Academic literature on the topic 'Algorithmic number theory'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Algorithmic number theory.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Algorithmic number theory"
Schoof, Ren\'e. "Book Review: Algorithmic algebraic number theory." Bulletin of the American Mathematical Society 29, no. 1 (July 1, 1993): 111–14. http://dx.doi.org/10.1090/s0273-0979-1993-00392-6.
Full textW., H. C., and Michael Pohst. "Algorithmic Methods in Algebra and Number Theory." Mathematics of Computation 55, no. 192 (October 1990): 876. http://dx.doi.org/10.2307/2008461.
Full textGilman, Robert. "Algorithmic search in group theory." Journal of Algebra 545 (March 2020): 237–44. http://dx.doi.org/10.1016/j.jalgebra.2019.08.021.
Full textRoman’kov, V. A. "Algorithmic theory of solvable groups." Prikladnaya Diskretnaya Matematika, no. 52 (2021): 16–64. http://dx.doi.org/10.17223/20710410/52/2.
Full textHofmann, Tommy, and Carlo Sircana. "On the computation of overorders." International Journal of Number Theory 16, no. 04 (December 6, 2019): 857–79. http://dx.doi.org/10.1142/s179304212050044x.
Full textCremona, J. E. "ALGORITHMIC ALGEBRAIC NUMBER THEORY (Encyclopedia of Mathematics and its Applications)." Bulletin of the London Mathematical Society 23, no. 1 (January 1991): 94–97. http://dx.doi.org/10.1112/blms/23.1.94.
Full textBaumslag, Gilbert, Frank B. Cannonito, Derek J. S. Robinson, and Dan Segal. "The algorithmic theory of polycyclic-by-finite groups." Journal of Algebra 142, no. 1 (September 1991): 118–49. http://dx.doi.org/10.1016/0021-8693(91)90221-s.
Full textUshakov, Alexander. "Algorithmic theory of free solvable groups: Randomized computations." Journal of Algebra 407 (June 2014): 178–200. http://dx.doi.org/10.1016/j.jalgebra.2014.02.014.
Full textMöhring, Rolf H. "Algorithmic graph theory and perfect graphs." Order 3, no. 2 (June 1986): 207–8. http://dx.doi.org/10.1007/bf00390110.
Full textBalakrishnan, Jennifer S. "Coleman integration for even-degree models of hyperelliptic curves." LMS Journal of Computation and Mathematics 18, no. 1 (2015): 258–65. http://dx.doi.org/10.1112/s1461157015000029.
Full textDissertations / Theses on the topic "Algorithmic number theory"
Smith, Benjamin Andrew. "Explicit endomorphisms and correspondences." University of Sydney, 2006. http://hdl.handle.net/2123/1066.
Full textIn this work, we investigate methods for computing explicitly with homomorphisms (and particularly endomorphisms) of Jacobian varieties of algebraic curves. Our principal tool is the theory of correspondences, in which homomorphisms of Jacobians are represented by divisors on products of curves. We give families of hyperelliptic curves of genus three, five, six, seven, ten and fifteen whose Jacobians have explicit isogenies (given in terms of correspondences) to other hyperelliptic Jacobians. We describe several families of hyperelliptic curves whose Jacobians have complex or real multiplication; we use correspondences to make the complex and real multiplication explicit, in the form of efficiently computable maps on ideal class representatives. These explicit endomorphisms may be used for efficient integer multiplication on hyperelliptic Jacobians, extending Gallant--Lambert--Vanstone fast multiplication techniques from elliptic curves to higher dimensional Jacobians. We then describe Richelot isogenies for curves of genus two; in contrast to classical treatments of these isogenies, we consider all the Richelot isogenies from a given Jacobian simultaneously. The inter-relationship of Richelot isogenies may be used to deduce information about the endomorphism ring structure of Jacobian surfaces; we conclude with a brief exploration of these techniques.
Smith, Benjamin Andrew. "Explicit endomorphisms and correspondences." Thesis, The University of Sydney, 2005. http://hdl.handle.net/2123/1066.
Full textPellet--Mary, Alice. "Réseaux idéaux et fonction multilinéaire GGH13." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEN048/document.
Full textLattice-based cryptography is a promising area for constructing cryptographic primitives that are plausibly secure even in the presence of quantum computers. A fundamental problem related to lattices is the shortest vector problem (or SVP), which asks to find a shortest non-zero vector in a lattice. This problem is believed to be intractable, even quantumly. Structured lattices, for example ideal lattices or module lattices (the latter being a generalization of the former), are often used to improve the efficiency of lattice-based primitives. The security of most of the schemes based on structured lattices is related to SVP in module lattices, and a very small number of schemes can also be impacted by SVP in ideal lattices.In this thesis, we first focus on the problem of finding short vectors in ideal and module lattices.We propose an algorithm which, after some exponential pre-computation, performs better on ideal lattices than the best known algorithm for arbitrary lattices. We also present an algorithm to find short vectors in rank 2 modules, provided that we have access to some oracle solving the closest vector problem in a fixed lattice. The exponential pre-processing time and the oracle call make these two algorithms unusable in practice.The main scheme whose security might be impacted by SVP in ideal lattices is the GGH13multilinear map. This protocol is mainly used today to construct program obfuscators, which should render the code of a program unintelligible, while preserving its functionality. In a second part of this thesis, we focus on the GGH13 map and its application to obfuscation. We first study the impact of statistical attacks on the GGH13 map and on its variants. We then study the security of obfuscators based on the GGH13 map and propose a quantum attack against multiple such obfuscators. This quantum attack uses as a subroutine an algorithm to find a short vector in an ideal lattice related to a secret element of the GGH13 map
Varescon, Firmin. "Calculs explicites en théorie d'Iwasawa." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2019/document.
Full textIn the first chapter of this thesis we explain Leopoldt's conjecture and some equivalent formulations. Then we give an algorithm that checks this conjecture for a given prime p and a number field. Next we assume that this conjecture is true, and we study the torsion part of the Galois group of the maximal abelian p-ramified p-extension of a given number field. We present a method to compute the invariant factors of this finite group. In the third chapter we give an interpretation of our numrical result by heuristics “à la” Cohen-Lenstra. In the fourth and last chapter, using our algorithm which computes this torsion submodule, we give new examples of numbers fields which satisfy Greenberg's conjecture
Shoup, Victor. "Removing randomness from computational number theory." Madison, Wis. : University of Wisconsin-Madison, Computer Sciences Dept, 1989. http://catalog.hathitrust.org/api/volumes/oclc/20839526.html.
Full textViu, Sos Juan. "Periods and line arrangements : contributions to the Kontsevich-Zagier period conjecture and to the Terao conjecture." Thesis, Pau, 2015. http://www.theses.fr/2015PAUU3022/document.
Full textThe first part concerns a problem of number theory, for which we develop a geometrical approach based on tools coming from algebraic geometry and combinatorial geometry. Introduced by M. Kontsevich and D. Zagier in 2001, periods are complex numbers expressed as values of integrals of a special form, where both the domain and the integrand are expressed using polynomials with rational coefficients. The Kontsevich-Zagier period conjecture affirms that any polynomial relation between periods can be obtained by linear relations between their integral representations, expressed by classical rules of integral calculus. Using resolution of singularities, we introduce a semi-canonical reduction for periods focusing on give constructible and algorithmic methods respecting the classical rules of integral transformations: we prove that any non-zero real period, represented by an integral, can be expressed up to sign as the volume of a compact semi-algebraic set. The semi-canonical reduction permit a reformulation of the Kontsevich-Zagier conjecture in terms of volume-preserving change of variables between compact semi-algebraic sets. Via triangulations and methods of PL–geometry, we study the obstructions of this approach as a generalization of the Third Hilbert Problem. We complete the works of J. Wan to develop a degree theory for periods based on the minimality of the ambient space needed to obtain such a compact reduction, this gives a first geometric notion of transcendence of periods. We extend this study introducing notions of geometric and arithmetic complexities for periods based in the minimal polynomial complexity among the semi-canonical reductions of a period. The second part deals with the understanding of particular objects coming from algebraic geometry with a strong background in combinatorial geometry, for which we develop a dynamical approach. The logarithmic vector fields are an algebraic-analytic tool used to study sub-varieties and germs of analytic manifolds. We are concerned with the case of line arrangements in the affine or projective space. One is interested to study how the combinatorial data of the arrangement determines relations between its associated logarithmic vector fields: this problem is known as the Terao conjecture. We study the module of logarithmic vector fields of an affine line arrangement by the filtration induced by the degree of the polynomial components. We determine that there exist only two types of non-trivial polynomial vector fields fixing an infinitely many lines. Then, we describe the influence of the combinatorics of the arrangement on the expected minimal degree for these kind of vector fields. We prove that the combinatorics do not determine the minimal degree of the logarithmic vector fields of an affine line arrangement, giving two pair of counter-examples, each pair corresponding to a different notion of combinatorics. We determine that the dimension of the filtered spaces follows a quadratic growth from a certain degree, depending only on the combinatorics of the arrangements. We illustrate these formula by computations over some examples. In order to study computationally these filtration, we develop a library of functions in the mathematical software Sage
Lezowski, Pierre. "Questions d’euclidianité." Thesis, Bordeaux 1, 2012. http://www.theses.fr/2012BOR14642/document.
Full textWe study norm-Euclideanity of number fields and some of its generalizations. In particular, we provide an algorithm to compute the Euclidean minimum of a number field of any signature. This allows us to study the norm-Euclideanity of many number fields. Then, we extend this algorithm to deal with norm-Euclidean classes and we obtain new examples of number fields with a non-principal norm-Euclidean class. Besides, we describe the complete list of pure cubic number fields admitting a norm-Euclidean class. Finally, we study the Euclidean property in quaternion fields. First, we establish its basic properties, then we study some examples. We provide the complete list of Euclidean quaternion fields, which are totally definite over a number field with degree at most two
Molin, Pascal. "Intégration numérique et calculs de fonctions L." Phd thesis, Université Sciences et Technologies - Bordeaux I, 2010. http://tel.archives-ouvertes.fr/tel-00537489.
Full textColes, Jonathan. "Algorithms for bounding Folkman numbers /." Online version of thesis, 2005. https://ritdml.rit.edu/dspace/handle/1850/2765.
Full textDomingues, Riaal. "A polynomial time algorithm for prime recognition." Diss., Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-08212007-100529.
Full textBooks on the topic "Algorithmic number theory"
Eric, Bach. Algorithmic number theory. Cambridge, Mass: MIT Press, 1996.
Find full textHanrot, Guillaume, François Morain, and Emmanuel Thomé, eds. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14518-6.
Full textBuhler, Joe P., ed. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0054849.
Full textHess, Florian, Sebastian Pauli, and Michael Pohst, eds. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11792086.
Full textvan der Poorten, Alfred J., and Andreas Stein, eds. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-79456-1.
Full textFieker, Claus, and David R. Kohel, eds. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45455-1.
Full textBuell, Duncan, ed. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/b98210.
Full textBosma, Wieb, ed. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/10722028.
Full textAdleman, Leonard M., and Ming-Deh Huang, eds. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994. http://dx.doi.org/10.1007/3-540-58691-1.
Full textCohen, Henri, ed. Algorithmic Number Theory. Berlin, Heidelberg: Springer Berlin Heidelberg, 1996. http://dx.doi.org/10.1007/3-540-61581-4.
Full textBook chapters on the topic "Algorithmic number theory"
Yan, Song Y. "Algorithmic Number Theory." In Number Theory for Computing, 139–258. Berlin, Heidelberg: Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/978-3-662-04053-9_2.
Full textYan, Song Y. "Computational/Algorithmic Number Theory." In Number Theory for Computing, 173–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/978-3-662-04773-6_2.
Full textGilbert, Hugo, Olivier Spanjaard, Paolo Viappiani, and Paul Weng. "Reducing the Number of Queries in Interactive Value Iteration." In Algorithmic Decision Theory, 139–52. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23114-3_9.
Full textMichler, Gerhard O. "High Performance Computations in Group Representation Theory." In Algorithmic Algebra and Number Theory, 399–415. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_20.
Full textBuchmann, Johannes, Michael J. Jacobson, Stefan Neis, Patrick Theobald, and Damian Weber. "Sieving Methods for Class Group Computation." In Algorithmic Algebra and Number Theory, 3–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_1.
Full textDecker, Wolfram, Gert-Martin Greuel, and Gerhard Pfister. "Primary Decomposition: Algorithms and Comparisons." In Algorithmic Algebra and Number Theory, 187–220. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_10.
Full textDolzmann, Andreas, Thomas Sturm, and Volker Weispfenning. "Real Quantifier Elimination in Practice." In Algorithmic Algebra and Number Theory, 221–47. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_11.
Full textKemper, Gregor. "Hilbert Series and Degree Bounds in Invariant Theory." In Algorithmic Algebra and Number Theory, 249–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_12.
Full textKemper, Gregor, and Gunter Malle. "Invariant Rings and Fields of Finite Groups." In Algorithmic Algebra and Number Theory, 265–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_13.
Full textMartin, Bernd. "Computing Versal Deformations with Singular." In Algorithmic Algebra and Number Theory, 283–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-642-59932-3_14.
Full textConference papers on the topic "Algorithmic number theory"
Gamarnik, David, and Eren C. Kizildag. "The Random Number Partitioning Problem: Overlap Gap Property and Algorithmic Barriers." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834647.
Full textRyabko, Boris. "Application of algorithmic information theory to calibrate tests of random number generators." In 2021 XVII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY). IEEE, 2021. http://dx.doi.org/10.1109/redundancy52534.2021.9606440.
Full textA. N., Rybalov. "GENERIC COMPLEXITY OF ALGORITHMIC PROBLEMS." In Mechanical Science and Technology Update. Omsk State Technical University, 2022. http://dx.doi.org/10.25206/978-5-8149-3453-6-2022-10-14.
Full textPődör, Lea. "Can Robot Judges Solve the So-Called “Hard Cases”?" In COFOLA International 2022. Brno: Masaryk University Press, 2022. http://dx.doi.org/10.5817/cz.muni.p280-0231-2022-16.
Full textKrus, Petter. "An Information Theoretical Perspective on Performance, Refinement and Cost." In ASME 2005 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2005. http://dx.doi.org/10.1115/detc2005-85403.
Full textEscanaverino, Jose Martinez, Jose A. Llamos Soriz, Alejandra Garcia Toll, and Tania Ortiz Cardenas. "Rational Design Automation by Dichromatic Graphs." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/dac-21050.
Full textOohama, Y. "Explicit expression of the interval algorithm for random number generation based on number systems." In IEEE Information Theory Workshop, 2005. IEEE, 2005. http://dx.doi.org/10.1109/itw.2005.1531878.
Full textYao, Bin, Shiying Kang, Xiao Zhao, Yuyan Chao, and Lifeng He. "A graph-theory-based Euler number computing algorithm." In 2015 IEEE International Conference on Information and Automation (ICIA). IEEE, 2015. http://dx.doi.org/10.1109/icinfa.2015.7279470.
Full textvan Dam, Wim, and Yoshitaka Sasaki. "QUANTUM ALGORITHMS FOR PROBLEMS IN NUMBER THEORY, ALGEBRAIC GEOMETRY, AND GROUP THEORY." In Summer School on Diversities in Quantum Computation/Information. WORLD SCIENTIFIC, 2012. http://dx.doi.org/10.1142/9789814425988_0003.
Full textKobylkin, Konstantin. "Complexity and approximability for a problem of intersecting of proximity graphs with minimum number of equal disks." In NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS (NUMTA–2016): Proceedings of the 2nd International Conference “Numerical Computations: Theory and Algorithms”. Author(s), 2016. http://dx.doi.org/10.1063/1.4965392.
Full textReports on the topic "Algorithmic number theory"
Horrocks, Ian, Ulrike Sattler, and Stephan Tobies. A Description Logic with Transitive and Converse Roles, Role Hierarchies and Qualifying Number Restrictions. Aachen University of Technology, 1999. http://dx.doi.org/10.25368/2022.94.
Full textTabunov, I. A., T. N. Mikhalenko, L. D. Kuznetsova, A. V. Suetova, and M. A. Shilovskiy. METHODOLOGICAL RECOMMENDATIONS FOR WORKING WITH CHILDREN IN A SOCIALLY DANGEROUS SITUATION. Cherepovets State University, December 2022. http://dx.doi.org/10.12731/er0619.03122022.
Full textKirichek, Galina, Vladyslav Harkusha, Artur Timenko, and Nataliia Kulykovska. System for detecting network anomalies using a hybrid of an uncontrolled and controlled neural network. [б. в.], February 2020. http://dx.doi.org/10.31812/123456789/3743.
Full textLee, W. S., Victor Alchanatis, and Asher Levi. Innovative yield mapping system using hyperspectral and thermal imaging for precision tree crop management. United States Department of Agriculture, January 2014. http://dx.doi.org/10.32747/2014.7598158.bard.
Full textKhrushch, Nila, Pavlo Hryhoruk, Tetiana Hovorushchenko, Sergii Lysenko, Liudmyla Prystupa, and Liudmyla Vahanova. Assessment of bank's financial security levels based on a comprehensive index using information technology. [б. в.], October 2020. http://dx.doi.org/10.31812/123456789/4474.
Full textKuznetsov, Victor, Vladislav Litvinenko, Egor Bykov, and Vadim Lukin. A program for determining the area of the object entering the IR sensor grid, as well as determining the dynamic characteristics. Science and Innovation Center Publishing House, April 2021. http://dx.doi.org/10.12731/bykov.0415.15042021.
Full textVisser, R., H. Kao, R. M. H. Dokht, A. B. Mahani, and S. Venables. A comprehensive earthquake catalogue for northeastern British Columbia: the northern Montney trend from 2017 to 2020 and the Kiskatinaw Seismic Monitoring and Mitigation Area from 2019 to 2020. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/329078.
Full textWisniewski, Michael, Samir Droby, John Norelli, Dov Prusky, and Vera Hershkovitz. Genetic and transcriptomic analysis of postharvest decay resistance in Malus sieversii and the identification of pathogenicity effectors in Penicillium expansum. United States Department of Agriculture, January 2012. http://dx.doi.org/10.32747/2012.7597928.bard.
Full textRankin, Nicole, Deborah McGregor, Candice Donnelly, Bethany Van Dort, Richard De Abreu Lourenco, Anne Cust, and Emily Stone. Lung cancer screening using low-dose computed tomography for high risk populations: Investigating effectiveness and screening program implementation considerations: An Evidence Check rapid review brokered by the Sax Institute (www.saxinstitute.org.au) for the Cancer Institute NSW. The Sax Institute, October 2019. http://dx.doi.org/10.57022/clzt5093.
Full textPayment Systems Report - June of 2021. Banco de la República, February 2022. http://dx.doi.org/10.32468/rept-sist-pag.eng.2021.
Full text