Sorry, you do not have access to this eBook
A subscription is required to access the full text content of this book.
2.1.1 Mathematics: The Toolchest of Modern Cryptography
2.1.1.1 History: From old tools to new
2.1.1.2 A treasure trove of techniques
2.1.1.3 Purpose of this chapter
2.3.2.2 Operations on permutations
2.3.2.3 Properties of permutations
2.4.4 The Chinese Remainder Theorem
2.4.5 Quadratic Residues and Quadratic Reciprocity
2.4.6.1 Distribution of the primes
2.4.7 Euler’s Totient Function
2.5 Efficient Integer Arithmetic
2.5.2 Montgomery Multiplication
2.5.4 Karatsuba Multiplication
2.6.2 Algebraic Structures: An Overview
2.6.3.1 Group structure and operations
2.6.3.2 Common properties of groups
2.6.3.4 The discrete logarithm problem
2.6.4.1 Ring structure and operations
2.6.5.1 Vector space structure and operations
2.6.5.2 Examples of vector spaces
2.6.6.1 Field structure and operations
2.6.6.3 Finite (Galois) fields
2.6.6.4 Finite field elements when degree d > 1
2.6.6.5 Finite field use in AES
2.7.3.1 Projective coordinates
2.7.3.3 Other coordinate systems
2.7.4 Point Addition and Doubling
2.9 Appendix A: Symbols and Notation
A subscription is required to access the full text content of this book.
Other ways to access this content: