This introductory book emphasizes algorithms and applications, such as cryptography and error correcting codes, and is accessible to a broad audience. The presentation alternates between theory and applications in order to motivate and illustrate the mathematics. The mathematical coverage includes the basics of number theory, abstract algebra and discrete probability theory. This edition now includes over 150 new exercises, ranging from the routine to the challenging, that flesh out the material presented in the body of the text, and which further develop the theory and present new applications. The material has also been reorganized to improve clarity of exposition and presentation. Ideal as a textbook for introductory courses in number theory and algebra, especially those geared towards computer science students.
Cited By
- Wang Z, Li J, Liu X, Wu X and Li F (2024). A new construction of public key authenticated encryption with keyword search based on LWE, Telecommunications Systems, 86:2, (229-240), Online publication date: 1-Jun-2024.
- Eriguchi R Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity Advances in Cryptology – ASIACRYPT 2023, (335-368)
- Zhao W, Xu J and Yang S A Secure electronic Voting Protocol Base on Threshold Proof Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, (704-708)
- Shany Y and Berman A (2023). Fast Syndrome-Based Chase Decoding of Binary BCH Codes Through Wu List Decoding, IEEE Transactions on Information Theory, 69:8, (4907-4926), Online publication date: 1-Aug-2023.
- Harmon L, Delavignette G, Roy A and Silva D PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Applied Cryptography and Network Security, (425-450)
- Lysyanskaya A Security Analysis of RSA-BSSA Public-Key Cryptography – PKC 2023, (251-280)
- Yan Y and Xu S CA-Free Real-Time Fuzzy Digital Signature Scheme Wireless Algorithms, Systems, and Applications, (479-490)
- Aguilar-Melchor C, Aragon N, Dyseryn V, Gaborit P and Zémor G LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals Post-Quantum Cryptography, (45-68)
- Corte-Real Santos M, Costello C and Shi J Accelerating the Delfs–Galbraith Algorithm with Fast Subfield Root Detection Advances in Cryptology – CRYPTO 2022, (285-314)
- Gutekunst S, Jin B and Williamson D The Two-Stripe Symmetric Circulant TSP is in P Integer Programming and Combinatorial Optimization, (319-332)
- Gu A, Johnson I, Goel K, Saab K, Dao T, Rudra A and Ré C Combining recurrent, convolutional, and continuous-time models with linear state-space layers Proceedings of the 35th International Conference on Neural Information Processing Systems, (572-585)
- Eriguchi R, Ohara K, Yamada S and Nuida K Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions Advances in Cryptology – CRYPTO 2021, (305-334)
- Costello C B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion Advances in Cryptology – ASIACRYPT 2020, (440-463)
- Galbraith S and Zobernig L Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems Theory of Cryptography, (81-110)
- Kaminaga M, Suzuki T and Fukase M (2019). Determining the Optimal Random-Padding Size for Rabin Cryptosystems, IEEE Transactions on Information Forensics and Security, 14:8, (2232-2242), Online publication date: 1-Aug-2019.
- Bellini E and Murru N A Multi-factor RSA-like Scheme with Fast Decryption Based on Rédei Rational Functions over the Pell Hyperbola Numerical Computations: Theory and Algorithms, (343-357)
- Ning Y, Miao F, Huang W, Meng K, Xiong Y and Wang X Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem Advances in Cryptology – ASIACRYPT 2018, (310-331)
- Wen Y, Liu S and Han S (2018). Reusable fuzzy extractor from the decisional Diffie---Hellman assumption, Designs, Codes and Cryptography, 86:11, (2495-2512), Online publication date: 1-Nov-2018.
- Ye Q, Hu M, Chen G and Qin P (2018). An Improved Encryption Scheme for Traitor Tracing from Lattice, International Journal of Digital Crime and Forensics, 10:4, (21-35), Online publication date: 1-Oct-2018.
- Garg S, Mahmoody M, Masny D and Meckler I On the Round Complexity of OT Extension Advances in Cryptology – CRYPTO 2018, (545-574)
- Kaminaga M, Yoshikawa H, Shikoda A and Suzuki T (2018). Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem, IEEE Transactions on Dependable and Secure Computing, 15:4, (723-728), Online publication date: 1-Jul-2018.
- Zhang J, Yang Y, Chen Y, Chen J and Zhang Q (2017). A general framework to design secure cloud storage protocol using homomorphic encryption scheme, Computer Networks: The International Journal of Computer and Telecommunications Networking, 129:P1, (37-50), Online publication date: 24-Dec-2017.
- Shi W, Bao Z, Wang J, Lu N, Zhu F and Shen J (2017). A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market, Personal and Ubiquitous Computing, 21:5, (779-789), Online publication date: 1-Oct-2017.
- Guruswami V, Jin L and Xing C (2017). Efficiently List-Decodable Punctured Reed-Muller Codes, IEEE Transactions on Information Theory, 63:7, (4317-4324), Online publication date: 1-Jul-2017.
- Benhamouda F, Herranz J, Joye M and Libert B (2017). Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$2k-th Power Residue Symbols, Journal of Cryptology, 30:2, (519-549), Online publication date: 1-Apr-2017.
- Xue M, Liu Y, Ross K and Qian H (2016). Thwarting location privacy protection in location-based social discovery services, Security and Communication Networks, 9:11, (1496-1508), Online publication date: 25-Jul-2016.
- Golovnev A, Kulikov A and Mihajlin I (2016). Families with Infants, ACM Transactions on Algorithms, 12:3, (1-17), Online publication date: 15-Jun-2016.
- Hayashi M and Tsurumaru T (2016). More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function, IEEE Transactions on Information Theory, 62:4, (2213-2232), Online publication date: 1-Apr-2016.
- Ge Y, Li Y and Liu Z (2016). Delegation of signing rights for emerging 5G networks, Concurrency and Computation: Practice & Experience, 28:4, (1193-1203), Online publication date: 25-Mar-2016.
- Yan J, Wang L, Dong M, Yang Y and Yao W (2015). Identity-based signcryption from lattices, Security and Communication Networks, 8:18, (3751-3770), Online publication date: 1-Dec-2015.
- Dwivedi S Computing Modular Exponentiation for Fixed-Exponent Proceedings of the 8th Annual ACM India Conference, (89-94)
- Groß T Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, (69-80)
- Bannister M, Devanny W, Eppstein D and Goodrich M The Galois Complexity of Graph Drawing Revised Selected Papers of the 22nd International Symposium on Graph Drawing - Volume 8871, (149-161)
- Lyubashevsky V, Peikert C and Regev O (2013). On Ideal Lattices and Learning with Errors over Rings, Journal of the ACM, 60:6, (1-35), Online publication date: 1-Nov-2013.
- Fleming S and Thomas D Hardware acceleration of matrix multiplication over small prime finite fields Proceedings of the 9th international conference on Reconfigurable Computing: architectures, tools, and applications, (103-114)
- Krenn S, Pietrzak K and Wadia A A counterexample to the chain rule for conditional HILL entropy Proceedings of the 10th theory of cryptography conference on Theory of Cryptography, (23-39)
- Barthe G, Grégoire B, Heraud S, Olmedo F and Zanella Béguelin S Verified indifferentiable hashing into elliptic curves Proceedings of the First international conference on Principles of Security and Trust, (209-228)
- Agrawal S, Freeman D and Vaikuntanathan V Functional encryption for inner product predicates from learning with errors Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (21-40)
- Lipton R, Regan K and Rudra A Symmetric functions capture general functions Proceedings of the 36th international conference on Mathematical foundations of computer science, (436-447)
- Bright C and Storjohann A Vector rational number reconstruction Proceedings of the 36th international symposium on Symbolic and algebraic computation, (51-58)
- Catrina O and De Hoogh S Improved primitives for secure multiparty integer computation Proceedings of the 7th international conference on Security and cryptography for networks, (182-199)
- Agrawal S, Boneh D and Boyen X Efficient lattice (H)IBE in the standard model Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (553-572)
- Barthe G, Daubignard M, Kapron B, Lakhnech Y and Laporte V On the equality of probabilistic terms Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning, (46-63)
- Brázdil T, Brožek V, Etessami K, Kučera A and Wojtczak D One-counter Markov decision processes Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (863-874)
- Pieters W and Tang Q Data Is Key Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, (240-251)
- Feng Q, Liu Y, Lu S and Wang J Improved Deterministic Algorithms for Weighted Matching and Packing Problems Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (211-220)
Index Terms
- A Computational Introduction to Number Theory and Algebra