Elliptic Curves, Modular Forms and Cryptography
Author : Ashwani K. Bhandari
Publisher : Springer
Page : 339 pages
File Size : 12,51 MB
Release : 2003-07-15
Category : Mathematics
ISBN : 9386279150
Author : Ashwani K. Bhandari
Publisher : Springer
Page : 339 pages
File Size : 12,51 MB
Release : 2003-07-15
Category : Mathematics
ISBN : 9386279150
Author : Neal I. Koblitz
Publisher : Springer Science & Business Media
Page : 262 pages
File Size : 10,27 MB
Release : 2012-12-06
Category : Mathematics
ISBN : 1461209099
The theory of elliptic curves and modular forms provides a fruitful meeting ground for such diverse areas as number theory, complex analysis, algebraic geometry, and representation theory. This book starts out with a problem from elementary number theory and proceeds to lead its reader into the modern theory, covering such topics as the Hasse-Weil L-function and the conjecture of Birch and Swinnerton-Dyer. This new edition details the current state of knowledge of elliptic curves.
Author : Álvaro Lozano-Robledo
Publisher : American Mathematical Soc.
Page : 217 pages
File Size : 16,1 MB
Release : 2011
Category : Mathematics
ISBN : 0821852426
Many problems in number theory have simple statements, but their solutions require a deep understanding of algebra, algebraic geometry, complex analysis, group representations, or a combination of all four. The original simply stated problem can be obscured in the depth of the theory developed to understand it. This book is an introduction to some of these problems, and an overview of the theories used nowadays to attack them, presented so that the number theory is always at the forefront of the discussion. Lozano-Robledo gives an introductory survey of elliptic curves, modular forms, and $L$-functions. His main goal is to provide the reader with the big picture of the surprising connections among these three families of mathematical objects and their meaning for number theory. As a case in point, Lozano-Robledo explains the modularity theorem and its famous consequence, Fermat's Last Theorem. He also discusses the Birch and Swinnerton-Dyer Conjecture and other modern conjectures. The book begins with some motivating problems and includes numerous concrete examples throughout the text, often involving actual numbers, such as 3, 4, 5, $\frac{3344161}{747348}$, and $\frac{2244035177043369699245575130906674863160948472041} {8912332268928859588025535178967163570016480830}$. The theories of elliptic curves, modular forms, and $L$-functions are too vast to be covered in a single volume, and their proofs are outside the scope of the undergraduate curriculum. However, the primary objects of study, the statements of the main theorems, and their corollaries are within the grasp of advanced undergraduates. This book concentrates on motivating the definitions, explaining the statements of the theorems and conjectures, making connections, and providing lots of examples, rather than dwelling on the hard proofs. The book succeeds if, after reading the text, students feel compelled to study elliptic curves and modular forms in all their glory.
Author : Jan Hendrik Bruinier
Publisher : Springer Science & Business Media
Page : 273 pages
File Size : 31,38 MB
Release : 2008-02-10
Category : Mathematics
ISBN : 3540741194
This book grew out of three series of lectures given at the summer school on "Modular Forms and their Applications" at the Sophus Lie Conference Center in Nordfjordeid in June 2004. The first series treats the classical one-variable theory of elliptic modular forms. The second series presents the theory of Hilbert modular forms in two variables and Hilbert modular surfaces. The third series gives an introduction to Siegel modular forms and discusses a conjecture by Harder. It also contains Harder's original manuscript with the conjecture. Each part treats a number of beautiful applications.
Author : Henry McKean
Publisher : Cambridge University Press
Page : 300 pages
File Size : 20,92 MB
Release : 1999-08-13
Category : Mathematics
ISBN : 9780521658171
An introductory 1997 account in the style of the original discoverers, treating the fundamental themes even-handedly.
Author : Henri Darmon
Publisher : American Mathematical Soc.
Page : 146 pages
File Size : 21,21 MB
Release : 2004
Category : Mathematics
ISBN : 0821828681
The book surveys some recent developments in the arithmetic of modular elliptic curves. It places a special emphasis on the construction of rational points on elliptic curves, the Birch and Swinnerton-Dyer conjecture, and the crucial role played by modularity in shedding light on these two closely related issues. The main theme of the book is the theory of complex multiplication, Heegner points, and some conjectural variants. The first three chapters introduce the background and prerequisites: elliptic curves, modular forms and the Shimura-Taniyama-Weil conjecture, complex multiplication and the Heegner point construction. The next three chapters introduce variants of modular parametrizations in which modular curves are replaced by Shimura curves attached to certain indefinite quaternion algebras. The main new contributions are found in Chapters 7-9, which survey the author's attempts to extend the theory of Heegner points and complex multiplication to situations where the base field is not a CM field. Chapter 10 explains the proof of Kolyvagin's theorem, which relates Heegner points to the arithmetic of elliptic curves and leads to the best evidence so far for the Birch and Swinnerton-Dyer conjecture.
Author : Lawrence C. Washington
Publisher : CRC Press
Page : 533 pages
File Size : 34,60 MB
Release : 2008-04-03
Category : Computers
ISBN : 1420071475
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. With additional exercises, this edition offers more comprehensive coverage of the fundamental theory, techniques, and application
Author : Bas Edixhoven
Publisher : Princeton University Press
Page : 438 pages
File Size : 42,95 MB
Release : 2011-06-20
Category : Mathematics
ISBN : 0691142017
Modular forms are tremendously important in various areas of mathematics, from number theory and algebraic geometry to combinatorics and lattices. Their Fourier coefficients, with Ramanujan's tau-function as a typical example, have deep arithmetic significance. Prior to this book, the fastest known algorithms for computing these Fourier coefficients took exponential time, except in some special cases. The case of elliptic curves (Schoof's algorithm) was at the birth of elliptic curve cryptography around 1985. This book gives an algorithm for computing coefficients of modular forms of level one in polynomial time. For example, Ramanujan's tau of a prime number p can be computed in time bounded by a fixed power of the logarithm of p. Such fast computation of Fourier coefficients is itself based on the main result of the book: the computation, in polynomial time, of Galois representations over finite fields attached to modular forms by the Langlands program. Because these Galois representations typically have a nonsolvable image, this result is a major step forward from explicit class field theory, and it could be described as the start of the explicit Langlands program. The computation of the Galois representations uses their realization, following Shimura and Deligne, in the torsion subgroup of Jacobian varieties of modular curves. The main challenge is then to perform the necessary computations in time polynomial in the dimension of these highly nonlinear algebraic varieties. Exact computations involving systems of polynomial equations in many variables take exponential time. This is avoided by numerical approximations with a precision that suffices to derive exact results from them. Bounds for the required precision--in other words, bounds for the height of the rational numbers that describe the Galois representation to be computed--are obtained from Arakelov theory. Two types of approximations are treated: one using complex uniformization and another one using geometry over finite fields. The book begins with a concise and concrete introduction that makes its accessible to readers without an extensive background in arithmetic geometry. And the book includes a chapter that describes actual computations.
Author : John William Scott Cassels
Publisher : Cambridge University Press
Page : 148 pages
File Size : 19,9 MB
Release : 1991-11-21
Category : Mathematics
ISBN : 9780521425308
A self-contained introductory text for beginning graduate students that is contemporary in approach without ignoring historical matters.
Author : Andreas Enge
Publisher : Springer Science & Business Media
Page : 184 pages
File Size : 37,31 MB
Release : 1999-08-31
Category : Computers
ISBN : 0792385896
Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems. Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the elegant mathematical theory underlying cryptosystems is considerably more involved than for other systems, this text requires the reader to have only an elementary knowledge of basic algebra. The text nevertheless leads to problems at the forefront of current research, featuring chapters on point counting algorithms and security issues. The Adopted unifying approach treats with equal care elliptic curves over fields of even characteristic, which are especially suited for hardware implementations, and curves over fields of odd characteristic, which have traditionally received more attention. Elliptic Curves and Their Applications: An Introduction has been used successfully for teaching advanced undergraduate courses. It will be of greatest interest to mathematicians, computer scientists, and engineers who are curious about elliptic curve cryptography in practice, without losing the beauty of the underlying mathematics.