Notation and Sources of Quotations, Images, and Ornaments

Total Page:16

File Type:pdf, Size:1020Kb

Notation and Sources of Quotations, Images, and Ornaments Notation and sources of quotations, images, and ornaments Notation N, N>n set of nonnegative integers, set of integers greater than n ∈ N Z ring of integers Q, Q>0 field of rational numbers, set of positive rational numbers R, R>r field of real numbers, set of real numbers greater than r ∈ R C field of complex numbers B set {0, 1} of Boolean values Fq finite field with q elements ZN integers modulo N, usually {0,...,N − 1} RN symmetric representatives {−N/2,...,(N − 1)/2} of ZN a = b in ZN , a equals b modulo N, a ≡ b mod NNdivides a − b a =(a quo N) · N +(a rem N), 0 ≤ a rem N<N division with remainder a =(a squo N) · N +(a srem N),a srem N ∈ RN division with symmetric remainder ∅ empty set A ∪ B union of the sets A and B A ∩ B intersection of the sets A and B A K B set-theoretic difference of A and B A × B product (set of pairs) of the sets A and B An vectors of length n ∈ N over the set A #A cardinality (number of elements) of the set A A subgroup, ideal, or subspace generated by the elements of A A =∼ BAand B are isomorphic groups or rings R× group of units of the ring R R[x] ring of polynomials in the variable x over the ring R Rn×m ring of n × m matrices over the ring R for n, m ∈ N R/(m) residue class ring of the ring R modulo (the ideal generated by) m ∈ R F (x) field of rational functions in the variable x over the field F exp(a) exponential function, ea for a ∈ R a ∈ R expb(a) real exponential b for positive a, b ln a natural (base e) logarithm of a ∈ R>0 log a binary (base 2) logarithm of a ∈ R>0 dlogg x,dexpg x discrete logarithm, exponential of x in base g |a| absolute value of a ∈ C © Springer-Verlag Berlin Heidelberg 2015 807 J. von zur Gathen, CryptoSchool, DOI 10.1007/978-3-662-48425-8 808 Notation and sources of quotations, images, and ornaments a greatest integer less than or equal to a ∈ R a smallest integer greater than or equal to a ∈ R a integer nearest to a ∈ R, a +1/2 ± { − } √a set a, a a positive square root in R, set of square roots in other rings ab inner product of vectors a and b a Euclidean norm of a vector or a polynomial a n Bn(z,r) n-dimensional ball with center z ∈ R and radius r>0 Sn n-dimensional real unit sphere a | badivides b, ∃cb= ac f formal derivative of the polynomial or rational function f ∂f/∂x formal derivative of the multivariate polynomial f with respect to x n ∈ N k binomial coefficient for n, k O, O∼, Ω, o, ω asymptotic notation, Section 15.6 P, NP, BPP complexity classes, Section 15.5 XOR, ⊕ exclusive or = addition modulo 2 ∨, ∧ Boolean OR, AND a ←−− X random choice of a according to distribution X a ←−− A uniform random choice of a from finite set A a ←− b assignment of the value of b to the variable a E(X),var(X) expected value (average), variance of random variable X Δ(X, Y ) statistical distance between distributions X and Y + N , N , N sets of squares, antisquares, absolute value of squares modulo N x|y, x|, |y Dirac bra-ket end of proof ♦ end of example Sources of quotations The quotes preserve their original spelling. Chapter 1: Jonathan Swift, Lemuel Gulliver, Travels into Several Remote Nations of the World, Part III: A voyage to Laputa, Balribarbi, Glubbdubdrib, Luggnag, and Japan, Benjamin Motte, London, 1726. Quote in Chapter V The grand academy of Lagado. Lord Byron, English Bards, and Scotch Reviewers. A Satire, 1809. Quote from the third edition, James Cawthorn, 1810, page 4, lines 51–52. Edgar Allan Poe, A few words on secret writing, Graham’s Lady’s and Gentleman’s Magazine, Philadelphia, 1840, page 38. Johannes Balthasar Friderici, Cryptographia oder Geheime schrifftmünd- und würck- liche Correspondenß welche lehrmäßig vorstellet eine hochschätzbare Kunst verborgene Schrifften zu machen und auffzulösen, Georg Rebenlein, Hamburg, 1685, Vorrede. William P. Bundy, Some of my wartime experiences, Cryptologia, Volume XI (2), Taylor & Francis, April 1987, 65–77. Quote on page 67, reprinted with permission by Taylor & Francis Ltd, http://www.tandfonline.com. David Kahn, Cryptology goes public,inForeign Affairs,Volume50(1), Council on Foreign Relations, 1979, URL https://www.foreignaffairs.com/articles/1979- 09-01/cryptology-goes-public, page 159. Chapter 2: William Jones, New Introduction to the Mathematics: Containing the Principles of Arithmetic & Geometry. Printed by J. Matthews for Jeff. Wale at the Angel in St. Paul’s Church-Yard, 1706, page 6. Sources of quotations 809 Godfrey Harold Hardy, A mathematician’s apology, Cambridge University Press, 1940, page 80. Edgar Allan Poe, The Gold-Bug,InThe Dollar Newspaper, 1843. For publication details, see Notes to Section A.4. Richard Wilmer Rowan, The Spy Menace—An Exposure of International Espionage, Thornton Butterworth Limited, London, 1934, page 172. Fletcher Pratt, Secret and Urgent, The Bobbs-Merrill Company, 1939, page 15. Steven Levy, Crypto Rebels, Wired, Issue 1.02, May/June 1993, Condé, page 55. David Hilbert, Mathematische Probleme, Göttinger Nachrichten, 1900, pages 253–297. Chapter A:Caesar,Commentarii de bello gallico (The Gallic War), Book V, Chapter 48. Edition by Harvard University Press, 1970, page 296. Sir Arthur Conan Doyle, The Adventures of Sherlock Holmes. XVII. — The Adventure of the “Gloria Scott.”, The Strand Magazine, John Newnes (editor), 1893, page 400. Matteo Argenti, Trattato che insegna di formare cifre di varie sorti che s’appartiene a secretarii et a gran signori, cited in Aloys Meister (1906), Die Geheimschrift im Dienste der Päpstlichen Kurie, page 152. Carl Benjamin Boyer, A History of Mathematics, John Wiley & Sons, New York, 1968, page viii. Copyright #c 1968 by John Wiley & Sons, Inc. Rudyard Kipling, The Man who would be King,inThe Phantom ’Rickshaw and other Eerie Tales, A. H. Wheeler & Co., 1888. Edition by Oxford University Press, Oxford, 1987, page 264. Chapter 3: Kurt Gödel, Letter to John von Neumann, 20.III.1956. Reproduced with kind permission of the Institute for Advanced Study, Princeton NJ, USA. The letter is in the collection John Von Neumann and Klara Dan Von Neumann papers, 1912-2000, Library of Congress, Washington DC, USA. William Stanley Jevons, The principles of science, Macmillan and Co., London and New York, 1877, page 122. Joseph Diaz Gergonne, Questions proposées. Problème d’analise indéterminée, Annales de Mathématiques pures et appliquées, tome onzième, Nismes, de l’imprimerie de P. Durand-Belle, 1820 et 1821, page 316. Derrick Henry Lehmer, On the Converse of Fermat’s Theorem,TheAmericanMath- ematical Monthly, Volume 43, Number 6 (Jun.–Jul.), 1936, page 347. Reprinted with the kind permission of the Mathematical Association of America. Chapter B: Ho Chi Minh, to the cadre and students of the 1950 Viet Bac Combat Sector army cryptographic class. Quoted in Essential Matters. A History of the Cryptographic Branch of the People’s Army of Viet-Nam, 1945 - 1975, Center for Cryptologic History, NSA, 1994, page xiii. George Ballard Mathews, Theory of Numbers, Deighton, Bell and Co., 1892, Part 1, sect. 29. Sir Alfred Ewing, in Jones, Alfred Ewing and Room 40, 1979, page 75. Johann Samuel Halle, Magie, oder, die Zauberkäfte der Natur, so auf den Nutzen und die Belustigung angewandt wurden, 1786, page 602. Samuel Lindner, Elementa artis decifratoriae, Litteris Hartvngianis, Regiomonti [Kalinin- grad], 1770, page 2. Thomas Edward Lawrence (of Arabia), Seven Pillars of Wisdom,printedbyRoyMan- ning Pike and Herbert John Hodgson, London, 1926, Chapter III, page 38. Unpublished edition 1922. 810 Notation and sources of quotations, images, and ornaments Benjamin Franklin, Reply to the Governor, written for the Pennsylvania Assembly, 11 November 1755, printed in Votes and Proceedings of the House of Representatives, 1755– 1756, Philadelphia, 1756, pages 19–21. Chapter 4: , (Garegin Nzhdeh or Garegin Ter-Harutunyan) is an Armenian national hero. The quotation is attributed to him, without a specific source. Thanks go to Vahe Hakobyan for help with the Armenian. John Napier of Merchiston (Ioannis Neperus), Rabdologiæ sev nvmerationis per Virgulas libri dvo, Andreas Hart, Edinburgh, 1617, Epist. Dedicat. William Jones, Synopsis palmariorum matheseos: or, New Introduction to the Mathe- matics: Containing the Principles of Arithmetic & Geometry. Printed by J. Matthews for Jeff. Wale at the Angel in St. Paul’s Church-Yard, 1706, page 179. Thomas Jefferson, Letter dated Monticello, 18 June 1799. Published in Scripta Math- ematica, 1(1), 1933, 88–90. Augustus De Morgan, Study and Difficulties of Mathematics, Chicago, 1902, Chapter 12. Chapter 5: Isaac Newton, A Treatise of the Method of Fluxions and Infinite Series With its Application to the Geometry of Curve Lines, T. Woodman and J. Millan, 1737, Quote in anonymous preface, page xiii–xiv. Newton (1642–1727) wrote this book in 1671, but it was only published posthumously in 1736. David Eugene Smith, The Teaching of Elementary Mathematics, The Macmillan Com- pany, New York, 1900, page 219. Bernard Le Bouyer de Fontenelle, Entretiens sur la pluralité des mondes,Michael Brunet, Paris, 1686. Quote in Cinquième soir, pages 178–179 of the 7th edition, 1724. Chapter C: Jean de la Fontaine, L’ Ours et l’Amateur des Jardins, Libre VIII in the Fables, Fable 10, Claude Barbin, Paris, 1678. Friedrich August Leo (publisher), Mysterienbuch alter und neuer Zeit oder Anleitung geheime Schriften lesen zu können, geschwind und kurz schreiben zu lernen, ingleichen Chif- fern aufzulösen.
Recommended publications
  • Cryptography
    56 Protecting Information With Cryptography Chapter by Peter Reiher (UCLA) 56.1 Introduction In previous chapters, we’ve discussed clarifying your security goals, determining your security policies, using authentication mechanisms to identify principals, and using access control mechanisms to enforce poli- cies concerning which principals can access which computer resources in which ways. While we identified a number of shortcomings and prob- lems inherent in all of these elements of securing your system, if we re- gard those topics as covered, what’s left for the operating system to worry about, from a security perspective? Why isn’t that everything? There are a number of reasons why we need more. Of particular im- portance: not everything is controlled by the operating system. But per- haps you respond, you told me the operating system is all-powerful! Not really. It has substantial control over a limited domain – the hardware on which it runs, using the interfaces of which it is given control. It has no real control over what happens on other machines, nor what happens if one of its pieces of hardware is accessed via some mechanism outside the operating system’s control. But how can we expect the operating system to protect something when the system does not itself control access to that resource? The an- swer is to prepare the resource for trouble in advance. In essence, we assume that we are going to lose the data, or that an opponent will try to alter it improperly. And we take steps to ensure that such actions don’t cause us problems.
    [Show full text]
  • Tarjan Transcript Final with Timestamps
    A.M. Turing Award Oral History Interview with Robert (Bob) Endre Tarjan by Roy Levin San Mateo, California July 12, 2017 Levin: My name is Roy Levin. Today is July 12th, 2017, and I’m in San Mateo, California at the home of Robert Tarjan, where I’ll be interviewing him for the ACM Turing Award Winners project. Good afternoon, Bob, and thanks for spending the time to talk to me today. Tarjan: You’re welcome. Levin: I’d like to start by talking about your early technical interests and where they came from. When do you first recall being interested in what we might call technical things? Tarjan: Well, the first thing I would say in that direction is my mom took me to the public library in Pomona, where I grew up, which opened up a huge world to me. I started reading science fiction books and stories. Originally, I wanted to be the first person on Mars, that was what I was thinking, and I got interested in astronomy, started reading a lot of science stuff. I got to junior high school and I had an amazing math teacher. His name was Mr. Wall. I had him two years, in the eighth and ninth grade. He was teaching the New Math to us before there was such a thing as “New Math.” He taught us Peano’s axioms and things like that. It was a wonderful thing for a kid like me who was really excited about science and mathematics and so on. The other thing that happened was I discovered Scientific American in the public library and started reading Martin Gardner’s columns on mathematical games and was completely fascinated.
    [Show full text]
  • Patent Filed, Commercialized & Granted Data
    Granted IPR Legends Applied IPR Total IPR filed till date 1995 S.No. Inventors Title IPA Date Grant Date 1 Prof. P K Bhattacharya (ChE) Process for the Recovery of 814/DEL/1995 03.05.1995 189310 05.05.2005 Inorganic Sodium Compounds from Kraft Black Liquor 1996 S.No. Inventors Title IPA Date Grant Date 1 Dr. Sudipta Mukherjee (ME), A Novel Attachment for Affixing to 1321/DEL/1996 12.08.1996 192495 28.10.2005 Anupam Nagory (Student, ME) Luggage Articles 2 Prof. Kunal Ghosh (AE) A Device for Extracting Power from 2673/DEL/1996 02.12.1996 212643 10.12.2007 to-and-fro Wind 1997 S.No. Inventors Title IPA Date Grant Date 1 Dr. D Manjunath, Jayesh V Shah Split-table Atm Multicast Switch 983/DEL/1997 17.04.1997 233357 29.03.2009 1998 S.No. Inventors Title IPA Date Grant Date 1999 1 Prof. K. A. Padmanabhan, Dr. Rajat Portable Computer Prinet 1521/DEL/1999 06.12.1999 212999 20.12.2007 Moona, Mr. Rohit Toshniwal, Mr. Bipul Parua 2000 S.No. Inventors Title IPA Date Grant Date 1 Prof. S. SundarManoharan (Chem), A Magnetic Polymer Composition 858/DEL/2000 22.09.2000 216744 24.03.2008 Manju Lata Rao and Process for the Preparation of the Same 2 Prof. S. Sundar Manoharan (Chem) Magnetic Cro2 &#8211; Polymer 933/DEL/2000 22.09.2000 217159 27.03.2008 Composite Blends 3 Prof. S. Sundar Manoharan (Chem) A Magneto Conductive Polymer 859/DEL/2000 22.09.2000 216743 19.03.2008 Compositon for Read and Write Head and a Process for Preparation Thereof 4 Prof.
    [Show full text]
  • Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs∗
    Substitution-permutation networks, pseudorandom functions, and natural proofs∗ Eric Miles† Emanuele Viola‡ August 20, 2015 Abstract This paper takes a new step towards closing the gap between pseudorandom func- tions (PRF) and their popular, bounded-input-length counterparts. This gap is both quantitative, because these counterparts are more efficient than PRF in various ways, and methodological, because these counterparts usually fit in the substitution-permutation network paradigm (SPN), which has not been used to construct PRF. We give several candidate PRF that are inspired by the SPN paradigm. Most Fi of our candidates are more efficient than previous ones. Our main candidates are: : 0, 1 n 0, 1 n is an SPN whose S-box is a random function on b bits given F1 { } → { } as part of the seed. We prove that resists attacks that run in time 2ǫb. F1 ≤ : 0, 1 n 0, 1 n is an SPN where the S-box is (patched) field inversion, F2 { } → { } a common choice in practical constructions. We show that is computable with F2 boolean circuits of size n logO(1) n, and that it has exponential security 2Ω(n) against · linear and differential cryptanalysis. : 0, 1 n 0, 1 is a non-standard variant on the SPN paradigm, where F3 { } → { } “states” grow in length. We show that is computable with TC0 circuits of size F3 n1+ǫ, for any ǫ> 0, and that it is almost 3-wise independent. : 0, 1 n 0, 1 uses an extreme setting of the SPN parameters (one round, F4 { } → { } one S-box, no diffusion matrix). The S-box is again (patched) field inversion.
    [Show full text]
  • Information and Announcements Mathematics Prizes Awarded At
    Information and Announcements Mathematics Prizes Awarded at ICM 2014 The International Congress of Mathematicians (ICM) is held once in four years under the auspices of the International Mathematical Union (IMU). The ICM is the largest, and the most prestigious, meeting of the mathematics community. During the ICM, the Fields Medal, the Nevanlinna Prize, the Gauss Prize, the Chern Medal and the Leelavati Prize are awarded. The Fields Medals are awarded to mathematicians under the age of 40 to recognize existing outstanding mathematical work and for the promise of future achievement. A maximum of four Fields Medals are awarded during an ICM. The Nevanlinna Prize is awarded for outstanding contributions to mathematical aspects of information sciences; this awardee is also under the age of 40. The Gauss Prize is given for mathematical research which has made a big impact outside mathematics – in industry or technology, etc. The Chern Medal is awarded to a person whose mathematical accomplishments deserve the highest level of recognition from the mathematical community. The Leelavati Prize is sponsored by Infosys and is a recognition of an individual’s extraordinary achievements in popularizing among the public at large, mathematics, as an intellectual pursuit which plays a crucial role in everyday life. The 27th ICM was held in Seoul, South Korea during August 13–21, 2014. Fields Medals The following four mathematicians were awarded the Fields Medal in 2014. 1. Artur Avila, “for his profound contributions to dynamical systems theory, which have changed the face of the field, using the powerful idea of renormalization as a unifying principle”. Work of Artur Avila (born 29th June 1979): Artur Avila’s outstanding work on dynamical systems, and analysis has made him a leader in the field.
    [Show full text]
  • PCI Assessment Evidence of PCI Policy Compliance
    PCI Assessment Evidence of PCI Policy Compliance CONFIDENTIALITY NOTE: The information contained in this report document is for the Prepared for: exclusive use of the client specified above and may contain confidential, privileged and non-disclosable information. If the recipient of this report is not the client or Prospect or Customer addressee, such recipient is strictly prohibited from reading, photocopying, distributing or otherwise using this report or its contents in any way. Prepared by: Your Company Name Evidence of PCI Policy Compliance PCI ASSESSMENT Table of Contents 1 - Overview 1.1 - Security Officer 1.2 - Overall Risk 2 - PCI DSS Evidence of Compliance 2.1 - Install and maintain firewall to protect cardholder data 2.1.1.1 - Requirements for firewall at each Internet connections and between DMZ and internal network zone 2.1.1.2 - Business justification for use of all services, protocols and ports allowed 2.1.2 - Build firewall and router configurations that restrict connections between untrusted networks and the cardholder data environment 2.1.2.1 - Restrict inbound and outbound to that which is necessary for the cardholder data environment 2.1.2.3 - Do not allow unauthorized outbound traffic from the cardholder data environment to the Internet 2.1.2.4 - Implement stateful inspection (also known as dynamic packet filtering) 2.1.2.5 - Do not allow unauthorized outbound traffic from the cardholder data environment to the Internet 2.2 - Prohibition of vendor-supplied default password for systems and security parameters 2.2.1
    [Show full text]
  • Design Programme Indian Institute of Technology Kanpur
    Design Programme Indian Institute of Technology Kanpur Contents Overview 01- 38 Academic 39-44 Profile Achievements 45-78 Design Infrastructure 79-92 Proposal for Ph.D program 93-98 Vision 99-104 01 ew The design-phase of a product is like a womb of a mother where the most important attributes of a life are concieved. The designer is required to consider all stages of a product-life like manufacturing, marketing, maintenance, and the disposal after completion of product life-cycle. The design-phase, which is based on creativity, is often exciting and satisfying. But the designer has to work hard worrying about a large number of parameters of man. In Indian context, the design of products is still at an embryonic stage. The design- phase of a product is often neglected in lieu of manufacturing. A rapid growth of design activities in India is a must to bring the edge difference in the world of mass manufacturing and mass accessibility. The start of Design Programme at IIT Kanpur in the year 2001, is a step in this direction. overvi The Design Program at IIT-Kanpur was established with the objective of advancing our intellectual and scientific understanding of the theory and practice of design, along with the system of design process management and product semantics. The programme, since its inception in 2002, aimed at training post-graduate students in the technical, aesthetic and ergonomic practices of the field and to help them to comprehend the broader cultural issues associated with contemporary design. True to its interdisciplinary approach, the faculty members are from varied fields of engineering like mechanical, computer science, bio sciences, electrical and chemical engineering and humanities.
    [Show full text]
  • Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
    Self-encrypting deception: weaknesses in the encryption of solid state drives Carlo Meijer Bernard van Gastel Institute for Computing and Information Sciences School of Computer Science Radboud University Nijmegen Open University of the Netherlands [email protected] and Institute for Computing and Information Sciences Radboud University Nijmegen Bernard.vanGastel@{ou.nl,ru.nl} Abstract—We have analyzed the hardware full-disk encryption full-disk encryption. Full-disk encryption software, especially of several solid state drives (SSDs) by reverse engineering their those integrated in modern operating systems, may decide to firmware. These drives were produced by three manufacturers rely solely on hardware encryption in case it detects support between 2014 and 2018, and are both internal models using the SATA and NVMe interfaces (in a M.2 or 2.5" traditional form by the storage device. In case the decision is made to rely on factor) and external models using the USB interface. hardware encryption, typically software encryption is disabled. In theory, the security guarantees offered by hardware encryp- As a primary example, BitLocker, the full-disk encryption tion are similar to or better than software implementations. In software built into Microsoft Windows, switches off software reality, we found that many models using hardware encryption encryption and completely relies on hardware encryption by have critical security weaknesses due to specification, design, and implementation issues. For many models, these security default if the drive advertises support. weaknesses allow for complete recovery of the data without Contribution. This paper evaluates both internal and external knowledge of any secret (such as the password).
    [Show full text]
  • 1 Review of Counter-Mode Encryption ¡
    Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption Helger Lipmaa Phillip Rogaway Helsinki University of Technology (Finland) and University of California at Davis (USA) and University of Tartu (Estonia) Chiang Mai University (Thailand) [email protected] [email protected] http://www.tml.hut.fi/ helger http://www.cs.ucdavis.edu/ rogaway David Wagner University of California Berkeley (USA) [email protected] http://www.cs.berkeley.edu/ wagner Abstract Counter-mode encryption (“CTR mode”) was introduced by Diffie and Hellman already in 1979 [5] and is already standardized by, for example, [1, Section 6.4]. It is indeed one of the best known modes that are not standardized in [10]. We suggest that NIST, in standardizing AES modes of operation, should include CTR-mode encryption as one possibility for the next reasons. First, CTR mode has significant efficiency advantages over the standard encryption modes without weakening the security. In particular its tight security has been proven. Second, most of the perceived disadvantages of CTR mode are not valid criticisms, but rather caused by the lack of knowledge. 1 Review of Counter-Mode Encryption ¡ Notation. Let EK X ¢ denote the encipherment of an n-bit block X using key K and a block cipher E. For concreteness £ ¤ we assume that E £ AES, so n 128. If X is a nonempty string and i is a nonnegative integer, then X i denotes ¥ the ¥ X -bit string that one gets by regarding X as a nonnegative number (written in binary, most significant bit first), X ¦ ¥ ¥ adding i to this number, taking the result modulo 2 ¦ , and converting this number back into an X -bit string.
    [Show full text]
  • A Decade of Lattice Cryptography
    Full text available at: http://dx.doi.org/10.1561/0400000074 A Decade of Lattice Cryptography Chris Peikert Computer Science and Engineering University of Michigan, United States Boston — Delft Full text available at: http://dx.doi.org/10.1561/0400000074 Foundations and Trends R in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is C. Peikert. A Decade of Lattice Cryptography. Foundations and Trends R in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2014. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-113-9 c 2016 C. Peikert All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for in- ternal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • Thesis Title
    Exp(n+d)-time Algorithms for Computing Division, GCD and Identity Testing of Polynomials A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Technology by Kartik Kale Roll No. : 15111019 under the guidance of Prof. Nitin Saxena Department of Computer Science and Engineering Indian Institute of Technology Kanpur June, 2017 Abstract Agrawal and Vinay showed that a poly(s) hitting set for ΣΠaΣΠb(n) circuits of size s, where a is !(1) and b is O(log s) , gives us a quasipolynomial hitting set for general VP circuits [AV08]. Recently, improving the work of Agrawal and Vinay, it was showed that a poly(s) hitting set for Σ ^a ΣΠb(n) circuits of size s, where a is !(1) and n, b are O(log s), gives us a quasipolynomial hitting set for general VP circuits [AFGS17]. The inputs to the ^ gates are polynomials whose arity and total degree is O(log s). (These polynomials are sometimes called `tiny' polynomials). In this thesis, we will give a new 2O(n+d)-time algorithm to divide an n-variate polynomial of total degree d by its factor. Note that this is not an algorithm to compute division with remainder, but it finds the quotient under the promise that the divisor completely divides the dividend. The intuition behind allowing exponential time complexity here is that we will later apply these algorithms on `tiny' polynomials, and 2O(n+d) is just poly(s) in case of tiny polynomials. We will also describe an 2O(n+d)-time algorithm to find the GCD of two n-variate polynomials of total degree d.
    [Show full text]