[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
A course in number theory and cryptographyOctober 1987
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-96576-5
Published:01 October 1987
Pages:
208
Skip Bibliometrics Section
Reflects downloads up to 04 Feb 2025Bibliometrics
Abstract

No abstract available.

Cited By

  1. Geffert V (2019). Unary Coded PSPACE-Complete Languages in ASPACE(loglog n), Theory of Computing Systems, 63:4, (688-714), Online publication date: 1-May-2019.
  2. Li X, Huang T, Liao Q and Xia X (2019). Optimal Estimates of Two Common Remainders for a Robust Generalized Chinese Remainder Theorem, IEEE Transactions on Signal Processing, 67:7, (1824-1837), Online publication date: 1-Apr-2019.
  3. Hazay C, Mikkelsen G, Rabin T, Toft T and Nicolosi A (2019). Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting, Journal of Cryptology, 32:2, (265-323), Online publication date: 1-Apr-2019.
  4. ACM
    Osipyan V and Litvinov K A mathematical model of the cryptosystem based on the linear Diophantine equation Proceedings of the 11th International Conference on Security of Information and Networks, (1-4)
  5. Wu J, Liao X and Yang B (2017). Color image encryption based on chaotic systems and elliptic curve ElGamal scheme, Signal Processing, 141:C, (109-124), Online publication date: 1-Dec-2017.
  6. ACM
    Osipyan V, Tlusten V, Laktionova N and Vakhrusheva N The duality principle in the theory of development generalized A-M knapsack cryptosystems Proceedings of the 10th International Conference on Security of Information and Networks, (200-205)
  7. Asif S and Kong Y (2017). Highly Parallel Modular Multiplier for Elliptic Curve Cryptography in Residue Number System, Circuits, Systems, and Signal Processing, 36:3, (1027-1051), Online publication date: 1-Mar-2017.
  8. ACM
    Osipyan V Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method Proceedings of the 8th International Conference on Security of Information and Networks, (338-341)
  9. Osipyan V Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method Proceedings of the 8th International Conference on Security of Information and Networks, (338-341)
  10. ACM
    V.O. O Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack Proceedings of the 7th International Conference on Security of Information and Networks, (180-185)
  11. ACM
    Osipyan V Information protection systems based on universal knapsack problem Proceedings of the 6th International Conference on Security of Information and Networks, (343-346)
  12. ACM
    Kar J and Majhi B A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique Proceedings of the 2011 International Conference on Communication, Computing & Security, (493-498)
  13. Dong F and Fan H Study on RSA based identity authentication algorithm and application in wireless controlling system of aids to navigation Proceedings of the 2010 international conference on Web information systems and mining, (7-13)
  14. Chi H and Cao Y Generating parallel random sequences via parameterizing EICGs for heterogeneous computing environments Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV, (409-417)
  15. Saxena N and Yi J (2019). Noninteractive self-certification for long-lived mobile ad hoc networks, IEEE Transactions on Information Forensics and Security, 4:4, (946-955), Online publication date: 1-Dec-2009.
  16. Wang P and Han B A new sequential multi-signature scheme with signers' intentions Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing, (4442-4445)
  17. Álvarez R, Tortosa L, Vicent J and Zamora A (2009). Analysis and design of a secure key exchange scheme, Information Sciences: an International Journal, 179:12, (2014-2021), Online publication date: 1-May-2009.
  18. Du X, Guizani M, Xiao Y and Chen H (2009). A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Transactions on Wireless Communications, 8:3, (1223-1229), Online publication date: 1-Mar-2009.
  19. ACM
    Karatop A and Savaş E An identity-based key infrastructure suitable for messaging and its application to e-mail Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-11)
  20. Alvarez R, Martinez F, Vicent J and Zamora A A new public key cryptosystem based on matrices Proceedings of the 6th WSEAS international conference on Information security and privacy, (36-39)
  21. Muralidhara V and Sen S A result on the distribution of quadratic residues with applications to elliptic curve cryptography Proceedings of the cryptology 8th international conference on Progress in cryptology, (48-57)
  22. Askoxylakis I, Pramateftakis M, Kastanis D and Traganitis A Integration of a secure mobile payment system in a GSM/UMTS SIM smart card Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security, (40-50)
  23. Catalano D and Gennaro R (2007). Cramer-Damgård signatures revisited, Theoretical Computer Science, 370:1-3, (186-200), Online publication date: 1-Feb-2007.
  24. Almuhammadi S and Sui N Safe Credential-Based Trust Protocols Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (949-952)
  25. ACM
    Bandyopadhyay S, Bhattacharyya D and Pal A (2006). Secure delivery of handwritten signature, Ubiquity, 2006:October, (1-12), Online publication date: 1-Oct-2006.
  26. Malkin M and Kalker T A cryptographic method for secure watermark detection Proceedings of the 8th international conference on Information hiding, (26-41)
  27. Dijk M, Clarke D, Gassend B, Suh G and Devadas S (2006). Speeding up Exponentiation using an Untrusted Computational Resource, Designs, Codes and Cryptography, 39:2, (253-273), Online publication date: 1-May-2006.
  28. Climent J, Ferrández F, Vicent J and Zamora A (2006). A nonlinear elliptic curve cryptosystem based on matrices, Applied Mathematics and Computation, 174:1, (150-164), Online publication date: 1-Mar-2006.
  29. Gyarmati K On a fast version of a pseudorandom generator General Theory of Information Transfer and Combinatorics, (326-342)
  30. Koblitz N and Menezes A Pairing-Based cryptography at high security levels Proceedings of the 10th international conference on Cryptography and Coding, (13-36)
  31. Sundaram B and Chapman B A grid authentication system with revocation guarantees Proceedings of the 12th international conference on High Performance Computing, (508-517)
  32. Sundaram B and Chapman B Addressing Credential Revocation in Grid Environments Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, (323-326)
  33. Ertaul L and Lu W ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i) Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (102-113)
  34. ACM
    Shirase M and Hibino Y (2005). An architecture for elliptic curve cryptograph computation, ACM SIGARCH Computer Architecture News, 33:1, (124-133), Online publication date: 1-Mar-2005.
  35. Catalano D and Gennaro R Cramer-Damgård signatures revisited Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography, (313-327)
  36. Chou J, Lin C and Lee T A novel hierarchical key management scheme based on quadratic residues Proceedings of the Second international conference on Parallel and Distributed Processing and Applications, (858-865)
  37. Chen T, Chung Y and Huang K (2004). A traceable proxy multisignature scheme based on the elliptic curve cryptosystem, Applied Mathematics and Computation, 159:1, (137-145), Online publication date: 1-Nov-2004.
  38. ACM
    Edoh K Elliptic curve cryptography Proceedings of the 1st annual conference on Information security curriculum development, (88-93)
  39. Wang G, Bao F, Zhou J and Deng R (2004). Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem', IEEE Transactions on Knowledge and Data Engineering, 16:10, (1309-1311), Online publication date: 1-Oct-2004.
  40. Hof H, Blaß E and Zitterbart M Secure overlay for service centric wireless sensor networks Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks, (125-138)
  41. Kovalchuk L (2019). Pseudoirreducible Polynomials, Cybernetics and Systems Analysis, 40:4, (610-616), Online publication date: 1-Jul-2004.
  42. Owens L, Duffy A and Dowling T An Identity Based Encryption system Proceedings of the 3rd international symposium on Principles and practice of programming in Java, (154-159)
  43. ACM
    Chaudhuri R (2004). Teaching bit-level algorithm analysis to the undergraduates in computer science, ACM SIGCSE Bulletin, 36:2, (62-63), Online publication date: 1-Jun-2004.
  44. ACM
    Mentens N, Ors S and Preneel B An FPGA implementation of an elliptic curve processor GF(2m) Proceedings of the 14th ACM Great Lakes symposium on VLSI, (454-457)
  45. Müller S (2019). On the Computation of Square Roots in Finite Fields, Designs, Codes and Cryptography, 31:3, (301-312), Online publication date: 1-Mar-2004.
  46. ACM
    Dodis Y and Reyzin L Breaking and repairing optimistic fair exchange from PODC 2003 Proceedings of the 3rd ACM workshop on Digital rights management, (47-54)
  47. ACM
    Nicolakis T, Pizano C, Prumo B and Webb M Protecting digital archives at the Greek Orthodox Archdiocese of America Proceedings of the 3rd ACM workshop on Digital rights management, (13-26)
  48. Schwabe E and Sutherland I Efficient mappings for parity-declustered data layouts Proceedings of the 9th annual international conference on Computing and combinatorics, (252-261)
  49. ACM
    Park J, Chong E and Siegel H Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures Proceedings of the twenty-second annual symposium on Principles of distributed computing, (172-181)
  50. Whelan C, Duffy A, Burnett A and Dowling T A Java API for polynomial arithmetic Proceedings of the 2nd international conference on Principles and practice of programming in Java, (139-144)
  51. ACM
    Chaudhuri R (2019). Do the arithmetic operations really execute in constant time?, ACM SIGCSE Bulletin, 35:2, (43-44), Online publication date: 1-Jun-2003.
  52. Lange T and Winterhof A (2003). Interpolation of the discrete logarithm in F by Boolean functions and by polynomials in several variables modulo a divisor of q - 1, Discrete Applied Mathematics, 128:1, (193-206), Online publication date: 15-May-2003.
  53. Katti R and Brennan J (2003). Low Complexity Multiplication in a Finite Field Using Ring Representation, IEEE Transactions on Computers, 52:4, (418-427), Online publication date: 1-Apr-2003.
  54. Li Q (2003). On weights in duadic Abelian codes, Discrete Mathematics, 260:1-3, (223-230), Online publication date: 6-Jan-2003.
  55. Ravi S, Raghunathan A and Chakradhar S Embedding Security in Wireless Embedded Systems Proceedings of the 16th International Conference on VLSI Design
  56. Grabmeier J, Kaltofen E and Weispfenning V Cited References Computer algebra handbook, (493-622)
  57. Agou S, Deléglise M and Nicolas J (2019). Short Polynomial Representations for Square Roots Modulo p, Designs, Codes and Cryptography, 28:1, (33-44), Online publication date: 1-Jan-2003.
  58. Kim H and Oh H Efficient hardware multiplicative inverters Proceedings of the 5th international conference on Information security and cryptology, (313-326)
  59. ACM
    Ravi S, Raghunathan A and Potlapally N Securing wireless data Proceedings of the 15th international symposium on System Synthesis, (195-200)
  60. Burnett A, Winters K and Dowling T A Java implementation of an elliptic curve cryptosystem Proceedings of the inaugural conference on the Principles and Practice of programming, 2002 and Proceedings of the second workshop on Intermediate representation engineering for virtual machines, 2002, (83-88)
  61. ACM
    Neff C A verifiable secret shuffle and its application to e-voting Proceedings of the 8th ACM conference on Computer and Communications Security, (116-125)
  62. Benantar M (2001). The internet public key infrastructure, IBM Systems Journal, 40:3, (648-665), Online publication date: 1-Mar-2001.
  63. Scanlon T (2001). Public Key Cryptosystems Based on Drinfeld Modules Are Insecure, Journal of Cryptology, 14:4, (225-230), Online publication date: 1-Jan-2001.
  64. Brown M, Cheung D, Hankerson D, Hernandez J, Kirkup M and Menezes A PGP in constrained wireless devices Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (19-19)
  65. Koblitz N, Menezes A and Vanstone S (2000). The State of Elliptic Curve Cryptography, Designs, Codes and Cryptography, 19:2-3, (173-193), Online publication date: 1-Mar-2000.
  66. Solinas J (2000). Efficient Arithmetic on Koblitz Curves, Designs, Codes and Cryptography, 19:2-3, (195-249), Online publication date: 1-Mar-2000.
  67. Dimitrov V, Jullien G and Miller W (2000). Complexity and Fast Algorithms for Multiexponentiations, IEEE Transactions on Computers, 49:2, (141-147), Online publication date: 1-Feb-2000.
  68. ACM
    Molva R and Pannetrat A Scalable multicast security in dynamic groups Proceedings of the 6th ACM conference on Computer and communications security, (101-112)
  69. Walter C Montgomery's Multiplication Technique Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems, (80-93)
  70. Kurosawa K and Ogata W (2019). Efficient Rabin-type Digital Signature Scheme, Designs, Codes and Cryptography, 16:1, (53-64), Online publication date: 1-Jan-1999.
  71. ACM
    Ateniese G, Steiner M and Tsudik G Authenticated group key agreement and friends Proceedings of the 5th ACM conference on Computer and communications security, (17-26)
  72. Drolet G (1998). A New Representation of Elements of Finite Fields GF(2m) Yielding Small Complexity Arithmetic Circuits, IEEE Transactions on Computers, 47:9, (938-946), Online publication date: 1-Sep-1998.
  73. Koc C and Acar T (2019). Montgomery Multiplication in GF(2 ^k, Designs, Codes and Cryptography, 14:1, (57-69), Online publication date: 1-Apr-1998.
  74. Johnson D and Menezes A Elliptic curve DSA (ECSDA) Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (13-13)
  75. Sakurai K and Shizuya H (1998). A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems, Journal of Cryptology, 11:1, (29-43), Online publication date: 1-Jan-1998.
  76. Stroele A and Mayer F Methods to reduce test application time for accumulator-based self-test Proceedings of the 15th IEEE VLSI Test Symposium
  77. ACM
    Joye M and Quisquater J On the importance of securing your bins Proceedings of the 4th ACM conference on Computer and communications security, (135-141)
  78. Boneh D and Venkatesan R Rounding in lattices and its cryptographic applications Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms, (675-682)
  79. Nyberg K and Rueppel R (2019). Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem, Designs, Codes and Cryptography, 7:1-2, (61-81), Online publication date: 1-Jan-1996.
  80. Sakurai K and Shizuya H Relationships among the computational powers of breaking discrete log cryptosystems Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques, (341-355)
  81. Thiong Ly J (1993). A serial version of the Pohlig-Hellman Algorithm for computing discrete logarithms, Applicable Algebra in Engineering, Communication and Computing, 4:1, (77-80), Online publication date: 1-Mar-1993.
  82. ACM
    Davenport J Primality testing revisited Papers from the international symposium on Symbolic and algebraic computation, (123-129)
  83. Harper G, Menezes A and Vanstone S Public-key cryptosystems with very small key lengths Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques, (163-173)
  84. Müller W and Oswald A Dickson pseudoprimes and primality testing Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, (512-516)
  85. Shizuya H, Itoh T and Sakurai K On the complexity of hyperelliptic discrete logarithm problem Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, (337-351)
  86. Kurosawa K, Katayama Y, Ogata W and Tsujii S General public key residue cryptosystems and mental poker protocols Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology, (374-388)
  87. Lidl R, Müller W and Oswald A (2019). Some remarks on strong fibonacci pseudoprimes, Applicable Algebra in Engineering, Communication and Computing, 1:1, (59-65), Online publication date: 1-Mar-1990.
  88. Koblitz N A family of Jacobians suitable for discrete log cryptosystems Proceedings on Advances in cryptology, (94-99)
Contributors
  • University of Washington

Reviews

Marlene L. Campbell

Koblitz begins by immediately discussing bit operations and big- O notation and its relation to algorithm complexity. Basic number theory topics are introduced rather systematically. Material is well presented in reasonable-sized blocks that are followed by exercises that vary from some brute force manipulations to thought provoking and challenging analyses and proofs. Since answers to the exercises are provided, the book could, indeed, be used for independent study by a serious, motivated student with a reasonable background in number theory and abstract algebra who is experienced in problem solving. It is not a book for the faint of heart. Chapter 1, “some topics in elementary number theory,” is a bit more comprehensible than chapter 2, “finite fields and quadratic residues.” Although there is a minimal use of thorough explanations and examples in the first two chapters, the understanding of early introduced theorems, corollaries, propositions, and lemmas is enhanced by the orderly progression of topics along with the application and extension of previously introduced notions. It is evident that the author's presentation of material was influenced by the proliferation of computer power and sophistication. As stated in the forward, these technological advances have given rise to a new branch of number theory called computational number theory. Unlike the first two chapters, chapter 3, “cryptography,” assumes no prior knowledge of this particular subject and starts with the basics. This is done in a thorough manner (i.e., by defining terms, explaining fundamental concepts, and using elementary examples before building to more elegant ones). Koblitz first presents an affine cryptosystem in an N-letter alphabet with parameters a ? ( Z/ NZ) 2* and b ? Z/ NZ consisting of the rules: C ? a P + b mod N, and P ? a? C + b? mod N, where a? = a ?1 in ( Z/ NZ)*, and b? = ? a ?1 b. After discussing the special cases of this cryptosystem, which result in a shift transformation and a linear transformation, he provides nice examples and follows with an abundance of exercises. He quickly moves on to enciphering matrices but takes time to review elementary concepts of linear algebra and matrix multiplication before pursuing this cryptosystem. After each cryptosystem is presented, he presents tactics used in the cryptanalysis of the systems. In the first three chapters, references are included at the end of each chapter; but the remaining chapters, 4 through 6, include both exercises and references after each main subsection of the chapters. Chapter 4, “public key,” begins with a general discussion of the concept of public keys and digital signatures and leaves the details of the procedures to the remaining subsections. The discussion of the RSA cryptosystem does a good job of presenting the whys and hows. Other methods presented in the chapter include the discrete logarithm problem, the Diffie-Hellman key exchange system, the Massey-Omura cryptosystem for message transmission, and the El Gamal cryptosystem and algorithms for finding discrete logs in finite fields. I was a bit surprised to find no mention of the Data Encryption Standard although it has recently come through its second five-year review. Both chapters 5 and 6, “primality and factoring” and “elliptic curves,” are handled much like chapter 4. The underlying notions and definitions are presented and then followed by specific applications. Chapter 5 includes a discussion of both primes and pseudoprimes, including Carmichael numbers, Euler pseudoprimes, and strong pseudoprimes. Definitions are given, propositions regarding these defined terms are proved, and examples are used to clarify the concepts. In addition to various primality tests, the author presents factorization methods, including the rho method (also called the Monte Carlo method), Fermat factorization, and a factor base algorithm, together with its heuristic time estimate. He concludes the chapter with a discussion of continued fractions and the continued fraction factoring algorithms. In chapter 6, Koblitz points out that the theory of elliptic curves defined over finite fields has recently found application in cryptography. He presents basic definitions and facts about elliptic curves including only “the minimal amount of background necessary to understand the applications to cryptography . . . emphasizing examples and concrete descriptions at the expense of proofs and generality.” This, I believe, is a good decision for this particular textbook. The reader wishing to learn more can consult the various references following the sections on elliptic curve cryptosystems and elliptic curve factorization. As the title indicates, the book is intended for use in a graduate mathematics course in number theory and cryptography. It would definitely fulfill this mission. The overall content is quite good, the format of the book is traditional, and the index, references, and exercises are fully adequate. The author's recommendations for organizing courses based on the book seem reasonable. I liked the book. I think it has a place not only in a graduate course in mathematics, but also in a graduate course in computer science. It could be used as the basis for a three-hour course in either discipline, or subsets could be used in a readings or special topics course of anywhere from one to three hours. Chapter 3 could be assigned for background reading even at the upper-division undergraduate level. The book would definitely be an asset to the professional reading collection in any undergraduate or graduate library.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations