Atnaujinkite slapukų nuostatas

Elementary Number Theory: Primes, Congruences, and Secrets: A Computational Approach 1st Edition. 2nd Printing. 2008 [Kietas viršelis]

3.71/5 (33 ratings by Goodreads)
  • Formatas: Hardback, 168 pages, aukštis x plotis: 235x155 mm, weight: 454 g, 45 Illustrations, black and white; X, 168 p. 45 illus., 1 Hardback
  • Serija: Undergraduate Texts in Mathematics
  • Išleidimo metai: 03-Dec-2008
  • Leidėjas: Springer-Verlag New York Inc.
  • ISBN-10: 0387855246
  • ISBN-13: 9780387855240
Kitos knygos pagal šią temą:
  • Formatas: Hardback, 168 pages, aukštis x plotis: 235x155 mm, weight: 454 g, 45 Illustrations, black and white; X, 168 p. 45 illus., 1 Hardback
  • Serija: Undergraduate Texts in Mathematics
  • Išleidimo metai: 03-Dec-2008
  • Leidėjas: Springer-Verlag New York Inc.
  • ISBN-10: 0387855246
  • ISBN-13: 9780387855240
Kitos knygos pagal šią temą:
Explains classical elementary number theory and elliptic curves. This book discusses elementary topics such as primes, factorization, continued fractions, and quadratic forms, in the context of cryptography and computation. It details elliptic curves, their applications to algorithmic problems, and their connections with problems in number theory.

This is a textbook about classical elementary number theory and elliptic curves. The first part discusses elementary topics such as primes, factorization, continued fractions, and quadratic forms, in the context of cryptography, computation, and deep open research problems. The second part is about elliptic curves, their applications to algorithmic problems, and their connections with problems in number theory such as Fermat's Last Theorem, the Congruent Number Problem, and the Conjecture of Birch and Swinnerton-Dyer. The intended audience of this book is an undergraduate with some familiarity with basic abstract algebra, e.g. rings, fields, and finite abelian groups.

This is a textbook about classical elementary number theory and elliptic curves. The first part discusses elementary topics such as primes, factorization, continued fractions, and quadratic forms, in the context of cryptography, computation, and deep open research problems. The second part is about elliptic curves, their applications to algorithmic problems, and their connections with problems in number theory. The intended audience of this book is an undergraduate with some familiarity with basic abstract algebra.

Recenzijos

From the reviews:









"This one treats topics that have become standard in recent years and it has exercises with selected solutions. it gives the students a tool to do calculations that illustrate even the most abstract concepts, and, simultaneously, introduces them to an open source software that can later be applied profitably for studying research problems. introducing the reader to a powerful software system." (Franz Lemmermeyer, Zentralblatt MATH, Vol. 1155, 2009)



"The cliché that number theory, ever the purest mathematics, now yields very practical applications barely tells the story. Teach undergraduate number theory today, and students demand to hear about public-key cryptography and related technologies. Stein (Univ. of Washington) serves undergraduates well by opening the way by intimating their power. he frames the sophisticated Birch and Swinnerton-Dyer conjecture as the new canonical challenge for the future. Summing Up: Recommended. All undergraduates students, professionals, and general readers." (D. V. Feldman, Choice, Vol. 47 (2), October, 2009)



"This book is an introduction to elementary number theory with a computational flavor. Many numerical examples are given throughout the book using the Sage mathematical software. The text is aimed at an undergraduate student with a basic knowledge of groups, rings and fields. Each chapter concludes with several exercises." (Samuel S. Wagstaff Jr., Mathematical Reviews, Issue 2009 i)

Preface ix
Prime Numbers
1(20)
Prime Factorization
2(8)
The Sequence of Prime Numbers
10(9)
Exercises
19(2)
The Ring of Integers Modulo n
21(28)
Congruences Modulo n
22(7)
The Chinese Remainder Theorem
29(2)
Quickly Computing Inverses and Huge Powers
31(5)
Primality Testing
36(3)
The Structure of (Z/pZ)
39(5)
Exercises
44(5)
Public-key Cryptography
49(20)
Playing with Fire
49(2)
The Diffie-Hellman Key Exchange
51(5)
The RSA Cryptosystem
56(5)
Attacking RSA
61(6)
Exercises
67(2)
Quadratic Reciprocity
69(24)
Statement of the Quadratic Reciprocity Law
70(3)
Euler's Criterion
73(2)
First Proof of Quadratic Reciprocity
75(6)
A Proof of Quadratic Reciprocity Using Gauss Sums
81(5)
Finding Square Roots
86(3)
Exercises
89(4)
Continued Fractions
93(30)
The Definition
94(1)
Finite Continued Fractions
95(6)
Infinite Continued Fractions
101(6)
The Continued Fraction of e
107(3)
Quadratic Irrationals
110(5)
Recognizing Rational Numbers
115(2)
Sums of Two Squares
117(4)
Exercises
121(2)
Elliptic Curves
123(26)
The Definition
124(1)
The Group Structure on an Elliptic Curve
125(4)
Integer Factorization Using Elliptic Curves
129(6)
Elliptic Curve Cryptography
135(5)
Elliptic Curves Over the Rational Numbers
140(6)
Exercises
146(3)
Answers and Hints 149(6)
References 155(6)
Index 161