You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume presents an exhaustive treatment of computation and algorithms for finite fields. Topics covered include polynomial factorization, finding irreducible and primitive polynomials, distribution of these primitive polynomials and of primitive points on elliptic curves, constructing bases of various types, and new applications of finite fields to other araes of mathematics. For completeness, also included are two special chapters on some recent advances and applications of the theory of congruences (optimal coefficients, congruential pseudo-random number generators, modular arithmetic etc.), and computational number theory (primality testing, factoring integers, computing in algebraic number theory, etc.) The problems considered here have many applications in computer science, coding theory, cryptography, number theory and discrete mathematics. The level of discussion presuppose only a knowledge of the basic facts on finite fields, and the book can be recommended as supplementary graduate text. For researchers and students interested in computational and algorithmic problems in finite fields.
This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, finding irreducible and primitive polynomials, the distribution of these primitive polynomials and of primitive points on elliptic curves, constructing bases of various types and new applications of finite fields to other areas of mathematics. For completeness we in clude two special chapters on some recent advances and applications of the theory of congruences (optimal coefficients, congruential pseudo-random number gener ators, modular arithmetic, etc.) and computational number theory (primality testing, factoring integers, computation in algebraic num...
The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.
This volume aims at collecting survey papers which give broad and enlightening perspectives of various aspects of number theory. Kitaoka's paper is a continuation of his earlier paper published in the last proceedings and pushes the research forward. Browning's paper introduces a new direction of research on analytic number theory ? quantitative theory of some surfaces and Bruedern et al's paper details state-of-the-art affairs of additive number theory. There are two papers on modular forms ? Kohnen's paper describes generalized modular forms (GMF) which has some applications in conformal field theory, while Liu's paper is very useful for readers who want to have a quick introduction to Maa...
Analysis at Large is dedicated to Jean Bourgain whose research has deeply influenced the mathematics discipline, particularly in analysis and its interconnections with other fields. In this volume, the contributions made by renowned experts present both research and surveys on a wide spectrum of subjects, each of which pay tribute to a true mathematical pioneer. Examples of topics discussed in this book include Bourgain’s discretized sum-product theorem, his work in nonlinear dispersive equations, the slicing problem by Bourgain, harmonious sets, the joint spectral radius, equidistribution of affine random walks, Cartan covers and doubling Bernstein type inequalities, a weighted Prékop...
Recurrence sequences are of great intrinsic interest and have been a central part of number theory for many years. Moreover, these sequences appear almost everywhere in mathematics and computer science. This book surveys the modern theory of linear recurrence sequences and their generalizations. Particular emphasis is placed on the dramatic impact that sophisticated methods from Diophantine analysis and transcendence theory have had on the subject. Related work on bilinear recurrences and an emerging connection between recurrences and graph theory are covered. Applications and links to other areas of mathematics are described, including combinatorics, dynamical systems and cryptography, and computer science. The book is suitable for researchers interested in number theory, combinatorics, and graph theory.
In honor of Serge Lang’s vast contribution to mathematics, this memorial volume presents articles by prominent mathematicians. Reflecting the breadth of Lang's own interests and accomplishments, these essays span the field of Number Theory, Analysis and Geometry.
The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference was held, although the name Asiacrypt was ?rst used for the 1991 conference in Japan. Starting with Asiacrypt 2000, the conference is now one of three annual conferences organized by the Inter- tional Association for Cryptologic Research (IACR). The continuing success of Asiacrypt is in no small part due to the e?orts of the Asiacrypt Steering C- mittee (ASC) and the strong support of the IACR Board of Directors. There were 153 papers submitted to Asiacrypt 2001 and 33 of these were accepted for inclusion in these proceedings. The authors of every paper, whether accepted or not, m...
A Special Session on affine and algebraic geometry took place at the first joint meeting between the American Mathematical Society (AMS) and the Real Sociedad Matematica Espanola (RSME) held in Seville (Spain). This volume contains articles by participating speakers at the Session. The book contains research and survey papers discussing recent progress on the Jacobian Conjecture and affine algebraic geometry and includes a large collection of open problems. It is suitable for graduate students and research mathematicians interested in algebraic geometry.
This book constitutes the refereed proceedings of the 9th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2003. The 25 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on coding and applications, applications of coding in cryptography, cryptography, cryptanalysis, network security and protocols.