43 results on '"Batten, Lynn"'
Search Results
2. BIBLIOGRAPHY.
3. CHAPTER 8: FACTORING METHODS: 8.4: CONTINUED FRACTIONS AND FACTORING.
4. CHAPTER 8: FACTORING METHODS: 8.3: POLLARD'S P - 1 AND RHO METHODS.
5. CHAPTER 8: FACTORING METHODS: 8.2: THE QUADRATIC SIEVE.
6. CHAPTER 8: FACTORING METHODS: 8.1: FERMAT AGAIN.
7. CHAPTER 7: PRIMALITY TESTING: 7.5: PRIMES IS IN P.
8. CHAPTER 7: PRIMALITY TESTING: 7.3: TRUE PRIMALITY TESTS.
9. CHAPTER 7: PRIMALITY TESTING: 7.2: THE MILLER-SELFRIDGE-RABIN PRIMALITY TEST.
10. CHAPTER 6: DIGITAL SIGNATURES: 6.3: ATTACKS ON DIGITAL SIGNATURES.
11. CHAPTER 6: DIGITAL SIGNATURES: 6.2: DIGITAL SIGNATURE SCHEMES.
12. CHAPTER 6: DIGITAL SIGNATURES: 6.1L HASH FUNCTIONS.
13. CHAPTER 5: ELLIPTIC CURVE CRYPTOGRAPHY: 5.2: ELLIPTIC CURVE CRYPTOGRAPHY.
14. CHAPTER 4: THE RSA SCHEME: 4.3: RSA SECURITY.
15. CHAPTER 4: THE RSA SCHEME: 4.4: IMPLEMENTING RSA.
16. CHAPTER 4: THE RSA SCHEME: 4.2: THE RSA ALGORITHM.
17. CHAPTER 4: THE RSA SCHEME: 4.1: EULER'S THEOREM.
18. CHAPTER 3: THE ELGAMAL SCHEME: 3.2: THE ELGAMAL SCHEME.
19. CHAPTER 3: THE ELGAMAL SCHEME: 3.1: PRIMITIVE ROOTS.
20. CHAPTER 2: CONGRUENCE EQUATIONS: 2.4: ATTACKING THE DISCRETE LOGARITHM.
21. CHAPTER 2: CONGRUENCE EQUATIONS: 2.3: DISCRETE LOGARITHMS AND DIFFIE-HELLMAN KEY EXCHANGE.
22. CHAPTER 2: CONGRUENCE EQUATIONS: 2.2: THE EUCLIDEAN ALGORITHM-FINDING INVERSES.
23. CHAPTER 2: CONGRUENCE EQUATIONS: 2.1: CONGRUENCE ARITHMETIC.
24. CHAPTER 1: INTRODUCTION: 1.2: SYMMETRIC KEY CRYPTOGRAPHY.
25. CHAPTER 7: PRIMALITY TESTING: 7.4: MERSENNE PRIMES AND THE LUCAS-LEHMER TEST.
26. CHAPTER 7: PRIMALITY TESTING: 7.1: FERMAT'S APPROACH AND WILSON'S THEOREM.
27. CHAPTER 5: ELLIPTIC CURVE CRYPTOGRAPHY: 5.3: THE ELLIPTIC CURVE FACTORING SCHEME.
28. CHAPTER 1: INTRODUCTION: 1.3: PUBLIC KEY (ASYMMETRIC) CRYPTOGRAPHY.
29. CHAPTER 3: THE ELGAMAL SCHEME: 3.3: SECURITY OF THE ELGAMAL SCHEME.
30. CHAPTER 1: INTRODUCTION: 1.4: KEY ESTABLISHMENT.
31. CHAPTER 8: FACTORING METHODS.
32. CHAPTER 7: PRIMALITY TESTING.
33. CHAPTER 1: INTRODUCTION: 1.7: ATTACKS.
34. CHAPTER 1: INTRODUCTION: 1.6: STANDARDS.
35. CHAPTER 1: INTRODUCTION:.
36. CHAPTER 6: DIGITAL SIGNATURES.
37. CHAPTER 5: ELLIPTIC CURVE CRYPTOGRAPHY.
38. CHAPTER 4: THE RSA SCHEME.
39. CHAPTER 3: THE ELGAMAL SCHEME.
40. CHAPTER 2: CONGRUENCE EQUATIONS:.
41. CHAPTER 1: INTRODUCTION: 1.1: THE MEANING OF THE WORD CRYPTOGRAPHY.
42. ACKNOWLEDGMENTS.
43. PREFACE.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.