In the introduction to the first volume of The Arithmetic of Elliptic Curves (Springer-Verlag, 1986), I observed that "the theory of elliptic curves is rich, varied, and amazingly vast," and as a consequence, "many important topics had to be omitted." I included a brief introduction to ten additional topics as an appendix to the first volume, with the tacit understanding that eventually there might be a second volume containing the details. You are now holding that second volume. it turned out that even those ten topics would not fit Unfortunately, into a single book, so I was forced to make...
In the introduction to the first volume of The Arithmetic of Elliptic Curves (Springer-Verlag, 1986), I observed that "the theory of elliptic curves i...
In 1961 the second author deliv1lred a series of lectures at Haverford Col- lege on the subject of "Rational Points on Cubic Curves. " These lectures, intended for junior and senior mathematics majors, were recorded, tran- scribed, and printed in mimeograph form. Since that time they have been widely distributed as photocopies of ever decreasing legibility, and por- tions have appeared in various textbooks (Husemoller 1], Chahal 1]), but they have never appeared in their entirety. In view of the recent inter- est in the theory of elliptic curves for subjects ranging from cryptogra- phy...
In 1961 the second author deliv1lred a series of lectures at Haverford Col- lege on the subject of "Rational Points on Cubic Curves. " These lectures,...
This title constitutes the thoroughly refereed post-proceedings of the International Conference on Cryptography and Lattices, CaLC 2001, held in Providence, RI, USA in March 2001. The 14 revised full papers presented together with an overview paper were carefully reviewed and selected for inclusion in the book. All aspects of lattices and lattice reduction in cryptography, both for cryptographic construction and cryptographic analysis, are addressed.
This title constitutes the thoroughly refereed post-proceedings of the International Conference on Cryptography and Lattices, CaLC 2001, held in Provi...
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern...
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signat...
This abstract algebra textbook takes an integrated approach that highlights the similarities of fundamental algebraic structures among a number of topics. The book begins by introducing groups, rings, vector spaces, and fields, emphasizing examples, definitions, homomorphisms, and proofs. The goal is to explain how all of the constructions fit into an axiomatic framework and to emphasize the importance of studying those maps that preserve the underlying algebraic structure. This fast-paced introduction is followed by chapters in which each of the four main topics is revisited and deeper...
This abstract algebra textbook takes an integrated approach that highlights the similarities of fundamental algebraic structures among a number of top...