Return to Article Details Number theory and its applications in cybersecurity: a review Download Download PDF