|
|
Showing 1 - 11 of
11 matches in All Departments
The book introduces new techniques which imply rigorous lower
bounds on the complexity of some number theoretic and cryptographic
problems. These methods and techniques are based on bounds of
character sums and numbers of solutions of some polynomial
equations over finite fields and residue rings. It also contains a
number of open problems and proposals for further research. We
obtain several lower bounds, exponential in terms of logp, on the
de grees and orders of * polynomials; * algebraic functions; *
Boolean functions; * linear recurring sequences; coinciding with
values of the discrete logarithm modulo a prime p at suf ficiently
many points (the number of points can be as small as pI/He). These
functions are considered over the residue ring modulo p and over
the residue ring modulo an arbitrary divisor d of p - 1. The case
of d = 2 is of special interest since it corresponds to the
representation of the right most bit of the discrete logarithm and
defines whether the argument is a quadratic residue. We also obtain
non-trivial upper bounds on the de gree, sensitivity and Fourier
coefficients of Boolean functions on bits of x deciding whether x
is a quadratic residue. These results are used to obtain lower
bounds on the parallel arithmetic and Boolean complexity of
computing the discrete logarithm. For example, we prove that any
unbounded fan-in Boolean circuit. of sublogarithmic depth computing
the discrete logarithm modulo p must be of superpolynomial size.
"Number Theory and Related Fields" collects contributions based on
the proceedings of the "International Number Theory Conference in
Memory of Alf van der Poorten," hosted by CARMA and held March
12-16th 2012 at the University of Newcastle, Australia. The purpose
of the conference was to promote number theory research in
Australia while commemorating the legacy of Alf van der Poorten,
who had written over 170 papers on the topic of number theory and
collaborated with dozens of researchers. The research articles and
surveys presented in this book were written by some of the most
distinguished mathematicians in the field of number theory, and
articles will include related topics that focus on the various
research interests of Dr. van der Poorten.
This book is mainly devoted to some computational and algorithmic
problems in finite fields such as, for example, polynomial
factorization, finding irreducible and primitive polynomials, the
distribution of these primitive polynomials and of primitive points
on elliptic curves, constructing bases of various types and new
applications of finite fields to other areas of mathematics. For
completeness we in clude two special chapters on some recent
advances and applications of the theory of congruences (optimal
coefficients, congruential pseudo-random number gener ators,
modular arithmetic, etc.) and computational number theory
(primality testing, factoring integers, computation in algebraic
number theory, etc.). The problems considered here have many
applications in Computer Science, Cod ing Theory, Cryptography,
Numerical Methods, and so on. There are a few books devoted to more
general questions, but the results contained in this book have not
till now been collected under one cover. In the present work the
author has attempted to point out new links among different areas
of the theory of finite fields. It contains many very important
results which previously could be found only in widely scattered
and hardly available conference proceedings and journals. In
particular, we extensively review results which originally appeared
only in Russian, and are not well known to mathematicians outside
the former USSR."
The book introduces new techniques that imply rigorous lower bounds
on the com plexity of some number-theoretic and cryptographic
problems. It also establishes certain attractive pseudorandom
properties of various cryptographic primitives. These methods and
techniques are based on bounds of character sums and num bers of
solutions of some polynomial equations over finite fields and
residue rings. Other number theoretic techniques such as sieve
methods and lattice reduction algorithms are used as well. The book
also contains a number of open problems and proposals for further
research. The emphasis is on obtaining unconditional rigorously
proved statements. The bright side of this approach is that the
results do not depend on any assumptions or conjectures. On the
downside, the results are much weaker than those which are widely
believed to be true. We obtain several lower bounds, exponential in
terms of logp, on the degrees and orders of o polynomials; o
algebraic functions; o Boolean functions; o linear recurrence
sequences; coinciding with values of the discrete logarithm modulo
a prime p at sufficiently many points (the number of points can be
as small as pI/2+O: ). These functions are considered over the
residue ring modulo p and over the residue ring modulo an arbitrary
divisor d of p - 1. The case of d = 2 is of special interest since
it corresponds to the representation of the rightmost bit of the
discrete logarithm and defines whether the argument is a quadratic
residue."
The theme of this book is the study of the distribution of integer
powers modulo a prime number. It provides numerous new, sometimes
quite unexpected, links between number theory and computer science
as well as to other areas of mathematics. Possible applications
include (but are not limited to) complexity theory, random number
generation, cryptography, and coding theory. The main method
discussed is based on bounds of exponential sums. Accordingly, the
book contains many estimates of such sums, including new estimates
of classical Gaussian sums. It also contains many open questions
and proposals for further research.
"Number Theory and Related Fields" collects contributions based on
the proceedings of the "International Number Theory Conference in
Memory of Alf van der Poorten," hosted by CARMA and held March
12-16th 2012 at the University of Newcastle, Australia. The purpose
of the conference was to promote number theory research in
Australia while commemorating the legacy of Alf van der Poorten,
who had written over 170 papers on the topic of number theory and
collaborated with dozens of researchers. The research articles and
surveys presented in this book were written by some of the most
distinguished mathematicians in the field of number theory, and
articles will include related topics that focus on the various
research interests of Dr. van der Poorten.
'Et moi, ...* si j'avait su comment en revenir. je One service
mathematics bas rendemI !be n'y semis point a1J6.' human race. It
bas put common sense back JulesVeme where it belongs. on tile
topmost sbelf next to tile dusty canister labelled 'discarded
nonsense'. The series is divergent; therefore we may be Eric T.BeIl
able to do something with il O. Heaviside Mathematics is a tool for
thought. A highly necessary tool in a world where both feedback and
nonlineari- ties abound. Similarly, all kinds of pans of
mathematics serve as tools for other pans and for other sci- ences.
Applying a simple rewriting rule to the quote on the right above
one finds such statements as: 'One ser- vice topology has rendered
mathematical physics ...'; 'One service logic has rendered computer
science ...'; 'One service category theory has rendered mathematics
...'. All arguably true. And all statements obtainable this way
fonn pan of the raison d' 8tre of this series.
The book introduces new techniques which imply rigorous lower
bounds on the complexity of some number theoretic and cryptographic
problems. These methods and techniques are based on bounds of
character sums and numbers of solutions of some polynomial
equations over finite fields and residue rings. It also contains a
number of open problems and proposals for further research. We
obtain several lower bounds, exponential in terms of logp, on the
de grees and orders of * polynomials; * algebraic functions; *
Boolean functions; * linear recurring sequences; coinciding with
values of the discrete logarithm modulo a prime p at suf ficiently
many points (the number of points can be as small as pI/He). These
functions are considered over the residue ring modulo p and over
the residue ring modulo an arbitrary divisor d of p - 1. The case
of d = 2 is of special interest since it corresponds to the
representation of the right most bit of the discrete logarithm and
defines whether the argument is a quadratic residue. We also obtain
non-trivial upper bounds on the de gree, sensitivity and Fourier
coefficients of Boolean functions on bits of x deciding whether x
is a quadratic residue. These results are used to obtain lower
bounds on the parallel arithmetic and Boolean complexity of
computing the discrete logarithm. For example, we prove that any
unbounded fan-in Boolean circuit. of sublogarithmic depth computing
the discrete logarithm modulo p must be of superpolynomial size.
The book introduces new techniques that imply rigorous lower bounds
on the com plexity of some number-theoretic and cryptographic
problems. It also establishes certain attractive pseudorandom
properties of various cryptographic primitives. These methods and
techniques are based on bounds of character sums and num bers of
solutions of some polynomial equations over finite fields and
residue rings. Other number theoretic techniques such as sieve
methods and lattice reduction algorithms are used as well. The book
also contains a number of open problems and proposals for further
research. The emphasis is on obtaining unconditional rigorously
proved statements. The bright side of this approach is that the
results do not depend on any assumptions or conjectures. On the
downside, the results are much weaker than those which are widely
believed to be true. We obtain several lower bounds, exponential in
terms of logp, on the degrees and orders of o polynomials; o
algebraic functions; o Boolean functions; o linear recurrence
sequences; coinciding with values of the discrete logarithm modulo
a prime p at sufficiently many points (the number of points can be
as small as pI/2+O: ). These functions are considered over the
residue ring modulo p and over the residue ring modulo an arbitrary
divisor d of p - 1. The case of d = 2 is of special interest since
it corresponds to the representation of the rightmost bit of the
discrete logarithm and defines whether the argument is a quadratic
residue."
This volume contains the refereed proceedings of the Workshop on
Cryptography and Computational Number Theory, CCNT'99, which has
been held in Singapore during the week of November 22-26, 1999. The
workshop was organized by the Centre for Systems Security of the Na
tional University of Singapore. We gratefully acknowledge the
financial support from the Singapore National Science and
Technology Board under the grant num ber RP960668/M. The idea for
this workshop grew out of the recognition of the recent, rapid
development in various areas of cryptography and computational
number the ory. The event followed the concept of the research
programs at such well-known research institutions as the Newton
Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy
(France). Accordingly, there were only invited lectures at the
workshop with plenty of time for informal discussions. It was hoped
and successfully achieved that the meeting would encourage and
stimulate further research in information and computer security as
well as in the design and implementation of number theoretic
cryptosystems and other related areas. Another goal of the meeting
was to stimulate collaboration and more active interaction between
mathematicians, computer scientists, practical cryptographers and
engineers in academia, industry and government."
This book is mainly devoted to some computational and algorithmic
problems in finite fields such as, for example, polynomial
factorization, finding irreducible and primitive polynomials, the
distribution of these primitive polynomials and of primitive points
on elliptic curves, constructing bases of various types and new
applications of finite fields to other areas of mathematics. For
completeness we in clude two special chapters on some recent
advances and applications of the theory of congruences (optimal
coefficients, congruential pseudo-random number gener ators,
modular arithmetic, etc.) and computational number theory
(primality testing, factoring integers, computation in algebraic
number theory, etc.). The problems considered here have many
applications in Computer Science, Cod ing Theory, Cryptography,
Numerical Methods, and so on. There are a few books devoted to more
general questions, but the results contained in this book have not
till now been collected under one cover. In the present work the
author has attempted to point out new links among different areas
of the theory of finite fields. It contains many very important
results which previously could be found only in widely scattered
and hardly available conference proceedings and journals. In
particular, we extensively review results which originally appeared
only in Russian, and are not well known to mathematicians outside
the former USSR."
|
You may like...
Lifted
Mike Ritter
Hardcover
R685
R614
Discovery Miles 6 140
Hands of Doom
Jack Holloway
Hardcover
R695
R614
Discovery Miles 6 140
The Party
Elizabeth Day
Paperback
(1)
R290
R264
Discovery Miles 2 640
Scatterlings
Resoketswe Manenzhe
Paperback
R259
Discovery Miles 2 590
|