scispace - formally typeset
Open AccessBook

A Course in Computational Algebraic Number Theory

Henri Cohen
Reads0
Chats0
TLDR
The first seven chapters guide readers to the heart of current research in computational algebraic number theory, including recent algorithms for computing class groups and units, as well as elliptic curve computations, while the last three chapters survey factoring and primality testing methods.
Abstract
A description of 148 algorithms fundamental to number-theoretic computations, in particular for computations related to algebraic number theory, elliptic curves, primality testing and factoring. The first seven chapters guide readers to the heart of current research in computational algebraic number theory, including recent algorithms for computing class groups and units, as well as elliptic curve computations, while the last three chapters survey factoring and primality testing methods, including a detailed description of the number field sieve algorithm. The whole is rounded off with a description of available computer packages and some useful tables, backed by numerous exercises. Written by an authority in the field, and one with great practical and teaching experience, this is certain to become the standard and indispensable reference on the subject.

read more

Citations
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book

Guide to Elliptic Curve Cryptography

TL;DR: This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.
Book

Digital Watermarking

TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Journal ArticleDOI

Closest point search in lattices

TL;DR: An efficient closest point search algorithm, based on the Schnorr-Euchner (1995) variation of the Pohst (1981) method, is implemented and is shown to be substantially faster than other known methods.
Book ChapterDOI

An Identity Based Encryption Scheme Based on Quadratic Residues

TL;DR: A novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity, which is related to the difficulty of solving the quadratic residuosity problem.
References
More filters
Journal ArticleDOI

Approximating rings of integers in number fields

TL;DR: This paper studies the algorithmic problem of finding the ring of integers of a given algebraic mimber field and proves that this subring has a particularly transparent local structure, which is reminiscent of the structure of tamely ramified extensions of local fields.
Journal ArticleDOI

A Monte Carlo factoring algorithm with linear storage

TL;DR: An algorithm which will factor an integer n quite efficiently if the class number h(-n) is free of large prime divisors and the method requires an amount of storage space which is proportional to the length of the input n.
Journal ArticleDOI

Computing Galois groups over the rationals

TL;DR: In this paper, practical computational techniques are described to determine the Galois group of a polynomial over the rationals, and each transitive permutation group of degree 3 to 7 is realized as a Galois groups over rationals.
Journal ArticleDOI

Algorithms for Hermite and Smith normal matrices and linear Diophantine equations

TL;DR: A modification of the Hermite algorithm gives an integer-preserving algorithm for solving linear equations with real-valued variables that is valid if the elements of the matrix are in a principal ideal domain.
Journal ArticleDOI

On the conjecture of Birch and Swinnerton-Dyer for an elliptic curve of rank 3

TL;DR: In this article, the authors verified the WeilTaniyama conjecture for the elliptic curve y2 = 4x3 28x + 25 with a triple zero at s = 1 and computed lim, L(s)/(s 1)3 to 28 decimal places, in accordance with the Birch-Swinnerton-Dyer conjecture.
Related Papers (5)