You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Diophantine number theory is an active area that has seen tremendous growth over the past century, and in this theory unit equations play a central role. This comprehensive treatment is the first volume devoted to these equations. The authors gather together all the most important results and look at many different aspects, including effective results on unit equations over number fields, estimates on the number of solutions, analogues for function fields and effective results for unit equations over finitely generated domains. They also present a variety of applications. Introductory chapters provide the necessary background in algebraic number theory and function field theory, as well as an account of the required tools from Diophantine approximation and transcendence theory. This makes the book suitable for young researchers as well as experts who are looking for an up-to-date overview of the field.
This book provides the first thorough treatment of effective results and methods for Diophantine equations over finitely generated domains. Compiling diverse results and techniques from papers written in recent decades, the text includes an in-depth analysis of classical equations including unit equations, Thue equations, hyper- and superelliptic equations, the Catalan equation, discriminant equations and decomposable form equations. The majority of results are proved in a quantitative form, giving effective bounds on the sizes of the solutions. The necessary techniques from Diophantine approximation and commutative algebra are all explained in detail without requiring any specialized knowledge on the topic, enabling readers from beginning graduate students to experts to prove effective finiteness results for various further classes of Diophantine equations.
The first comprehensive and up-to-date account of discriminant equations and their applications. For graduate students and researchers.
The 13 chapters of this book centre around the proof of Theorem 1 of Faltings' paper "Diophantine approximation on abelian varieties", Ann. Math.133 (1991) and together give an approach to the proof that is accessible to Ph.D-level students in number theory and algebraic geometry. Each chapter is based on an instructional lecture given by its author ata special conference for graduate students, on the topic of Faltings' paper.
This book contains the proceedings of the EUROCRYPT '87 conference, a workshop on theory and applications of cryptographic techniques held at Amsterdam, April 1987. 26 papers were selected from over twice that number submitted to the program committee. The authors come from Europe, North America, and Japan and represent some of the leading research groups working in the fields of cryptography and data security. The subjects covered include sequences and linear complexity; hardware considerations, including random sources, physical security, and cryptographic algorithm implementation; topics in public key cryptography; authentication and secure transactions; hash functions and signatures; and the theory and application of symmetric ciphers.
The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.
Three major branches of number theory are included in the volume: namely analytic number theory, algebraic number theory, and transcendental number theory. Original research is presented that discusses modern techniques and survey papers from selected academic scholars.
The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.
The mid-1990ssaw an exciting convergenceof a number of dieren t information protection technologies, whose theme was the hiding (as opposed to encryption) of information. Copyright marking schemes are about hiding either copyright notices or individual serial numbers imperceptibly in digital audio and video, as a component in intellectual property protection systems; anonymous c- munication is another area of rapid growth, with people designing systems for electronic cash, digital elections, and privacy in mobile communications; se- rity researchers are also interested in ‘stray’ communication channels, such as those which arise via shared resourcesin operating systems or the physical le...
Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.