Public Key Cryptography
Part of the Springer Undergraduate Texts in Mathematics and Technology book series (SUMAT)
KeywordsPrime Number Quantum Computer Quadratic Residue Prime Integer Prime Number Theorem
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Unable to display preview. Download preview PDF.
- J.-P. Delahaye. La cryptographie RSA 20 ans après.Pour la Science, 2000.Google Scholar
- E. Knill, R. Laflamme, H. Barnum, D. Dalvit, J. Dziarmaga, J. Gubernatis, L. Gurvits, G. Ortiz, L. Viola, and W.H. Zurek. From factoring to phase estimation: A discussion of Shor’s algorithm.Los Alamos Science, 27:38–45, 2002.Google Scholar
- E. Knill, R. Laflamme, H. Barnum, D. Dalvit, J. Dziarmaga, J. Gubernatis, L. Gurvits, G. Ortiz, L. Viola, and W.H. Zurek. Quantum information processing: A hands-on primer.Los Alamos Science, 27:2–37, 2002.Google Scholar
© Springer-Verlag New York 2008