Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic...

14
Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings of the 20th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1979, 55- 60. 2. L. M. Adleman, "Algorithmic Number Theory- The Complexity Contribution", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 88-113. 3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals of Mathematics, 117 (1983), 173- 206. 4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992. 5. M. Agrawal, N. Kayal and N. Saxena, Primes is in P, Dept of Computer Science & Engineering, Indian Institute of Technology Kanpur, India, 6 August 2002. 6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals of Mathematics, 140 (1994), 703-722. 7. J. A. Anderson and J. M. Bell, Number Theory with Applications, Prentice- Hall, 1997. 8. G. E. Andrews, Number Theory, W. B. Sayders Company, 1971. Also Dover Publications, 1994. 9. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Print- ing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998. 10. A. 0. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Math- ematics of Computation, 61 (1993), 29-68. 11. E. Bach, M. Giesbrecht and J. Mcinnes, The Complexity of Number Theoret- ical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991. 12. E. Bach and J. Shallit, Algorithmic Number Theory I- Efficient Algorithms, MIT Press, 1996. 13. A. Baker, A Concise Introduction to the Theory of Numbers, Cambridge Uni- versity Press, 1984. 14. R. C. Baker and G. Harman, "The Brun-Tichmarsh Theorem on Average", In: Proceedings of a Conference in Honor of Heini Halberstam, Volume 1, 1996, 39-103. 15. R. J. Baillie and S. S. Wagstaff, Jr., "Lucas Pseudoprimes", Mathematics of Computation, 35 (1980), 1391-1417.

Transcript of Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic...

Page 1: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Bibliography

1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings of the 20th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1979, 55-60.

2. L. M. Adleman, "Algorithmic Number Theory- The Complexity Contribution", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 88-113.

3. L. M. Adleman, C. Pomerance, and R. S. Rumely, "On Distinguishing Prime Numbers from Composite Numbers", Annals of Mathematics, 117 (1983), 173-206.

4. L. M. Adleman and M. D. A. Huang, Primality Testing and Abelian Varieties over Finite Fields, Lecture Notes in Mathematics 1512, Springer-Verlag, 1992.

5. M. Agrawal, N. Kayal and N. Saxena, Primes is in P, Dept of Computer Science & Engineering, Indian Institute of Technology Kanpur, India, 6 August 2002.

6. W. Alford, G. Granville and C. Pomerance, "There Are Infinitely Many Carmichael Numbers", Annals of Mathematics, 140 (1994), 703-722.

7. J. A. Anderson and J. M. Bell, Number Theory with Applications, Prentice­Hall, 1997.

8. G. E. Andrews, Number Theory, W. B. Sayders Company, 1971. Also Dover Publications, 1994.

9. T. M. Apostol, Introduction to Analytic Number Theory, Corrected 5th Print­ing, Undergraduate Texts in Mathematics, Springer-Verlag, 1998.

10. A. 0. L. Atkin and F. Morain, "Elliptic Curves and Primality Proving", Math­ematics of Computation, 61 (1993), 29-68.

11. E. Bach, M. Giesbrecht and J. Mcinnes, The Complexity of Number Theoret­ical Algorithms, Technical Report 247/91, Department of Computer Science, University of Toronto, 1991.

12. E. Bach and J. Shallit, Algorithmic Number Theory I- Efficient Algorithms, MIT Press, 1996.

13. A. Baker, A Concise Introduction to the Theory of Numbers, Cambridge Uni­versity Press, 1984.

14. R. C. Baker and G. Harman, "The Brun-Tichmarsh Theorem on Average", In: Proceedings of a Conference in Honor of Heini Halberstam, Volume 1, 1996, 39-103.

15. R. J. Baillie and S. S. Wagstaff, Jr., "Lucas Pseudoprimes", Mathematics of Computation, 35 (1980), 1391-1417.

Page 2: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

224 Bibliography

16. F. L. Bauer, Decrypted Secrets - Methods and Maxims of Cryptology, 2nd Edition, Springer-Verlag, 2000.

17. C. H. Bennett, "Quantum Information and Computation", Physics Today, Oc­tober 1995, 24-30.

18. C. H. Bennett, G. Brassard and A. K. Ekert, "Quantum Cryptography", Sci­entific American, October 1992, 26-33.

19. C. H. Bennett, "Strengths and Weakness of Quantum Computing", SIAM Jour­nal on Computing, 26 (5)1997, 1510-1523.

20. E. Bernstein and U. Vazirani, "Quantum Complexity Theory", SIAM Journal on Computing, 26 5(1997), 1411-1473.

21. D. J. Bernstein, Proving Primality After Agrawal-Kayal-Saxena, Dept of Math­ematics, Statistics and Computer Science, The University of Illinois at Chicago, 25 Jan 2003.

22. D. Bishop, Introduction to Cryptography with Java TM Applets, Jones and Bartlett, 2003.

23. M. Blum and S. Goldwasser, "An Efficient Probabilistic Public-key Encryp­tion Scheme that Hides all Partial Information", Advances in Cryptography, CRYPTO '84, Proceedings, Lecture Notes in Computer Science 196, Springer­Verlag, 1985, 289-302.

24. R. Bhattacharjee and P. Pandey, "Primality Testing", Dept of Computer Sci­ence & Engineering, Indian Institute of Technology Kanpur, India, 2001.

25. E. Bombieri, Problems of the Millennium: The Riemann Hypothesis, Institute for Advanced Study, Princeton, 2000.

26. D. Boneh, "Twenty Years of Attacks on the RSA Cryptosystem", Notices of the AMS, 46 2(1999), 203-213.

27. G. Brassard, "A Quantum Jump in Computer Science", Computer Science Today- Recent Trends and Development, Lecture Notes in Computer Science 1000, Springer-Verlag, 1995, 1-14.

28. R. P. Brent, "Irregularities in the Distribution of Primes and Twin Primes", Mathematics of Computation, 29 (1975), 43-56.

29. R. P. Brent, "An Improved Monte Carlo Factorization Algorithm", BIT, 20 (1980), 176-184.

30. R. P. Brent, "Some Integer Factorization Algorithms using Elliptic Curves", Australian Computer Science Communications, 8 (1986), 149-163.

31. R. P. Brent, "Primality Testing and Integer Factorization", Proceedings of Aus­tralian Academy of Science Annual General Meeting Symposium on the Role of Mathematics in Science, Canberra, 1991, 14-26.

32. R. P. Brent, "Uses of Randomness in Computation", Report TR-CS-94-06, Computer Sciences Laboratory, Australian National University, 1994.

33. R. P. Brent, "Some parallel algorithms for integer factorisation", Proc. Fifth International Euro-Par Conference (Toulouse, France, 1-3 Sept 1999), Lecture Notes in Computer Science, Volume 1685, Springer-Verlag, 1999, 1-22.

34. R. P. Brent, "Recent progress and prospects for integer factorisation algo­rithms", Proc. COCOON 2000 (Sydney, July 2000), Lecture Notes in Computer Science, Volume 1858, Springer-Verlag, 2000, 3-22.

35. D. M. Bressoud, Factorization and Primality Testing, Undergraduate Texts in Mathematics, Springer-Verlag, 1989.

Page 3: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Bibliography 225

36. E. F. Brickell, D. M. Gordon and K. S. McCurley, "Fast Exponentiation with Precomputation" (Extended Abstract), Advances in Cryptography, EURO­CRYPT '92, Proceedings, Lecture Notes in Computer Science 658, Springer­Verlag, 1992, 200-207.

37. J. P. Buhler (editor), Algorithmic Number Theory, Third International Sym­posium, ANTS-III, Proceedings, Lecture Notes in Computer Science 1423, Springer-Verlag, 1998.

38. S. A. Burr (editor), The Unreasonable Effectiveness of Number Theory, Pro­ceedings of Symposia in Applied Mathematics 46, American Mathematical So­ciety, 1992.

39. L. Childs, A Concrete Introduction to Higher Algebra, 2nd Edition, Springer­Verlag, 2000.

40. H. Cohen, Advanced Number Theory, Dover Publications, 1980.

41. H. Cohen, A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics 138, Springer-Verlag, 1993.

42. S. Cook, The P versus NP Problem, University of Toronto, April, 2000. (Manuscript prepared for the Clay Mathematics Institute for the Millennium Prize Problems; revised in November 2000.)

43. J. W. Cooley and J. W. Tukey, "An Algorithm for the Machine Calculation of Complex Fourier Series", Mathematics of Computation, 19 (1965), 297-301.

44. T. H. Cormen, C. E. Ceiserson and R. L. Rivest, Introduction to Algorithms, MIT Press, 1990.

45. D. A. Cox, Primes of the Form x 2 + ny2 , Wiley, 1989. 46. R. Crandall and C. Pomerance, Prime Numbers - A Computational Perspec­

tive, Springer-Verlag, 2001. 47. H. Davenport, The Higher Arithmetic, 7th Edition, Cambridge University

Press, 1999.

48. D. Deutsch, "Quantum Theory, the Church-Turing Principle and the Universal Quantum Computer", Proceedings of the Royal Society of London, Series A, 400 {1985), 96-117.

49. L. E. Dickson, History of the Theory of Numbers I- Divisibility and Primality, G. E. Stechert & Co., New York, 1934.

50. W. Diffie and E. Hellman, "New Directions in Cryptography", IEEE TI-ansac­tions on Information Theory, 22, 5(1976), 644-654.

51. W. Diffie and E. Hellman, "Privacy and Authentication: An Introduction to Cryptography", Proceedings of the IEEE, 67, 3(1979), 393-427.

52. P. G. L. Dirichlet, Lecturers on Number Theory, Supplements by R. Dedekind, American Mathematics Society and London Mathematics Society, 1999.

53. J.D. Dixon, "Factorization and Primality tests", The American Mathematical Monthly, June-July 1984, pp 333-352.

54. T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms", IEEE TI-ansactions on Information Theory, 31 (1985), 496-472.

55. Euclid, The Thirteen Books of Euclid's Elements, Translated by T. L. Heath, Great Books of the Western World 11, edited by R. M. Hutchins, William Benton Publishers, 1952.

56. Euclid, The Thirteen Books of Euclid's Elements, Second Edition, Translated by Thomas L. Heath, Dover Publications, 1956.

Page 4: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

226 Bibliography

57. E. Fouvry, "Theoreme de Brun-Titchmarsh: Application au Theoreme de Fer­mat", ventiones Mathematicae, 79 {1985), 383-407.

58. M. Gardner, "Mathematical Games - A New Kind of Cipher that Would Take Millions of Years to Break", Scientific American, 237, 2{1977), 120-124.

59. M. R. Garey and D. S. Johnson, Computers and Intractability - A Guide to the Theory of NP-Completeness, W. H. Freeman and Company, 1979.

60. C. F. Gauss, Disquisitiones Arithmeticae, G. Fleischer, Leipzig, 1801. English translation by A. A. Clarke, Yale University Press, 1966. Revised English trans­lation by W. C. Waterhouse, Springer-Verlag, 1975.

61. S. Goldwasser and J. Kilian, "Almost All Primes Can be Quickly Certified", Proceedings of the 18th ACM Symposium on Theory of Computing, Berkeley, 1986, 316-329.

62. S. Goldwasser and J. Kilian, "Primality Testing Using Elliptic Curves", Journal of ACM, 46, 4{1999), 450-472.

63. S. Goldwasser and S. Micali, "Probabilistic Encryption", Journal of Computer and System Sciences, 28 {1984), 270-299.

64. D. M. Gordon and K. S. McCurley, "Massively Parallel Computation of Dis­crete Logarithms", Advances in Cryptography, Crypto '92, Proceedings, Lec­ture Notes in Computer Science 740, Springer-Verlag, 1992, 312-323.

65. D. M. Gordon, "Discrete Logarithms in GF(p) using the Number Field Sieve", SIAM Journal on Discrete Mathematics, 6, 1{1993), 124-138.

66. F. Guterl, "Suddenly, Number Theory Makes Sense to Industry", International Business Week, 20 June 1994, pp. 62-64.

67. G. H. Hardy, A Mathematician's Apology, Cambridge University Press, 1979.

68. G. H. Hardy and E. M. Wright, An Introduction to Theory of Numbers, 5th Edition, Oxford University Press, 1979.

69. M. Hellman, "Private Communications", 2001-2003. 70. I. N. Herstein, Topics in Algebra, 2nd Edition, Wiley, 1975. 71. L. Hua, Introduction to Number Theory, English Translation from Chinese by

P. Shiu, Springer-Verlag, 1980. 72. R. J. Hughes, "Cryptography, Quantum Computation and Trapped Ions",

Philosophic Transactions of the Royal Society London, Series A, 356 {1998), 1853-1868.

73. R. M. Huizing, An Implementation of the Number Field Sieve, Note NM-R9511, Centre for Mathematics and Computer Science (CWI), Amsterdam, 1995.

74. D. Husemoller, Elliptic Curves, Graduate Texts in Mathematics 111, Springer­Verlag, 1987.

75. K. Ireland and M. Rosen, A Classical Introduction to Modern Number Theory, 2nd Edition, Graduate Texts in Mathematics 84, Springer-Verlag, 1990.

76. T. H. Jackson, From Number Theory to Secret Codes, A Computer Illustrated Text, Adam Hilger, Bristol, 1987.

77. M. J. Jacobson, N. Koblitz, J. H. Silverman, A. Stein, E. Teske, "Analysis of the Xedni Calculus Attack", Designs, Codes and Cryptography, 20, 2000, 41-64.

78. K. Kato, N. Kurokawa and T. Saito, Number Theory 1: Fermat's Dream, AMS, 2000.

79. J. Kilian, Uses of Randomness in Algorithms and Protocols, MIT Press, 1990.

Page 5: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Bibliography 227

80. D. E. Knuth, The Art of Computer Programming II - Seminumerical Algo­rithms, 3rd Edition, Addison-Wesley, 1998.

81. N. Koblitz, "Elliptic Curve Cryptography", Mathematics of Computation, 48 (1987), 203-209.

82. N. Koblitz, Introduction to Elliptic Curves and Modular Forms, 2nd Edition, Graduate Texts in Mathematics 97, Springer-Verlag, 1993.

83. N. Koblitz, A Course in Number Theory and Cryptography, 2nd Edition, Grad­uate Texts in Mathematics 114, Springer-Verlag, 1994.

84. N. Koblitz, Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics 3, Springer-Verlag, 1998.

85. N. Koblitz, "A Survey of Number Theory and Cryptography", in: Number Theory, Edited by . P. Bambah, V. C. Dumir and R. J. Hans-Gill, Birkhiiser, 2000, 217-239.

86. N. Koblitz, "Cryptography", in: Mathematics Unlimited- 2001 and Beyond, Edited by B. Enguist and W. Schmid, Springer-Verlag, 2001, 749-769.

87. E. Kranakis, Primality and Cryptography, John Wiley & Sons, 1986. 88. S. Lang, Elliptic Functions, 2nd Edition, Springer-Verlag, 1987.

89. H. W. Lenstra, Jr., "Factoring Integers with Elliptic Curves", Annals of Math­ematics, 126 (1987), 649-673.

90. A. K. Lenstra and H. W. Lenstra, Jr. (editors), The Development of the Number Field Sieve, Lecture Notes in Mathematics 1554, Springer-Verlag, 1993.

91. J. H. McClellan and C. M. Rader, Number Theory in Digital Signal Processing, Prentice-Hall, 1979.

92. K. S. McCurley, "The Discrete Logarithm Problem", in: Cryptology and Com­putational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.

93. K. S. McCurley, "Odds and Ends from Cryptology and Computational Num­ber Theory", in: Cryptology and Computational Number Theory, edited by C. Pomerance, Proceedings of Symposia in Applied Mathematics 42, American Mathematics Society, 1990, pp 49-74.

94. H. McKean and V. Moll, Elliptic Curves- Function Theory, Geometry, Arith­metic, Cambridge University Press, 1997.

95. R. J. McEliece, A Public-Key Cryptosystem based on Algebraic Coding Theory, JPL DSN Progress Report 42-44, 1978, 583-584.

96. A. Menezes and S. A. Vanstone, "Elliptic curve cryptosystems and their im­plementation", Journal of Cryptology, 6 (1993), 209-224.

97. A. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptosystems, CRC Press, 1996.

98. R. C. Merkle, "Secure Communications over Insecure Channels" Communica­tions of the ACM, 21 (1978), 294-299. (Submitted in 1975.)

99. J. F. Mestre, "Formules Explicites et Minoration de Conducteurs de VariEltes algebriques" Compositio Mathematica, 58 (1986), 209-232.

100. B. Meyer and and V. Miiller, "A Public Key Cryptosystem Based on Elliptic Curves over 7l/n7l Equivalent to Factoring", Advances in Cryptology, EURO­CRYPT '96, Proceedings, Lecture Notes in Computer Science 1070, Springer­Verlag, 1996, 49-59.

Page 6: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

228 Bibliography

101. G. Miller, "Riemann's Hypothesis and Tests for Primality", Journal of Systems and Computer Science, 13 (1976), 300-317.

102. V. Miller, "Uses of Elliptic Curves in Cryptography", Advances in Cryptology, CRYPTO '85, Proceedings, Lecture Notes in Computer Science 218, Springer­Verlag, 1986, 417-426.

103. R. A. Mollin, Fundamental Number Theory with Applications, CRC Press, 1998.

104. R. A. Mollin, An Introduction to Cryptography, Chapman & Hall/CRC, 2001. 105. R. A. Mollin, RSA and Public-Key Cryptography, Chapman & Hall/CRC

Press, 2003.

106. P. L. Montgomery, "Speeding Pollard's and Elliptic Curve Methods of Fac­torization", Mathematics of Computation, 48 (1987), 243-264.

107. F. Morain, Courbes Elliptiques et Tests de Primalite, Universite Claude Bernard, Lyon I, 1990.

108. P. L. Montgomery, "A Survey of Modern Integer Factorization Algorithms", CWI Quarterly, 7, 4(1994), 337-394.

109. M. A. Morrison and J. Brillhart, "A Method of Factoring and the Factorization of F7", Mathematics of Computation, 29 (1975), 183-205.

110. R. Motwani and P. Raghavan, Randomized Algorithms, Cambridge University Press, 1995.

111. M. B. Nathanson, Elementary Methods in Number Theory, Springer-Verlag, 2000.

112. I. Niven, H. S. Zuckerman and H. L. Montgomery, An Introduction to the Theory of Numbers, 5th Edition, John Wiley & Sons, 1991.

113. S. Pohlig and M. Hellman, "An Improved Algorithm for Computing Loga­rithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), pp 106-110.

114. J. O'Connor and E. Robertson, The MacThtor History of Mathematics Archive, http:/ jwww.groups.dcs.st-and.ac. uk/ "'history /Mathematicians.

115. A.M. Odlyzko, "Discrete Logarithms in Finite Fields and their Cryptographic Significance", Advances in Cryptography, EUROCRYPT '84, Proceedings, Lec­ture Notes in Computer Science 209, Springer-Verlag, 1984, 225-314.

116. 0. Ore, Number Theory and its History, Dover Publications, 1988. 117. C. P. Pfieeger, Security in Computing, Prentice-Hall, 1997. 118. R. G. E. Pinch, "Some Primality Testing Algorithms", Notices of the American

Mathematical Society, 40, 9(1993), 1203-1210. 119. R. G. E. Pinch, Mathematics for Cryptography, Queen's College, University

of Cambridge, 1997. 120. S. C. Pohlig and M. Hellman, "An Improved Algorithm for Computing Loga­

rithms over GF(p) and its Cryptographic Significance", IEEE Transactions on Information Theory, 24 (1978), 106-110.

121. J. M. Pollard, "A Monte Carlo Method for Factorization", BIT, 15 (1975), 331-332.

122. J. M. Pollard, "Monte Carlo Methods for Index Computation (mod p)", Mathematics of Computation, 32 (1980), 918-924.

123. C. Pomerance, "Very Short Primality Proofs", Mathematics of Computation, 48 (1987), 315-322.

Page 7: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Bibliography 229

124. C. Pomerance (editor), Cryptology and Computational Number Theory, Pro­ceedings of Symposia in Applied Mathematics 42, American Mathematical So­ciety, 1990.

125. C. Pomerance, "Cryptology and Computational Number Theory - An Intro­duction", Cryptology and Computational Number Theory, edited by C. Pomer­ance, Proceedings of Symposia in Applied Mathematics 42, American Mathe­matical Society, 1990, 1-12.

126. C. Pomerance, "A Tale of Two Sieves", Notice of the AMS, 43, 12{1996), 1473-1485.

127. C. Pomerance, J. L. Selfridge and S. S. Wagstaff, Jr., "The Pseudoprimes to 25 · 109", Mathematics of Computation, 35 (1980), 1003-1026.

128. V. R. Pratt, "Every Prime Has a Succinct Certificate", SIAM Journal on Computing, 4 {1975), 214-220.

129. M. 0. Rabin, "Probabilistic Algorithms for Testing Primality", Journal of Number Theory, 12 {1980), 128-138.

130. D. Redmond, Number Theory: An Introduction, Marcel Dekker, New York, 1996.

131. P. Ribenboim, The Little Book on Big Primes, Springer-Verlag, 1991.

132. P. Ribenboim, "Selling Primes", Mathematics Magazine, 68, 3(1995), 175-182.

133. P. Ribenboim, The New Book of Prime Number Records, Springer-Verlag, 1996.

134. H. J. J. te Riele, "Factorization of RSA-140 using the Number Field Sieve", http: I lwww. crypto-world. com/announcementsiRSA140. txt, 4 February 1999.

135. H. J. J. te Riele, "Factorization of a 512-bits RSA Key using the Number Field Sieve", http: I lwww. crypto-world. com/announcementsiRSA155. txt, 26 August 1999.

136. H. J. J. te Riele, W. Lioen and D. Winter, "Factoring with the Quadrtaic Sieve on Large Vector Computers", Journal of Computational and Applied Mathe­matics, 27 {1989), 267-278.

137. H. Riesel, Prime Numbers and Computer Methods for Factorization, Birkhauser, Boston, 1990.

138. R. L. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public Key Cryptosystems, Communications of the ACM, 21, 2{1978), 120-126.

139. H. E. Rose, A Course in Number Theory, 2nd Edition, Oxford University Press, 1994.

140. K. Rosen, Elementary Number Theory and its Applications, 4th Edition, Addison-Wesley, 2000.

141. J. J. Rotman A First Course in Abstract Algebra, Second Edition, Prentice­Hall, 2000.

142. A. Salomaa, Public-Key Cryptography, 2nd Edition, Springer-Verlag, 1996. 143. B. Schneier, Applied Cryptography- Protocols, Algorithms, and Source Code

in C, 2nd Edition, John Wiley & Sons, 1996.

144. C. P. Schnorr, "Efficient Identification and Signatures for Smart Cards", Ad­vances in Cryptography, CRYPTO '89, Proceedings, Lecture Notes in Computer Science 435, Springer-Verlag, 1990, 239-252.

Page 8: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

230 Bibliography

145. R. Schoof, "Elliptic Curves over Finite Fields and the Computation of Square Roots mod p", Mathematics of Computation, 44 {1985), 483-494.

146. M. R. Schroeder, Number Theory in Science and Communication, 3rd Edition, Springer Series in Information Sciences 7, Springer-Verlag, 1997.

147. A. Shamir, "Factoring Numbers in O{logn) Arithmetic Steps", Information Processing Letters, 8, 1{1979), 28-31.

148. A. Shamir, "How to Share a Secret", Communications of the ACM, 22, 11{1979), 612-613.

149. P. Shor, "Algorithms for Quantum Computation: Discrete Logarithms and Factoring", Proceedings of 35th Annual Symposium on Foundations of Com­puter Science, IEEE Computer Society Press, 1994, 124-134.

150. P. Shor, "Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer", SIAM Journal on Computing, 26, 5{1997), 1484-1509.

151. J. H. Silverman and J. Tate, Rational Points on Elliptic Curves, Undergrad­uate Texts in Mathematics, Springer-Verlag, 1992.

152. J. H. Silverman, The Arithmetic of Elliptic Curves, Graduate Texts in Math­ematics 106, Springer-Verlag, 1994.

153. J. H. Silverman, A Friendly Introduction to Number Theory, Second Edition, Prentice-Hall, 2001.

154. J. H. Silverman, "The Xedni Calculus and the Elliptic Curve Discrete Loga­rithm Problem", Dept of Mathematics, Brown University, 10 February 1999.

155. J. H. Silverman and J. Suzuki, "Elliptic Curve Discrete Logarithms and the Index Calculus", Advances in Cryptology - ASIACRYPT '98, Springer Lecture Notes in Computer Science 1514, 1998, 11Q-125.

156. J. H. Silverman, "The Xedni Calculus and the Elliptic Curve Discrete Loga­rithm Problem", Designs, Codes and Cryptography, 20, 2000, 5-40.

157. R. D. Silverman, 'The Multiple Polynomial Quadratic Sieve", Mathematics of Computation, 48 {1987), 329-339.

158. R. D. Silverman, "A Perspective on Computational Number Theory", Notices of the American Mathematical Society, 38, 6{1991), 562-568.

159. R. D. Silverman, "Massively Distributed Computing and Factoring Large In­tegers", Communications of the ACM, 34, 11{1991), 95-103.

160. D. R. Simon, "On the Power of Quantum Computation", Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, IEEE Press, 1994, 116-123.

161. S. Singh, The Code Book - The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Fourth Estate, London, 1999.

162. S. Singh, The Science of Secrecy - The Histroy of Codes and Codebreaking, Fourth Estate, London, 2000.

163. N. Smart, Cryptography: An Introduction, McGraw-Hill, 2003. 164. R. Solovay and V. Strassen, "A Fast Monte-Carlo Test for Primality", SIAM

Journal on Computing, 6, 1{1977), 84-85. "Erratum: A Fast Monte-Carlo Test for Primality", SIAM Journal on Computing, 7, 1{1978), 118.

165. J. Stillwell, Elements of Number Theory, Springer-Verlag, 2000. 166. D. R. Stinson, Cryptography: Theory and Practice, 2nd Edition, Chapman &

Hall/CRC Press, 2002.

Page 9: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Bibliography 231

167. N. S. Szabo and R. I. Tanaka, Residue Arithmetic and its Applications to Computer Technology, McGraw-Hill, 1967.

168. W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Prentice-Hall, 2002.

169. H. C. A. van Til borg, Fundamentals of Cryptography, Kluwer Academic Pub­lishers, 1999.

170. S. Wagon, "Primality Testing", The Mathematical Intelligencer, 8, 3(1986), 58-61.

171. S. S. Wagstaff, Jr., Cryptanalysis of Number Theoretic Ciphers, Chapman & Hall/CRC Press, 2002.

172. H. Wiener, "Cryptanalysis of Short RSA Secret Exponents", IEEE Transac­tions on Information Theory, 36, 3(1990), 553-558.

173. A. Wiles, "Modular Elliptic Curves and Fermat's Last Theorem", Annals of Mathematics, 141 (1995), 443-551.

174. H. S. Wilf, Algorithms and Complexity, 2nd Edition, A. K. Peters, 2002.

175. H. C. Williams, "The Influence of Computers in the Development of Number Theory", Computers & Mathematics with Applications, 8, 2(1982), 75-93.

176. H. C. Williams, "Factoring on a Computer", Mathematical Intelligencer, 6, 3(1984), 29-36.

177. H. C. Williams, Edouard Lucas and Primality Testing, John Wiley & Sons, 1998.

178. C. P. Williams and S. H. Clearwater, Explorations in Quantum Computation, The Electronic Library of Science (TELOS), Springer-Verlag, 1998.

179. S. Y. Yan, "Primality Testing of Large Numbers in Maple", Computers & Mathematics with Applications, 29, 12(1995), 1-8.

180. S. Y. Yan, Number Theory for Computing, 2nd Edition, Springer-Verlag, 2002.

181. S. Y. Yan, "Computing Prime Factorization and Discrete Logarithms: From Index Calculus to Xedni Calculus", International Journal of Computer Mathe­matics, 80, 5(2003), 573-590.

Page 10: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Index

>.(n), 32 J-l(n), 32 1/J(n), 30 1r(x), 109 u(n), 27 T(n), 27 ((s), 2 b-sequence, 121 kth (higher) power non-residue, 78 kth (higher) power residue, 78 kth Power Residuosity Problem

(kPRP), 181 kth Root Problem (kRTP), 181 kth power non-residue, 57 kth power residue, 57

additive group, 81 additive identity, 84 additive inverse, 84 algebraic computation Jaw, 94 algebraic equation, 22 algebraic integer, 163 algebraic number, 162 arithmetic function, 25 associativity, 80 asymmetric key cryptosystem, 196 authentication, 194

base-2 pseudoprimality test, 119

Carmichael number, 119 Carmichael's >.-function, 32, 50 Carmichael's theorem, 50 CFRAC factoring algorithm, 157 CFRAC method, 155 Chinese Remainder Theorem (CRT),

53 Chinese test, 120 closure, 80 common multiple, 9 commutative group, 81

commutative ring, 83 commutativity, 81 complete system of residues, 39 completely multiplicative function, 25 complex zeros, 112 composite number, 4 congruence classes, 37 congruent, 36 conic, 87 consecutive pairs of quadratic residues,

58 consecutive triples of quadratic

residues, 59 Continued FRACtion (CFRAC)

method, 140 convergent, 16 convergents, 23 Converse of Fermat's little theorem, 49 Converse of Wilson's theorem, 51 cryptanalysis, 193 cryptography, 193 cryptology, 193 cubic Diophantine equation, 88 cubic integer, 163 cyclic group, 81

deterministic encryption, 205 Diffie-Hellman-Merkle key-exchange,

211 Diophantine geometry, 87 discrete logarithm, 77 discrete logarithm problem, 170 dividend, 4 division algorithm, 4 division ring, 83 divisor, 3 domain, 25

ECPP (Elliptic Curve Primality Proving), 127

ECPP Algorithm, 128

Page 11: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

234

ElGamal cryptosystem, 213 elliptic curve, 88, 214 elliptic curve analogue of Diffie­

Hellman, 216 elliptic curve analogue of ElGamal, 217 elliptic curve analogue of Massey-

Omura, 216 elliptic curve analogue of RSA, 217 elliptic curve cryptography (ECC), 214 elliptic function, 90 elliptic integral, 90 embedding messages on elliptic curves,

215 ENIGMA code, 194 equivalence classes, 37 equivalence relation, 37 Euclid, 5 Euclid's algorithm, 12 Euclid's Elements, 13 Euler probable prime, 124 Euler pseudoprime, 124 Euler's (totient) ¢-function, 30 Euler's criterion, 60 Euler's theorem, 50 even number, 4 extended Euclid's algorithm, 46

factor, 3 factoring by trial divisions, 141 fast group operations, 107 fast modular exponentiations, 104 fast point additions, 107 Fermat Last Theorem, 1 Fermat probable prime, 118 Fermat pseudoprime, 118 Fermat's factoring algorithm, 142 Fermat's little theorem, 49 field, 83 finite fields, 85 finite group, 81 finite order of a point on an elliptic

curve, 92 finite simple continued fraction, 17 fixed-point attack, 205 Fundamental Theorem of Arithmetic, 6

Galois field, 85 Gauss'sJemma, 63 geometric composition law, 91 Goldbach Conjecture, 1 greatest common divisor (gcd), 7 group, 80 group laws on elliptic curves, 92

height, 96 high-order congruence, 55 hybrid cryptosystem, 197

identity, 81 incongruent, 36 index calculus algorithm, 178 index calculus method, 178 index of a to the base g, 76 index of an integer modulo n, 76 infinite fields, 85 infinite group, 81

Index

infinite order of a point on an elliptic curve, 92

infinite simple continued fraction, 18 integer factorization problem, 139 integral domain, 83 inverse, 81 irrational numbers, 18

Jacobi symbol, 69

least (non-negative) residue of x modulo n, 38

least common multiple (lcm), 9 least non-negative residue, 36 least residue, 63 Legendre symbol, 61 Legendre's congruence, 153 Legendre, A. M., 60 Lehman's method, 139 Lenstra's Elliptic Curve Method

(ECM), 140, 149 linear congruence, 46 linear Diophantine equation, 22

Mobius 11-function, 32 Mobius inversion formula, 34 Massey-Omura cryptosystem, 213 Mersenne prime, 3 Miller-Rabin test, 122 modular arithmetic in ZjnZ, 41 modular inverse, 44 modulus, 36 multiple, 3 Multiple Polynomial Quadratic Sieve

(MPQS), 140 multiple polynomial quadratic sieve

(MPQS), 159 multiplicative function, 25 multiplicative group, 81 multiplicative identity, 84 multiplicative·inverse, 44, 84

Page 12: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

Index

non-secret encryption, 195 non-singular elliptic curve, 89 non-witness, 124 non-zero field element, 84 nontrivial divisor, 4 nontrivial square root of 1, 121 nontrivial zeros, 112 Number Field Sieve (NFS), 140, 162,

179

odd number, 4 order of a modulo n, 72 order of a field, 85 order of a point on an elliptic curve, 92

partial quotients, 15 perfect number, 3 period, 20 periodic simple continued fraction, 20 Pocklington's theorem, 126, 135 point at infinity, 89 Pollard's p factoring algorithm, 147 Pollard's p-method, 140, 143 Pollard's "p- 1" factoring algorithm,

148 Pollard's "p- 1" method, 148 polynomial congruence, 55 polynomial congruential equation, 55 polynomial security, 206 primality testing problem, 99, 115 prime counting function, 109 prime factor, 6 prime field, 85 prime number, 4 Prime Number Theorem, 110 prime power, 85 primitive root of n, 73 privacy, 194 private key, 196 probabilistic encryption, 206, 207 probable prime, 118 proper divisor, 3 pseudoprime, 118 public-key, 196 public-key cryptography, 195 public-key cryptosystem, 196 purely periodic simple continued

fraction, 20

quadratic congruence, 56 quadratic integer, 163 quadratic irrational, 20 quadratic non-residue, 57 Quadratic reciprocity law, 65

235

quadratic residue, 57 Quadratic Residuosity Problem (QRP),

181, 206 Quadratic Sieve (QS), 158 quantum algorithm for discrete

logarithms, 179 quantum algorithm for integer

factorization, 168 quantum register, 169 quotient, 4

randomized encryption, 206 rank of an elliptic curve, 94 rational integers, 164 rational line, 87 rational number, 87 rational numbers, 17 rational point, 87 real base logarithm, 76 real number, 20 real zeros, 112 real-valued function, 25 reduced system of residues modulo n,

41 reflexive, 37 relatively prime, 8 remainder, 4 repeated doubling and addition, 107 repeated doubling method, 215 repeated squaring and multiplication,

103 residue, 36 residue class, 37 residue classes, 37 residue of x modulo n, 37 Riemann (-function, 2, 111 Riemann Hypothesis, 2 Riemann Hypothesis (RH), 112 ring, 82 ring with identity, 83 root finding problem, 204 RSA Assumption, 198 RSA cryptosystem, 197

secret-key, 196 secret-key cryptosystem, 196 semantic security, 206 Shanks' baby-step giant-step method

for discrete logarithms, 172 Shanks' class group method, 140 Shanks' SQUFOF method, 139 Sieve of Eratosthenes, 5 Silver-Pohlig-Hellman algorithm, 174

Page 13: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

236

simple continued fraction, 15 Solovay-Strassen test, 124 Sophie Germain prime, 133 square root method, 173 SQuare RooT Problem (SQRTP), 181 strong probable prime, 122 strong pseudoprimality test, 120, 122 strong pseudoprime, 122 subgroup, 81 symmetric, 37

torsion subgroup, 94 transitive, 37 trial division, 140 trivial divisor, 4 trivial zeros, 112 Twin Prime Conjecture, 2

Wiener's attack, 205 Wilson's theorem, 51 witness, 124

Index

Page 14: Bibliography978-1-4757-3816-2/1.pdf · Bibliography 1. L. M. Adleman, "A Subexponential Algorithmic for the Discrete Logarithm Problem with Applications to Cryptography", Proceedings

About the Author

SONG Y Y AN majored in both Computer Science and Math­ematics, and obtained a Doctorate in Mathematics (Number Theory) from the Department of Mathematics at the U ni­versity of York, England. His current research interests are in number theory, theoretical computer science, public-key cryp­tography and information/network security. His other publi­cations include Perfect, Amicable and Sociable Numbers: A

Computational Approach, World Scientific, 1996, and Number Theory for Computing, Springer-Verlag, 2nd Edition, 2002. Song Yan is currently with the School of Mathematical and Information Sciences at Coventry University, England, and can be contacted by [email protected].