Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
A Computational Introduction to Number Theory and AlgebraFebruary 2009
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-51644-0
Published:16 February 2009
Pages:
598
Skip Bibliometrics Section
Reflects downloads up to 23 Feb 2025Bibliometrics
Skip Abstract Section
Abstract

This introductory book emphasizes algorithms and applications, such as cryptography and error correcting codes, and is accessible to a broad audience. The presentation alternates between theory and applications in order to motivate and illustrate the mathematics. The mathematical coverage includes the basics of number theory, abstract algebra and discrete probability theory. This edition now includes over 150 new exercises, ranging from the routine to the challenging, that flesh out the material presented in the body of the text, and which further develop the theory and present new applications. The material has also been reorganized to improve clarity of exposition and presentation. Ideal as a textbook for introductory courses in number theory and algebra, especially those geared towards computer science students.

Cited By

  1. Wang Z, Li J, Liu X, Wu X and Li F (2024). A new construction of public key authenticated encryption with keyword search based on LWE, Telecommunications Systems, 86:2, (229-240), Online publication date: 1-Jun-2024.
  2. Eriguchi R Unconditionally Secure Multiparty Computation for Symmetric Functions with Low Bottleneck Complexity Advances in Cryptology – ASIACRYPT 2023, (335-368)
  3. ACM
    Zhao W, Xu J and Yang S A Secure electronic Voting Protocol Base on Threshold Proof Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, (704-708)
  4. Shany Y and Berman A (2023). Fast Syndrome-Based Chase Decoding of Binary BCH Codes Through Wu List Decoding, IEEE Transactions on Information Theory, 69:8, (4907-4926), Online publication date: 1-Aug-2023.
  5. Harmon L, Delavignette G, Roy A and Silva D PIE: p-adic Encoding for High-Precision Arithmetic in Homomorphic Encryption Applied Cryptography and Network Security, (425-450)
  6. Lysyanskaya A Security Analysis of RSA-BSSA Public-Key Cryptography – PKC 2023, (251-280)
  7. Yan Y and Xu S CA-Free Real-Time Fuzzy Digital Signature Scheme Wireless Algorithms, Systems, and Applications, (479-490)
  8. Aguilar-Melchor C, Aragon N, Dyseryn V, Gaborit P and Zémor G LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals Post-Quantum Cryptography, (45-68)
  9. Corte-Real Santos M, Costello C and Shi J Accelerating the Delfs–Galbraith Algorithm with Fast Subfield Root Detection Advances in Cryptology – CRYPTO 2022, (285-314)
  10. Gutekunst S, Jin B and Williamson D The Two-Stripe Symmetric Circulant TSP is in P Integer Programming and Combinatorial Optimization, (319-332)
  11. Gu A, Johnson I, Goel K, Saab K, Dao T, Rudra A and Ré C Combining recurrent, convolutional, and continuous-time models with linear state-space layers Proceedings of the 35th International Conference on Neural Information Processing Systems, (572-585)
  12. Eriguchi R, Ohara K, Yamada S and Nuida K Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions Advances in Cryptology – CRYPTO 2021, (305-334)
  13. Costello C B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion Advances in Cryptology – ASIACRYPT 2020, (440-463)
  14. Galbraith S and Zobernig L Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems Theory of Cryptography, (81-110)
  15. Kaminaga M, Suzuki T and Fukase M (2019). Determining the Optimal Random-Padding Size for Rabin Cryptosystems, IEEE Transactions on Information Forensics and Security, 14:8, (2232-2242), Online publication date: 1-Aug-2019.
  16. Bellini E and Murru N A Multi-factor RSA-like Scheme with Fast Decryption Based on Rédei Rational Functions over the Pell Hyperbola Numerical Computations: Theory and Algorithms, (343-357)
  17. Ning Y, Miao F, Huang W, Meng K, Xiong Y and Wang X Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem Advances in Cryptology – ASIACRYPT 2018, (310-331)
  18. Wen Y, Liu S and Han S (2018). Reusable fuzzy extractor from the decisional Diffie---Hellman assumption, Designs, Codes and Cryptography, 86:11, (2495-2512), Online publication date: 1-Nov-2018.
  19. Ye Q, Hu M, Chen G and Qin P (2018). An Improved Encryption Scheme for Traitor Tracing from Lattice, International Journal of Digital Crime and Forensics, 10:4, (21-35), Online publication date: 1-Oct-2018.
  20. Garg S, Mahmoody M, Masny D and Meckler I On the Round Complexity of OT Extension Advances in Cryptology – CRYPTO 2018, (545-574)
  21. Kaminaga M, Yoshikawa H, Shikoda A and Suzuki T (2018). Crashing Modulus Attack on Modular Squaring for Rabin Cryptosystem, IEEE Transactions on Dependable and Secure Computing, 15:4, (723-728), Online publication date: 1-Jul-2018.
  22. Zhang J, Yang Y, Chen Y, Chen J and Zhang Q (2017). A general framework to design secure cloud storage protocol using homomorphic encryption scheme, Computer Networks: The International Journal of Computer and Telecommunications Networking, 129:P1, (37-50), Online publication date: 24-Dec-2017.
  23. Shi W, Bao Z, Wang J, Lu N, Zhu F and Shen J (2017). A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market, Personal and Ubiquitous Computing, 21:5, (779-789), Online publication date: 1-Oct-2017.
  24. Guruswami V, Jin L and Xing C (2017). Efficiently List-Decodable Punctured Reed-Muller Codes, IEEE Transactions on Information Theory, 63:7, (4317-4324), Online publication date: 1-Jul-2017.
  25. Benhamouda F, Herranz J, Joye M and Libert B (2017). Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$2k-th Power Residue Symbols, Journal of Cryptology, 30:2, (519-549), Online publication date: 1-Apr-2017.
  26. Xue M, Liu Y, Ross K and Qian H (2016). Thwarting location privacy protection in location-based social discovery services, Security and Communication Networks, 9:11, (1496-1508), Online publication date: 25-Jul-2016.
  27. ACM
    Golovnev A, Kulikov A and Mihajlin I (2016). Families with Infants, ACM Transactions on Algorithms, 12:3, (1-17), Online publication date: 15-Jun-2016.
  28. Hayashi M and Tsurumaru T (2016). More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function, IEEE Transactions on Information Theory, 62:4, (2213-2232), Online publication date: 1-Apr-2016.
  29. Ge Y, Li Y and Liu Z (2016). Delegation of signing rights for emerging 5G networks, Concurrency and Computation: Practice & Experience, 28:4, (1193-1203), Online publication date: 25-Mar-2016.
  30. Yan J, Wang L, Dong M, Yang Y and Yao W (2015). Identity-based signcryption from lattices, Security and Communication Networks, 8:18, (3751-3770), Online publication date: 1-Dec-2015.
  31. ACM
    Dwivedi S Computing Modular Exponentiation for Fixed-Exponent Proceedings of the 8th Annual ACM India Conference, (89-94)
  32. ACM
    Groß T Efficient Certification and Zero-Knowledge Proofs of Knowledge on Infrastructure Topology Graphs Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, (69-80)
  33. Bannister M, Devanny W, Eppstein D and Goodrich M The Galois Complexity of Graph Drawing Revised Selected Papers of the 22nd International Symposium on Graph Drawing - Volume 8871, (149-161)
  34. ACM
    Lyubashevsky V, Peikert C and Regev O (2013). On Ideal Lattices and Learning with Errors over Rings, Journal of the ACM, 60:6, (1-35), Online publication date: 1-Nov-2013.
  35. Fleming S and Thomas D Hardware acceleration of matrix multiplication over small prime finite fields Proceedings of the 9th international conference on Reconfigurable Computing: architectures, tools, and applications, (103-114)
  36. Krenn S, Pietrzak K and Wadia A A counterexample to the chain rule for conditional HILL entropy Proceedings of the 10th theory of cryptography conference on Theory of Cryptography, (23-39)
  37. Barthe G, Grégoire B, Heraud S, Olmedo F and Zanella Béguelin S Verified indifferentiable hashing into elliptic curves Proceedings of the First international conference on Principles of Security and Trust, (209-228)
  38. Agrawal S, Freeman D and Vaikuntanathan V Functional encryption for inner product predicates from learning with errors Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security, (21-40)
  39. Lipton R, Regan K and Rudra A Symmetric functions capture general functions Proceedings of the 36th international conference on Mathematical foundations of computer science, (436-447)
  40. ACM
    Bright C and Storjohann A Vector rational number reconstruction Proceedings of the 36th international symposium on Symbolic and algebraic computation, (51-58)
  41. Catrina O and De Hoogh S Improved primitives for secure multiparty integer computation Proceedings of the 7th international conference on Security and cryptography for networks, (182-199)
  42. Agrawal S, Boneh D and Boyen X Efficient lattice (H)IBE in the standard model Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques, (553-572)
  43. Barthe G, Daubignard M, Kapron B, Lakhnech Y and Laporte V On the equality of probabilistic terms Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning, (46-63)
  44. Brázdil T, Brožek V, Etessami K, Kučera A and Wojtczak D One-counter Markov decision processes Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete algorithms, (863-874)
  45. Pieters W and Tang Q Data Is Key Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII, (240-251)
  46. Feng Q, Liu Y, Lu S and Wang J Improved Deterministic Algorithms for Weighted Matching and Packing Problems Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation, (211-220)
Contributors
  • DFINITY

Reviews

S. Nagaraj

Algebra and number theory are important subdisciplines of mathematics. They play an essential role in modern computer science, as evidenced by applications such as coding theory and cryptography. Consequently, books that introduce the computational aspects of number theory and algebra will help novices appreciate such applications. This introductory book is a revised second edition of a book that first appeared in 2005. It underscores algorithms and applications, and is intended for a wide audience. The presentation switches between theory and applications. The book covers the basics of number theory, abstract algebra, and discrete probability theory. It includes a total of 650 exercises and 280 worked examples. Compared to the previous edition, this one incorporates 150 new exercises. The material has been reorganized to improve clarity. Prerequisites are kept to a bare minimum-undergraduate mathematics and some familiarity with programming, algorithm analysis, and discrete mathematics. An electronic version of the book is available from Shoup's Web site [1]. Topics covered in the book include: basic properties of integers; congruences; computing with large integers; Euclid's algorithm; the distribution of primes; Abelian groups; rings; finite and discrete probability distributions; probabilistic algorithms; probabilistic primality testing; finding generators and discrete logarithms; quadratic reciprocity and computing modular square roots; modules and vector spaces; matrices; subexponential-time discrete logarithms and factoring; more rings; polynomial arithmetic and applications; linearly generated sequences and applications; finite fields; algorithms for finite fields; and deterministic primality testing. An appendix lists some useful facts. The number of pages in the new edition has gone up by about 60 pages. Two chapters in the first edition-the one on quadratic residues and quadratic reciprocity, and the one on computational problems related to quadratic residues-have been merged into a single chapter in the second edition, "Quadratic Reciprocity and Computing Modular Square Roots," reducing the number of chapters by one. Topics logically related, such as the chapters on probabilistic algorithms and probabilistic primality testing, have been brought together. A few chapters, such as those on Abelian groups and rings, are introduced earlier than before. The titles of the chapters are essentially the same in the two editions, but the contents have undergone change-some topics were added, while some were deleted or modified. One of the chapters whose size increased considerably is the one on congruences. One of the chapters that was reduced is, surprisingly, the chapter on probabilistic primality testing. Topics whose exclusion from the book is notable include the theory of lattices, along with algorithms for and applications of lattice basis reduction. This is rather surprising, considering that lattice basis reduction plays a significant role in computational number theory, algebra, and cryptography. It is all the more unexpected, since Shoup has developed a software package that includes routines for lattice basis reduction. The exclusion of these topics is highly unfortunate and I hope that they will be included in future editions of the book. The second edition corrects some errors in the first edition and includes new examples. The number of citations to the literature has increased marginally, by just six-from 105 to 111; the author should have provided a more substantial number of references to add value to the book. Despite the reorganization of the material, the inclusion of additional exercises and examples, and the increase in the size of the book by about ten percent, a second edition is hardly justified. The author could have included some thought-provoking exercises, programming challenges, open problems, and additional references, and emphasized the implementation of algorithms. Despite these shortcomings, the book will continue to serve as a good textbook for introductory courses in algebra and number theory, especially for students of computer science. Online Computing Reviews Service

Alasdair McAndrew

It's a pleasure to find a book that is so masterful and so well written that it has all the hallmarks of a classic. This is such a book. Shoup set himself the difficult task of bringing readers up to speed with number theory and algebra, starting "from scratch" (he is quite successful). My main complaint is that the book is not longer, but as Shoup regretfully observes in the introduction, some important topics were omitted to keep the book a reasonable size. Many books on computational number theory present the theory as a sort of smorgasbord of algorithms: primality testing, factorization, discrete logarithms, modular square, and n th roots. Shoup steers clear of this recipe approach and, instead, places the entire theory into a formal algebraic setting. This allows not only for elegance of exposition and remarkable clarity, but also provides the entire book with structural homogeneity. Even though "some topics could simply not be covered," it manages to include a wide range of topics. The book is geared toward students of cryptography and coding theory, as it covers the most relevant material in those disciplines. The book starts with several standard integer-based number theory concepts: divisibility; congruences and modular arithmetic, including quadratic residues (but reciprocity is treated later); large integer arithmetic; Euclid's algorithm and its association with the Chinese remainder theorem; and a brief discussion of the RSA cryptosystem, including a particularly elegant proof of its correctness. All of this material is standard for many other texts, yet it is rarely treated with as much care as here, in spite of the relative brevity. The first few chapters contain as much mathematics as many other entire cryptography texts and yet, at this stage, we are not even one fifth into the book. Another chapter discusses the distribution of primes, including a proof of Bertrand's postulate and a discussion of the prime number theorem. Given the importance of primes to modern cryptography, these are vital topics, so it is refreshing to see them treated so carefully. These first chapters set the scene, so to speak, for the number theory with which the text is concerned. However, much of the subsequent material is discussed in terms of the general theory of groups and rings. Primitive roots, for example, are not discussed as such, but in terms of generators of the nonzero residues of integers modulo a prime. Although this approach might seem at first to be unnecessarily obtuse, it is in fact the most natural way to introduce these algorithms, as it places them squarely in a generalized algebraic theory. The text, as one would expect, contains several chapters that discuss the basic theory of abelian groups and rings, including a fine proof of the fundamental theorem of the structure of finite abelian groups as sums of cyclic groups. What makes this book unique is the way in which several different mathematical strands?number theory and algebra?are interwoven and made into a masterful whole. Apart from rings and fields, there is much linear algebra (modules, vector spaces, and matrices), as well as a considerable amount of probability distributions and probabilistic algorithms, culminating in the Miller-Rabin test for primality and a few applications. The book ends with some chapters on finite fields and their various algorithms and a chapter on the Agrawal-Kayal-Saxena (AKS) deterministic primality test; the author carefully observes that the probabilistic Miller-Rabin test is much faster than AKS and, hence, should be preferred for all practical purposes. Nonetheless, as an ingenious use of much number theory and algebra, the AKS algorithm is a lovely example with which to finish the text. Although the text does not require much specific mathematical background, I would hesitate to use it except in an advanced class, or with students whose mathematical ability is already high. The material moves swiftly¿while never compromising rigor¿and the multiple strands assume considerable ability on the part of the reader. I was pleased to see copious exercises; a student who has completed the book and mastered the exercises will be in a very strong position to embark on some advanced studies. The author does not recommend any specific chapter sequence for a semester's study, but an astute teacher could pull some parts from this text for an initial course of study, and then complete the text in an advanced course. One regrettable omission is computational tools¿neither Shoup's own C++ NTL library for computational number theory and algebra nor a computer algebra system. A companion volume, or some material on the author's Web site that discusses some implementation issues, would be most welcome. (Note: the entire text is available under a Creative Commons license on the author's Web site (http://www.shoup.net/). This is a truly magnificent text, deserving of a place on the shelves of any mathematician or computer scientist working in these areas. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations