Although number theorists have sometimes shunned and even disparaged computation in the past, today's applications of number theory to cryptography and computer security demand vast arithmetical computations. These demands have shifted the focus of studies in number theory and have changed attitudes toward computation itself.
Reihe
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Gewicht
ISBN-13
978-0-8218-4439-7 (9780821844397)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Numbers The problem $A\square + B = \square$ Congruences Double congruences and the Euclidean algorithm The augmented Euclidean algorithm Simultaneous congruences The fundamental theorem of arithmetic Exponentiation and orders Euler's $\phi$-function Finding the order of $a\bmod c$ Primality testing The RSA cipher system Primitive roots $\bmod\p$ Polynomials Tables of indices $\bmod\ p$ Brahmagupta's formula and hypernumbers Modules of hypernumbers A canonical form for modules of hypernumbers Solution of $A\square + B = \square$ Proof of the theorem of Chapter 19 Euler's remarkable discovery Stable modules Equivalence of modules Signatures of equivalence classes The main theorem Which modules become principal when squared? The possible signatures for certain values of $A$ The law of quadratic reciprocity Proof of the Main Theorem The theory of binary quadratic forms Composition of binary quadratic forms Cycles of stable modules Answers to exercises Bibliography Index.