Results

**11 - 15**of**15**### Primality testing

, 2003

"... We consider the classical problem of testing if a given (large) number n is prime or composite. First we outline some of the efficient randomised algorithms for solving this problem. For many years it has been an open question whether a deterministic polynomial time algorithm exists for primality ..."

Abstract
- Add to MetaCart

We consider the classical problem of testing if a given (large) number n is prime or composite. First we outline some of the efficient randomised algorithms for solving this problem. For many years it has been an open question whether a deterministic polynomial time algorithm exists for primality testing, i.e. whether "PRIMES is in P". Recently Agrawal, Kayal and Saxena answered this question in the affirmative. They gave a surprisingly simple deterministic algorithm. We describe their algorithm, mention some improvements by Bernstein and Lenstra, and consider whether the algorithm is useful in practice. Finally, as a topic for future research, we mention a conjecture that, if proved, would give a fast and practical deterministic primality test.

### Pseudoprimes: A Survey Of Recent Results

, 1992

"... this paper, we aim at presenting the most recent results achieved in the theory of pseudoprime numbers. First of all, we make a list of all pseudoprime varieties existing so far. This includes Lucas-pseudoprimes and the generalization to sequences generated by integer polynomials modulo N , elliptic ..."

Abstract
- Add to MetaCart

this paper, we aim at presenting the most recent results achieved in the theory of pseudoprime numbers. First of all, we make a list of all pseudoprime varieties existing so far. This includes Lucas-pseudoprimes and the generalization to sequences generated by integer polynomials modulo N , elliptic pseudoprimes. We discuss the making of tables and the consequences on the design of very fast primality algorithms for small numbers. Then, we describe the recent work of Alford, Granville and Pomerance, in which they prove that there

### TWO KINDS OF STRONG PSEUDOPRIMES UP TO 10 36

"... Abstract. Let n>1 be an odd composite integer. Write n − 1=2sd with d odd. If either bd ≡ 1modnor b2rd ≡−1modnfor some r =0, 1,...,s − 1, then we say that n isastrongpseudoprimetobaseb, or spsp(b) forshort. Define ψt to be the smallest strong pseudoprime to all the first t prime bases. If we know th ..."

Abstract
- Add to MetaCart

Abstract. Let n>1 be an odd composite integer. Write n − 1=2sd with d odd. If either bd ≡ 1modnor b2rd ≡−1modnfor some r =0, 1,...,s − 1, then we say that n isastrongpseudoprimetobaseb, or spsp(b) forshort. Define ψt to be the smallest strong pseudoprime to all the first t prime bases. If we know the exact value of ψt, we will have, for integers n<ψt, a deterministic efficient primality testing algorithm which is easy to implement. Thanks to Pomerance et al. and Jaeschke, the ψt are known for 1 ≤ t ≤ 8. Conjectured values of ψ9,...,ψ12 were given by us in our previous papers (Math. Comp. 72 (2003), 2085–2097; 74 (2005), 1009–1024). The main purpose of this paper is to give exact values of ψ ′ t for 13 ≤ t ≤ 19; to give a lower bound of ψ ′ 20: ψ ′ 20> 1036; and to give reasons and numerical evidence of K2- and C3-spsp’s < 1036 to support the following conjecture: ψt = ψ ′ t <ψ′ ′ t for any t ≥ 12, where ψ ′ t (resp. ψ′ ′ t) is the smallest K2- (resp. C3-) strong pseudoprime to all the first t prime bases. For this purpose we describe procedures for computing and enumerating the two kinds of spsp’s < 1036 to the first 9 prime bases. The entire calculation took about 4000 hours on a PC Pentium IV/1.8GHz. (Recall that a K2-spsp is an spsp of the form: n = pq with p, q primes and q − 1=2(p−1); and that a C3-spsp is an spsp and a Carmichael number of the form: n = q1q2q3 with each prime factor qi ≡ 3mod4.) 1.

### MO419 – Probabilistic Algorithms – Flávio K. Miyazawa – IC/UNICAMP 2010 A survey on Probabilistic Algorithms to Primality Test

"... One of the longstanding problems in using encryption to encode messages is that the recipient of the message needs to know the key in order to decrypt the message. Clearly we somehow have to get the key to the participants so they can use it. We can’t send the key to them without encrypting *it*, or ..."

Abstract
- Add to MetaCart

One of the longstanding problems in using encryption to encode messages is that the recipient of the message needs to know the key in order to decrypt the message. Clearly we somehow have to get the key to the participants so they can use it. We can’t send the key to them without encrypting *it*, or someone might “eavesdrop ” and get it. But this puts us in an infinite loop: the

### A GENERALIZATION OF MILLER’S PRIMALITY THEOREM PEDRO BERRIZBEITIA AND AURORA OLIVIERI

"... Abstract. For any integer r we show that the notion of ω-prime to base a introduced by Berrizbeitia and Berry, 2000, leads to a primality test for numbers n congruent to 1 modulo r, which runs in polynomial time assuming the Extended Riemann Hypothesis (ERH). For r = 2 we obtain Miller’s classical r ..."

Abstract
- Add to MetaCart

Abstract. For any integer r we show that the notion of ω-prime to base a introduced by Berrizbeitia and Berry, 2000, leads to a primality test for numbers n congruent to 1 modulo r, which runs in polynomial time assuming the Extended Riemann Hypothesis (ERH). For r = 2 we obtain Miller’s classical result. 1.