CIMPA School of Number Theory in Cryptography and Its Applications

نویسنده

  • Michel Waldschmidt
چکیده

0.1 Group theory . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 0.2 Ring theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 0.3 Field theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 0.4 Arithmetic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 0.4.1 Residue classes modulo n . . . . . . . . . . . . . . . . 8 0.4.2 The ring Z[X] . . . . . . . . . . . . . . . . . . . . . . 9 0.4.3 Möbius inversion formula . . . . . . . . . . . . . . . . 10

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

2 5 Se p 20 09 SEMIDEFINITE PROGRAMMING , HARMONIC ANALYSIS AND CODING THEORY

These lecture notes where presented as a course of the CIMPA summer school in Manila, July 20-30, 2009, Semidefinite programming in algebraic combinatorics. CONTENTS

متن کامل

Semidefinite programming, harmonic analysis and coding theory

These lecture notes where presented as a course of the CIMPA summer school in Manila, July 20-30, 2009, Semidefinite programming in algebraic combinatorics. CONTENTS

متن کامل

An introduction to residues and resultants

These notes correspond to one of the introductory courses for the CIMPA Graduate School on Systems of Polynomial Equations to be held in Buenos Aires, Argentina, in July 2003. We present an elementary introduction to univariate residues and resultants, and we outline some of their multivariate generalizations and applications.

متن کامل

A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions

A non-interactive (t,n)-publicly veriable secret sharing scheme (non-interactive (t,n)-PVSS scheme) is a (t,n)-secret sharing scheme in which anyone, not only the participants of the scheme, can verify the correctness of the produced shares without interacting with the dealer and participants. The (t,n)-PVSS schemes have found a lot of applications in cryptography because they are suitable for<...

متن کامل

Improving security of double random phase encoding with chaos theory using fractal images

This study presents a new method based on the combination of cryptography and information hiding methods. Firstly, the image is encoded by the Double Random Phase Encoding (DRPE) technique. The real and imaginary parts of the encoded image are subsequently embedded into an enlarged normalized host image. DRPE demands two random phase mask keys to decode the decrypted image at the destination. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010