Number-Theoretic Methods in Statistics

Number-Theoretic Methods in Statistics

Author: Kai-Tai Fang

Publisher: CRC Press

Published: 1993-12-01

Total Pages: 356

ISBN-13: 9780412465208

DOWNLOAD EBOOK

This book is a survey of recent work on the application of number theory in statistics. The essence of number-theoretic methods is to find a set of points that are universally scattered over an s-dimensional unit cube. In certain circumstances this set can be used instead of random numbers in the Monte Carlo method. The idea can also be applied to other problems such as in experimental design. This book will illustrate the idea of number-theoretic methods and their application in statistics. The emphasis is on applying the methods to practical problems so only part-proofs of theorems are given.


Number-Theoretic Methods in Cryptology

Number-Theoretic Methods in Cryptology

Author: Jerzy Kaczorowski

Publisher: Springer

Published: 2018-03-09

Total Pages: 287

ISBN-13: 3319766201

DOWNLOAD EBOOK

This book constitutes the refereed post-conference proceedings of the First International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2017, held in Warsaw, Poland, in September 2017.The 15 revised full papers presented in this book together with 3 invited talks were carefully reviewed and selected from 32 initial submissions. The papers are organized in topical sections on elliptic curves in cryptography; public-key cryptography; lattices in cryptography; number theory; pseudorandomness; and algebraic structures and analysis.


Applications of Number Theory to Numerical Analysis

Applications of Number Theory to Numerical Analysis

Author: L.-K. Hua

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 252

ISBN-13: 3642678297

DOWNLOAD EBOOK

Owing to the developments and applications of computer science, ma thematicians began to take a serious interest in the applications of number theory to numerical analysis about twenty years ago. The progress achieved has been both important practically as well as satisfactory from the theoretical view point. It'or example, from the seventeenth century till now, a great deal of effort was made in developing methods for approximating single integrals and there were only a few works on multiple quadrature until the 1950's. But in the past twenty years, a number of new methods have been devised of which the number theoretic method is an effective one. The number theoretic method may be described as follows. We use num ber theory to construct a sequence of uniformly distributed sets in the s dimensional unit cube G , where s ~ 2. Then we use the sequence to s reduce a difficult analytic problem to an arithmetic problem which may be calculated by computer. For example, we may use the arithmetic mean of the values of integrand in a given uniformly distributed set of G to ap s proximate the definite integral over G such that the principal order of the s error term is shown to be of the best possible kind, if the integrand satis fies certain conditions.


Cryptanalysis of Number Theoretic Ciphers

Cryptanalysis of Number Theoretic Ciphers

Author: Samuel S. Wagstaff, Jr.

Publisher: CRC Press

Published: 2019-08-22

Total Pages: 336

ISBN-13: 1420057693

DOWNLOAD EBOOK

At the heart of modern cryptographic algorithms lies computational number theory. Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory to the inner workings of ciphers and protocols. First, the book provides the mathematical background needed in cryptography as well as definitions and simple examples from cryptography. It includes summaries of elementary number theory and group theory, as well as common methods of finding or constructing large random primes, factoring large integers, and computing discrete logarithms. Next, it describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. For each attack method the author lists the systems it applies to and tells how they may be broken with it. Computational number theorists are some of the most successful cryptanalysts against public key systems. Cryptanalysis of Number Theoretic Ciphers builds a solid foundation in number theory and shows you how to apply it not only when breaking ciphers, but also when designing ones that are difficult to break.


Number Theoretic Methods in Cryptography

Number Theoretic Methods in Cryptography

Author: Igor Shparlinski

Publisher: Birkhäuser

Published: 2012-12-06

Total Pages: 181

ISBN-13: 3034886640

DOWNLOAD EBOOK

The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of logp, on the de grees and orders of • polynomials; • algebraic functions; • Boolean functions; • linear recurring sequences; coinciding with values of the discrete logarithm modulo a prime p at suf ficiently many points (the number of points can be as small as pI/He). These functions are considered over the residue ring modulo p and over the residue ring modulo an arbitrary divisor d of p - 1. The case of d = 2 is of special interest since it corresponds to the representation of the right most bit of the discrete logarithm and defines whether the argument is a quadratic residue. We also obtain non-trivial upper bounds on the de gree, sensitivity and Fourier coefficients of Boolean functions on bits of x deciding whether x is a quadratic residue. These results are used to obtain lower bounds on the parallel arithmetic and Boolean complexity of computing the discrete logarithm. For example, we prove that any unbounded fan-in Boolean circuit. of sublogarithmic depth computing the discrete logarithm modulo p must be of superpolynomial size.


Number Theoretic Methods

Number Theoretic Methods

Author: Shigeru Kanemitsu

Publisher: Springer Science & Business Media

Published: 2013-03-14

Total Pages: 442

ISBN-13: 1475736754

DOWNLOAD EBOOK

This volume contains the proceedings of the very successful second China-Japan Seminar held in lizuka, Fukuoka, Japan, during March 12-16, 2001 under the support of the Japan Society for the Promotion of Science (JSPS) and the National Science Foundation of China (NSFC), and some invited papers of eminent number-theorists who visited Japan during 1999-2001 at the occasion of the Conference at the Research Institute of Mathematical Sciences (RIMS), Kyoto University. The proceedings of the 1st China-Japan Seminar held in September 1999 in Beijing has been published recently {2002) by Kluwer as DEVM 6 which also contains some invited papers. The topics of that volume are, however, restricted to analytic number theory and many papers in this field are assembled. In this volume, we return to the lines of the previous one "Number Theory and its Applications", published as DEVM 2 by Kluwer in 1999 and uphold the spirit of presenting various topics in number theory and related areas with possible applica tions, in a unified manner, and this time in nearly a book form with a well-prepared index. We accomplish this task by collecting highly informative and readable survey papers (including half-survey type papers), giving overlooking surveys of the hith erto obtained results in up-to-the-hour form with insight into the new developments, which are then analytically continued to a collection of high standard research papers which are concerned with rather diversed areas and will give good insight into new researches in the new century.


Basic Number Theory.

Basic Number Theory.

Author: Andre Weil

Publisher: Springer Science & Business Media

Published: 2013-12-14

Total Pages: 332

ISBN-13: 3662059789

DOWNLOAD EBOOK

Itpzf}JlOV, li~oxov uoq>ZUJlCJ. 7:WV Al(JX., llpoj1. AE(Jj1. The first part of this volume is based on a course taught at Princeton University in 1961-62; at that time, an excellent set ofnotes was prepared by David Cantor, and it was originally my intention to make these notes available to the mathematical public with only quite minor changes. Then, among some old papers of mine, I accidentally came across a long-forgotten manuscript by ChevaIley, of pre-war vintage (forgotten, that is to say, both by me and by its author) which, to my taste at least, seemed to have aged very welt It contained abrief but essentially com plete account of the main features of c1assfield theory, both local and global; and it soon became obvious that the usefulness of the intended volume would be greatly enhanced if I inc1uded such a treatment of this topic. It had to be expanded, in accordance with my own plans, but its outline could be preserved without much change. In fact, I have adhered to it rather c10sely at some critical points.


Number-Theoretic Algorithms in Cryptography

Number-Theoretic Algorithms in Cryptography

Author: Oleg Nikolaevich Vasilenko

Publisher: American Mathematical Soc.

Published: 2007

Total Pages: 274

ISBN-13: 9780821840900

DOWNLOAD EBOOK

Algorithmic number theory is a rapidly developing branch of number theory, which, in addition to its mathematical importance, has substantial applications in computer science and cryptography. Among the algorithms used in cryptography, the following are especially important: algorithms for primality testing; factorization algorithms for integers and for polynomials in one variable; applications of the theory of elliptic curves; algorithms for computation of discrete logarithms; algorithms for solving linear equations over finite fields; and, algorithms for performing arithmetic operations on large integers. The book describes the current state of these and some other algorithms. It also contains extensive bibliography. For this English translation, additional references were prepared and commented on by the author.


Cryptographic Applications of Analytic Number Theory

Cryptographic Applications of Analytic Number Theory

Author: Igor Shparlinski

Publisher: Springer Science & Business Media

Published: 2003-02-12

Total Pages: 434

ISBN-13: 9783764366544

DOWNLOAD EBOOK

The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.


Set-Theoretic Methods in Control

Set-Theoretic Methods in Control

Author: Franco Blanchini

Publisher: Birkhäuser

Published: 2015-07-02

Total Pages: 640

ISBN-13: 3319179330

DOWNLOAD EBOOK

The second edition of this monograph describes the set-theoretic approach for the control and analysis of dynamic systems, both from a theoretical and practical standpoint. This approach is linked to fundamental control problems, such as Lyapunov stability analysis and stabilization, optimal control, control under constraints, persistent disturbance rejection, and uncertain systems analysis and synthesis. Completely self-contained, this book provides a solid foundation of mathematical techniques and applications, extensive references to the relevant literature, and numerous avenues for further theoretical study. All the material from the first edition has been updated to reflect the most recent developments in the field, and a new chapter on switching systems has been added. Each chapter contains examples, case studies, and exercises to allow for a better understanding of theoretical concepts by practical application. The mathematical language is kept to the minimum level necessary for the adequate formulation and statement of the main concepts, yet allowing for a detailed exposition of the numerical algorithms for the solution of the proposed problems. Set-Theoretic Methods in Control will appeal to both researchers and practitioners in control engineering and applied mathematics. It is also well-suited as a textbook for graduate students in these areas. Praise for the First Edition "This is an excellent book, full of new ideas and collecting a lot of diverse material related to set-theoretic methods. It can be recommended to a wide control community audience." - B. T. Polyak, Mathematical Reviews "This book is an outstanding monograph of a recent research trend in control. It reflects the vast experience of the authors as well as their noticeable contributions to the development of this field...[It] is highly recommended to PhD students and researchers working in control engineering or applied mathematics. The material can also be used for graduate courses in these areas." - Octavian Pastravanu, Zentralblatt MATH