ABSTRACT

In this part of the book we describe many cryptographic functions and algorithms that use number theory.