{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T23:18:29Z","timestamp":1761175109218,"version":"build-2065373602"},"reference-count":7,"publisher":"Polish Information Processing Society","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.15439\/2025f0998","type":"proceedings-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:44:23Z","timestamp":1761119063000},"page":"795-800","source":"Crossref","is-referenced-by-count":0,"title":["A statistical hypothesis test for primality based on random\ndivisor sampling: Principles, properties, adaptive design,\nand algorithmic analysis"],"prefix":"10.15439","volume":"43","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8308-4304","authenticated-orcid":true,"given":"Lubom\u00edr","family":"\u0160t\u011bp\u00e1nek","sequence":"first","affiliation":[{"name":"Institute of Biophysics and Informatics, First Faculty of Medicine, Charles University"}]}],"member":"6175","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","unstructured":"R. L. Rivest, A. Shamir, and L. Adleman. \u201cA Method for\nObtaining Digital Signatures and Public-Key Cryptosystems\u201d.\nIn: Communications of the ACM 21.2 (1978), pp. 120\u2013126. DOI:10.1145\/359340.359342.","DOI":"10.1145\/359340.359342"},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"R. Crandall and C. Pomerance. Prime Numbers: A Computational Perspective. 2nd. Springer, 2005. ISBN: 9780387252820.\nDOI: 10.1017\/S0025557200182932.","DOI":"10.1017\/S0025557200182932"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"G. L. Miller. \u201cRiemann\u2019s Hypothesis and Tests for Primality\u201d.\nIn: Journal of Computer and System Sciences 13.3 (1976),\npp. 300\u2013317. DOI: 10.1016\/S0022-0000(76)80043-8.","DOI":"10.1016\/S0022-0000(76)80043-8"},{"key":"ref4","unstructured":"K. H. Rosen. Elementary Number Theory and Its Applications.\n6th. Addison-Wesley, 2011. ISBN: 9780321500311."},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"M. O. Rabin. \u201cProbabilistic Algorithm for Testing Primality\u201d.\nIn: Journal of Number Theory 12.1 (1980), pp. 128\u2013138. DOI:10.1016\/0022-314X(80)90084-0.","DOI":"10.1016\/0022-314X(80)90084-0"},{"key":"ref6","doi-asserted-by":"crossref","unstructured":"M. Agrawal, N. Kayal, and N. Saxena. \u201cPRIMES is in P\u201d. In:\nAnnals of Mathematics 160.2 (2004), pp. 781\u2013793. DOI: 10.4007\/annals.2004.160.781.","DOI":"10.4007\/annals.2004.160.781"},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"G. Casella and R. L. Berger. Statistical Inference. 2nd.\nDuxbury Press, 2002. ISBN : 9780534243128. DOI: 10.1201\/9781003456285.","DOI":"10.1201\/9781003456285"}],"event":{"name":"20th Conference on Computer Science and Intelligence Systems (FedCSIS)","theme":"Computer Science and Intelligence Systems","location":"Krak\u00f3w, Poland","acronym":"FedCSIS","number":"20","start":{"date-parts":[[2025,9,14]]},"end":{"date-parts":[[2025,9,17]]}},"container-title":["Annals of Computer Science and Information Systems","Proceedings of the 20th Conference on Computer Science and Intelligence Systems (FedCSIS)"],"original-title":[],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T07:51:53Z","timestamp":1761119513000},"score":1,"resource":{"primary":{"URL":"https:\/\/annals-csis.org\/Volume_43\/drp\/0998.html"}},"subtitle":[],"proceedings-subject":"Computer Science and Information Systems","short-title":[],"issued":{"date-parts":[[2025,10,15]]},"references-count":7,"URL":"https:\/\/doi.org\/10.15439\/2025f0998","relation":{},"ISSN":["2300-5963"],"issn-type":[{"value":"2300-5963","type":"print"}],"subject":[],"published":{"date-parts":[[2025,10,15]]}}}