You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Invited articles by leading researchers explore various aspects of the parallel worlds of function fields and number fields Topics range from Arakelov geometry, the search for a theory of varieties over the field with one element, via Eisenstein series to Drinfeld modules, and t-motives Aimed at graduate students, mathematicians, and researchers interested in geometry and arithmetic and their connections
This volume contains the proceedings of the 13th $\mathrm{AGC^2T}$ conference, held March 14-18, 2011, in Marseille, France, together with the proceedings of the 2011 Geocrypt conference, held June 19-24, 2011, in Bastia, France. The original research articles contained in this volume cover various topics ranging from algebraic number theory to Diophantine geometry, curves and abelian varieties over finite fields and applications to codes, boolean functions or cryptography. The international conference $\mathrm{AGC^2T}$, which is held every two years in Marseille, France, has been a major event in the area of applied arithmetic geometry for more than 25 years.
The symposium "MEGA-90 - Effective Methods in Algebraic Geome try" was held in Castiglioncello (Livorno, Italy) in April 17-211990. The themes - we quote from the "Call for papers" - were the fol lowing: - Effective methods and complexity issues in commutative algebra, pro jective geometry, real geometry, algebraic number theory - Algebraic geometric methods in algebraic computing Contributions in related fields (computational aspects of group theory, differential algebra and geometry, algebraic and differential topology, etc.) were also welcome. The origin and the motivation of such a meeting, that is supposed to be the first of a series, deserves to be explained. The subject - the theory and the practice of computation in alge braic geometry and related domains from the mathematical viewpoin- has been one of the themes of the symposia organized by SIGSAM (the Special Interest Group for Symbolic and Algebraic Manipulation of the Association for Computing Machinery), SAME (Symbolic and Algebraic Manipulation in Europe), and AAECC (the semantics of the name is vary ing; an average meaning is "Applied Algebra and Error Correcting Codes").
This book constitutes the refereed proceedings of the Second International Workshop on Coding and Cryptology, IWCC 2009, held in Zhangjiajie, China, in June 2009. The 21 revised full technical papers, except one, are contributed by the invited speakers of the workshop. The papers were carefully selected during two rounds of reviewing and improvement for inclusion in the volume and address all aspects of coding theory, cryptology and related areas - such as combinatorics - theoretical or applied. Topics addressed are coding theory, secure codes, hash functions, combinatorics, boolean functions, authentication, cryptography, protocols, sequences, and secure communications.
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which was held in Lyon, France, in April 2023. The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge.
Intended for mathematics librarians, the list allows librarians to ascertain if a seminaire has been published, which library has it, and the forms of entry under which it has been cataloged.