bibliography - springer978-3-662-04053-9/1.pdf · bibliography 1. l. m ... a first course in...

19
Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings oE the 20th Annual IEEE Symposium on Foundations oE Computer Science, IEEE Press, 1979, 55- 60. 2. L. M. Adleman, "Algorithmic Number Theory - The Complexity Contribution", Proceedings oE the 35th Annual IEEE Symposium on Foundations oE Computer Seien ce, IEEE Press, 1994, 88-113. 3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals oE Mathematics, 117 (1983), 173- 206. 4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992. 5. A. V. Aho, J. E. Hopcroft and J. D. Ullman, The Design and Analysis oE Computer Algorithms, Addison-Wesley, 1974. 6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals oE Mathematics, 140 (1994), 703-722. 7. R. Alter, "Computations and Generalizations of aRemark of Ramanujan", Analytic Number Theory, Proceedings, Lecture Notes in Mathematics 899, Springer-Verlag, 1981, 183-196. 8. J. A. Anderson and J. M. Bell, Number Theory with Applications, Prentice- Hall, 1997. 9. R. Anderson (editor), InEormation Hiding, First International Workshop, Pro- ceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, 1996. 10. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Print- ing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998. 11. A. O. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Math- ematics oE Computation, 61 (1993), 29-68. 12. D. Aucsmith (editor), InEormation Hiding, Second International Workshop, Proceedings, Lecture Notes in Computer Science 1525, Springer-Verlag, 1998. 13. E. Bach, M. Giesbrecht and J. McInnes, The Complexity oE Number Theoret- ical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991. 14. E. Bach, G. Miller and J. Shallit, "Sums of Divisors, Perfect Numbers and Factoring", SIAM Journal on Computing, 15 (1989), 1143-1154. 15. E. Bach and J. Shallit, Algorithmic Number Theory I - EfIicient Algorithms, MIT Press, 1996.

Upload: ngothuy

Post on 27-Aug-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Bibliography

1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings oE the 20th Annual IEEE Symposium on Foundations oE Computer Science, IEEE Press, 1979, 55-60.

2. L. M. Adleman, "Algorithmic Number Theory - The Complexity Contribution", Proceedings oE the 35th Annual IEEE Symposium on Foundations oE Computer Seien ce, IEEE Press, 1994, 88-113.

3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals oE Mathematics, 117 (1983), 173-206.

4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992.

5. A. V. Aho, J. E. Hopcroft and J. D. Ullman, The Design and Analysis oE Computer Algorithms, Addison-Wesley, 1974.

6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals oE Mathematics, 140 (1994), 703-722.

7. R. Alter, "Computations and Generalizations of aRemark of Ramanujan", Analytic Number Theory, Proceedings, Lecture Notes in Mathematics 899, Springer-Verlag, 1981, 183-196.

8. J. A. Anderson and J. M. Bell, Number Theory with Applications, Prentice­Hall, 1997.

9. R. Anderson (editor), InEormation Hiding, First International Workshop, Pro­ceedings, Lecture Notes in Computer Science 1174, Springer-Verlag, 1996.

10. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Print­ing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998.

11. A. O. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Math­ematics oE Computation, 61 (1993), 29-68.

12. D. Aucsmith (editor), InEormation Hiding, Second International Workshop, Proceedings, Lecture Notes in Computer Science 1525, Springer-Verlag, 1998.

13. E. Bach, M. Giesbrecht and J. McInnes, The Complexity oE Number Theoret­ical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991.

14. E. Bach, G. Miller and J. Shallit, "Sums of Divisors, Perfect Numbers and Factoring", SIAM Journal on Computing, 15 (1989), 1143-1154.

15. E. Bach and J. Shallit, Algorithmic Number Theory I - EfIicient Algorithms, MIT Press, 1996.

364 Bibliography

16. A. Backer, A Concise Introduction to the Theory oE Numbers, Cambridge Uni­versity Press, 1984.

17. R. J. Baillie and S. S. Wagstaff, Jr., "Lucas Pseudoprimes", Mathematics oE Computation, 35 (1980), 1391-1417.

18. F. L. Bauer, Decrypted Secrets - Methods and Maxims oE Cryptology, 2nd Edition, Springer-Verlag, 2000.

19. B. Beckett, Introduction to Cryptology and PC Security, McGraw-Hill, 1997.

20. M. Bellare and P. Gogaway, "Optimal Asymmetrie Encryption", Advances in Cryptography, CRYPTO '94, Proceedings, Lecture Notes in Computer Science 950, Springer-Verlag, 1995, 92-111.

21. P. Benioff, "The Computer as a Physical System - A Microscopic Quantum Mechanical Hamiltonian Model of Computers as Represented by Turing Ma­chines" , Journal oE Statistical Physics, 22 (1980), 563-591.

22. C. H. Bennett, "Quantum Information and Computation" , Physics Today, Oc­tober 1995, 24-30.

23. C. H. Bennett, G. Brassard and A. K. Ekert, "Quantum Cryptography", Sci­entific American, October 1992, 26-33.

24. C. H. Bennett, "Strengths and Weakness of Quantum Computing" , SIAM Jour­nal on Computing, 26, (5)1997, 1510-1523.

25. E. Bernstein and U. Vazirani, "Quantum Complexity Theory", SIAM Journal on Computing, 26, 5(1997), 1411-1473.

26. M. Blum and S. Goldwasser, "An Efficient Probabilistic Public-key Encryp­tion Scheme that Hides all Partial Information", Advances in Cryptography, CRYPTO '84, Proceedings, Lecture Notes in Computer Science 196, Springer­Verlag, 1985, 289-302.

27. B. Bollobas (editor), Littlewood's Miscellany, Cambridge University Press, 1986.

28. D. Boneh, "Twenty Years of Attacks on the RSA Cryptosystem", Notices oE the AMS, 46, 2(1999), 203-213.

29. W. Borho, "Über die Fixpunkte der k-fach iterierten Teilersummenfunktion" , Mitt. Math. Gesellsch. Hamburg, 9, 5(1969), 34-48.

30. W. Borho and H. Hoffmann, "Breeding Amicable Numbers in Abundance", Mathematics oE Computation, 46 (1986), 281-293.

31. G. Brassard, "A Quantum Jump in Computer Science" , Computer Science Today - Recent Trends and Development, Lecture Notes in Computer Science 1000, Springer-Verlag, 1995, 1-14.

32. R. P. Brent, "Irregularities in the Distribution of Primes and Twin Primes" , Mathematics oE Computation, 29 (1975), 43-56.

33. R. P. Brent, "An Improved Monte Carlo Factorization Algorithm", BIT, 20 (1980), 176-184.

34. R. P. Brent, "Some Integer Factorization Algorithms using Elliptic Curves", Australian Computer Science Communications, 8 (1986), 149-163.

35. R. P. Brent, "Primality Testing and Integer Factorization", Proceedings oE Aus­tralian Academy oE Science Annual General Meeting Symposium on the Role oE Mathematics in Science, Canberra, 1991, 14-26.

36. R. P. Brent, "Uses of Randomness in Computation", Report TR-CS-94-06, Computer Sciences Laboratory, Australian National University, 1994.

Bibliography 365

37. R. P. Brent, G. L. Cohen and H. J. J. te Riele, "Improved Techniques for Lower Bounds for Odd Perfect Numbers", Mathematics oE Computation, 51 (1991), 857-868.

38. D. M. Bressoud, Factorization and Primality Testing, Undergraduate Texts in Mathematics, Springer-Verlag, 1989.

39. E. F. Brickell, D. M. Gordon and K. S. McCurley, "Fast Exponentiation with Precomputation" (Extended Abstract), Advances in Cryptography, EURO­CRYPT '92, Proceedings, Lecture Notes in Computer Science 658, Springer­Verlag, 1992, 200-207.

40. W. Buchanan, Mastering the Internet, Macmillan, 1997.

41. J. P. Buhler (editor), Algorithmic Number Theory, Third International Sym­posium, ANTS-III, Proceedings, Lecture Notes in Computer Science 1423, Springer-Verlag, 1998.

42. S. A. Burr (editor), The Unreasonable Effectiveness oE Number Theory, Pro­ceedings of Symposia in Applied Mathematics 46, American Mathematical So­ciety, 1992.

43. CACM, "The Digital Signature Standard Proposed by NIST and Responses to NIST's ProposaI" , Communications oE the ACM, 35, 7(1992), 36-54.

44. J. R. Chen, "On the Representation of a Large Even Integer as the Sum of a Prime and the Product of at most Two Primes" , Scientia Sinica, XVI, 2(1973), 157-176.

45. K. Chen, "Authenticated Encryption Scheme Based on Quadratic Residue", Electronics Letters, 34, 22(1998), 2115-2116.

46. L. Childs, A Concrete Introduction to Higher Algebra, Undergraduate Texts in Mathematics, Springer-Verlag, 1979.

47. H. Cohen, A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics 138, Springer-Verlag, 1993.

48. J. H. Conway and R. K. Guy, The Book oE Numbers, Springer-Verlag, 1996.

49. T. H. Cormen, C. E. Ceiserson and R. L. Rivest, Introduction to Algorithms, MIT Press, 1990.

50. R. Crandall, J. Doenias, C. Norrie and J. Young, "The Twenty-Second Fermat Number is Composite", Mathematics oE Computation, 64 (1995), 863-869.

51. I. Damgard (editor), Lectures in Data Security, Lecture Notes in Computer Science 1561, Springer-Verlag, 1999.

52. H. Davenport, The Higher Arithmetic, 7th Edition, Cambridge University Press, 1999.

53. M. Deleglise and J. Rivat, "Computing ?T(x) - the Meissel, Lehmer, Lagarias, Miller, Odlyzko Method", Mathematics oE Computation, 65 (1996), 235-245.

54. D. C. Denson, The Moment oE Pro oE - Mathematical Epiphanies, Oxford Uni­versity Press, 1997.

55. J. M. Deshouillers, G. Effinger, H. J. J. te Riele and D. Zinoviev, "A Complete Vinogradov 3-Prime Theorem under the Riemann Hypothesis" , Electronic Re­search Announcements oE the AMS, 3 (1997), 99-104.

56. J. M. Deshouillers, H. J. J. te Riele and Y. Saouter, New Experimental Results Concerning the Goldbach Conjecture, Technical Report MAS-R9804, Cent re for Mathematics and Computer Science (CWI), Amsterdam, 1998.

366 Bibliography

57. D. Deutsch, "Quantum Theory, the Church~Turing Principle and the Universal Quantum Computer", Proceedings of the Royal Society of London, Series A, 400 (1985), 96~ 117.

58. K. Devlin, Mathematics: The Science oE Patterns, Scientific American Library, 1997.

59. L. E. Dickson, History oE the Theory oE Numbers I ~ Divisibility and Primality, G. E. Stechert & Co., New York, 1934.

60. W. Diffie and E. Hellman, "New Directions in Cryptography", IEEE Transac­tions on InEormation Theory, 22, 5(1976), 644~654.

61. T. EIGamal, "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms", IEEE Transactions on InEormation Theory, 31 (1985), 496~472.

62. G. EIlis, Rings and Fields, Oxford University Press, 1992.

63. S. S. Epp, Discrete Mathematics with Applications, 2nd Edition, PWS Pub­lishing Company, Boston, 1995.

64. Euclid, The Thirteen Books oE Euc1id's Elements, Translated by T. L. Heath, Great Books oE the Western World 11, edited by R. M. Hutchins, William Benton Publishers, 1952.

65. Euclid, The Thirteen Books oE Euc1id's Elements, Second Edition, Translated by Thomas L. Heath, Dover Publications, 1956.

66. R. P. Feynman, "Simulating Physics with Computers", International Journal oE Theoretical Physics, 21 (1982), 467~488.

67. R. P. Feynman, Feynman Lectures on Computation, Edited by A. J. G. Hey and R. W. Allen, Addison-Wesley, 1996.

68. J. B. Fraleigh, A First Course in Abstract Algebra, 5th Edition, Addison­Wesley, 1994.

69. J. A. Gallian, "Error Detection Methods", ACM Computing Surveys, 28, 3(1996), 503~517.

70. M. Gardner, "Mathematical Games ~ A New Kind of Cipher that Would Take Millions of Years to Break", Scientific American, 237, 2(1977), 120~124.

71. M. R. Garey and D. S. Johnson, Computers and Intractability ~ A Guide to the Theory oE NP-Completeness, W. H. Freeman and Company, 1979.

72. S. GarfinkeI, Web Security and Commerce, O'Reilly, 1997.

73. C. F. Gauss, Disquisitiones Arithmeticae, G. Fleischer, Leipzig, 1801. English translation by A. A. Clarke, Yale University Press, 1966. Revised English trans­lation by W. C. Waterhouse, Springer-Verlag, 1975.

74. P. Giblin, Prim es and Programming ~ An Introduction to Number Theory with Computing, Cambridge University Press, 1993.

75. S. Goldwasser, "The Search for Provably Secure Cryptosystems", Cryptology and Computational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematical Society, 1990.

76. S. Goldwasser and J. Kilian, "Almost All Primes Can be Quickly Certified", Proceedings oE the 18th ACM Symposium on Theory oE Computing, Berkeley, 1986, 316~329.

77. S. Goldwasser and J. Kilian, "Primality Testing Using Elliptic Curves", Journal oE ACM, 46, 4(1999), 450~472.

Bibliography 367

78. S. Goldwasser and S. Micali, "Probabilistic Encryption", Journal oE Computer and System Sciences, 28 (1984), 270-299.

79. D. M. Gordon and K. S. McCurley, "Massively Parallel Computation of Dis­crete Logarithms", Advances in Cryptography, Crypto '92, Proceedings, Lec­ture Notes in Computer Science 740, Springer-Verlag, 1992,312-323.

80. D. M. Gordon, "Discrete Logarithms in GF(p) using the Number Field Sieve", SIAM Journal on Discrete Mathematics, 6, 1(1993), 124-138.

81. F. T. Grampp and R. H. Morris, "UNIX Operating System Security", AT&T Bell Laboratories Technical Journal, 63 (1984), 1649-1672.

82. A. Granville, J. van de Lune and H. J. J. te Riele, "Checking the Goldbach Conjecture on a Vector Computer", Number Theory and Applications, edited by R. A. Mollin, Kluwer Academic Publishers, 1989, 423-433.

83. D. Gries and F. B. Schneider, A Logical Approach to Discrete Math, Texts and Monographs in Computer Science, Springer-Verlag, 1993.

84. R. K. Guy, Unsolved Problems in Number Theory, 2nd Edition, Springer-Verlag, 1994.

85. D. Guedj, Numbers - The Universal Language, Thames and Hudson, 1997.

86. H. Halberstarn and H. E. Richert, Sieve Methods, Academic Press, 1974.

87. G. H. Hardy, A Mathematician's Apology, Cambridge University Press, 1979.

88. G. H. Hardy and J. E. Littlewood, "Some Problems of 'Partitio Numerorum', 111: On the Express of a Number as a Sum of Primes" , Acta Mathematica, 44 (1923), 1-70.

89. G. H. Hardy and E. M. Wright, An Introduction to Theory oE Numbers, 5th Edition, Oxford University Press, 1979.

90. D. R. Heath-Brown, "Odd Perfect Numbers", Mathematical Proceedings oE Cambridge Philosophy Society, 115, 1(1994), 191-196.

91. A. Heck, Introduction to Maple, 2nd Edition, Springer-Verlag, 1996.

92. I. N. Herstein, Topics in Algebra, 2nd Edition, Wiley, 1975.

93. R. Hill, A First Course in Coding Theory, Oxford University Press, 1991.

94. L. Hua, Introduction to Number Theory, English Translation from Chinese by P. Shiu, Springer-Verlag, 1980.

95. R. J. Hughes, "Cryptography, Quantum Computation and Trapped Ions", Philosophie Transactions oE the Royal Society London, Series A, 356 (1998), 1853-1868.

96. R. M. Huizing, An Implementation oEthe Number Field Sieve, Note NM-R9511, Centre for Mathematics and Computer Science (CWI), Amsterdam, 1995.

97. T. W. Hungerford, Abstract Algebra - An Introduction, Saunders College Pub­lishing, 1990.

98. D. Husemöller, Elliptic Curves, Graduate Texts in Mathematics 111, Springer­Verlag, 1987.

99. H. Inamori, A Minimal Introduction to Quantum Key Distribution, Centre for Quantum Computation, Clarendon Laboratory, Oxford University, 1999.

100. K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, 2nd Edition, Graduate Texts in Mathematics 84, Springer-Verlag, 1990.

101. T. H. Jackson, From Number Theory to Secret Codes, A Computer Illustrated Text, Adam Hilger, Bristol, 1987.

368 Bibliography

102. G. Jaeschke, "Reciprocal Hashing: A Method for Generating Minimal Perfeet Hashing Functions", Communications oE the ACM, 24, 12(1981), 829-833.

103. D. S. Johnson, "A Catalog of Complexity Classes", Handbook oE Theoretical Computer Science, edited by J. van Leeuwen, MIT Press, 1990, 69-161.

104. B. S. Kaliski, "A Pseudo-Random Bit Generator Based on Elliptic Curve Logarithms", Advances in Cryptography, CRYPTO '86, Proceedings, Lecture Notes in Computer Science 263, Springer-Verlag, 1986,84-103.

105. D. Kahn, The Codebreakers, Macmillan, 1967.

106. C. Kaufman, R. Perlman and M. Speciner, Network Security - Private Com­munication in a Public World, Prentice-Hall, 1995.

107. A. Va. Khinchin, Continued Fractions, English translation from Russian, Chicago University Press, 1964.

108. J. Kilian, Uses oE Randomness in Algorithms and Protocols, MIT Press, 1990.

109. D. E. Knuth, "Computer Science and its Relation to Mathematics" , American Mathematical Monthly, 81, 4(1974), 323-343.

110. D. E. Knuth, The Art oE Computer Programming I-Fundamental Algorithms, 3rd Edition, Addison-Wesley, 1997.

111. D. E. Knuth, The Art oE Computer Programming II - Seminumerical Algo­rithms, 3rd Edition, Addison-Wesley, 1998.

112. D. E. Knuth, The Art oE Computer Programming III - Sorting and Searching, 2nd Edition, Addison-Wesley, 1998.

113. C. Ko and Q. Sun, Lecture Notes in Number Theory (In Chinese), Higher Education Press, Beijing, 1984.

114. N. Koblitz, "Elliptic Curve Cryptography" , Mathematics oE Computation, 48 (1987), 203-209.

115. N. Koblitz, Introduction to Elliptic Curves and Modular Forms, 2nd Edition, Graduate Texts in Mathematics 97, Springer-Verlag, 1993.

116. N. Koblitz, A Course in Number Theory and Cryptography, 2nd Edition, Graduate Texts in Mathematics 114, Springer-Verlag, 1994.

117. N. Koblitz, Algebraic Aspects oE Cryptography, Algorithms and Computation in Mathematics 3, Springer-Verlag, 1998.

118. S. Konyagin and C. Pomerance, "On Primes Recognizable in Deterministic Polynomial Time", The Mathematics oE Paul Erdös, edited by R. L. Graham and J. Nesetril, Algorithms and Combinatorics 13, Springer-Verlag, 1997, 176-198.

119. I. Koren, Computer Arithmetic Algorithms, Prentice-Hall, 1993.

120. H. Krishna, B. Krishna, K. Y. Lin, and J. D. Sun, Computational Number Theory and Digital Signal Processing, CRC Press, 1994.

121. E. Kranakis, Primality and Cryptography, John Wiley & Sons, 1986.

122. R. Kumanduri and C. Ronero, Number Theory with Computer Applications, Prentice-Hall, 1998.

123. J. C. Lagarias, "Pseudorandom Number Generators", Cryptology and Com­putational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematical Society, 1990, pp 115-143.

124. S. Lang, Elliptic Functions, 2nd Edition, Springer-Verlag, 1987.

125. J. van Leeuwen (editor), Handbook oE Theoretical Computer Seien ce, MIT Press, 1990.

Bibliography 369

126. R. S. Lehman, "Factoring Large Integers" , Mathematics oE Computation, 28 (1974), pp 637-646.

127. H. W. Lenstra, Jr., "Factoring Integers with Elliptic Curves", Annals oE Math­ematics, 126 (1987), 649-673.

128. A. K. Lenstra and H. W. Lenstra, Jr., The Development oE the Number Field Sieve, Lecture Notes in Mathematics 1554, Springer-Verlag, 1993.

129. H. R. Lewis and C. H. Papadimitriou, Elements oE the Theory oE Computation, 2nd Edition, Prentice-Hall, 1998.

130. P. Linz, An Introduction to Formal Languages and Automata, 2nd Edition, Jones and Bartlett Publishers, 1997.

131. C L. Liu, Introduction to Combinatorial Mathematics, McGraw-Hill, 1968.

132. H. K. Lo, "Quantum Cryptography" , Introduction to Quantum Computation and InEormation, edited by H. K. Lo, S. Popescu and T. Spiller, World Scientific, 1998, 76-119.

133. J. van de Lune, H. J. J. te Riele and D. T. Winter, "On the Zeros of the Riemann Zata Function in the Critical Strip IV" , Mathematics oE Computation, 46 (1986), _667-681.

134. R. S. Macgregor, A. Aresi and A. Siegert, WWW.Security - How to Build a Sec ure World Wide Web Connection, Prentice-Hall, 1996.

135. J. H. McClellan and C. M. Radar, Number Theory in Digital Signal Process­ing, Prentice-Hall, 1979.

136. K. S. McCurley, "The Discrete Logarithm Problem", Cryptology and Com­putational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.

137. K. S. McCurley, "Odds and Ends from Cryptology and Computational Num­ber Theory", edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.

138. R. J. McEliece, Finite Fields Eor Computer Scientists and Engineers, Kluwer Academic Publishers, 1987.

139. H. McKean and V. Moll, Elliptic Curves - Function Theory, Geometry, Arith­metic, Cambridge University Press, 1997.

140. A. R. Meijer, "Groups, Factoring, and Cryptography" Mathematics Magazine, 69, 2(1996), 103-109.

141. A. J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.

142. A. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook oE Applied Cryptosystems, CRC Press, 1996.

143. B. Meyer and and V. Müller, "A Public Key Cryptosystem Based on Elliptic Curves over Z/nZ Equivalent to Factoring", Advances in Cryptology, EURO­CRYPT "96, Proceedings, Lecture Notes in Computer Science 1070, Springer­Verlag, 1996, 49-59.

144. M. Mignotte, "How to Share a Secret", Cryptography, Workshop Proceedings, Lecture Notes in Computer Science 149, Springer-Verlag, 1983, 371-375.

145. G. Miller, "Riemann's Hypothesis and Tests for Primality", Journal oE Systems and Computer Science, 13 (1976), 300-317.

146. V. Miller, "Uses of Elliptic Curves in Cryptography", Advances in Cryptology, CRYPTO '85, Proceedings, Lecture Notes in Computer Science 218, Springer­Verlag, 1986, 417-426.

370 Bibliography

147. R. A. Mollin, Fundamental Number Theory with Applications, CRC Press, 1998.

148. P. L. Montgomery, "Speeding Pollard's and Elliptic Curve Methods of Fac­torization", Mathematics of Computation, 48 (1987), 243-264.

149. P. L. Montgomery, "A Survey of Modern Integer Factorization Algorithms", CWI Quarterly, 7, 4(1994), 337-394.

150. F. Morain, Courbes Elliptiques et Tests de PrimaliM, Universite Claude Bernard, Lyon I, 1990.

151. M. A. Morrison and J. Brillhart, "A Method of Factoring and the Factorization of F7", Mathematics of Computation, 29 (1975), 183-205.

152. R. Motwani and P. Raghavan, Randomized Algorithms, Cambridge University Press, 1995.

153. C. J. Mozzochi, "A Simple Proof of the Chinese Remainder Theorem", Amer­ican Mathematical Monthly, 74 (1967), 998.

154. NIST, "Data Encryption Standard", Federal Information Processing Stan­dards Publication 46-3, National Institute of Standards and Technology, U.S. Department of Commerce, 1999.

155. I. Niven, H. S. Zuckerman and H. L. Montgomery, An Introduction to the Theory of Numbers, 5th Edition, John Wiley & Sons, 1991.

156. D. H. Nyang and J. S. Song, "Fast Digital Signature Scheme Based on the Quadratic Residue Problem", Electronics Letters, 33, 3(1997), 205-206.

157. J. O'Connor and E. Robertson, The MacTutor History of Mathematics Archive, http://www.groups.dcs.st-and.ac. uk/ '" history /Mathematicians.

158. A. M. Odlyzko, "Discrete Logarithms in Finite Fields and their Cryptographic Significance" , Advances in Cryptography, EUROCRYPT '84, Proceedings, Lec­ture Notes in Computer Science 209, Springer-Verlag, 1984, 225-314.

159. T. Okamoto and K. Ohta, "Universal Electronic Cash", Advances in Cryp­tography, CRYPTO '91, Proceedings, Lecture Notes in Computer Science 576, Springer-Verlag, 1991, 324-337.

160. Open University Course Team, Number Theory, Complex Analysis Unit 15, Open University Press, 1974.

161. O. Ore, Number Theory and its History, Dover Publications, 1988.

162. C. P. Pfleeger, Security in Computing, Prentice-Hall, 1997.

163. R. G. E. Pinch, Some Primality Testing Algorithms, Notices of the American Mathematical Society, 40, 9(1993), 1203-1210.

164. R. G. E. Pinch, Mathematics for Cryptography, Queen's College, University of Cambridge, 1997.

165. S. C. Pohlig and M. Hellman, "An Improved Algorithm for Computing Loga­rithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), 106-110.

166. J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15 (1975), 331-332.

167. J. M. Pollard, "Monte Carlo Methods for Index Computation (mod p)", Mathematics of Computation, 32 (1980), 918-924.

168. C. Pomerance, "Very Short Primality Proofs", Mathematics of Computation, 48 (1987), 315-322.

Bibliography 371

169. C. Pomeranee (editor), Cryptology and Computational Number Theory, Pro­eeedings of Symposia in Applied Mathematies 42, Ameriean Mathematical So­eiety, 1990.

170. C. Pomeranee, "Cryptology and Computational Number Theory - An Intro­duetion" , Cryptologyand Computational Number Theory, edited by C. Pomer­anee, Proeeedings of Symposia in Applied Mathematies 42, Ameriean Mathe­matieal Society, 1990, 1-12.

171. C. Pomeranee, J. L. Selfridge and S. S. Wagstaff, Jr., "The Pseudoprimes to 25.109", Mathematics oE Computation, 35 (1980), 1003-1026.

172. V. R. Pratt, "Every Prime Has a Suecinct Certifieate", SIAM Journal on Computing, 4 (1975), 214-220.

173. W. H. Press and Teukolsky et al. , Numerical Recipes in C - The Art oE Scientific Computing, 2nd Edition, Cambridge University Press, 1992.

174. M. O. Rabin, "Probabilistic Algorithms for Testing Primality", Journal oE Number Theory, 12 (1980), 128-138.

175. E. D. Reilly and F. D. Federighi, PASCALGORITHMS - A Pascal-Based Introduction to Computer Science, Houghton MifHin, Boston, 1989.

176. P. Ribenboim, The Little Book on Big Prim es, Springer-Verlag, 1991.

177. P. Ribenboim, "Selling Primes" , Mathematics Magazine, 68, 3(1995), 175-182.

178. P. Ribenboim, The New Book oE Prime Number Records, Springer-Verlag, 1996.

179. J. Richstein, "Goldbaeh's Conjeeture up to 4· 1014", Number Theory Web, Created and Maintained by K. Matthews, The University of Queensland, 12th November 1998.

180. H. J. J. te Riele, "New Very Large Amicable Pairs", Number Theory, Noord­wijkerhout 1983, Proceedings, Lecture Notes in Mathematics 1068, Springer­Verlag, 1984, 210-215.

181. H. J. J. te Riele, "A New Method for Finding Amicable Numbers", Reprint from Mathematics oE Computation 1943-1993, A HalE-century oE Computational Mathematics, Vaneouver, 9-13 August 1993.

182. H. J. J. te Riele, "Factorization of RSA-140", NMBRTHRY, NMBRTHRY<OLISTSERV.NODAK.EDU, 4 February 1999.

183. H. J. J. te Riele, "New Factorization Record", NMBRTHRY, NMBRTHRYIOLISTSERV.NODAK.EDU, 26 August 1999.

184. H. Riesel, Prime Numbers and Computer Methods Eor Factorization, Birkhäuser, Boston, 1990.

185. R. L. Rivest, "Remarks on a Proposed Cryptanalytic Attaek on the M.I.T. Public-key Cryptosystem", Cryptologia, 2, 1(1978), 62-65.

186. R. L. Rivest, A. Shamir and L. Adlernan, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications oE the ACM, 21, 2(1978), 120-126.

187. H. E. Rose, A Course in Number Theory, 2nd Edition, Oxford University Press, 1994.

188. K. Rosen, Elementary Number Theory and its Applications, 3rd Edition, Addison-Wesley, 1993.

189. J. J. Rotman An Introduction to the Theory oE Groups, Springer-Verlag, 1994.

372 Bibliography

190. A. D. Rubin and D. E. Geer, Jr., Mobile Code Security, IEEE Internet Com­puting, 2, 6(1998), 30-34.

191. G. Rozenberg and A. Salomaa, Cornerstones oE Undecidability, Prentice-Hall, 1994.

192. A. Salomaa, Public-Key Cryptography, 2nd Edition, Springer-Verlag, 1996.

193. Y. Saouter, Vinogradov's Theorem is TI-ue up to 1020, Publication Interne No. 977, IRISA, 1995.

194. V. Scarani, "Quantum Computing", American Journal oE Physics, 66, 11(1998), 956-960.

195. B. Schneier, Applied Cryptography - Protocols, Algorithms, and Source Code in C, 2nd Edition, John Wiley & Sons, 1996.

196. B. Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson, The Twoiish Encryption Algorithm, John Wiley & Sons, 1999.

197. C. P. Schnorr, "Efficient Identification and Signatures for Smart Cards", Ad­vances in Cryptography, CRYPTO '89, Proceedings, Lecture Notes in Computer Science 435, Springer-Verlag, 1990, 239-252.

198. R. Schoof, "Elliptic Curves over Finite Fields anq. the Computation of Square Roots mod p", Mathematics oE Computation, 44 (1985), 483-494.

199. M. R. Schroeder, Number Theory in Seien ce and Communication, 3rd Edition, Springer Series in Information Sciences 7, Springer-Verlag, 1997.

200. W. Schwarz and J. Wolfgang, "Some Remarks on the History of the Prime Number Theorem from 1896 to 1960" Development oE Mathematics 1900-1950, edited by J.-P. Pier, Birkhäuser, 1994.

201. A. Shamir, "Factoring Numbers in o (log n) Arithmetic Steps", InEormation Processing Letters, 8, 1(1979), 28-31.

202. A. Shamir, "How to Share a Secret", Communications oE the ACM, 22, 11(1979), 612-613.

203. P. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring", Proceedings oE 35th Annual Symposium on Foundations oE Com­puter Science, IEEE Computer Society Press, 1994, 124-134.

204. P. Shor, "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", SIAM Journal on Computing, 26, 5(1997), 1484-1509.

205. J. H. Silverman and J. Tate, Rational Points on Elliptic Curves, Undergrad­uate Texts in Mathematics, Springer-Verlag, 1992.

206. J. H. Silverman, The Arithmetic oE Elliptic Curves, Graduate Texts in Math­ematics 106, Springer-Verlag, 1994.

207. J. H. Silverman, A Friendly Introduction to Number Theory, Prentice-Hall, 1997.

208. R. D. Silverman, 'The Multiple Polynomial Quadratic Sieve", Mathematics oE Computation, 48 (1987), 329-339.

209. R. D. Silverman, "A Perspective on Computational Number Theory", Notices oEthe American Mathematical Society, 38, 6(1991), 562-568.

210. R. D. Silverman, "Massively Distributed Computing and Factoring Large In­tegers", Communications oE the ACM, 34, 11(1991), 95-103.

Bibliography 373

211. D. R. Simon, "On the Power of Quantum Computation", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 116-123.

212. S. Singh, The Code Book - The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Fourth Estate, London, 1999.

213. M. K. Sinisalo, "Checking the Goldbach Conjecture up to 4.1011 ", Mathe­matics of Computation, 61 (1993),931-934.

214. M. Sipser, Introduction to the Theory of Computation, PWS Publishing Com­pany, Boston, 1997.

215. D. Slowinski, "Searching for the 27th Mersenne Prime", Journal of Recre­ational Mathematics, 11, 4(1978-79), 258-261.

216. R. E. Smith, Internet Cryptography, Kluwer Academic Publishers, 1997.

217. M. A. Soderstrand, W. K. Jenkins, G. A. Jullien and F. J. Taylor, Residue Number System Arithmetic, Modern Applications in Digital Signal Processing, IEEE Press, 1986.

218. R. Solovay and V. Strassen, "A Fast Monte-Carlo Test for Primality", SIAM Journal on Computing, 6, 1(1977), 84-85. "Erratum: A Fast Monte-Carlo Test for Primality" , SIAM Journal on Computing, 7, 1(1978), 118.

219. I. Stewart, "Geometry Finds Factor Faster" , Nature, 325, 15 January 1987, 199.

220. D. R. Stinson, Cryptography: Theory and Practice, CRC Press, 1995.

221. N. S. Szabo and R. I. Tanaka, Residue Arithmetic and its Applications to Computer Technology, McGraw-Hill, 1967.

222. H. C. A. van Tilborg, An Introduction to Cryptography, Kluwer Academic Publishers, 1988.

223. I. Vardi, Computational Recreations in Mathematica, Addison-Wesley, 1991.

224. M. Waldschmidt, P. Moussa, J. M. Luck and C. Itzykson, From Number The­ory to Physics, Springer-Verlag, 1992.

225. S. Wagon, "Primality Testing", The Mathematical Intelligencer, 8, 3(1986), 58-61.

226. D. Welsh, Codes and Cryptography, Oxford University Press, 1989.

227. H. Wiener, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transac­tions on Information Theory, 36, 3(1990), 553-558.

228. A. Wiles, "Modular Elliptic Curves and Fermat's Last Theorem", Annals of Mathematics, 141 (1995), 443-551.

229. H. C. Williams, "The Influence of Computers in the Development of Number Theory", Computers & Mathematics with Applications, 8, 2(1982), 75-93.

230. H. C. Williams, "Factoring on a Computer", Mathematical Intelligencer, 6, 3(1984), 29-36.

231. H. C. Williams, Edouard Lucas and Primality Testing, John Wiley & Sons, 1998.

232. C. P. Williams and S. H. Clearwater, Explorations in Quantum Computation, The Electronic Library of Science (TELOS), Springer-Verlag, 1998.

233. H. Woll, "Reductions Among Number Theoretic Problems" , Information and Computation, 72 (1987), 167-179.

374 Bibliography

234. S. Y. Yan, "Primality Testing of Large Numbers in Maple", Computers & Mathematics with Applications, 29, 12(1995), 1-8.

235. S. Y. Yan, PerEect, Amicable and Sociable Numbers - A Computational Ap­proach, World Scientific, 1996.

236. S. Y. Yan, An Introduction to Formal Languages and Machine Computation, World Scientific, 1998.

237. J. Young, "Large Primes and Fermat Factors", Mathematics oE Computation, 67 (1998),1735-1738.

238. K. C. Zeng, C. H. Yang, D. Y. Wei and T. R. N. Rao, "Pseudorandom Bit Generators in Stream-Cipher Cryptography", Computer, 24, 2(1991), 8-17.

Index

(k, n)-threshold scherne, 349 R(x),82 EXP, 147 NP, 148 NP-complete, 152 NP-hard, 152 P,147 A(n), 71 >..(n),62 p,(n), 63 rj;(n),61 7r, 141 7r(x),65 7r2(x),86 7rM(x),29 1/J(x),72 a-(n),51 T(n), 51 8(x),69 ((s),75 b-sequence, 173 kth (higher) power nonresidue, 122 kth (higher) power residue, 121 kth power nonresidue, 106 kth power residue, 106 nth prime, 84 s(n), 51 NP-SPACE, 149 P-SPACE, 149 Li(x),73

Abel, N. H., 14 absolute least residue, 108 adder, 272 additive group, 15 additive identity, 17 additive inverse, 17 additivity, 6 Adlernan, L., 313 Advanced Encryption Standard (AES),

302

affine transformation, 292 Al-Khwarizmi, 142 algebraic computation law, 129 algebraic equation, 42 algebraic numbers, 13 algorithm, 142 algorithmic number theory, 139 aliquot k-cycle, 54 alphabet, 148 amicable k-tuple, 54 amicable pair, 54, 141, 249 amicable tripIe, 54 APR test, 191 APRCL test, 191 arithmetic function, 50 arithmetic mean, 53 arithmetic progression of primes, 89,

141 associativity, 14 asymmetrie cryptosystems, 289 asymmetrie key cryptosystem, 304 Atkin, A. O. L., 188 authentication, 288

base-2 pseudoprimality test, 172 basis vector, 231 Bernoulli's number, 75 binary computers, 269 binary Goldbach conjecture, 7, 252 binary operation, 13 bit operation, 156 block cipher, 294 Brent, R. P., 212 Brun's constant, 87

Caesar, J., 291 Caesar cipher, 291 Carmichael, R. D., 62 Carmichael number, 171 Carmichael's >"-function, 62, 98, 314 Carmichael's theorem, 98

376

CESG,309 CFRAC factoring algorithm, 203 CFRAC method, 201 character cipher, 291 Chebyshev, P. L., 69 Chebyshev's function, 69 check digit, 278 Chen, J. R., 8, 88 Chinese Remainder Theorem (CRT),

101, 345, 349 Chinese test, 172 Church, A., 145 Church-Turing thesis, 145 ciphertext space, 289 closure, 14 Cocks, C. C., 307 coin-tossing states, 144 combined test, 182 common multiple, 26 Communication-Electronics Security

Group (CESG), 306 commutative group, 14 commutative ring, 16 commutativity, 14 complement, 148 complete quotients, 39 complete system of residues, 93 completely multiplicative function, 51 complex numbers, 13 complex zeros, 77 complexity classe, 148 composite, 20 composite Fermat numbers, 30 computable, 142 computation, 145 computationally intractable (or

infeasible), 150 computationally tractable (or feasible),

150 congruence, 90 congruence classes, 91 congruent, 91 continued fraction, 36 Continued FRACtion (CFRAC)

method,194 convergent, 37 convergents, 44 Converse of Fermat's little theorem, 98 Converse of Wilson's theorem, 99 Cook, S., 151 Cook-Karp Thesis, 151 covered writing, 356 cryptanalysis, 288

cryptography, 288 cryptology, 288 cubic Diophantine equation, 125 cyclic group, 15

Index

Data Encryption Standard (DES), 299, 319

database decryption, 346 database encryption, 345 database security, 344 De la Vallee-Poussin, C. J., 71 decidable, 142 decision problems, 148 decryption key, 289 decryption process (algorithm), 289 deterministic encryption, 326 Deutsch, D., 230 Dickson, L. E., 259 Diffie, W., 303 Diffie-Hellman key-exchange, 310 Digital Signature Algorithm (DSA),

342 Digital Signature Standard (DSS), 342 digital signatures, 336 Diophantine equation, 41 Diophantus, 41 Dirac, P. A. M., 231 Dirichlet, J. P. G. L., 81 Dirichlet characters, 81 Dirichlet L-functions, 81 Dirichlet series, 81 discrete exponential bit generator, 287 discrete exponential generator, 286 discrete logarithm, 120 discrete logarithm problem, 218, 305 Disquisitiones Arithmeticae, 90 dividend, 32 divisibility, 20 division algorithm, 32 division ring, 16 divisor, 20 domain, 50 double encryption, 301 double hashing, 275

ECPP (Elliptic Curve Primality Proving), 188

ECPP Algorithm, 188 effective procedure, 142 efficient (good) algorithm, 150 electronic commerce, 355 EIGamal cryptosystem, 311 elliptic curve, 125, 332

Index

elliptic curve analogue of Diffie­Hellman, 334

elliptic curve analogue of ElGamal, 335 elliptic curve analogue of Massey-

Omura,334 elliptic curve analogue of RSA, 335 elliptic curve bit generator, 287 elliptic curve cryptography (ECC), 332 elli ptic curve test, 186 elliptic function, 127 elliptic integral, 127 Ellis, J. H., 307 embedded message, 357 embedding messages on elliptic curves,

333 encryption key, 289 encryption process (algorithm), 289 ENIGMA code, 288 equivalence classes, 91 equivalence relation, 91 Eratosthenes of Cyrene, 22 Erdös, P., 72 error detection and correction, 277 Euclid, 2, 21 Euclid's algorithm, 32, 34 Euclid's Elements, 35 Euclid-Euler Theorem, 55 Euler, L., 59 Euler probable prime, 179 Euler pseudoprime, 179 Euler's (totient) t/J-function, 61 Euler's criterion, 107 Euler's pseudoprimality test, 178 Euler's rule for amicable pairs, 59 Euler's theorem, 98 exclusive or (XOR), 301 exponential complexity, 158 exponentially bounded, 147 exponentially solvable, 147

factor, 20 factoring by trial divisions, 197 fast group operations, 164 fast modular exponentiations, 161 fast point additions, 164 Federal Information Processing

Standard, 299 Fermat, P., 11 Fermat numbers, 30, 140 Fermat probable prime, 171 Fermat pseudoprime, 171 Fermat's factoring algorithm, 198 Fermat's Last Theorem (FLT), 11

Fermat's little theorem, 97 Fermat's pseudoprimality test, 170 Feynman, R. P., 230 Fibonacci, L. P., 180 Fibonacci numbers, 180 field, 17 finite fields, 19 finite group, 15

377

finite order of a point on an elliptic curve, 133

finite simple continued fraction, 38 FIPS 186, 342 FIPS 46, 299 FIPS 46-2, 299 FIPS 46-3, 299 firewall; 352 fixed-base number systems, 261 fixed-point attack, 326 Fundamental Theorem of Arithmetic,

24, 261

Galileo spacecraft, 281 Galois, E, 19 Galois field, 19 Gauss, C. F., 67 Gauss's lemma, 108 Generalized Riemann Hypothesis, 82 generating function, 81 geometrie composition law, 129 geometrie mean, 52 Goldbach partition, 9 Goldbach's conjecture, 6, 141, 252 Goldwasser, S., 187 Government Communications

Headquarters (GCHQ), 306 greatest common divisor (gcd), 25 group, 14 group laws on elliptic curves, 133

Hadamard, J., 70 halting problem, 146 Hardy, G. H., 7 Hardy-Ramanujan taxi number, 9 harmonie mean, 53 hashing function, 274 Hasse, H, 134 height, 131 Hellman, M. E., 304 high-order congruence, 104 Hilbert space, 231 hybrid cryptosystem, 306

identity, 14

378

incongruent, 91 index caleulus algorithm, 226 index caleulus method, 226 index of a to the base g, 120 index of an integer modulo n, 120 inefficient (bad) algorithm), 150 infinite fields, 18 infinite group, 15 infinite order of a point on an elliptie

curve, 133 infinite simple continued fraction, 38 instantaneous description (ID), 145 integer, 12 integer factorization problem, 192, 305 integral domain, 16 International Standard Book Number

(ISBN), 278 Internet, 352 inverse, 14 invertible function, 305 irrational number, 13 irrational numbers, 38 isomorphie, 265 isomorphism, 265

Jacobi, C. G., 111 Jacobi symbol, 111

Karp, R., 151 key bundle, 301 key space, 289 Kilian, J., 187 Knuth, D. E., 193 Koblitz, N, 332 Kronecker, L., 12

Lagarias, J. C., 244 Landau, E., 7 language, 148 least (nonnegative) residue of x modulo

n,92 least common multiple (lern), 26 Legendre, A. M., 68, 107 Legendre symbol, 107 Legendre's congruence, 199 Lehman's method, 194 Lehmer, D. H., 183 Lenstra, H. W. Jr., 215 Lenstra's Elliptie Curve Method

(ECM), 195, 215 linear congruence, 96 linear Congruential generator, 283 linear Diophantine equation, 42 Littlewood, J. E., 7

logarithm, 154 logarithmic integral, 73 Lucas, F. E., 180 Lucas numbers, 180 Lucas probable prime, 181 Lucas pseudoprimality test, 182 Lucas pseudoprime, 181 Lucas sequences, 180 Lucas test, 181 Lucas theorem, 181 Lucas-Lehmer test, 183 Lucas-Lehmer theorem, 183 Lucas-Lehmer test for Mersenne

primes, 185

Möbius, A. F., 63 Möbius f.L-function, 63 Möbius inversion formula, 64 magnitude, 270 Massey-Omura cryptosystem, 312 Meissel, D. F. E., 244 Mersenne, M., 27 Mersenne number, 27 Mersenne primes, 27, 140 Mertens's conjecture, 60 message concealing, 357 message digest, 343 message extracting, 357 message space, 289 middle-square method, 282 Miller, G., 174 Miller-Rabin test, 174

Index

minimal perfect hashing function, 276 minimal collision-free hashing function,

276 mixed-base number systems, 261 modular arithmetic in 7l,/n7l" 94 modular exponentiation, 160 modular inverse, 95 monographic cipher, 291 monoid,14 Morain, F., 188 Mordell, L. J., 135 multiple, 20 multiple encryption, 301 Multiple Polynomial Quadratie Sieve

(MPQS),194 multiplieative function, 50 multiplieative generator, 284 multiplicative group, 15 multiplieative identity, 18 multiplicative inverse, 18, 95 multiplicativity, 5

Index

National Institute of Standards and Technology (NIST), 299

natural numbers, 12 non-secret cover-message, 357 non-secret encryption, 307 non-zero field element, 18 noncomputable, 143 nonnegative integers, 12 nonpositional number systems, 261 nontrivial divisor, 20 nontrivial square root of 1, 173 nontrivial zeros, 77 nonwitness, 177 Number Field Sieve (NFS), 5, 194, 206,

227 number systems, 261

odd perfect numbers, 140 Odlyzko, A. M., 60, 244 one's complement representation, 272 one-way function, 304 order of a modulo n, 115 order of a field, 19 order of a group, 15 order of a point on an elliptic curve,

133

packer filter, 353 parity, 2 parity check, 3, 277 parity check bit, 277 partial quotients, 36 Pell's equation, 45 perfect hashing function, 276 perfect number, 54 period, 38 periodic simple continued fraction, 38 Pocklington's theorem, 186, 316 point at infinity, 126 polarization, 358 Pollard, J. M.,208 Pollard's p factoring algorithm, 213 Pollard's p-method, 194, 208 Pollard's "p - I" factoring algorithm,

214 Pollard's "p - I" method, 214 polygraphic cipher, 294 polynomial bounded, 147, 148 polynomial complexity, 158 polynomial congruence, 104 polynomial congruential equation, 104 polynomial security, 327 polynomially solvable, 147

Pomerance, C., 204 positional number systems, 261 positive integers, 12 power generator, 285

379

practically feasible computation, 147 practically tractable computation, 147 primality, 4 primality testing problem, 167 prime, 20 prime counting function, 65 prime distribution function, 65 prime factor, 24 prime factorization, 5, 24 prime Fermat numbers, 30 Prime Number Theorem, 67 prime numbers, 65 prime power, 19 prime tripies, 4 primitive root of n, 116 principle of superposition, 232 privacy, 288 private key, 304 probabilistic encryption, 327, 328 probabilistic Turing machine (PTM),

144 probable prime, 171 pseudoprime, 171 pseudorandom numbers, 282 public key, 304 public-key cryptography, 289 public-key cryptosystem, 306 purely periodic simple continued

fraction, 38 Pythagoras, 58

Qin Jiushao, 101 quadratic congruence, 105 quadratic Diophantine equation, 45 quadratic irrational, 38 quadratic nonresidue, 106 quadratic nonresidue modulo n, 306 Quadratic reciprocity law, 109 quadratic residue, 106 quadratic residue modulo n, 305 quadratic residues generator, 286 Quadratic Residuosity Problem (QRP),

305, 327 Quadratic Sieve (QS), 204 quantum algorithm for discrete

logarithms, 241 quantum algorithm for integer

factorization, 238 quantum bit, 231

380

quantum computer, 231, 233 quantum cryptography, 358 quantum operation, 234 quantum register, 233, 238 quantum state, 231 quantum Turing machine (QTM), 235 qubit, 235 quotient, 32

Rabin, M. 0., 174 Rabin's modified bit generator, 287 Ramanujan, S., 9 random number generation, 282 random numbers, 282 randomized encryption, 327 rational numbers, 13, 38 read-keys, 345 real numbers, 13 real zeros, 77 real-valued function, 50 realbase logarithm, 120 rectilinear polarization, 358 reduced system of residues modulo n,

94 reflexive, 91 relatively prime, 25 remainder, 32 repeated doubling and addition, 164 repeated doubling method, 334 repeated multiplication, 160 repeated squaring, 160 repeated squaring and multiplication,

160 residue arithmetie in (Z/nZ)*, 267 residue dass, 92 residue dasses, 91 residue dasses modulo n, 13 residue computers, 269 residue number systems, 261, 269 residue of x modulo n, 92 residue representation of a number, 262 Riemann, G. F. B, 70, 74 Riemann (-function, 74, 75 Riemann function, 82 Riemann Hypothesis (RH), 77, 141 ring, 15 ring with identity, 16 Rivest, R. L., 313 root finding problem, 228, 325 RSA Assumption, 313 RSA bit generator, 286 RSA cryptosystem, 313 RSA generator, 285

running time, 147

secret key, 289, 304 secret sharing, 348 secret-key cryptography, 288 secret-key cryptosystem, 306 Selberg's estimate, 71 Selberg, A., 71 Selfridge, J. L., 175 semantic security, 327 semigroup, 14 seminumerical method, 249 Shamir, A., 313 Shanks, D., 219

Index

Shanks' baby-step giant-step method for discrete logarithms, 220

Shanks' dass group method, 194 Shanks' SQUFOF method, 194 Shannon, C. E., 155 Shannon bits, 231 shift transformation, 292 Shor, P., 238 sieve of Eratosthenes, 22 sign bit, 270 signature generation, 342 signature verification, 342 signed-magnitude representation, 270 Silver-Pohlig-Hellman algorithm, 222 simple continued fraction, 36 sociable group, 54 Solovay, R., 190 Solovay-Strassen test, 179 solvable, 142 square generator, 286 square root method, 222 steganographic system, 357 steganography, 356 stego-key, 357 stego-message, 357 Strassen, V., 190 strong probable prime, 175 strong pseudoprimality test, 173, 174 strong pseudoprime, 175 strong test, 173 subexponential complexity, 195 subgroup, 15 substitution cipher, 291 summatory function of 4(n), 72 Sun Zi, 101 superposition, 234 symmetrie,91 symmetrie cryptosystems, 288

Taylor, R., 11

Index

te Riele's rule, 60 te Riele, H. J. J., 60 ternary Goldbach conjecture, 7, 252 Thabit ibn Qurra, 56 Thabit's rule for amicable pairs, 57 time complexity function, 147 transcendental numbers, 13 transitive, 91 trapdoor, 305 trapdoor one-way function, 305 trial division, 194 Tripie DES (TDES), 301 trivial divisor, 20 trivial zeros, 77 Turing, A. M., 143 Turing machine, 143 Twin Prime Conjecture, 88 twin primes, 4, 65 two's complement representation, 272

381

U.S. National Institute of Standards and Technology (NIST), 342

undecidable, 143 unsolvable, 143

Vinogradov, I. M., 8 von Mangoldt function, 71 von Neumann, J., 282

Waring's problem, 141 Wiener's attack, 326 Wiles, A. J., 10, 11 Williamson, M, 308 Wilson, J., 99 Wilson's theorem, 99 witness, 177 words, 269 write-keys, 345