Picture 1 of 1

Gallery
Picture 1 of 1

Have one to sell?
Elementary Number Theory: Primes, Congruences, and Secrets: A Computational App,
US $63.99
ApproximatelyS$ 82.21
Condition:
“Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!”
Good
A book that has been read but is in good condition. Very minimal damage to the cover including scuff marks, but no holes or tears. The dust jacket for hard covers may not be included. Binding has minimal wear. The majority of pages are undamaged with minimal creasing or tearing, minimal pencil underlining of text, no highlighting of text, no writing in margins. No missing pages.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Shipping:
US $6.99 (approx S$ 8.98) USPS Media MailTM.
Located in: Multiple Locations, United States
Delivery:
Estimated between Wed, 20 Aug and Tue, 26 Aug to 94104
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:226674938047
Item specifics
- Condition
- Good
- Seller Notes
- “Used book in good condition. Shows typical wear. Quick shipping. Satisfaction guaranteed!”
- Book Title
- Elementary Number Theory: Primes, Congruences, and Secrets: A Co,
- Topic
- Geometry & Topology
- Narrative Type
- Geometry & Topology
- Genre
- N/A
- Intended Audience
- N/A
- ISBN
- 9781441927521
About this product
Product Identifiers
Publisher
Springer New York
ISBN-10
1441927522
ISBN-13
9781441927521
eBay Product ID (ePID)
109094220
Product Key Features
Number of Pages
X, 168 Pages
Publication Name
Elementary Number Theory: Primes, Congruences, and Secrets : a Computational Approach
Language
English
Subject
Number Theory, Geometry / Algebraic
Publication Year
2010
Type
Textbook
Subject Area
Mathematics
Series
Undergraduate Texts in Mathematics Ser.
Format
Trade Paperback
Dimensions
Item Weight
16 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
Dewey Edition
22
Reviews
From the reviews:"This one treats topics that have become standard in recent years and it has exercises with selected solutions. it gives the students a tool to do calculations that illustrate even the most abstract concepts, and, simultaneously, introduces them to an open source software that can later be applied profitably for studying research problems. introducing the reader to a powerful software system." (Franz Lemmermeyer, Zentralblatt MATH, Vol. 1155, 2009)"The clich that number theory, ever the purest mathematics, now yields very practical applications barely tells the story. Teach undergraduate number theory today, and students demand to hear about public-key cryptography and related technologies. Stein (Univ. of Washington) serves undergraduates well by opening the way by intimating their power. he frames the sophisticated Birch and Swinnerton-Dyer conjecture as the new canonical challenge for the future. Summing Up: Recommended. All undergraduates students, professionals, and general readers." (D. V. Feldman, Choice, Vol. 47 (2), October, 2009)"This book is an introduction to elementary number theory with a computational flavor. Many numerical examples are given throughout the book using the Sage mathematical software. The text is aimed at an undergraduate student with a basic knowledge of groups, rings and fields. Each chapter concludes with several exercises." (Samuel S. Wagstaff Jr., Mathematical Reviews, Issue 2009 i), From the reviews:"This one treats topics that have become standard in recent years … and it has exercises with selected solutions. … it gives the students a tool to do calculations that illustrate even the most abstract concepts, and, simultaneously, introduces them to an open source software that can later be applied profitably for studying research problems. … introducing the reader to a powerful software system." (Franz Lemmermeyer, Zentralblatt MATH, Vol. 1155, 2009)"The cliché that number theory, ever the purest mathematics, now yields very practical applications barely tells the story. Teach undergraduate number theory today, and students demand to hear about public-key cryptography and related technologies. … Stein (Univ. of Washington) serves undergraduates well by … opening the way by intimating their power. … he frames the sophisticated Birch and Swinnerton-Dyer conjecture as the new canonical challenge for the future. Summing Up: Recommended. All undergraduates students, professionals, and general readers." (D. V. Feldman, Choice, Vol. 47 (2), October, 2009)"This book is an introduction to elementary number theory with a computational flavor. … Many numerical examples are given throughout the book using the Sage mathematical software. The text is aimed at an undergraduate student with a basic knowledge of groups, rings and fields. Each chapter concludes with several exercises." (Samuel S. Wagstaff Jr., Mathematical Reviews, Issue 2009 i), From the reviews: "This one treats topics that have become standard in recent years ... and it has exercises with selected solutions. ... it gives the students a tool to do calculations that illustrate even the most abstract concepts, and, simultaneously, introduces them to an open source software that can later be applied profitably for studying research problems. ... introducing the reader to a powerful software system." (Franz Lemmermeyer, Zentralblatt MATH, Vol. 1155, 2009) "The cliché that number theory, ever the purest mathematics, now yields very practical applications barely tells the story. Teach undergraduate number theory today, and students demand to hear about public-key cryptography and related technologies. ... Stein (Univ. of Washington) serves undergraduates well by ... opening the way by intimating their power. ... he frames the sophisticated Birch and Swinnerton-Dyer conjecture as the new canonical challenge for the future. Summing Up: Recommended. All undergraduates students, professionals, and general readers." (D. V. Feldman, Choice, Vol. 47 (2), October, 2009) "This book is an introduction to elementary number theory with a computational flavor. ... Many numerical examples are given throughout the book using the Sage mathematical software. The text is aimed at an undergraduate student with a basic knowledge of groups, rings and fields. Each chapter concludes with several exercises." (Samuel S. Wagstaff Jr., Mathematical Reviews, Issue 2009 i)
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
512.7
Table Of Content
Prime Numbers.- The Ring of Integers Modulo n.- Public-key Cryptography.- Quadratic Reciprocity.- Continued Fractions.- Elliptic Curves.
Synopsis
This is a textbook about classical elementary number theory and elliptic curves. The first part discusses elementary topics such as primes, factorization, continued fractions, and quadratic forms, in the context of cryptography, computation, and deep open research problems. The second part is about elliptic curves, their applications to algorithmic problems, and their connections with problems in number theory. The intended audience of this book is an undergraduate with some familiarity with basic abstract algebra., This is a book about prime numbers, congruences, secret messages, and elliptic curves that you can read cover to cover. It grew out of undergr- uate courses that the author taught at Harvard, UC San Diego, and the University of Washington. The systematic study of number theory was initiated around 300B. C. when Euclid proved that there are in'nitely many prime numbers, and also cleverly deduced the fundamental theorem of arithmetic, which asserts that every positive integer factors uniquely as a product of primes. Over a thousand years later (around 972A. D. ) Arab mathematicians formulated the congruent number problem that asks for a way to decide whether or not a given positive integer n is the area of a right triangle, all three of whose sides are rational numbers. Then another thousand years later (in 1976), Di'e and Hellman introduced the ?rst ever public-key cryptosystem, which enabled two people to communicate secretely over a public communications channel with no predetermined secret; this invention and the ones that followed it revolutionized the world of digital communication. In the 1980s and 1990s, elliptic curves revolutionized number theory, providing striking new insights into the congruent number problem, primality testing, publ- key cryptography, attacks on public-key systems, and playing a central role in Andrew Wiles' resolution of Fermat's Last Theorem., Classical number theory and elliptic curves are examined in this textbook, which moves on from elementary topics such as primes, continued fractions, and quadratic forms, to elliptic curves and their applications to algorithmic and number theory problems., This is a book about prime numbers, congruences, secret messages, and elliptic curves that you can read cover to cover. It grew out of undergr- uate courses that the author taught at Harvard, UC San Diego, and the University of Washington. The systematic study of number theory was initiated around 300B. C. when Euclid proved that there are in?nitely many prime numbers, and also cleverly deduced the fundamental theorem of arithmetic, which asserts that every positive integer factors uniquely as a product of primes. Over a thousand years later (around 972A. D. ) Arab mathematicians formulated the congruent number problem that asks for a way to decide whether or not a given positive integer n is the area of a right triangle, all three of whose sides are rational numbers. Then another thousand years later (in 1976), Di?e and Hellman introduced the ?rst ever public-key cryptosystem, which enabled two people to communicate secretely over a public communications channel with no predeterminedsecret; this invention and the ones that followed it revolutionized the world of digital communication. In the 1980s and 1990s, elliptic curves revolutionized number theory, providing striking new insights into the congruent number problem, primality testing, publ- key cryptography, attacks on public-key systems, and playing a central role in Andrew Wiles' resolution of Fermat's Last Theorem.
LC Classification Number
QA241-247.5
Item description from the seller
Seller feedback (2,139)
- u***r (297)- Feedback left by buyer.Past monthVerified purchaseDelighted. Fast shipping, and Great communication. Overall, a very professional transaction.
- b***k (2710)- Feedback left by buyer.Past monthVerified purchasefast shipping, good communication, great transaction
- h***e (50)- Feedback left by buyer.Past monthVerified purchaseFast shipping, packaged well. Just as described. Will buy again! Thank you. A++++