linear congruences
Recently Published Documents


TOTAL DOCUMENTS

62
(FIVE YEARS 0)

H-INDEX

7
(FIVE YEARS 0)

2020 ◽  
pp. 31-49
Author(s):  
Khodakhast Bibak
Keyword(s):  


Author(s):  
Robin Wilson

‘Congruences, clocks, and calendars’ demonstrates how we might apply the idea of congruence, first introduced by Gauss in 1801, to problems such as testing which Mersenne numbers are primes and finding the day of the week on which a given date falls. Ancient Chinese puzzles depended on the solving of simultaneous linear congruences, inspiring mathematicians and giving rise to the Chinese Remainder Theorem. Exploring quadratic congruences leads towards the law of quadratic reciprocity, noted by Euler and Legendre and proved by Gauss. The problem, ‘Is 1066 a square or a non-square?’ can be solved by applying this law several times to reduce the numbers involved.



2020 ◽  
Vol 343 (2) ◽  
pp. 111690
Author(s):  
Khodakhast Bibak


2018 ◽  
Vol 103 (5-6) ◽  
pp. 911-918
Author(s):  
I. D. Kan


2018 ◽  
Vol 29 (03) ◽  
pp. 357-375 ◽  
Author(s):  
Khodakhast Bibak ◽  
Bruce M. Kapron ◽  
Venkatesh Srinivasan ◽  
László Tóth

Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in computer science. MMH[Formula: see text], which was shown to be [Formula: see text]-universal by Halevi and Krawczyk in 1997, is a well-known universal hash function family. We introduce a variant of MMH[Formula: see text], that we call GRDH, where we use an arbitrary integer [Formula: see text] instead of prime [Formula: see text] and let the keys [Formula: see text] satisfy the conditions [Formula: see text] ([Formula: see text]), where [Formula: see text] are given positive divisors of [Formula: see text]. Then via connecting the universal hashing problem to the number of solutions of restricted linear congruences, we prove that the family GRDH is an [Formula: see text]-almost-[Formula: see text]-universal family of hash functions for some [Formula: see text] if and only if [Formula: see text] is odd and [Formula: see text] [Formula: see text]. Furthermore, if these conditions are satisfied then GRDH is [Formula: see text]-almost-[Formula: see text]-universal, where [Formula: see text] is the smallest prime divisor of [Formula: see text]. Finally, as an application of our results, we propose an authentication code with secrecy scheme which strongly generalizes the scheme studied by Alomair et al. [J. Math. Cryptol. 4 (2010) 121–148], and [J.UCS 15 (2009) 2937–2956].



2017 ◽  
Vol 86 (9) ◽  
pp. 1893-1904 ◽  
Author(s):  
Khodakhast Bibak ◽  
Bruce M. Kapron ◽  
Venkatesh Srinivasan
Keyword(s):  


2017 ◽  
Vol 3 (1) ◽  
pp. 93-99
Author(s):  
Polemer Cuarto ◽  


2017 ◽  
Vol 171 ◽  
pp. 128-144 ◽  
Author(s):  
Khodakhast Bibak ◽  
Bruce M. Kapron ◽  
Venkatesh Srinivasan ◽  
Roberto Tauraso ◽  
László Tóth
Keyword(s):  


2016 ◽  
Vol 144 (7) ◽  
pp. 2837-2846 ◽  
Author(s):  
Igor E. Shparlinski
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document