Get Free Shipping on orders over $79
Primality Testing and Integer Factorization in Public-Key Cryptography : Advances in Information Security - Song Y. Yan

Primality Testing and Integer Factorization in Public-Key Cryptography

By: Song Y. Yan

Paperback | 29 November 2010 | Edition Number 2

At a Glance

Paperback


$218.90

or 4 interest-free payments of $54.73 with

 or 

Ships in 5 to 7 business days

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Primality Testing and Integer Factorization in Public Key Cryptography, Second Edition, provides a survey of recent progress in primality testing and integer factorization, with implications to factoring based public key cryptography. Notable new features are the comparison of Rabin-Miller probabilistic test in RP, Atkin-Morain elliptic curve test in ZPP and AKS deterministic test.

This volume is designed for advanced level students in computer science and mathematics, and as a secondary text or reference book; suitable for practitioners and researchers in industry.

Industry Reviews

From the reviews of the second edition:

"The well-written and self-contained second edition 'is designed for a professional audience composed of researchers practitioners in industry.' In addition, 'this book is also suitable as a secondary text for graduate-level students in computer science, mathematics, and engineering,' as it contains about 300 problems. ... Overall ... 'this monograph provides a survey of recent progress in Primality Testing and Integer Factorization, with implications in factoring-based Public Key Cryptography.'" (Hao Wang, ACM Computing Reviews, April, 2009)

"This is the second edition of a book originally published in 2004. ... I used it as a reference in preparing lectures for an advanced cryptography course for undergraduates, and it proved to be a wonderful source for a general description of the algorithms. ... the book will be a valuable addition to any good reference library on cryptography and number theory ... . It contains descriptions of all the main algorithms, together with explanations of the key ideas behind them." (S. C. Coutinho, SIGACT News, April, 2012)

More in Data Encryption

Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.75

$30.99

54%
OFF
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF
Linux Security Cookbook : Cookbooks Ser. - Daniel J Barrett

RRP $76.00

$39.75

48%
OFF
Casino and Gaming Resort Investigations - Derk J. Boss

RRP $142.75

$129.99