Description

Book Synopsis
In this volume, originally published in 1990, are included papers presented at two meetings; one a workshop on Number Theory and Cryptography, and the other, the annual meeting of the Australian Mathematical Society. Questions in number theory are of military and commercial importance for the security of communication, as they are related to codes and code-breaking. Papers in the volume range from problems in pure mathematics whose study has been intensified by this connection, through interesting theoretical and combinatorial problems which arise in the implementation, to practical questions that come from banking and telecommunications. The contributors are prominent within their field. The whole volume will be an attractive purchase for all number theorists, 'pure' or 'applied'.

Table of Contents
List of contributors; Introduction; Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl; 2. Quadratic fields and cryptography J. Buchmann and H. C. Williams; 3. Parallel algorithms for integer factorisation R. P. Brent; 4. An open architecture number sieve A. J. Stephens and H. C. Williams; 5. Algorithms for finite fields H. W. Lenstra, Jr.; 6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten; Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare; 8. Linear feedback shift registers and stream ciphers E. Dawson; 9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli; 10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry; 11. Privacy for MANCET M. Warner; 12. Authentication B. Newman; 13. Insecurity of the knapsack one-time pad R. T. Worley; 14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters; 15. Reed–Solomon coding in the complex field M. Rudolph; Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams; 17. Number theoretic problems involving two independent bases T. Kamae; 18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa; 19. Notes on uniform distribution G. Myerson and A. Pollington; 20. Thue equations and multiplicative independence B. Brizinda; 21. A number theoretic crank associated with open bosonic strings F. G. Garvan; 22. Universal families of abelian varieties A. Silverberg.

Number Theory and Cryptography 154 London Mathematical Society Lecture Note Series Series Number 154

Product form

£49.59

Includes FREE delivery

Order before 4pm today for delivery by Thu 18 Dec 2025.

A Paperback by J. H. Loxton

15 in stock


    View other formats and editions of Number Theory and Cryptography 154 London Mathematical Society Lecture Note Series Series Number 154 by J. H. Loxton

    Publisher: Cambridge University Press
    Publication Date: 4/19/1990 12:00:00 AM
    ISBN13: 9780521398770, 978-0521398770
    ISBN10: 0521398770

    Description

    Book Synopsis
    In this volume, originally published in 1990, are included papers presented at two meetings; one a workshop on Number Theory and Cryptography, and the other, the annual meeting of the Australian Mathematical Society. Questions in number theory are of military and commercial importance for the security of communication, as they are related to codes and code-breaking. Papers in the volume range from problems in pure mathematics whose study has been intensified by this connection, through interesting theoretical and combinatorial problems which arise in the implementation, to practical questions that come from banking and telecommunications. The contributors are prominent within their field. The whole volume will be an attractive purchase for all number theorists, 'pure' or 'applied'.

    Table of Contents
    List of contributors; Introduction; Part I. Number Theoretic Aspects of Cryptology: 1. Some mathematical aspects of recent advances in cryptology R. Lidl; 2. Quadratic fields and cryptography J. Buchmann and H. C. Williams; 3. Parallel algorithms for integer factorisation R. P. Brent; 4. An open architecture number sieve A. J. Stephens and H. C. Williams; 5. Algorithms for finite fields H. W. Lenstra, Jr.; 6. Notes on continued fractions and recurrence sequences A. J. Van der Poorten; Part II. Cryptographic Devices and Applications: 7. Security in telecommunication services over the next decade J. Snare; 8. Linear feedback shift registers and stream ciphers E. Dawson; 9. Applying randomness tests to commercial level block ciphers H. Gustaphson, E. Dawson and W. Caelli; 10. Pseudo-random sequence generators using structures noise R. S. Safavi-Naini and J. R. Seberry; 11. Privacy for MANCET M. Warner; 12. Authentication B. Newman; 13. Insecurity of the knapsack one-time pad R. T. Worley; 14. The tactical frequency management problem: heuristic search and simulated annealing L. Peters; 15. Reed–Solomon coding in the complex field M. Rudolph; Part III. Diophantine Analysis: 16. Class number problems for real quadratic fields R. A. Mollin and H. C. Williams; 17. Number theoretic problems involving two independent bases T. Kamae; 18. A class of normal numbers II. Y. -N. Nakai and I. Shiokawa; 19. Notes on uniform distribution G. Myerson and A. Pollington; 20. Thue equations and multiplicative independence B. Brizinda; 21. A number theoretic crank associated with open bosonic strings F. G. Garvan; 22. Universal families of abelian varieties A. Silverberg.

    Recently viewed products

    © 2025 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account