rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783110170467

Public-Key Cryptography and Computational Number Theory

by ; ;
  • ISBN13:

    9783110170467

  • ISBN10:

    3110170469

  • Format: Hardcover
  • Copyright: 2001-11-01
  • Publisher: De Gruyter

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $238.00 Save up to $77.35
  • Rent Book $160.65
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    SPECIAL ORDER: 1-2 WEEKS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

How To: Textbook Rental

Looking to rent a book? Rent Public-Key Cryptography and Computational Number Theory [ISBN: 9783110170467] for the semester, quarter, and short term or search our site for other textbooks by Alster, Kazimierz; Urbanowicz, Jerzy; Williams, Hugh C.. Renting a textbook can save you up to 90% from the cost of buying.

Table of Contents

Preface vii
Mathematics, cryptology, and technology ix
Andrew Odlyzko
A survey on IQ cryptography
1(16)
Johannes Buchmann
Safuat Hamdy
Algebraic groups and discrete logarithm
17(12)
Jean-Marc Couveignes
Fermat numbers, Wieferich and Wilson primes: computations and generalizations
29(20)
Karl Dilcher
How to distinguish hyperelliptic curves in even charateristic
49(10)
Andreas Enge
Limitations of constructive Weil descent
59(12)
Steven D. Galbraith
On the security of a public-key cryptosystem
71(6)
Otokar Grosek
Spyros S. Magliveras
Wandi Wei
Optimizations for NTRU
77(12)
Jeffrey Hoffstein
Joseph Silverman
The efficiency and security of a real quadratic field based key exchange protocol
89(24)
Michael J. Jacobson
Renate Scheidler
Hugh C. Williams
Extending the binary gcd algorithms
113(24)
Przemystaw Kubiak
Stochastic kleptography detection
137(14)
Daniel Kucner
Mirostaw Kutytowski
An overview of the XTR public key system
151(30)
Arjen K. Lenstra
Eric R. Verheul
A survey of IND-CCA secure public-key encryption schemes relative to factoring
181(16)
Siguna Muller
Efficient point multiplication for elliptic curves over special optimal extension fields
197(12)
Volker Muller
Error-correcting codes and cryptography
209(12)
Harald Niederreiter
Secret public key schemes
221(18)
Jacques Patarin
Index form surfaces and construction of elliptic curves over large finite fields
239(10)
Attila Petho
On the size of solutions of the inequality φ(ax + b) < φ(ax)
249(8)
Herman te Riele
Security of DL-encryption and signatures against generic attacks--a survey
257(26)
Claus Peter Schnorr
Square-root algorithms for the discrete logarithm problem (a survey)
283(20)
Edlyn Teske
Height functions on elliptic curves
303(20)
Horst G. Zimmer
List of participants 323(6)
List of contributors 329

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program