CS60082/CS60094 Computational Number Theory Spring 2009

Prerequisites | Syllabus | References | Tests | Spring 08 | Spring 07 | Home

Slot: E (W 11:30-12:25, Th: 10:30-11:25, F: 08:30-10:25)
Venue: CSE 108
Teaching Assistant: Souvik Bhattacherjee
List of students

Undergraduate (BTech and Dual-degree) students should cancel registration for CS60082 (which has a 4-0-0 L-T-P loading due to database inconsistencies) and re-register for CS60094 (which has the correct 3-0-0 loading). Postgraduate (MTech, MS and PhD) should register for the course with the original number CS60082.

Prerequisites

I will mercilessly assume that a student registering for this course is equipped with rudimentary knowledge of discrete mathematical structures (groups, rings, fields), algorithms (design and analysis techniques), and probability. Students lacking one or more of these backgrounds may find the exposition difficult to follow. I will, under no circumstances, entertain requests to cover these elementary topics in this course. Note, however, that no prior acquaintance with number theory (elementary, analytic, or algebraic) is necessary for attending this course.

Syllabus

References

[1]      V. Shoup, A computational introduction to number theory and algebra, Cambridge University Press.
[2]      M. Mignotte, Mathematics for computer algebra, Springer-Verlag.
[3]      I. Niven, H. S. Zuckerman and H. L. Montgomery, An introduction to the theory of numbers, John Wiley.
[4]      J. von zur Gathen and J. Gerhard, Modern computer algebra, Cambridge University Press.
[5]      R. Lidl and H. Niederreiter, Introduction to finite fields and their applications, Cambridge University Press.
[6]      A. J. Menezes, editor, Applications of finite fields, Kluwer Academic Publishers.
[7]      J. H. Silverman and J. Tate, Rational points on elliptic curves, Springer International Edition.
[8]      D. R. Hankerson, A. J. Menezes and S. A. Vanstone, Guide to elliptic curve cryptography, Springer-Verlag.
[9]      A. Das and C. E. Veni Madhavan, Public-key cryptography: Theory and practice, Pearson Education Asia.
[10]      H. Cohen, A course in computational algebraic number theory, Springer-Verlag.

Exercises and tests

Prerequisites | Syllabus | References | Tests | Spring 08 | Spring 07 | Home