[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Did anyone see...



Eli Brandt writes:

 >> Victor S. Miller, [who I suspect is the same Victor S. Miller I
 >> knew at UMass Boston many years ago], published a nifty little
 >> paper in the mid 1980's on the computation of the function Pi(n)

 > Do you have a pointer to this paper?  I'd been under the
 > impression that this function had no analytic closed form
 > (unless you cheat).

I'll also post this to the list since I need to correct a dumb
error in my previous post.

I previously stated that Pi(n) was the Nth prime.  It is of
course in reality the Prime Number Counting Function which is
equal to the number of primes <= n.  Computing the Nth prime is
trivial given a program which computes Pi(n) since Pi(n) is
asymptotic to a known smooth function and one need only evaluate
it a small number of times to refine an initial estimate of the
Nth prime into the correct value.

Miller's definitive paper on the subject is...

    Computing Pi(x): The Meissel-Lehmer method
    Mathematics of Computation, 1985, 44, no. 170, 537-560

There is another paper by this gentleman which may be of interest
to Cypherpunks.  It is on the use of elliptic curves as a basis
for cryptosystems.  He demonstrates how an analogue to the
Diffie-Hellman secure key exchange may be constructed using
groups of points on elliptic curves and conjectures that such a
system may be stronger than one based on the discrete log
problem.  Here is the citation.

    Use of elliptic curves in cryptography
    Advances in cryptology---CRYPTO 85
    1986, 417-426 ISBN: 0-387-16463-4

Happy reading.

-- 
     Mike Duvos         $    PGP 2.6 Public Key available     $
     [email protected]     $    via Finger.                      $