Primality Testing And Integer Factorization In Public-Key Cryptography

by
Edition: 2nd
Format: Hardcover
Pub. Date: 2008-11-01
Publisher(s): Springer Verlag
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $199.99

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$57.24
Online:60 Days access
Downloadable:60 Days
$76.32
Online:90 Days access
Downloadable:90 Days
$95.40
Online:120 Days access
Downloadable:120 Days
$114.48
Online:180 Days access
Downloadable:180 Days
$124.02
Online:1825 Days access
Downloadable:Lifetime Access
$190.80
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$124.02*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer factorization, with implications to factoring based public key cryptography. Notable new features are the comparison of Rabin-Miller probabilistic test in RP, Atkin-Morain elliptic curve test in ZPP and AKS deterministic test.This volume is designed for advanced level students in computer science and mathematics, and as a secondary text or reference book; suitable for practitioners and researchers in industry.First edition was very positively reviewed by Prof Samuel Wagstaff at Purdue University in AMS Mathematical Reviews (See MR2028480 2004j:11148), and by Professor J.T. Ayuso of University of Simon Bolivar in the European Mathematical Society's review journal Zentralblatt für Mathematik (see Zbl 1048.11103).

Table of Contents

Preface to the Second Editionp. ix
Preface to the First Editionp. xi
Number-Theoretic Preliminariesp. 1
Problems in Number Theoryp. 1
Groups, Rings and Fieldsp. 13
Divisibility Propertiesp. 23
Euclid's Algorithm and Continued Fractionsp. 34
Arithmetic Functions ¿(n), ¿(n), ¿(n), ¿(n), ¿(n)p. 50
Linear Congruencesp. 63
Quadratic Congruencesp. 85
Primitive Roots and Power Residuesp. 103
Arithmetic of Elliptic Curvesp. 113
Chapter Notes and Further Readingp. 124
Primality Testing and Prime Generationp. 127
Computing with Numbers and Curvesp. 127
Riemann ¿ and Dirichlet L Functionsp. 139
Rigorous Primality Testsp. 149
Compositeness and Pseudoprimality Testsp. 157
Lucas Pseudoprimality Testp. 168
Elliptic Curve Primality Testsp. 172
Superpolynomial-Time Testsp. 177
Polynomial-Time Testsp. 182
Comparison of General Purpose Primality Testsp. 188
Primality Tests for Special Numbersp. 192
Prime Number Generationp. 201
Chapter Notes and Further Readingp. 207
Integer Factorization and Discrete Logarithmsp. 209
Introductionp. 209
Simple Factoring Methodsp. 212
Elliptic Curve Method (ECM)p. 221
General Factoring Congruencep. 226
Continued FRACtion Method (CFRAC)p. 230
Quadratic Sieve (QS)p. 234
Number Field Sieve (NFS)p. 239
Quantum Factoring Algorithmp. 251
Discrete Logarithmsp. 257
kth Rootsp. 270
Elliptic Curve Discrete Logarithmsp. 278
Chapter Notes and Further Readingp. 285
Number-Theoretic Cryptographyp. 287
Public-Key Cryptographyp. 287
RSA Cryptosystemp. 292
Security and Cryptanalysis of RSAp. 301
Rabin Cryptographyp. 314
Quadratic Residuosity Cryptographyp. 320
Discrete Logarithm Cryptographyp. 326
Elliptic Curve Cryptographyp. 331
Zero-Knowledge Techniquesp. 338
Deniable Authenticationp. 341
Non-Factoring Based Cryptographyp. 346
Chapter Notes and Further Readingp. 351
Bibliographyp. 353
Indexp. 367
About the Authorp. 373
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.