- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Papers presented by prominent contributors at a workshop on Number Theory and Cryptography, and the annual meeting of the Australian Mathematical Society.
Andere Kunden interessierten sich auch für
- F. Mezzadri / N. C. Snaith (eds.)Recent Perspectives in Random Matrix Theory and Number Theory101,99 €
- Sinnou David (ed.)Number Theory82,99 €
- Shinnou DavidNumber Theory37,99 €
- Dynamics and Analytic Number Theory86,99 €
- Yoichi Motohashi (ed.)Analytic Number Theory76,99 €
- Miles Reid / Alexei Skorobogatov (eds.)Number Theory and Algebraic Geometry82,99 €
- Peter D. ElliottDuality in Analytic Number Theory73,99 €
-
-
-
Papers presented by prominent contributors at a workshop on Number Theory and Cryptography, and the annual meeting of the Australian Mathematical Society.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Cambridge University Press
- Seitenzahl: 248
- Erscheinungstermin: 26. April 2011
- Englisch
- Abmessung: 229mm x 152mm x 15mm
- Gewicht: 408g
- ISBN-13: 9780521398770
- ISBN-10: 0521398770
- Artikelnr.: 26933508
- Verlag: Cambridge University Press
- Seitenzahl: 248
- Erscheinungstermin: 26. April 2011
- Englisch
- Abmessung: 229mm x 152mm x 15mm
- Gewicht: 408g
- ISBN-13: 9780521398770
- ISBN-10: 0521398770
- Artikelnr.: 26933508
List of contributors
Introduction
Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl
2. Quadratic fields and cryptography J. Buchmann and H. C. Williams
3. Parallel algorithms for integer factorisation R. P. Brent
4. An open architecture number sieve A. J. Stephens and H. C. Williams
5. Algorithms for finite fields H. W. Lenstra, Jr.
6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten
Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare
8. Linear feedback shift registers and stream ciphers E. Dawson
9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli
10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry
11. Privacy for MANCET M. Warner
12. Authentication B. Newman
13. Insecurity of the knapsack one-time pad R. T. Worley
14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters
15. Reed-Solomon coding in the complex field M. Rudolph
Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams
17. Number theoretic problems involving two independent bases T. Kamae
18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa
19. Notes on uniform distribution G. Myerson and A. Pollington
20. Thue equations and multiplicative independence B. Brizinda
21. A number theoretic crank associated with open bosonic strings F. G. Garvan
22. Universal families of abelian varieties A. Silverberg.
Introduction
Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl
2. Quadratic fields and cryptography J. Buchmann and H. C. Williams
3. Parallel algorithms for integer factorisation R. P. Brent
4. An open architecture number sieve A. J. Stephens and H. C. Williams
5. Algorithms for finite fields H. W. Lenstra, Jr.
6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten
Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare
8. Linear feedback shift registers and stream ciphers E. Dawson
9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli
10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry
11. Privacy for MANCET M. Warner
12. Authentication B. Newman
13. Insecurity of the knapsack one-time pad R. T. Worley
14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters
15. Reed-Solomon coding in the complex field M. Rudolph
Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams
17. Number theoretic problems involving two independent bases T. Kamae
18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa
19. Notes on uniform distribution G. Myerson and A. Pollington
20. Thue equations and multiplicative independence B. Brizinda
21. A number theoretic crank associated with open bosonic strings F. G. Garvan
22. Universal families of abelian varieties A. Silverberg.
List of contributors
Introduction
Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl
2. Quadratic fields and cryptography J. Buchmann and H. C. Williams
3. Parallel algorithms for integer factorisation R. P. Brent
4. An open architecture number sieve A. J. Stephens and H. C. Williams
5. Algorithms for finite fields H. W. Lenstra, Jr.
6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten
Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare
8. Linear feedback shift registers and stream ciphers E. Dawson
9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli
10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry
11. Privacy for MANCET M. Warner
12. Authentication B. Newman
13. Insecurity of the knapsack one-time pad R. T. Worley
14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters
15. Reed-Solomon coding in the complex field M. Rudolph
Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams
17. Number theoretic problems involving two independent bases T. Kamae
18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa
19. Notes on uniform distribution G. Myerson and A. Pollington
20. Thue equations and multiplicative independence B. Brizinda
21. A number theoretic crank associated with open bosonic strings F. G. Garvan
22. Universal families of abelian varieties A. Silverberg.
Introduction
Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl
2. Quadratic fields and cryptography J. Buchmann and H. C. Williams
3. Parallel algorithms for integer factorisation R. P. Brent
4. An open architecture number sieve A. J. Stephens and H. C. Williams
5. Algorithms for finite fields H. W. Lenstra, Jr.
6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten
Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare
8. Linear feedback shift registers and stream ciphers E. Dawson
9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli
10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry
11. Privacy for MANCET M. Warner
12. Authentication B. Newman
13. Insecurity of the knapsack one-time pad R. T. Worley
14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters
15. Reed-Solomon coding in the complex field M. Rudolph
Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams
17. Number theoretic problems involving two independent bases T. Kamae
18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa
19. Notes on uniform distribution G. Myerson and A. Pollington
20. Thue equations and multiplicative independence B. Brizinda
21. A number theoretic crank associated with open bosonic strings F. G. Garvan
22. Universal families of abelian varieties A. Silverberg.