000 -LEADER |
fixed length control field |
04809nam a22005295i 4500 |
001 - CONTROL NUMBER |
control field |
978-0-8176-8298-9 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20180115171445.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
111121s2012 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780817682989 |
-- |
978-0-8176-8298-9 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-0-8176-8298-9 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA241-247.5 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
PBH |
Source |
bicssc |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
MAT022000 |
Source |
bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
512.7 |
Edition number |
23 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Riesel, Hans. |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Prime Numbers and Computer Methods for Factorization |
Medium |
[electronic resource] / |
Statement of responsibility, etc. |
by Hans Riesel. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Boston, MA : |
Name of producer, publisher, distributor, manufacturer |
Birkhäuser Boston : |
-- |
Imprint: Birkhäuser, |
Date of production, publication, distribution, manufacture, or copyright notice |
2012. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XVIII, 464 p. 20 illus. |
Other physical details |
online resource. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
490 1# - SERIES STATEMENT |
Series statement |
Modern Birkhäuser Classics |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface -- The Number of Primes Below a Given Limit -- The Primes Viewed at Large -- Subtleties in the Distribution of Primes -- The Recognition of Primes -- Classical Methods of Factorization -- Modern Factorization Methods -- Prime Numbers and Cryptography -- Appendix 1. Basic Concepts in Higher Algebra -- Appendix 2. Basic concepts in Higher Arithmetic -- Appendix 3. Quadratic Residues -- Appendix 4. The Arithmetic of Quadratic Fields -- Appendix 5. Higher Algebraic Number Fields -- Appendix 6. Algebraic Factors -- Appendix 7. Elliptic Curves -- Appendix 8. Continued Fractions -- Appendix 9. Multiple-Precision Arithmetic -- Appendix 10. Fast Multiplication of Large Integers -- Appendix 11. The Stieltjes Integral -- Tables -- List of Textbooks -- Index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Published in the mid 1980s, the highly successful first edition of this title investigated the mathematical underpinnings of computer encryption, a discipline drawing heavily on the factorization of large numbers into primes. The book served a broad audience of researchers, students, practitioners of cryptography, and non-scientific readers with a mathematical inclination, treating four fundamental problems: the number of primes below a given limit, the approximate number of primes, the recognition of primes, and the factorization of large numbers. The second edition of the work, released in the mid 1990s, expanded significantly upon the original book, including important advances in computational prime number theory and factorization, as well as revised and updated tables. With explicit algorithms and computer programs, the author illustrated applications while attempting to discuss many classically important results along with more modern discoveries. Although it has been over a decade since the publication of this second edition, the theory it contained remains still highly relevant, and the particular cryptosystem it addressed (RSA public-key) is ubiquitous. Therefore, in addition to providing a historical perspective on many of the issues in modern prime number theory and data encryption, this soft cover version—which reproduces the second edition exactly as it originally appeared—offers affordable access to a great deal of valuable information. Highly readable for a wide variety of mathematicians, students of applied number theory, and others, this modern classic will be of interest to anyone involved in the study of number theory and cryptography. Reviews: Here is an outstanding technical monograph on recursive number theory and its numerous automated techniques. It successfully passes a critical milestone not allowed to many books, viz., a second edition... All in all, this handy volume continues to be an attractive combination of number-theoretic precision, practicality, and theory with a rich blend of computer science. —Zentralblatt MATH The book...is an enthusiastic introduction to some of the ideas concerned with primes and factorization. It should be of interest to anyone who would like to learn about the use of computers in number theory. —Mathematical Reviews. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Applied mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Engineering mathematics. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Number theory. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Mathematics. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Number Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Data Encryption. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Algorithms. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Applications of Mathematics. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Mathematics, general. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Relationship information |
Printed edition: |
International Standard Book Number |
9780817682972 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Modern Birkhäuser Classics |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="http://dx.doi.org/10.1007/978-0-8176-8298-9">http://dx.doi.org/10.1007/978-0-8176-8298-9</a> |
912 ## - |
-- |
ZDB-2-SMA |