Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic...
Transcript of Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic...
Bibliography
1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings of the 20th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1979, 55-60.
2. L. M. Adleman, "Algorithmic Number Theory- The Complexity Contribution", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 88-113.
3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals of Mathematics, 117 (1983), 173-206.
4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992.
5. M. Agrawal, N. Kayal and N. Saxena, Primes is in P, Dept of Computer Science & Engineering, Indian Institute of Technology Kanpur, India, 6 August 2002.
6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals of Mathematics, 140 (1994), 703-722.
7. J. A. Anderson and J. M. Bell, Number Theory with Applications, PrenticeHall, 1997.
8. G. E. Andrews, Number Theory, W. B. Sayders Company, 1971. Also Dover Publications, 1994.
9. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Printing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998.
10. A. 0. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Mathematics of Computation, 61 (1993), 29-68.
11. E. Bach, M. Giesbrecht and J. Mcinnes, The Complexity of Number Theoretical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991.
12. E. Bach and J. Shallit, Algorithmic Number Theory I- Efficient Algorithms, MIT Press, 1996.
13. A. Baker, A Concise Introduction to the Theory of Numbers, Cambridge University Press, 1984.
14. R. C. Baker and G. Harman, "The Brun-Tichmarsh Theorem on Average", In: Proceedings of a Conference in Honor of Heini Halberstam, Volume 1, 1996, 39-103.
15. R. J. Baillie and S. S. Wagstaff, Jr., "Lucas Pseudoprimes", Mathematics of Computation, 35 (1980), 1391-1417.
224 Bibliography
16. F. L. Bauer, Decrypted Secrets - Methods and Maxims of Cryptology, 2nd Edition, Springer-Verlag, 2000.
17. C. H. Bennett, "Quantum Information and Computation", Physics Today, October 1995, 24-30.
18. C. H. Bennett, G. Brassard and A. K. Ekert, "Quantum Cryptography", Scientific American, October 1992, 26-33.
19. C. H. Bennett, "Strengths and Weakness of Quantum Computing", SIAM Journal on Computing, 26 (5)1997, 1510-1523.
20. E. Bernstein and U. Vazirani, "Quantum Complexity Theory", SIAM Journal on Computing, 26 5(1997), 1411-1473.
21. D. J. Bernstein, Proving Primality After Agrawal-Kayal-Saxena, Dept of Mathematics, Statistics and Computer Science, The University of Illinois at Chicago, 25 Jan 2003.
22. D. Bishop, Introduction to Cryptography with Java TM Applets, Jones and Bartlett, 2003.
23. M. Blum and S. Goldwasser, "An Efficient Probabilistic Public-key Encryption Scheme that Hides all Partial Information", Advances in Cryptography, CRYPTO '84, Proceedings, Lecture Notes in Computer Science 196, SpringerVerlag, 1985, 289-302.
24. R. Bhattacharjee and P. Pandey, "Primality Testing", Dept of Computer Science & Engineering, Indian Institute of Technology Kanpur, India, 2001.
25. E. Bombieri, Problems of the Millennium: The Riemann Hypothesis, Institute for Advanced Study, Princeton, 2000.
26. D. Boneh, "Twenty Years of Attacks on the RSA Cryptosystem", Notices of the AMS, 46 2(1999), 203-213.
27. G. Brassard, "A Quantum Jump in Computer Science", Computer Science Today- Recent Trends and Development, Lecture Notes in Computer Science 1000, Springer-Verlag, 1995, 1-14.
28. R. P. Brent, "Irregularities in the Distribution of Primes and Twin Primes", Mathematics of Computation, 29 (1975), 43-56.
29. R. P. Brent, "An Improved Monte Carlo Factorization Algorithm", BIT, 20 (1980), 176-184.
30. R. P. Brent, "Some Integer Factorization Algorithms using Elliptic Curves", Australian Computer Science Communications, 8 (1986), 149-163.
31. R. P. Brent, "Primality Testing and Integer Factorization", Proceedings of Australian Academy of Science Annual General Meeting Symposium on the Role of Mathematics in Science, Canberra, 1991, 14-26.
32. R. P. Brent, "Uses of Randomness in Computation", Report TR-CS-94-06, Computer Sciences Laboratory, Australian National University, 1994.
33. R. P. Brent, "Some parallel algorithms for integer factorisation", Proc. Fifth International Euro-Par Conference (Toulouse, France, 1-3 Sept 1999), Lecture Notes in Computer Science, Volume 1685, Springer-Verlag, 1999, 1-22.
34. R. P. Brent, "Recent progress and prospects for integer factorisation algorithms", Proc. COCOON 2000 (Sydney, July 2000), Lecture Notes in Computer Science, Volume 1858, Springer-Verlag, 2000, 3-22.
35. D. M. Bressoud, Factorization and Primality Testing, Undergraduate Texts in Mathematics, Springer-Verlag, 1989.
Bibliography 225
36. E. F. Brickell, D. M. Gordon and K. S. McCurley, "Fast Exponentiation with Precomputation" (Extended Abstract), Advances in Cryptography, EUROCRYPT '92, Proceedings, Lecture Notes in Computer Science 658, SpringerVerlag, 1992, 200-207.
37. J. P. Buhler (editor), Algorithmic Number Theory, Third International Symposium, ANTS-III, Proceedings, Lecture Notes in Computer Science 1423, Springer-Verlag, 1998.
38. S. A. Burr (editor), The Unreasonable Effectiveness of Number Theory, Proceedings of Symposia in Applied Mathematics 46, American Mathematical Society, 1992.
39. L. Childs, A Concrete Introduction to Higher Algebra, 2nd Edition, SpringerVerlag, 2000.
40. H. Cohen, Advanced Number Theory, Dover Publications, 1980.
41. H. Cohen, A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics 138, Springer-Verlag, 1993.
42. S. Cook, The P versus NP Problem, University of Toronto, April, 2000. (Manuscript prepared for the Clay Mathematics Institute for the Millennium Prize Problems; revised in November 2000.)
43. J. W. Cooley and J. W. Tukey, "An Algorithm for the Machine Calculation of Complex Fourier Series", Mathematics of Computation, 19 (1965), 297-301.
44. T. H. Cormen, C. E. Ceiserson and R. L. Rivest, Introduction to Algorithms, MIT Press, 1990.
45. D. A. Cox, Primes of the Form x 2 + ny2 , Wiley, 1989. 46. R. Crandall and C. Pomerance, Prime Numbers - A Computational Perspec
tive, Springer-Verlag, 2001. 47. H. Davenport, The Higher Arithmetic, 7th Edition, Cambridge University
Press, 1999.
48. D. Deutsch, "Quantum Theory, the Church-Turing Principle and the Universal Quantum Computer", Proceedings of the Royal Society of London, Series A, 400 {1985), 96-117.
49. L. E. Dickson, History of the Theory of Numbers I- Divisibility and Primality, G. E. Stechert & Co., New York, 1934.
50. W. Diffie and E. Hellman, "New Directions in Cryptography", IEEE TI-ansactions on Information Theory, 22, 5(1976), 644-654.
51. W. Diffie and E. Hellman, "Privacy and Authentication: An Introduction to Cryptography", Proceedings of the IEEE, 67, 3(1979), 393-427.
52. P. G. L. Dirichlet, Lecturers on Number Theory, Supplements by R. Dedekind, American Mathematics Society and London Mathematics Society, 1999.
53. J.D. Dixon, "Factorization and Primality tests", The American Mathematical Monthly, June-July 1984, pp 333-352.
54. T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms", IEEE TI-ansactions on Information Theory, 31 (1985), 496-472.
55. Euclid, The Thirteen Books of Euclid's Elements, Translated by T. L. Heath, Great Books of the Western World 11, edited by R. M. Hutchins, William Benton Publishers, 1952.
56. Euclid, The Thirteen Books of Euclid's Elements, Second Edition, Translated by Thomas L. Heath, Dover Publications, 1956.
226 Bibliography
57. E. Fouvry, "Theoreme de Brun-Titchmarsh: Application au Theoreme de Fermat", ventiones Mathematicae, 79 {1985), 383-407.
58. M. Gardner, "Mathematical Games - A New Kind of Cipher that Would Take Millions of Years to Break", Scientific American, 237, 2{1977), 120-124.
59. M. R. Garey and D. S. Johnson, Computers and Intractability - A Guide to the Theory of NP-Completeness, W. H. Freeman and Company, 1979.
60. C. F. Gauss, Disquisitiones Arithmeticae, G. Fleischer, Leipzig, 1801. English translation by A. A. Clarke, Yale University Press, 1966. Revised English translation by W. C. Waterhouse, Springer-Verlag, 1975.
61. S. Goldwasser and J. Kilian, "Almost All Primes Can be Quickly Certified", Proceedings of the 18th ACM Symposium on Theory of Computing, Berkeley, 1986, 316-329.
62. S. Goldwasser and J. Kilian, "Primality Testing Using Elliptic Curves", Journal of ACM, 46, 4{1999), 450-472.
63. S. Goldwasser and S. Micali, "Probabilistic Encryption", Journal of Computer and System Sciences, 28 {1984), 270-299.
64. D. M. Gordon and K. S. McCurley, "Massively Parallel Computation of Discrete Logarithms", Advances in Cryptography, Crypto '92, Proceedings, Lecture Notes in Computer Science 740, Springer-Verlag, 1992, 312-323.
65. D. M. Gordon, "Discrete Logarithms in GF(p) using the Number Field Sieve", SIAM Journal on Discrete Mathematics, 6, 1{1993), 124-138.
66. F. Guterl, "Suddenly, Number Theory Makes Sense to Industry", International Business Week, 20 June 1994, pp. 62-64.
67. G. H. Hardy, A Mathematician's Apology, Cambridge University Press, 1979.
68. G. H. Hardy and E. M. Wright, An Introduction to Theory of Numbers, 5th Edition, Oxford University Press, 1979.
69. M. Hellman, "Private Communications", 2001-2003. 70. I. N. Herstein, Topics in Algebra, 2nd Edition, Wiley, 1975. 71. L. Hua, Introduction to Number Theory, English Translation from Chinese by
P. Shiu, Springer-Verlag, 1980. 72. R. J. Hughes, "Cryptography, Quantum Computation and Trapped Ions",
Philosophic Transactions of the Royal Society London, Series A, 356 {1998), 1853-1868.
73. R. M. Huizing, An Implementation of the Number Field Sieve, Note NM-R9511, Centre for Mathematics and Computer Science (CWI), Amsterdam, 1995.
74. D. Husemoller, Elliptic Curves, Graduate Texts in Mathematics 111, SpringerVerlag, 1987.
75. K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, 2nd Edition, Graduate Texts in Mathematics 84, Springer-Verlag, 1990.
76. T. H. Jackson, From Number Theory to Secret Codes, A Computer Illustrated Text, Adam Hilger, Bristol, 1987.
77. M. J. Jacobson, N. Koblitz, J. H. Silverman, A. Stein, E. Teske, "Analysis of the Xedni Calculus Attack", Designs, Codes and Cryptography, 20, 2000, 41-64.
78. K. Kato, N. Kurokawa and T. Saito, Number Theory 1: Fermat's Dream, AMS, 2000.
79. J. Kilian, Uses of Randomness in Algorithms and Protocols, MIT Press, 1990.
Bibliography 227
80. D. E. Knuth, The Art of Computer Programming II - Seminumerical Algorithms, 3rd Edition, Addison-Wesley, 1998.
81. N. Koblitz, "Elliptic Curve Cryptography", Mathematics of Computation, 48 (1987), 203-209.
82. N. Koblitz, Introduction to Elliptic Curves and Modular Forms, 2nd Edition, Graduate Texts in Mathematics 97, Springer-Verlag, 1993.
83. N. Koblitz, A Course in Number Theory and Cryptography, 2nd Edition, Graduate Texts in Mathematics 114, Springer-Verlag, 1994.
84. N. Koblitz, Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics 3, Springer-Verlag, 1998.
85. N. Koblitz, "A Survey of Number Theory and Cryptography", in: Number Theory, Edited by . P. Bambah, V. C. Dumir and R. J. Hans-Gill, Birkhiiser, 2000, 217-239.
86. N. Koblitz, "Cryptography", in: Mathematics Unlimited- 2001 and Beyond, Edited by B. Enguist and W. Schmid, Springer-Verlag, 2001, 749-769.
87. E. Kranakis, Primality and Cryptography, John Wiley & Sons, 1986. 88. S. Lang, Elliptic Functions, 2nd Edition, Springer-Verlag, 1987.
89. H. W. Lenstra, Jr., "Factoring Integers with Elliptic Curves", Annals of Mathematics, 126 (1987), 649-673.
90. A. K. Lenstra and H. W. Lenstra, Jr. (editors), The Development of the Number Field Sieve, Lecture Notes in Mathematics 1554, Springer-Verlag, 1993.
91. J. H. McClellan and C. M. Rader, Number Theory in Digital Signal Processing, Prentice-Hall, 1979.
92. K. S. McCurley, "The Discrete Logarithm Problem", in: Cryptology and Computational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.
93. K. S. McCurley, "Odds and Ends from Cryptology and Computational Number Theory", in: Cryptology and Computational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.
94. H. McKean and V. Moll, Elliptic Curves- Function Theory, Geometry, Arithmetic, Cambridge University Press, 1997.
95. R. J. McEliece, A Public-Key Cryptosystem based on Algebraic Coding Theory, JPL DSN Progress Report 42-44, 1978, 583-584.
96. A. Menezes and S. A. Vanstone, "Elliptic curve cryptosystems and their implementation", Journal of Cryptology, 6 (1993), 209-224.
97. A. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptosystems, CRC Press, 1996.
98. R. C. Merkle, "Secure Communications over Insecure Channels" Communications of the ACM, 21 (1978), 294-299. (Submitted in 1975.)
99. J. F. Mestre, "Formules Explicites et Minoration de Conducteurs de VariEltes algebriques" Compositio Mathematica, 58 (1986), 209-232.
100. B. Meyer and and V. Miiller, "A Public Key Cryptosystem Based on Elliptic Curves over 7l/n7l Equivalent to Factoring", Advances in Cryptology, EUROCRYPT '96, Proceedings, Lecture Notes in Computer Science 1070, SpringerVerlag, 1996, 49-59.
228 Bibliography
101. G. Miller, "Riemann's Hypothesis and Tests for Primality", Journal of Systems and Computer Science, 13 (1976), 300-317.
102. V. Miller, "Uses of Elliptic Curves in Cryptography", Advances in Cryptology, CRYPTO '85, Proceedings, Lecture Notes in Computer Science 218, SpringerVerlag, 1986, 417-426.
103. R. A. Mollin, Fundamental Number Theory with Applications, CRC Press, 1998.
104. R. A. Mollin, An Introduction to Cryptography, Chapman & Hall/CRC, 2001. 105. R. A. Mollin, RSA and Public-Key Cryptography, Chapman & Hall/CRC
Press, 2003.
106. P. L. Montgomery, "Speeding Pollard's and Elliptic Curve Methods of Factorization", Mathematics of Computation, 48 (1987), 243-264.
107. F. Morain, Courbes Elliptiques et Tests de Primalite, Universite Claude Bernard, Lyon I, 1990.
108. P. L. Montgomery, "A Survey of Modern Integer Factorization Algorithms", CWI Quarterly, 7, 4(1994), 337-394.
109. M. A. Morrison and J. Brillhart, "A Method of Factoring and the Factorization of F7", Mathematics of Computation, 29 (1975), 183-205.
110. R. Motwani and P. Raghavan, Randomized Algorithms, Cambridge University Press, 1995.
111. M. B. Nathanson, Elementary Methods in Number Theory, Springer-Verlag, 2000.
112. I. Niven, H. S. Zuckerman and H. L. Montgomery, An Introduction to the Theory of Numbers, 5th Edition, John Wiley & Sons, 1991.
113. S. Pohlig and M. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), pp 106-110.
114. J. O'Connor and E. Robertson, The MacThtor History of Mathematics Archive, http:/ jwww.groups.dcs.st-and.ac. uk/ "'history /Mathematicians.
115. A.M. Odlyzko, "Discrete Logarithms in Finite Fields and their Cryptographic Significance", Advances in Cryptography, EUROCRYPT '84, Proceedings, Lecture Notes in Computer Science 209, Springer-Verlag, 1984, 225-314.
116. 0. Ore, Number Theory and its History, Dover Publications, 1988. 117. C. P. Pfieeger, Security in Computing, Prentice-Hall, 1997. 118. R. G. E. Pinch, "Some Primality Testing Algorithms", Notices of the American
Mathematical Society, 40, 9(1993), 1203-1210. 119. R. G. E. Pinch, Mathematics for Cryptography, Queen's College, University
of Cambridge, 1997. 120. S. C. Pohlig and M. Hellman, "An Improved Algorithm for Computing Loga
rithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), 106-110.
121. J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15 (1975), 331-332.
122. J. M. Pollard, "Monte Carlo Methods for Index Computation (mod p)", Mathematics of Computation, 32 (1980), 918-924.
123. C. Pomerance, "Very Short Primality Proofs", Mathematics of Computation, 48 (1987), 315-322.
Bibliography 229
124. C. Pomerance (editor), Cryptology and Computational Number Theory, Proceedings of Symposia in Applied Mathematics 42, American Mathematical Society, 1990.
125. C. Pomerance, "Cryptology and Computational Number Theory - An Introduction", Cryptology and Computational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematical Society, 1990, 1-12.
126. C. Pomerance, "A Tale of Two Sieves", Notice of the AMS, 43, 12{1996), 1473-1485.
127. C. Pomerance, J. L. Selfridge and S. S. Wagstaff, Jr., "The Pseudoprimes to 25 · 109", Mathematics of Computation, 35 (1980), 1003-1026.
128. V. R. Pratt, "Every Prime Has a Succinct Certificate", SIAM Journal on Computing, 4 {1975), 214-220.
129. M. 0. Rabin, "Probabilistic Algorithms for Testing Primality", Journal of Number Theory, 12 {1980), 128-138.
130. D. Redmond, Number Theory: An Introduction, Marcel Dekker, New York, 1996.
131. P. Ribenboim, The Little Book on Big Primes, Springer-Verlag, 1991.
132. P. Ribenboim, "Selling Primes", Mathematics Magazine, 68, 3(1995), 175-182.
133. P. Ribenboim, The New Book of Prime Number Records, Springer-Verlag, 1996.
134. H. J. J. te Riele, "Factorization of RSA-140 using the Number Field Sieve", http: I lwww. crypto-world. com/announcementsiRSA140. txt, 4 February 1999.
135. H. J. J. te Riele, "Factorization of a 512-bits RSA Key using the Number Field Sieve", http: I lwww. crypto-world. com/announcementsiRSA155. txt, 26 August 1999.
136. H. J. J. te Riele, W. Lioen and D. Winter, "Factoring with the Quadrtaic Sieve on Large Vector Computers", Journal of Computational and Applied Mathematics, 27 {1989), 267-278.
137. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, Boston, 1990.
138. R. L. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, 21, 2{1978), 120-126.
139. H. E. Rose, A Course in Number Theory, 2nd Edition, Oxford University Press, 1994.
140. K. Rosen, Elementary Number Theory and its Applications, 4th Edition, Addison-Wesley, 2000.
141. J. J. Rotman A First Course in Abstract Algebra, Second Edition, PrenticeHall, 2000.
142. A. Salomaa, Public-Key Cryptography, 2nd Edition, Springer-Verlag, 1996. 143. B. Schneier, Applied Cryptography- Protocols, Algorithms, and Source Code
in C, 2nd Edition, John Wiley & Sons, 1996.
144. C. P. Schnorr, "Efficient Identification and Signatures for Smart Cards", Advances in Cryptography, CRYPTO '89, Proceedings, Lecture Notes in Computer Science 435, Springer-Verlag, 1990, 239-252.
230 Bibliography
145. R. Schoof, "Elliptic Curves over Finite Fields and the Computation of Square Roots mod p", Mathematics of Computation, 44 {1985), 483-494.
146. M. R. Schroeder, Number Theory in Science and Communication, 3rd Edition, Springer Series in Information Sciences 7, Springer-Verlag, 1997.
147. A. Shamir, "Factoring Numbers in O{logn) Arithmetic Steps", Information Processing Letters, 8, 1{1979), 28-31.
148. A. Shamir, "How to Share a Secret", Communications of the ACM, 22, 11{1979), 612-613.
149. P. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring", Proceedings of 35th Annual Symposium on Foundations of Computer Science, IEEE Computer Society Press, 1994, 124-134.
150. P. Shor, "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", SIAM Journal on Computing, 26, 5{1997), 1484-1509.
151. J. H. Silverman and J. Tate, Rational Points on Elliptic Curves, Undergraduate Texts in Mathematics, Springer-Verlag, 1992.
152. J. H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Mathematics 106, Springer-Verlag, 1994.
153. J. H. Silverman, A Friendly Introduction to Number Theory, Second Edition, Prentice-Hall, 2001.
154. J. H. Silverman, "The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem", Dept of Mathematics, Brown University, 10 February 1999.
155. J. H. Silverman and J. Suzuki, "Elliptic Curve Discrete Logarithms and the Index Calculus", Advances in Cryptology - ASIACRYPT '98, Springer Lecture Notes in Computer Science 1514, 1998, 11Q-125.
156. J. H. Silverman, "The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem", Designs, Codes and Cryptography, 20, 2000, 5-40.
157. R. D. Silverman, 'The Multiple Polynomial Quadratic Sieve", Mathematics of Computation, 48 {1987), 329-339.
158. R. D. Silverman, "A Perspective on Computational Number Theory", Notices of the American Mathematical Society, 38, 6{1991), 562-568.
159. R. D. Silverman, "Massively Distributed Computing and Factoring Large Integers", Communications of the ACM, 34, 11{1991), 95-103.
160. D. R. Simon, "On the Power of Quantum Computation", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 116-123.
161. S. Singh, The Code Book - The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Fourth Estate, London, 1999.
162. S. Singh, The Science of Secrecy - The Histroy of Codes and Codebreaking, Fourth Estate, London, 2000.
163. N. Smart, Cryptography: An Introduction, McGraw-Hill, 2003. 164. R. Solovay and V. Strassen, "A Fast Monte-Carlo Test for Primality", SIAM
Journal on Computing, 6, 1{1977), 84-85. "Erratum: A Fast Monte-Carlo Test for Primality", SIAM Journal on Computing, 7, 1{1978), 118.
165. J. Stillwell, Elements of Number Theory, Springer-Verlag, 2000. 166. D. R. Stinson, Cryptography: Theory and Practice, 2nd Edition, Chapman &
Hall/CRC Press, 2002.
Bibliography 231
167. N. S. Szabo and R. I. Tanaka, Residue Arithmetic and its Applications to Computer Technology, McGraw-Hill, 1967.
168. W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Prentice-Hall, 2002.
169. H. C. A. van Til borg, Fundamentals of Cryptography, Kluwer Academic Publishers, 1999.
170. S. Wagon, "Primality Testing", The Mathematical Intelligencer, 8, 3(1986), 58-61.
171. S. S. Wagstaff, Jr., Cryptanalysis of Number Theoretic Ciphers, Chapman & Hall/CRC Press, 2002.
172. H. Wiener, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transactions on Information Theory, 36, 3(1990), 553-558.
173. A. Wiles, "Modular Elliptic Curves and Fermat's Last Theorem", Annals of Mathematics, 141 (1995), 443-551.
174. H. S. Wilf, Algorithms and Complexity, 2nd Edition, A. K. Peters, 2002.
175. H. C. Williams, "The Influence of Computers in the Development of Number Theory", Computers & Mathematics with Applications, 8, 2(1982), 75-93.
176. H. C. Williams, "Factoring on a Computer", Mathematical Intelligencer, 6, 3(1984), 29-36.
177. H. C. Williams, Edouard Lucas and Primality Testing, John Wiley & Sons, 1998.
178. C. P. Williams and S. H. Clearwater, Explorations in Quantum Computation, The Electronic Library of Science (TELOS), Springer-Verlag, 1998.
179. S. Y. Yan, "Primality Testing of Large Numbers in Maple", Computers & Mathematics with Applications, 29, 12(1995), 1-8.
180. S. Y. Yan, Number Theory for Computing, 2nd Edition, Springer-Verlag, 2002.
181. S. Y. Yan, "Computing Prime Factorization and Discrete Logarithms: From Index Calculus to Xedni Calculus", International Journal of Computer Mathematics, 80, 5(2003), 573-590.
Index
>.(n), 32 J-l(n), 32 1/J(n), 30 1r(x), 109 u(n), 27 T(n), 27 ((s), 2 b-sequence, 121 kth (higher) power non-residue, 78 kth (higher) power residue, 78 kth Power Residuosity Problem
(kPRP), 181 kth Root Problem (kRTP), 181 kth power non-residue, 57 kth power residue, 57
additive group, 81 additive identity, 84 additive inverse, 84 algebraic computation Jaw, 94 algebraic equation, 22 algebraic integer, 163 algebraic number, 162 arithmetic function, 25 associativity, 80 asymmetric key cryptosystem, 196 authentication, 194
base-2 pseudoprimality test, 119
Carmichael number, 119 Carmichael's >.-function, 32, 50 Carmichael's theorem, 50 CFRAC factoring algorithm, 157 CFRAC method, 155 Chinese Remainder Theorem (CRT),
53 Chinese test, 120 closure, 80 common multiple, 9 commutative group, 81
commutative ring, 83 commutativity, 81 complete system of residues, 39 completely multiplicative function, 25 complex zeros, 112 composite number, 4 congruence classes, 37 congruent, 36 conic, 87 consecutive pairs of quadratic residues,
58 consecutive triples of quadratic
residues, 59 Continued FRACtion (CFRAC)
method, 140 convergent, 16 convergents, 23 Converse of Fermat's little theorem, 49 Converse of Wilson's theorem, 51 cryptanalysis, 193 cryptography, 193 cryptology, 193 cubic Diophantine equation, 88 cubic integer, 163 cyclic group, 81
deterministic encryption, 205 Diffie-Hellman-Merkle key-exchange,
211 Diophantine geometry, 87 discrete logarithm, 77 discrete logarithm problem, 170 dividend, 4 division algorithm, 4 division ring, 83 divisor, 3 domain, 25
ECPP (Elliptic Curve Primality Proving), 127
ECPP Algorithm, 128
234
ElGamal cryptosystem, 213 elliptic curve, 88, 214 elliptic curve analogue of Diffie
Hellman, 216 elliptic curve analogue of ElGamal, 217 elliptic curve analogue of Massey-
Omura, 216 elliptic curve analogue of RSA, 217 elliptic curve cryptography (ECC), 214 elliptic function, 90 elliptic integral, 90 embedding messages on elliptic curves,
215 ENIGMA code, 194 equivalence classes, 37 equivalence relation, 37 Euclid, 5 Euclid's algorithm, 12 Euclid's Elements, 13 Euler probable prime, 124 Euler pseudoprime, 124 Euler's (totient) ¢-function, 30 Euler's criterion, 60 Euler's theorem, 50 even number, 4 extended Euclid's algorithm, 46
factor, 3 factoring by trial divisions, 141 fast group operations, 107 fast modular exponentiations, 104 fast point additions, 107 Fermat Last Theorem, 1 Fermat probable prime, 118 Fermat pseudoprime, 118 Fermat's factoring algorithm, 142 Fermat's little theorem, 49 field, 83 finite fields, 85 finite group, 81 finite order of a point on an elliptic
curve, 92 finite simple continued fraction, 17 fixed-point attack, 205 Fundamental Theorem of Arithmetic, 6
Galois field, 85 Gauss'sJemma, 63 geometric composition law, 91 Goldbach Conjecture, 1 greatest common divisor (gcd), 7 group, 80 group laws on elliptic curves, 92
height, 96 high-order congruence, 55 hybrid cryptosystem, 197
identity, 81 incongruent, 36 index calculus algorithm, 178 index calculus method, 178 index of a to the base g, 76 index of an integer modulo n, 76 infinite fields, 85 infinite group, 81
Index
infinite order of a point on an elliptic curve, 92
infinite simple continued fraction, 18 integer factorization problem, 139 integral domain, 83 inverse, 81 irrational numbers, 18
Jacobi symbol, 69
least (non-negative) residue of x modulo n, 38
least common multiple (lcm), 9 least non-negative residue, 36 least residue, 63 Legendre symbol, 61 Legendre's congruence, 153 Legendre, A. M., 60 Lehman's method, 139 Lenstra's Elliptic Curve Method
(ECM), 140, 149 linear congruence, 46 linear Diophantine equation, 22
Mobius 11-function, 32 Mobius inversion formula, 34 Massey-Omura cryptosystem, 213 Mersenne prime, 3 Miller-Rabin test, 122 modular arithmetic in ZjnZ, 41 modular inverse, 44 modulus, 36 multiple, 3 Multiple Polynomial Quadratic Sieve
(MPQS), 140 multiple polynomial quadratic sieve
(MPQS), 159 multiplicative function, 25 multiplicative group, 81 multiplicative identity, 84 multiplicative·inverse, 44, 84
Index
non-secret encryption, 195 non-singular elliptic curve, 89 non-witness, 124 non-zero field element, 84 nontrivial divisor, 4 nontrivial square root of 1, 121 nontrivial zeros, 112 Number Field Sieve (NFS), 140, 162,
179
odd number, 4 order of a modulo n, 72 order of a field, 85 order of a point on an elliptic curve, 92
partial quotients, 15 perfect number, 3 period, 20 periodic simple continued fraction, 20 Pocklington's theorem, 126, 135 point at infinity, 89 Pollard's p factoring algorithm, 147 Pollard's p-method, 140, 143 Pollard's "p- 1" factoring algorithm,
148 Pollard's "p- 1" method, 148 polynomial congruence, 55 polynomial congruential equation, 55 polynomial security, 206 primality testing problem, 99, 115 prime counting function, 109 prime factor, 6 prime field, 85 prime number, 4 Prime Number Theorem, 110 prime power, 85 primitive root of n, 73 privacy, 194 private key, 196 probabilistic encryption, 206, 207 probable prime, 118 proper divisor, 3 pseudoprime, 118 public-key, 196 public-key cryptography, 195 public-key cryptosystem, 196 purely periodic simple continued
fraction, 20
quadratic congruence, 56 quadratic integer, 163 quadratic irrational, 20 quadratic non-residue, 57 Quadratic reciprocity law, 65
235
quadratic residue, 57 Quadratic Residuosity Problem (QRP),
181, 206 Quadratic Sieve (QS), 158 quantum algorithm for discrete
logarithms, 179 quantum algorithm for integer
factorization, 168 quantum register, 169 quotient, 4
randomized encryption, 206 rank of an elliptic curve, 94 rational integers, 164 rational line, 87 rational number, 87 rational numbers, 17 rational point, 87 real base logarithm, 76 real number, 20 real zeros, 112 real-valued function, 25 reduced system of residues modulo n,
41 reflexive, 37 relatively prime, 8 remainder, 4 repeated doubling and addition, 107 repeated doubling method, 215 repeated squaring and multiplication,
103 residue, 36 residue class, 37 residue classes, 37 residue of x modulo n, 37 Riemann (-function, 2, 111 Riemann Hypothesis, 2 Riemann Hypothesis (RH), 112 ring, 82 ring with identity, 83 root finding problem, 204 RSA Assumption, 198 RSA cryptosystem, 197
secret-key, 196 secret-key cryptosystem, 196 semantic security, 206 Shanks' baby-step giant-step method
for discrete logarithms, 172 Shanks' class group method, 140 Shanks' SQUFOF method, 139 Sieve of Eratosthenes, 5 Silver-Pohlig-Hellman algorithm, 174
236
simple continued fraction, 15 Solovay-Strassen test, 124 Sophie Germain prime, 133 square root method, 173 SQuare RooT Problem (SQRTP), 181 strong probable prime, 122 strong pseudoprimality test, 120, 122 strong pseudoprime, 122 subgroup, 81 symmetric, 37
torsion subgroup, 94 transitive, 37 trial division, 140 trivial divisor, 4 trivial zeros, 112 Twin Prime Conjecture, 2
Wiener's attack, 205 Wilson's theorem, 51 witness, 124
Index
About the Author
SONG Y Y AN majored in both Computer Science and Mathematics, and obtained a Doctorate in Mathematics (Number Theory) from the Department of Mathematics at the U niversity of York, England. His current research interests are in number theory, theoretical computer science, public-key cryptography and information/network security. His other publications include Perfect, Amicable and Sociable Numbers: A
Computational Approach, World Scientific, 1996, and Number Theory for Computing, Springer-Verlag, 2nd Edition, 2002. Song Yan is currently with the School of Mathematical and Information Sciences at Coventry University, England, and can be contacted by [email protected].