**Author**: Song Y. Yan

**Publisher:** Springer Science & Business Media

**ISBN:**

**Category:** Computers

**Page:** 381

**View:** 808

Taking readers from elementary number theory, via algorithmic, to applied number theory in computer science, this text introduces basic concepts, results, and methods, before going on to discuss their applications in the design of hardware and software, cryptography, and security. Aimed at undergraduates in computing and information technology, and presupposing only high-school math, this book will also interest mathematics students concerned with applications. XXXXXXX Neuer Text This is an essential introduction to number theory for computer scientists. It treats three areas, elementary-, algorithmic-, and applied number theory in a unified and accessible manner. It introduces basic concepts and methods, and discusses their applications to the design of hardware, software, cryptography, and information security. Aimed at computer scientists, electrical engineers and students the presentation presupposes only an understanding of high-school math.

This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic, conjecture and numerical verification. The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems. Chapters also cover various other quantum algorithms for Pell's equation, principal ideal, unit group, class group, Gauss sums, prime counting function, Riemann's hypothesis and the BSD conjecture. Quantum Computational Number Theory is self-contained and intended to be used either as a graduate text in computing, communications and mathematics, or as a basic reference in the related fields. Number theorists, cryptographers and professionals working in quantum computing, cryptography and network security will find this book a valuable asset.

Developed from the author’s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also suitable for researchers new to the field and practitioners of cryptography in industry. Requiring no prior experience with number theory or sophisticated algebraic tools, the book covers many computational aspects of number theory and highlights important and interesting engineering applications. It first builds the foundation of computational number theory by covering the arithmetic of integers and polynomials at a very basic level. It then discusses elliptic curves, primality testing, algorithms for integer factorization, computing discrete logarithms, and methods for sparse linear systems. The text also shows how number-theoretic tools are used in cryptography and cryptanalysis. A dedicated chapter on the application of number theory in public-key cryptography incorporates recent developments in pairing-based cryptography. With an emphasis on implementation issues, the book uses the freely available number-theory calculator GP/PARI to demonstrate complex arithmetic computations. The text includes numerous examples and exercises throughout and omits lengthy proofs, making the material accessible to students and practitioners.

This introduction to number theory has been written specifically for mathematics and computing undergraduates. Computer programs in BASIC are accompanied by basic text which explains the subject and demonstrates how computers have opened up new horizons for number theorists.

A description of 148 algorithms fundamental to number-theoretic computations, in particular for computations related to algebraic number theory, elliptic curves, primality testing and factoring. The first seven chapters guide readers to the heart of current research in computational algebraic number theory, including recent algorithms for computing class groups and units, as well as elliptic curve computations, while the last three chapters survey factoring and primality testing methods, including a detailed description of the number field sieve algorithm. The whole is rounded off with a description of available computer packages and some useful tables, backed by numerous exercises. Written by an authority in the field, and one with great practical and teaching experience, this is certain to become the standard and indispensable reference on the subject.

Number theory is one of the oldest and most appealing areas of mathematics. Computation has always played a role in number theory, a role which has increased dramatically in the last 20 or 30 years, both because of the advent of modern computers, and because of the discovery of surprising and powerful algorithms. As a consequence, algorithmic number theory has gradually emerged as an important and distinct field with connections to computer science and cryptography as well as other areas of mathematics. This text provides a comprehensive introduction to algorithmic number theory for beginning graduate students, written by the leading experts in the field. It includes several articles that cover the essential topics in this area, and in addition, there are contributions pointing in broader directions, including cryptography, computational class field theory, zeta functions and L-series, discrete logarithm algorithms, and quantum computing.

This text provides a detailed introduction to number theory, demonstrating how other areas of mathematics enter into the study of the properties of natural numbers. It contains problem sets within each section and at the end of each chapter to reinforce essential concepts, and includes up-to-date information on divisibility problems, polynomial congruence, the sums of squares and trigonometric sums.;Five or more copies may be ordered by college or university bookstores at a special price, available on application.

Volume 1.

This book effectively integrates computing concepts into the number theory curriculum using a heuristic approach and strong emphasis on rigorous proofs. Its in-depth coverage of modern applications considers the latest trends and topics, such as elliptic curves—a subject that has seen a rise in popularity in the undergraduate curriculum.

This book is about perfect, amicable and sociable numbers, with an emphasis on amicable numbers, from both a mathematical and particularly a computational point of view. Perfect and amicable numbers have been studied since antiquity, nevertheless, many problems still remain. The book introduces the basic concepts and results of perfect, amicable and sociable numbers and reviews the long history of the search for these numbers. It examines various methods, both numerical and algebraic, of generating these numbers, and also includes a set of important and interesting open problems in the area. The book is self-contained, and accessible to researchers, students, and even amateurs in mathematics and computing science. The only prerequisites are some familiarity with high-school algebra and basic computing techniques.

This book provides a concise and modern introduction to Formal Languages and Machine Computation, a group of disparate topics in the theory of computation, which includes formal languages, automata theory, turing machines, computability, complexity, number-theoretic computation, public-key cryptography, and some new models of computation, such as quantum and biological computation. As the theory of computation is a subject based on mathematics, a thorough introduction to a number of relevant mathematical topics, including mathematical logic, set theory, graph theory, modern abstract algebra, and particularly number theory, is given in the first chapter of the book. The book can be used either as a textbook for an undergraduate course, for a first-year graduate course, or as a basic reference in the field.

The only book to provide a unified view of the interplay betweencomputational number theory and cryptography Computational number theory and modern cryptography are two ofthe most important and fundamental research fields in informationsecurity. In this book, Song Y. Yang combines knowledge of thesetwo critical fields, providing a unified view of the relationshipsbetween computational number theory and cryptography. The authortakes an innovative approach, presenting mathematical ideas first,thereupon treating cryptography as an immediate application of themathematical concepts. The book also presents topics from numbertheory, which are relevant for applications in public-keycryptography, as well as modern topics, such as coding and latticebased cryptography for post-quantum cryptography. The authorfurther covers the current research and applications for commoncryptographic algorithms, describing the mathematical problemsbehind these applications in a manner accessible to computerscientists and engineers. Makes mathematical problems accessible to computer scientistsand engineers by showing their immediate application Presents topics from number theory relevant for public-keycryptography applications Covers modern topics such as coding and lattice basedcryptography for post-quantum cryptography Starts with the basics, then goes into applications and areasof active research Geared at a global audience; classroom tested in North America,Europe, and Asia Incudes exercises in every chapter Instructor resources available on the book’s CompanionWebsite Computational Number Theory and Modern Cryptography isideal for graduate and advanced undergraduate students incomputer science, communications engineering, cryptography andmathematics. Computer scientists, practicing cryptographers, andother professionals involved in various security schemes will alsofind this book to be a helpful reference.

In the past dozen or so years, cryptology and computational number theory have become increasingly intertwined. Because the primary cryptologic application of number theory is the apparent intractability of certain computations, these two fields could part in the future and again go their separate ways. But for now, their union is continuing to bring ferment and rapid change in both subjects. This book contains the proceedings of an AMS Short Course in Cryptology and Computational Number Theory, held in August 1989 during the Joint Mathematics Meetings in Boulder, Colorado. These eight papers by six of the top experts in the field will provide readers with a thorough introduction to some of the principal advances in cryptology and computational number theory over the past fifteen years. In addition to an extensive introductory article, the book contains articles on primality testing, discrete logarithms, integer factoring, knapsack cryptosystems, pseudorandom number generators, the theoretical underpinnings of cryptology, and other number theory-based cryptosystems. Requiring only background in elementary number theory, this book is aimed at nonexperts, including graduate students and advanced undergraduates in mathematics and computer science.

This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, finding irreducible and primitive polynomials, the distribution of these primitive polynomials and of primitive points on elliptic curves, constructing bases of various types and new applications of finite fields to other areas of mathematics. For completeness we in clude two special chapters on some recent advances and applications of the theory of congruences (optimal coefficients, congruential pseudo-random number gener ators, modular arithmetic, etc.) and computational number theory (primality testing, factoring integers, computation in algebraic number theory, etc.). The problems considered here have many applications in Computer Science, Cod ing Theory, Cryptography, Numerical Methods, and so on. There are a few books devoted to more general questions, but the results contained in this book have not till now been collected under one cover. In the present work the author has attempted to point out new links among different areas of the theory of finite fields. It contains many very important results which previously could be found only in widely scattered and hardly available conference proceedings and journals. In particular, we extensively review results which originally appeared only in Russian, and are not well known to mathematicians outside the former USSR.

This book is based on the AMS Short Course, The Unreasonable Effectiveness of Number Theory, held in Orono, Maine, in August 1991. This Short Course provided some views into the great breadth of applications of number theory outside cryptology and highlighted the power and applicability of number-theoretic ideas. Because number theory is one of the most accessible areas of mathematics, this book will appeal to a general mathematical audience as well as to researchers in other areas of science and engineering who wish to learn how number theory is being applied outside of mathematics. All of the chapters are written by leading specialists in number theory and provides excellent introduction to various applications.

Discrete Mathematics for Computing presents the essential mathematics needed for the study of computing and information systems. The subject is covered in a gentle and informal style, but without compromising the need for correct methodology. It is perfect for students with a limited background in mathematics. This new edition includes: • An expanded section on encryption • Additional examples of the ways in which theory can be applied to problems in computing • Many more exercises covering a range of levels, from the basic to the more advanced This book is ideal for students taking a one-semester introductory course in discrete mathematics - particularly for first year undergraduates studying Computing and Information Systems. PETER GROSSMAN has worked in both MA26 and industrial roles as a mathematician and computing professional. As a lecturer in mathematics, he was responsible for coordinating and developing mathematics courses for Computing students. He has also applied his skills in areas as diverse as calculator design, irrigation systems and underground mine layouts. He lives and works in Melbourne, Australia.

In a manner accessible to beginning undergraduates, An Invitation to Modern Number Theory introduces many of the central problems, conjectures, results, and techniques of the field, such as the Riemann Hypothesis, Roth's Theorem, the Circle Method, and Random Matrix Theory. Showing how experiments are used to test conjectures and prove theorems, the book allows students to do original work on such problems, often using little more than calculus (though there are numerous remarks for those with deeper backgrounds). It shows students what number theory theorems are used for and what led to them and suggests problems for further research. Steven Miller and Ramin Takloo-Bighash introduce the problems and the computational skills required to numerically investigate them, providing background material (from probability to statistics to Fourier analysis) whenever necessary. They guide students through a variety of problems, ranging from basic number theory, cryptography, and Goldbach's Problem, to the algebraic structures of numbers and continued fractions, showing connections between these subjects and encouraging students to study them further. In addition, this is the first undergraduate book to explore Random Matrix Theory, which has recently become a powerful tool for predicting answers in number theory. Providing exercises, references to the background literature, and Web links to previous student research projects, An Invitation to Modern Number Theory can be used to teach a research seminar or a lecture class.

Algorithmic number theory is a rapidly developing branch of number theory, which, in addition to its mathematical importance, has substantial applications in computer science and cryptography. Among the algorithms used in cryptography, the following are especially important: algorithms for primality testing; factorization algorithms for integers and for polynomials in one variable; applications of the theory of elliptic curves; algorithms for computation of discrete logarithms; algorithms for solving linear equations over finite fields; algorithms for performing arithmetic operations on large integers. The book describes the current state of these and some other algorithms. It also contains extensive bibliography. For this English translation, additional references were prepared and commented on by the author.