Cryptography, and the other, the annual meeting of the Australian Mathematical Society. Questions in number theory are of military and commercial importance for the security of communication, as they are related to codes and codebreaking. Papers in the volume range from problems in pure mathematics whose study has been intensified by this connection, through interesting theoretical and combinatorial problems which arise in the implementation, to practical questions that come from banking and telecommunications. The contributors are prominent within their field. The whole volume will be an attractive purchase for all number theorists, 'pure' or 'applied'.
Customer reviews
Not yet reviewed
Be the first to review
Review was not posted due to profanity
×Product details
 Date Published: April 1990
 format: Paperback
 isbn: 9780521398770
 length: 248 pages
 dimensions: 229 x 152 x 14 mm
 weight: 0.37kg
 availability: Available
Table of Contents
List of contributors
Introduction
Part I. Number Theoretic Aspects of Cryptology:
1. Some mathematical aspects of recent advances in cryptology R. Lidl
2. Quadratic fields and cryptography J. Buchmann and H. C. Williams
3. Parallel algorithms for integer factorisation R. P. Brent
4. An open architecture number sieve A. J. Stephens and H. C. Williams
5. Algorithms for finite fields H. W. Lenstra, Jr.
6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten
Part II. Cryptographic Devices and Applications:
7. Security in telecommunication services over the next decade J. Snare
8. Linear feedback shift registers and stream ciphers E. Dawson
9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli
10. Pseudorandom sequence generators using structures noise R. S. SafaviNaini and J. R. Seberry
11. Privacy for MANCET M. Warner
12. Authentication B. Newman
13. Insecurity of the knapsack onetime pad R. T. Worley
14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters
15. Reed–Solomon coding in the complex field M. Rudolph
Part III. Diophantine Analysis:
16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams
17. Number theoretic problems involving two independent bases T. Kamae
18. A class of normal numbers II. Y. N. Nakai and I. Shiokawa
19. Notes on uniform distribution G. Myerson and A. Pollington
20. Thue equations and multiplicative independence B. Brizinda
21. A number theoretic crank associated with open bosonic strings F. G. Garvan
22. Universal families of abelian varieties A. Silverberg.
Sorry, this resource is locked
Please register or sign in to request access. If you are having problems accessing these resources please email cflack@cambridge.org
Register Sign in» Proceed