About the Project

cryptography

AdvancedHelp

(0.001 seconds)

5 matching pages

1: 27.16 Cryptography
§27.16 Cryptography
Applications to cryptography rely on the disparity in computer time required to find large primes and to factor large integers. … For further information see Apostol and Niven (1994, p. 24), and for other applications to cryptography see Menezes et al. (1997) and Schroeder (2006).
2: 23.20 Mathematical Applications
§23.20(iii) Factorization
§27.16 describes the use of primality testing and factorization in cryptography. …
3: Bibliography K
  • N. Koblitz (1999) Algebraic Aspects of Cryptography. Springer-Verlag, Berlin.
  • 4: Bibliography M
  • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone (1997) Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.
  • 5: Bibliography S
  • M. R. Schroeder (2006) Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity. 4th edition, Springer-Verlag, Berlin.