2005

  1. Kanat Abdukhalikov, Unimodular Hermitian lattices, Mathematisches Forschungsinstitut Oberwolfach Report No. 1/2005 (2005), 27–30.
  2. Amod Agashe and William Stein, Visible evidence for the Birch and Swinnerton-Dyer conjecture for modular abelian varieties of analytic rank zero, Math. Comp. 74 (2005), no. 249, 455–484 (electronic).[MR]
  3. Scott Ahlgren and Ken Ono, Arithmetic of singular moduli and class polynomials, Compos. Math. 141 (2005), no. 2, 293–312.[MR]
  4. Toru Akishita, Masanobu Katagi, Izuru Kitamura, and Tsuyoshi Takagi, Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors, Information Security and Cryptology. ICISC 2004: 7th International Conference, Seoul, Korea, December 2–3, 2004, Lecture Notes in Comput. Sci., vol. 3506, Springer, Berlin, 2005, pp. 296.
  5. Sophie Ambrose, Matrix Groups: Theory, Algorithms and Applications, PhD Thesis, University of Western Australia, 2005.
  6. Sophie Ambrose, Max Neunhöffer, Cheryl E. Praeger, and Csaba Schneider, Generalised sifting in black-box groups, LMS J. Comput. Math. 8 (2005), 217–250 (electronic).[MR]
  7. Jianbei An and E. A. O'Brien, The Alperin and Uno conjectures for the Fischer simple group Fi22, Comm. Algebra 33 (2005), no. 5, 1529–1557.[MR]
  8. Marc A. Armand, List decoding of generalized Reed-Solomon codes over commutative rings, IEEE Trans. Inform. Theory 51 (2005), no. 1, 411–419.[MR]
  9. François Arnault and Thierry P. Berger, Design and properties of a new pseudorandom generator based on a filtered FCSR automaton, IEEE Trans. Comput 54 (2005), no. 11, 1374–1383.
  10. Joseph L. Awange and Erik W. Grafarend, Solving Algebraic Computational Problems in Geodesy and Geoinformatics, Springer-Verlag, Berlin, 2005, pp. xviii+333.[MR]
  11. David H. Bailey and Jonathan M. Borwein, Experimental mathematics: Examples, methods and implications, Notices Amer. Math. Soc. 52 (2005), no. 5, 502–514.[MR]
  12. Matthew H. Baker, Enrique González-Jiménez, Josep González, and Bjorn Poonen, Finiteness results for modular curves of genus at least 2, Amer. J. Math. 127 (2005), no. 6, 1325–1387.[MR]
  13. Ayala Bar-Ilan, Tzviya Berrebi, Genadi Chereshnya, Ruth Leabovich, Mikhal Cohen, and Mary Schaps, Explicit tilting complexes for the Broué conjecture on 3-blocks, vol. 1, Cambridge University Press, 2005, pp. 8.[link]
  14. Richard William Barraclough, Some calculations related to the monster group, PhD Thesis, University of Birmingham, 2005.
  15. Saugata Basu and Michael Kettner, Computing the Betti numbers of arrangements in practice, in Computer Algebra in Scientific Computing, Lecture Notes in Computer Science, vol. 3718, Springer Berlin/Heidelberg, 2005, pp. 13–31.
  16. Ingrid Bauer, Fabrizio Catanese, and Fritz Grunewald, Beauville surfaces without real structures, Geometric Methods in Algebra and Number Theory, Progr. Math., vol. 235, Birkhäuser Boston, Boston, MA, 2005, pp. 1–42.[MR]
  17. Mark Bauer, Edlyn Teske, and Annegret Weng, Point counting on Picard curves in large characteristic, Math. Comp. 74 (2005), no. 252, 1983–2005 (electronic).[MR]
  18. Philip Boalch, Some explicit solutions to the Riemann-Hilbert problem, preprint (2005), 24 pages.[arXiv]
  19. Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, and Consuelo Martínez, Weak keys in MST1, Des. Codes Cryptogr. 37 (2005), no. 3, 509–524.[MR]
  20. Alin Bostan, Thomas Cluzeau, and Bruno Salvy, Fast algorithms for polynomial solutions of linear differential equations, ISSAC'05: Proceedings of the 2005 International Symposium on Symbolic and Algebraic Computation, ACM, New York, 2005, pp. 45–52 (electronic).[MR]
  21. Nigel Boston, Reducing the Fontaine-Mazur conjecture to group theory, Progress in Galois theory, Dev. Math., vol. 12, Springer, New York, 2005, pp. 39–50.[MR]
  22. Mireille Boutin and Gregor Kemper, On reconstructing configurations of points in P2 from a joint distribution of invariants, Appl. Algebra Engrg. Comm. Comput. 15 (2005), no. 6, 361–391.[MR]
  23. An Braeken, Christopher Wolf, and Bart Preneel, A study of the security of unbalanced oil and vinegar signature schemes, Topics in Cryptology—CT-RSA 2005, Lecture Notes in Comput. Sci., vol. 3376, Springer, Berlin, 2005, pp. 29–43.[MR]
  24. John N. Bray, John S. Wilson, and Robert A. Wilson, A characterization of finite soluble groups by laws in two variables, Bull. London Math. Soc. 37 (2005), no. 2, 179–186.[MR]
  25. John Brevik and Michael E. O'Sullivan, The performance of LDPC codes with large girth, Preprint (2005), 13 pages.
  26. Friederike Brezing and Annegret Weng, Elliptic curves suitable for pairing based cryptography, Des. Codes Cryptogr. 37 (2005), no. 1, 133–141.[MR]
  27. Thomas Britz and Carrie G. Rutherford, Covering radii are not matroid invariants, Discrete Math. 296 (2005), no. 1, 117–120.[MR]
  28. Ezra Brown, Bruce T. Myers, and Jerome A. Solinas, Hyperelliptic curves with compact parameters, Des. Codes Cryptogr. 36 (2005), no. 3, 245–261.[MR]
  29. R. F. Brown, M. Furi, L. Górniewicz, and B. Jiang (eds.), Handbook of Topological Fixed Point Theory, Springer, Dordrecht, 2005, pp. x+971.[MR/link]
  30. Nils Bruin, The primitive solutions to x3+y9=z2, J. Number Theory 111 (2005), no. 1, 179–189.[MR]
  31. Nils Bruin and E. Victor Flynn, Towers of 2-covers of hyperelliptic curves, Trans. Amer. Math. Soc. 357 (2005), no. 11, 4329–4347 (electronic).[MR]
  32. Robert R. Bruner, Lê M. Hà, and Nguyên H. V. Hung, On the behavior of the algebraic transfer, Trans. Amer. Math. Soc. 357 (2005), no. 2, 473–487 (electronic).[MR]
  33. Anita Buckley and Balázs Szendröi, Orbifold Riemann-Roch for threefolds with an application to Calabi-Yau geometry, J. Algebraic Geom. 14 (2005), no. 4, 601–622.[MR]
  34. Francis Buekenhout, All geometries for the smallest sporadic groups, Mathematisches Forschungsinstitut Oberwolfach Report No. 12/2005 (2005), 685–687.
  35. Yann Bugeaud, Florian Luca, Maurice Mignotte, and Samir Siksek, On Fibonacci numbers with few prime divisors, Proc. Japan Acad. Ser. A Math. Sci. 81 (2005), no. 2, 17–20.[MR]
  36. Yann Bugeaud, Florian Luca, Maurice Mignotte, and Samir Siksek, On perfect powers in Lucas sequences, Int. J. Number Theory 1 (2005), no. 3, 309–332.[MR]
  37. J. Buhler and Z. Reichstein, Symmetric functions and the phase problem in crystallography, Trans. Amer. Math. Soc. 357 (2005), no. 6, 2353–2377 (electronic).[MR]
  38. Laurent Busé and Marc Chardin, Implicitizing rational hypersurfaces using approximation complexes, J. Symbolic Comput. 40 (2005), no. 4-5, 1150–1168.[MR]
  39. Kevin Buzzard, Questions about slopes of modular forms, Astérisque (2005), no. 298, 1–15.[MR]
  40. Kevin Buzzard and L. J. P. Kilford, The 2-adic eigencurve at the boundary of weight space, Compos. Math. 141 (2005), no. 3, 605–619.[MR]
  41. Bryden Cais, Serre's conjectures, Preprint (2005), 21 pages.[link]
  42. J. S. Calcut, Knot theory and the Casson invariant in the Artin presentation theory, Fundam. Prikl. Mat. 11 (2005), no. 4, 119–126.[MR]
  43. Peter J. Cameron, Partitions and permutations, Discrete Math. 291 (2005), no. 1-3, 45–54.[MR]
  44. John J. Cannon, Derek F. Holt, Michael Slattery, and Allan K. Steel, Computing subgroups of bounded index in a finite group, J. Symbol. Comput. 40 (2005), no. 2, 1013–1022.[MR]
  45. Robert Carls, Theta null points of 2-adic canonical lifts, preprint (2005), 18 pages.[arXiv]
  46. Jon F. Carlson, Coclass and cohomology, J. Pure Appl. Algebra 200 (2005), no. 3, 251–266.[MR]
  47. Jon F. Carlson, Cohomology, computations, and commutative algebra, Notices Amer. Math. Soc. 52 (2005), no. 4, 426–434.[MR]
  48. Jon F. Carlson and Jacques Thévenaz, The classification of torsion endo-trivial modules, Ann. of Math. (2) 162 (2005), no. 2, 823–883.[MR]
  49. Pierre Cartier, Combinatorics of trees, Surveys in modern mathematics, London Math. Soc. Lecture Note Ser., vol. 321, Cambridge Univ. Press, Cambridge, 2005, pp. 274–282.[MR]
  50. Denis Charles and Kristin Lauter, Computing modular polynomials, LMS J. Comput. Math. 8 (2005), 195–204 (electronic).[MR]
  51. Imin Chen, A Diophantine equation associated to X0(5), LMS J. Comput. Math. 8 (2005), 116–121 (electronic).[MR]
  52. Jiun-Ming Chen and Bo-Yin Yang, All in the XL family: theory and practice, Information Security and Cryptology. ICISC 2004: 7th International Conference, Seoul, Korea, December 2–3, 2004, Lecture Notes in Comput. Sci., vol. 3506, Springer, Berlin, 2005, pp. 296.
  53. Jiun-Ming Chen and Bo-Yin Yang, Building secure tame-like multivariate public-key cryptosystems: the new TTS, Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings, Lecture Notes in Comput. Sci., vol. 3574, Springer, Berlin, 2005, pp. 518.
  54. Kyo Il Chung, Mun-Kyu Lee, Kunsoo Park, and Tae Jun Park, Speeding up scalar multiplication in genus 2 hyperelliptic curves with efficient endomorphisms, ETRI 27 (2005), no. 5, 617–627.
  55. C. Cid, S. Murphy, and M. Robshaw, Small scale variants of the AES, in LNCS 3557, Eds. Gilbert, H. and Handschuh, H., Springer, 2005, pp. 145-162.
  56. Stephen D. Cohen, Finite field elements with specified order and traces, Des. Codes Cryptogr. 36 (2005), no. 3, 331–340.[MR]
  57. Marston Conder and Peter Dobcsányi, Applications and adaptations of the low index subgroups procedure, Math. Comp. 74 (2005), no. 249, 485–497 (electronic).[MR]
  58. Marston Conder and Colin Maclachlan, Compact hyperbolic 4-manifolds of small volume, Proc. Amer. Math. Soc. 133 (2005), no. 8, 2469–2476 (electronic).[MR]
  59. Marston Conder, Aleksander Malnič, Dragan Marušič, Tomaž Pisanski, and Primož Potočnik, The edge-transitive but not vertex-transitive cubic graph on 112 vertices, J. Graph Theory 50 (2005), no. 1, 25–42.[MR]
  60. B. Conrad, K. Conrad, and H. Helfgott, Root numbers and ranks in positive characteristic, Adv. Math. 198 (2005), no. 2, 684–731.[MR]
  61. Scott Contini and Igor E. Shparlinski, On Stern's attack against secret truncated linear congruential generators, Information Security and Privacy, Lecture Notes in Computer Science, vol. 3574, Springer Berlin / Heidelberg, 2005, pp. 52–60.
  62. Gunther Cornelissen, Thanases Pheidas, and Karim Zahidi, Division-ample sets and the Diophantine problem for rings of integers, J. Théor. Nombres Bordeaux 17 (2005), no. 3, 727–735.[MR]
  63. Antonio Cossidente and Tim Penttila, Hemisystems on the Hermitian surface, J. London Math. Soc. (2) 72 (2005), no. 3, 731–741.[MR]
  64. David A. Cox, John Little, and Donal O'Shea, Using Algebraic Geometry, Graduate Texts in Mathematics, vol. 185, Springer, New York, 2005, pp. xii+572.[MR]
  65. S. Cui, P. Duan, and C. W. Chan, A new method of building more non-supersingular elliptic curves, Computational Science and Its Applications, Lecture Notes in Comput. Sci., vol. 3481, Springer, Berlin, 2005, pp. 657.
  66. Craig Culbert and Gary L. Ebert, Circle geometry and three-dimensional subregular translation planes, Innov. Incidence Geom. 1 (2005), 3–18.[MR]
  67. Alexander A. Davydov, Giorgio Faina, Stefano Marcugini, and Fernanda Pambianco, Computer search in projective planes for the sizes of complete arcs, J. Geom. 82 (2005), no. 1-2, 50–62.[MR]
  68. Lassina Dembélé, Explicit computations of Hilbert modular forms on Q(√5), Experiment. Math. 14 (2005), no. 4, 457–466.[MR]
  69. Alice Devillers, A classification of finite partial linear spaces with a primitive rank 3 automorphism group of almost simple type, Innov. Incidence Geom. 2 (2005), 129–175.[MR]
  70. Francisco Diaz y Diaz, Jean-François Jaulent, Sebastian Pauli, Michael Pohst, and Florence Soriano-Gafiuk, A new algorithm for the computation of logarithmic l-class groups of number fields, Experiment. Math. 14 (2005), no. 1, 65–74.[MR]
  71. Claus Diem, Index calculus in class groups of plane curves of small degree, Preprint (2005), 43 pages.
  72. Luis V. Dieulefait, Solving Diophantine equations x4+y4=qzp, Acta Arith. 117 (2005), no. 3, 207–211.[MR]
  73. Marten van Dijk, Sebastian Egner, Marcus Greferath, and Alfred Wassermann, On two doubly even self-dual binary codes of length 160 and minimum weight 24, IEEE Trans. Inform. Theory 51 (2005), no. 1, 408–411.[MR]
  74. L. Di Martino, A. Previtali, and R. Radina, Sets of transvections generating subgroups isomorphic to special linear groups, Comm. Algebra 33 (2005), no. 6, 1663–1691.[MR]
  75. J. Ding, J. E. Gower, D. Schmidt, C. Wolf, and Z. Yin, Complexity estimates for the F4 attack on the perturbed Matsumoto-Imai cryptosystem, Cryptography and coding, Lecture Notes in Comput. Sci., vol. 3796, Springer, Berlin, 2005, pp. 262–277.[MR]
  76. Jintai Ding and Dieter Schmidt, Cryptanalysis of HFEv and internal perturbation of HFE, Public Key Cryptography—PKC 2005, Lecture Notes in Comput. Sci., vol. 3386, Springer, Berlin, 2005, pp. 288–301.[MR]
  77. Jean-Guillaume Dumas, Clément Pernet, and Zhendong Wan, Efficient computation of the characteristic polynomial, ISSAC'05: Proceedings of the 2005 International Symposium on Symbolic and Algebraic Computation, ACM, New York, 2005, pp. 140–147 (electronic).[MR/arXiv]
  78. Régis Dupont, Andreas Enge, and François Morain, Building curves with arbitrary small MOV degree over finite prime fields, J. Cryptology 18 (2005), no. 2, 79–89.[MR]
  79. Bettina Eick, Computational group theory, Jahresber. Deutsch. Math.-Verein. 107 (2005), no. 3, 155–170.[MR/link]
  80. Patrick Felke, Computing the uniformity of power mappings: a systematic approach with the multi-variate method over finite fields of odd characteristic, PhD Thesis, Ruhr Universität Bochum, 2005.
  81. D. L. Flannery and E. A. O'Brien, Linear groups of small degree over finite fields, Internat. J. Algebra Comput. 15 (2005), no. 3, 467–502.[MR]
  82. Robert Fraatz, Computation of maximal orders of cyclic extensions of function fields, PhD Thesis, Technischen Universtät Berlin, 2005.
  83. Philippe Gaborit and Oliver D. King, Linear constructions for DNA codes, Theoret. Comput. Sci. 334 (2005), no. 1-3, 99–113.[MR]
  84. Philippe Gaborit, Carmen-Simona Nedeloaia, and Alfred Wassermann, On the weight enumerators of duadic and quadratic residue codes, IEEE Trans. Inform. Theory 51 (2005), no. 1, 402–407.[MR]
  85. P. Gaudry, Fast genus 2 arithmetic based on theta functions, J. Ramanujan Math. Soc. (2005), no. 4, 20 pages.
  86. P. Gaudry and É. Schost, Modular equations for hyperelliptic curves, Math. Comp. 74 (2005), no. 249, 429–454 (electronic).[MR]
  87. Volker Gebhardt, A new approach to the conjugacy problem in Garside groups, J. Algebra 292 (2005), no. 1, 282–302.[MR]
  88. University of Georgia VIGRE Algebra Group, Varieties of nilpotent elements for simple Lie algebras. II. Bad primes, J. Algebra 292 (2005), no. 1, 65–99.[MR]
  89. S. Georgiou and C. Koukouvinos, Some results on orthogonal designs and Hadamard matrices, Int. J. Appl. Math. 17 (2005), no. 4, 433–443.[MR]
  90. Vladimir P. Gerdt, Involutive algorithms for computing Gröbner bases, Computational Commutative and Non-commutative Algebraic Geometry, NATO Sci. Ser. III Comput. Syst. Sci., vol. 196, IOS, Amsterdam, 2005, pp. 199–225.[MR/link]
  91. Eknath Ghate, Enrique González-Jiménez, and Jordi Quer, On the Brauer class of modular endomorphism algebras, Int. Math. Res. Not. (2005), no. 12, 701–723.[MR]
  92. Martine Girard and Leopoldo Kulesz, Computation of sets of rational points of genus-3 curves via the Demjanenko-Manin method, LMS J. Comput. Math. 8 (2005), 267–300 (electronic).[MR]
  93. Josep González, Jordi Guàrdia, and Victor Rotger, Abelian surfaces of GL2-type as Jacobians of curves, Acta Arith. 116 (2005), no. 3, 263–287.[MR]
  94. Neil A. Gordon, Trevor M. Jarvis, and Ron Shaw, Aspects of the linear groups GL(n,2), n < 7, J. Combin. Math. Combin. Comput. 53 (2005), 13–31.[MR]
  95. Aline Gouget, Hervé Sibert, Come Berbain, Nicolas Courtois, Blandine Debraize, and Chris Mitchell, Analysis of the bit-search generator and sequence compression techniques, in Fast Software Encryption, Lecture Notes in Computer Science, vol. 3557, Springer-Verlag, Berlin, 2005, pp. 196–214.
  96. Willem A. de Graaf, Classification of solvable Lie algebras, Experiment. Math. 14 (2005), no. 1, 15–25.[MR]
  97. R. Granger and F. Vercauteren, On the discrete logarithm problem on algebraic tori, Crypto 2005: 25th Annual International Cryptology Conference (Santa Barbara, Cal., Lecture Notes in Comput. Sci., vol. 3621, Springer, Berlin, 2005, pp. 66.
  98. Markus Grassl, Tomography of quantum states in small dimensions, in Proceedings of the Workshop on Discrete Tomography and its Applications, Electron. Notes Discrete Math., vol. 20, Elsevier, Amsterdam, 2005, pp. 151–164 (electronic).[MR]
  99. Markus Grassl and Martin Rötteler, Quantum block and convolutional codes from self-orthogonal product codes, in Proceedings 2005 IEEE International Symposium on Information Theory (ISIT 2005), 2005, pp. 1018-1022.[arXiv]
  100. Markus Grassl and Greg White, New codes from chains of quasi-cyclic codes, in IEEE International Symposium on Information Theory (ISIT), Adelaide, 2005.
  101. T. Aaron Gulliver, Masaaki Harada, Takuji Nishimura, and Patric R. J. Östergård, Near-extremal formally self-dual even codes of lengths 24 and 32, Des. Codes Cryptogr. 37 (2005), no. 3, 465–471.[MR]
  102. Nicolas Gürel, Extracting bits from coordinates of a point of an elliptic curve, IACR (2005), 9 pages.[eprint]
  103. K. Győry and Á. Pintér, Almost perfect powers in products of consecutive integers, Monatsh. Math. 145 (2005), no. 1, 19–33.[MR]
  104. K. Győry and Á. Pintér, Correction to the paper: "Almost perfect powers in products of consecutive integers", Monatsh. Math. 146 (2005), no. 4, 341.[MR]
  105. Farshid Hajir, On the Galois group of generalized Laguerre polynomials, J. Théor. Nombres Bordeaux 17 (2005), no. 2, 517–525.[MR]
  106. Farshid Hajir, Tame pro-p Galois groups: A survey of recent work, Arithmetic, Geometry and Coding Theory (AGCT 2003), Sémin. Congr., vol. 11, Soc. Math. France, Paris, 2005, pp. 111–124.[MR]
  107. Emmanuel Hallouin, Study and computation of a Hurwitz space and totally real PSL2(F8)-extensions of Q, J. Algebra 292 (2005), no. 1, 259–281.[MR]
  108. Timo Hanke, A twisted Laurent series ring that is a noncrossed product, Israel J. Math. 150 (2005), 199–203.[MR]
  109. Brian Hansen, Explicit computations supporting a generalization of Serre's conjecture, Master's Thesis, Brigham Young University, 2005.
  110. Masaaki Harada, On the self-dual F5-codes constructed from Hadamard matrices of order 24, J. Combin. Des. 13 (2005), no. 2, 152–156.[MR]
  111. Masaaki Harada, Masaaki Kitazume, Akihiro Munemasa, and Boris Venkov, On some self-dual codes and unimodular lattices in dimension 48, European J. Combin. 26 (2005), no. 5, 543–557.[MR]
  112. Masaaki Harada, Clement Lam, and Vladimir D. Tonchev, Symmetric (4,4)-nets and generalized Hadamard matrices over groups of order 4, Des. Codes Cryptogr. 34 (2005), no. 1, 71–87.[MR]
  113. Michael Ian Hartley and Dimitri Leemans, On the thin regular geometries of rank four for the Janko group J1, Innov. Incidence Geom. 1 (2005), 181–190.[MR]
  114. George Havas and M. R. Vaughan-Lee, 4-Engel groups are locally nilpotent, Internat. J. Algebra Comput. 15 (2005), no. 4, 649–682.[MR]
  115. F. Hess, Weil descent attacks, Advances in Elliptic Curve Cryptography, London Math. Soc. Lecture Note Ser., vol. 317, Cambridge Univ. Press, Cambridge, 2005, pp. 151–180.[MR]
  116. R. J. Higgs, The bad behavior of representation groups, J. Algebra Appl. 4 (2005), no. 2, 139–151.[MR]
  117. Derek F. Holt, Bettina Eick, and Eamonn A. O'Brien, Handbook of Computational Group Theory, Discrete Mathematics and its Applications (Boca Raton), Chapman &Hall/CRC, Boca Raton, FL, 2005, pp. xvi+514.[MR]
  118. Derek F. Holt and Colva M. Roney-Dougal, Constructing maximal subgroups of classical groups, LMS J. Comput. Math. 8 (2005), 46–79 (electronic).[MR]
  119. Naoyuki Horiguchi, Hiroyuki Nakasora, and Takehisa Wakabayashi, On the strongly regular graphs obtained from quasi-symmetric 2-(31,7,7) designs, Bull. Yamagata Univ. Natur. Sci. 16 (2005), no. 1, 1–6.[MR]
  120. Everett W. Howe, Infinite families of pairs of curves over Q with isomorphic Jacobians, J. London Math. Soc. (2) 72 (2005), no. 2, 327–350.[MR]
  121. Everett W. Howe, Kristin E. Lauter, and Jaap Top, Pointless curves of genus three and four, Arithmetic, Geometry and Coding Theory (AGCT 2003), Sémin. Congr., vol. 11, Soc. Math. France, Paris, 2005, pp. 125–141.[MR]
  122. Xinchuan Huang, Bastiaan J. Braams, and Joel M. Bowman, Ab initio potential energy and dipole moment surfaces for H5O2+, J. Chem. Phys 122 (2005), no. 044308, 12 pages.
  123. Klaus Hulek and Helena Verrill, On modularity of rigid and nonrigid Calabi-Yau varieties associated to the root lattice A4, Nagoya Math. J. 179 (2005), 103–146.[MR]
  124. Klaus Hulek and Helena A. Verrill, On the motive of Kummer varieties associated to Γ1(7)— Supplement to the paper: "The modularity of certain non-rigid Calabi-Yau threefolds" by R. Livné and N. Yui, J. Math. Kyoto Univ. 45 (2005), no. 4, 667–681.[MR/link]
  125. Alexander Hulpke, Constructing transitive permutation groups, J. Symbolic Comput. 39 (2005), no. 1, 1–30.[MR]
  126. I. M. Isaacs and Dikran B. Karagueuzian, Involutions and characters of upper triangular matrix groups, Math. Comp. 74 (2005), no. 252, 2027–2033 (electronic).[MR]
  127. G. Jäger, Reduction of Smith normal form transformation matrices, Computing 74 (2005), no. 4, 377–388.[MR]
  128. Christoph Jansen, The minimal degrees of faithful representations of the sporadic simple groups and their covering groups, LMS J. Comput. Math. 8 (2005), 122–144 (electronic).[MR]
  129. Mikael Johansson, Computation of Poincaré-Betti series for monomial rings, Rend. Istit. Mat. Univ. Trieste 37 (2005), no. 1-2, 85–94 (2006).[MR]
  130. Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, and Pierre-Michel Ricordel, Cryptanalysis of the tractable rational map cryptosystem, Public Key Cryptography—PKC 2005, Lecture Notes in Comput. Sci., vol. 3386, Springer, Berlin, 2005, pp. 258–274.[MR]
  131. David Joyner and Amy Ksir, Modular representations on some Riemann-Roch spaces of modular curves X(N), Computational Aspects of Algebraic Curves, Lecture Notes Ser. Comput., vol. 13, World Sci. Publ., Hackensack, NJ, 2005, pp. 163–205.[MR]
  132. David Joyner and William Stein, SAGE: System for algebra and geometry experimentation, SIGSAM Bull. 39 (2005), no. 2, 61–64.
  133. Sadok Kallel and Denis Sjerve, On the group of automorphisms of cyclic covers of the Riemann sphere, Math. Proc. Cambridge Philos. Soc. 138 (2005), no. 2, 267–287.[MR]
  134. Kiran S. Kedlaya, Computing zeta functions of surfaces, Mathematisches Forschungsinstitut Oberwolfach Report 32 (2005), 1808–1810.
  135. J. D. Key, T. P. McDonough, and V. C. Mavron, Partial permutation decoding for codes from finite planes, European J. Combin. 26 (2005), no. 5, 665–682.[MR]
  136. J. D. Key, J. Moori, and B. G. Rodrigues, Some binary codes from symplectic geometry of odd characteristic, Util. Math. 67 (2005), 121–128.[MR]
  137. Masanari Kida, Kummer theory for norm algebraic tori, J. Algebra 293 (2005), no. 2, 427–447.[MR]
  138. Jennifer de Kleine, Michael Monagan, and Allan Wittkopf, Algorithms for the non-monic case of the sparse modular GCD algorithm, Proceedings of the 2005 International Symposium on Symbolic and Algebraic Computation: ISSAC'05, ACM, New York, 2005, pp. 124–131 (electronic).[MR]
  139. Ingo Herbert Klöcker, Modular forms for the orthogonal group O(2,5), PhD Thesis, 2005.
  140. Jürgen Klüners and Sebastian Pauli, Computing residue class rings and Picard groups of orders, J. Algebra 292 (2005), no. 1, 47–64.[MR]
  141. Martin Kohls, Invarianten zusammenhaengender gruppen und die Cohen-Macaulay eigenschaft, Master's Thesis, Technische Universitaet Muechen, 2005.
  142. Kenji Koike and Annegret Weng, Construction of CM Picard curves, Math. Comp. 74 (2005), no. 249, 499–518 (electronic).[MR]
  143. Marjeta Kramar, The structure of irreducible matrix groups with submultiplicative spectrum, Linear Multilinear Algebra 53 (2005), no. 1, 13–25.[MR]
  144. A. Krieg, The graded ring of quaternionic modular forms of degree 2, Math. Z. 251 (2005), no. 4, 929–942.[MR]
  145. P. H. Kropholler, S. Mohseni Rajaei, and J. Segal, Invariant rings of orthogonal groups over \bf F2, Glasg. Math. J. 47 (2005), no. 1, 7–54.[MR]
  146. M. Künzer and H. Weber, Some additive Galois cohomology rings, Comm. Algebra 33 (2005), no. 12, 4415–4455.[MR]
  147. Matthias Künzer and Andrew Mathas, Elementary divisors of Specht modules, European J. Combin. 26 (2005), no. 6, 943–964.[MR]
  148. Matthias Künzer and Eduard Wirsing, On coefficient valuations of Eisenstein polynomials, J. Théor. Nombres Bordeaux 17 (2005), no. 3, 801–823.[MR]
  149. K. Kutnar, A. Malnič, and Dragan Marušič, Chirality of toroidal molecular graphs, J. Chem. Inf. Model. 45 (2005), no. 6, 1527-1535.[MR]
  150. Jeffrey C. Lagarias and Eric Rains, Dynamics of a family of piecewise-linear area-preserving plane maps. II. Invariant circles, J. Difference Equ. Appl. 11 (2005), no. 13, 1137–1163.[MR/link]
  151. Tanja Lange, Formulae for arithmetic on genus 2 hyperelliptic curves, Appl. Algebra Engrg. Comm. Comput. 15 (2005), no. 5, 295–328.[MR]
  152. Tanja Lange and Marc Stevens, Efficient doubling on genus two curves over binary fields, Selected Areas in Cryptography, Lecture Notes in Comput. Sci., vol. 3357, Springer, Berlin, 2005, pp. 170–181.[MR]
  153. Sonja Lauer, Entwurf von Algorithmen zur Konstruktion von Differentialgleichungen mit vorgegebener endlicher Galoisgruppe, Master's Thesis, Universität Karlsruhe, 2005.
  154. Dimitri Leemans, A generalization of a construction due to Van Nypelseer, Beiträge Algebra Geom. 46 (2005), no. 2, 561–574.[MR]
  155. Dimitri Leemans, The residually weakly primitive geometries of HS, Australas. J. Combin. 33 (2005), 231–236.[MR]
  156. Dimitri Leemans, Two rank six geometries for the Higman-Sims sporadic group, Discrete Math. 294 (2005), no. 1-2, 123–132.[MR]
  157. Wolfgang Lempken and Tran van Trung, On minimal logarithmic signatures of finite groups, Experiment. Math. 14 (2005), no. 3, 257–269.[MR]
  158. Chong Jie Lim, Consta-abelian polyadic codes, IEEE Trans. Inform. Theory 51 (2005), no. 6, 2198–2206.[MR]
  159. Mark Lingham, Modular Forms and Elliptic Curves over Imaginary Quartic Fields, PhD Thesis, University of Nottingham, 2005.
  160. John Little and Ryan Schwarz, On m-dimensional toric codes, preprint (2005), 17 pages.[arXiv]
  161. J. Löfvenberg, Binary fingerprinting codes, Des. Codes Cryptogr. 36 (2005), no. 1, 69–81.[MR]
  162. P. Loidreau and V. Shorin, Application of Gröbner bases techniques for searching new sequences with good periodic correlation properties, in IEEE International Symposium on Information Theory (ISIT), Adelaide, 2005.
  163. Martin Lorenz, Multiplicative Invariant Theory, Encyclopaedia of Mathematical Sciences, vol. 135, Springer-Verlag, Berlin, 2005, pp. xii+177.[MR]
  164. Arturo Magidin, Capability of nilpotent products of cyclic groups, J. Group Theory 8 (2005), no. 4, 431–452.[MR/arXiv]
  165. Stefano Marcugini, Alfredo Milani, and Fernanda Pambianco, Maximal (n,3)-arcs in PG(2,13), Discrete Math. 294 (2005), no. 1-2, 139–145.[MR]
  166. Gretchen L. Matthews, Some computational tools for estimating the parameters of algebraic geometry codes, Coding Theory and Quantum Computing, Contemp. Math., vol. 381, Amer. Math. Soc., Providence, RI, 2005, pp. 19–26.[MR]
  167. Gretchen L. Matthews and Todd W. Michel, One-point codes using places of higher degree, IEEE Trans. Inform. Theory 51 (2005), no. 4, 1590–1593.[MR]
  168. Gary McGuire and José Felipe Voloch, Weights in codes and genus 2 curves, Proc. Amer. Math. Soc. 133 (2005), no. 8, 2429–2437 (electronic).[MR]
  169. Stephen McMath, Parallel integer factorization using quadratic forms, Technical Report (2005), 132 pages.
  170. Nele Mentens, Lejla Batina, Bart Preneel, and Ingrid Verbauwhede, A systematic evaluation of compact hardware implementations for the Rijndael S-box, Topics in Cryptology—CT-RSA 2005, Lecture Notes in Comput. Sci., vol. 3376, Springer, Berlin, 2005, pp. 323–333.[MR]
  171. Gerhard O. Michler and Andrea Previtali, Another existence and uniqueness proof for the Higman-Sims simple group, Algebra Colloq. 12 (2005), no. 3, 369–398.[MR]
  172. Vanessa Miemietz, On representations of affine hecke algebras of type B, PhD Thesis, Universität Stuttgart, 2005.
  173. Jesper M. Moeller, N-determined 2-compact groups, preprint (2005), 115 pages.[arXiv]
  174. Jamshid Moori and B. G. Rodrigues, A self-orthogonal doubly even code invariant under McL : 2, J. Combin. Theory Ser. A 110 (2005), no. 1, 53–69.[MR]
  175. Bernard Mourrain, Generalized normal forms and polynomial system solving, ISSAC'05: Proceedings of the 2005 International Symposium on Symbolic and Algebraic Computation, ACM, New York, 2005, pp. 253–260 (electronic).[MR]
  176. Gabriele Nebe and Maria Teider, Hecke actions on certain strongly modular genera of lattices, Arch. Math. (Basel) 84 (2005), no. 1, 46–56.[MR]
  177. Gabriele Nebe and Boris Venkov, Low-dimensional strongly perfect lattices I: The 12-dimensional case, Enseign. Math. (2) 51 (2005), no. 1-2, 129–163.[MR]
  178. Phong Q. Nguên and Damien Stehlé, Floating-point LLL revisited, Advances in cryptology—EUROCRYPT 2005, Lecture Notes in Comput. Sci., vol. 3494, Springer, Berlin, 2005, pp. 215–233.[MR]
  179. V. Niculescu and G. S. Moldovan, Building an object oriented computational algebra system based on design patterns, in SYNASC 2005: Symbolic and Numeric Algorithms for Scientific Computing, 2005, 2005, 8 pages.[doi]
  180. Alice C. Niemeyer, Constructive recognition of normalizers of small extra-special matrix groups, Internat. J. Algebra Comput. 15 (2005), no. 2, 367–394.[MR]
  181. E. A. O'Brien and M. R. Vaughan-Lee, The groups with order p7 for odd prime p, J. Algebra 292 (2005), no. 1, 243–258.[MR]
  182. Alen Orbanić, Parallel-product decomposition of edge-transitive maps, preprint (2005), 30 pages.[arXiv]
  183. Ferruh Özbudak, Elements of prescribed order, prescribed traces and systems of rational functions over finite fields, Des. Codes Cryptogr. 34 (2005), no. 1, 35–54.[MR]
  184. Ariel Pacetti and Fernando Rodriguez Villegas, Computing weight 2 modular forms of level p2, Math. Comp. 74 (2005), no. 251, 1545–1557 (electronic).[MR]
  185. Mihran Papikian, On the variation of Tate-Shafarevich groups of elliptic curves over hyperelliptic curves, J. Number Theory 115 (2005), no. 2, 249–283.[MR]
  186. Ludovic Perret, A fast cryptanalysis of the isomorphism of polynomials with one secret problem, in Advances in Cryptology - Eurocrypt 2005, Lecture Notes in Computer Science, vol. 3494, Springer Berlin/Heidelberg, 2005, pp. 354–370.
  187. Tomaz Pisanski, Marko Boben, and Arjana Zitnik, Interactive conjecturing with VEGA, Fajtlowicz, Siemion (ed.) et al., Graphs and Discovery, DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 69, American Mathematical Society (AMS), Providence, RI, 2005, pp. 351–364.
  188. W. Plesken and D. Robertz, Constructing invariants for finite groups, Experiment. Math. 14 (2005), no. 2, 175–188.[MR]
  189. Andrea Previtali, Unitriangular actions on quadratic forms and character degrees, Linear Algebra Appl. 408 (2005), 120–150.[MR]
  190. I. K. Redchuk, Finite-dimensionality and growth of algebras defined by polylinearly connected generators, Ukraïn. Mat. Zh. 57 (2005), no. 10, 1435–1440.[MR]
  191. Guyan Robertson, Torsion in boundary coinvariants and K-theory for affine buildings, K-Theory 33 (2005), no. 4, 347–369.[MR]
  192. Colva M. Roney-Dougal, The primitive permutation groups of degree less than 2500, J. Algebra 292 (2005), no. 1, 154–183.[MR]
  193. Mohamed Sayed, Coset enumeration of groups generated by symmetric sets of involutions, Int. J. Math. Math. Sci. (2005), no. 23, 3739–3750.[MR]
  194. Mohamed Sayed, Double-coset enumeration algorithm for symmetrically generated groups, Int. J. Math. Math. Sci. (2005), no. 5, 699–715.[MR]
  195. Werner Schindler and Le Van Ly, How to embed short cycles into large nonlinear feedback-shift registers, Security in Communications Networks: 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, Lecture Notes in Comput. Sci., vol. 3352, Springer, Berlin, 2005, pp. 367.
  196. René Schoof, Arakelov class groups and ideal lattices, Mathematisches Forschungsinstitut Oberwolfach Report No. 1/2005 (2005), 23–24.
  197. Andreas M. Schöpp, Über torsionspunkte elliptischer und hyperelliptischer kurven nebst anwendungen, PhD Thesis, Technische Universitaet Berlin,, 2005.
  198. Achill Schürmann and Frank Vallentin, Local covering optimality of lattices: Leech lattice versus root lattice E8, Int. Math. Res. Not. (2005), no. 32, 1937–1955.[MR/arXiv]
  199. Michael Scott and Paulo S. L. M. Barreto, On a (flawed) proposal to build more pairing-friendly curves, IACR (2005).[eprint]
  200. Magda Sebestean, Correspondance de Mckay et Equivalences Derivees, PhD Thesis, Paris VII, 2005.[link]
  201. Jian-Yi Shi, Congruence classes of presentations for the complex reflection groups G(m, 1, n) and G(m, m, n), Indag. Math. (N.S.) 16 (2005), no. 2, 267–288.
  202. Samir Siksek, On standardized models of isogenous elliptic curves, Math. Comp. 74 (2005), no. 250, 949–951 (electronic).[MR]
  203. Kirby C. Smith and Leon van Wyk, A concrete matrix field description of some Galois fields, Linear Algebra Appl. 403 (2005), 159–164.[MR]
  204. Arvind Sridharan, Design and analysis of LDPC convolutional codes, PhD Thesis, University of Notre Dame, 2005.
  205. Sebastian Karl Michael Stamminger, Explicit 8-descent on elliptic curves, PhD Thesis, International University Bremen, 2005.
  206. R. Staszewski, H. Völklein, and G. Wiesend, Counting generating systems of a finite group from given conjugacy classes, Computational aspects of algebraic curves, Lecture Notes Ser. Comput., vol. 13, World Sci. Publ., Hackensack, NJ, 2005, pp. 256–263.[MR]
  207. Allan Steel, Conquering inseparability: Primary decomposition and multivariate factorization over algebraic function fields of positive characteristic, J. Symbolic Comput. 40 (2005), no. 3, 1053–1075.[MR]
  208. Till Stegers, Faugère's F5 algorithm revisited, Master's Thesis, Technische Universiteit Darmstadt, 2005.[link]
  209. William Stein and Yan Zhang, On power bases in number fields, Preprint (2005), 15 pages.
  210. Katsuyuki Takashima, New families of hyperelliptic curves with efficient Gallant-Lambert-Vanstone method, Information Security and Cryptology, ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Lecture Notes in Comput. Sci., vol. 3506, Springer, Berlin, 2005, pp. 279–295.
  211. Szabolcs Tengely, Effective methods for Diophantine equations, PhD Thesis, Leiden University, 2005.
  212. L. Vauthier, Atlas de polytopes réguliers issus de groupes presque simples, Master's Thesis, Université Libre de Bruxelles, 2005.
  213. Marie-France Vignéras, p-adic integral structures of some representations of GL(2, F), Preprint (2005), 23 pages.[link]
  214. John Voight, Quadratic Forms and Quaternion Algebras: Algorithms and Arithmetic, PhD Thesis, Berkeley, 2005.
  215. Christopher Voll, Normal subgroup growth in free class-2-nilpotent groups, Math. Ann. 332 (2005), no. 1, 67–79.[MR]
  216. José Felipe Voloch, Computing the minimal distance of cyclic codes, Comput. Appl. Math. 24 (2005), no. 3, 393–398.[MR]
  217. Harold N. Ward, An Introduction to Algebraic Coding Theory, Coding Theory and Quantum Computing, Contemp. Math., vol. 381, Amer. Math. Soc., Providence, RI, 2005, pp. 27–52.[MR]
  218. Gabor Wiese, Modular Forms of Weight One over Finite Fields, PhD Thesis, Universiteit Leiden, 2005.
  219. Clarence W. Wilkerson, Jr., Lab notes on the exceptional Lie group E8 at the prime 2, Preprint (2005), 23 pages.[link]
  220. Christopher Wolf, An Braeken, and Bart Preneel, Efficient cryptanalysis of RSE(2) PKC and RSSE(2) PKC, Security in Communication Networks: Fourth International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Lecture Notes in Comput. Sci., vol. 3352, Springer, Berlin, 2005, pp. 294–309.
  221. W. Christopher Wolf, Multivariate quadratic polynomials in public key cryptography, IACR (2005), 156 pages.[eprint]
  222. Bo-Yin Yang, Chen-Mou Cheng, Bor-Rong Chen, and Chen Jiun-Ming, Implementing minimized multivariate public-key cryptosystems on low-resource embedded systems, Preprint (2005), 15 pages.
  223. Doron Zeilberger, Deconstructing the Zeilberger algorithm, J. Difference Equ. Appl. 11 (2005), no. 9, 851–856.[MR]

2006

  1. Timothy G. Abbott, Kiran S. Kedlaya, and David Roe, Bounding Picard numbers of surfaces using p-adic cohomology, preprint (2006), 33 pages.[arXiv]
  2. Amod Agashe, Kenneth Ribet, and William A. Stein, The Manin constant, Pure Appl. Math. Q. 2 (2006), no. 2, 617–636.[MR]
  3. Seigo Arita, Kazuto Matsuo, Koh-ichi Nagao, and Mahoro Shimura, A Weil descent attack against elliptic curve cryptosystems over quartic extension fields, IEICE Trans. Fundamentals E89-A (2006), no. 5, 28.
  4. Henrik Bäärnhielm, Recognising the Ree groups in their natural representations, Preprint (2006), 22 pages.[link]
  5. Henrik Bäärnhielm, Recognising the Suzuki groups in their natural representations, J. Algebra 300 (2006), no. 1, 171–198.[MR]
  6. Henrik Bäärnhielm, Tensor decomposition of the Ree groups, Preprint (2006), 9 pages.[link]
  7. David H. Bailey, Jonathan M. Borwein, Vishaal Kapoor, and Eric W. Weisstein, Ten problems in experimental mathematics, Amer. Math. Monthly 113 (2006), no. 6, 481–509.[MR]
  8. R. A. Bailey, Peter J. Cameron, Peter Dobcsányi, John P. Morgan, and Leonard H. Soicher, Designs on the web, Discrete Math. 306 (2006), no. 23, 3014–3027.[MR]
  9. Tatiana Bandman, Gert-Martin Greuel, Fritz Grunewald, Boris Kunyavskii, Gerhard Pfister, and Eugene Plotkin, Identities for finite solvable groups and equations in finite simple groups, Compos. Math. 142 (2006), no. 3, 734–764.[MR]
  10. Eiichi Bannai and Etsuko Bannai, On Euclidean tight 4-designs, J. Math. Soc. Japan 58 (2006), no. 3, 775–804.[MR]
  11. Laurent Bartholdi, Benjamin Enriquez, Pavel Etingof, and Eric Rains, Groups and Lie algebras corresponding to the Yang-Baxter equations, J. Algebra 305 (2006), no. 2, 742–764.[MR/arXiv]
  12. Ingrid C. Bauer, Fabrizio Catanese, and Roberto Pignatelli, Complex surfaces of general type: Some recent progress, Global Aspects of Complex Geometry, Springer, Berlin, 2006, pp. 1–58.[MR]
  13. Ingrid C. Bauer, Fabrizio Catanese, and Roberto Pignatelli, The moduli space of surfaces with K2 = 6 and pg = 4, Math. Ann. 336 (2006), no. 2, 421–438.[MR]
  14. M. A. Bennett, N. Bruin, K. Győry, and L. Hajdu, Powers from products of consecutive terms in arithmetic progression, Proc. London Math. Soc. (3) 92 (2006), no. 2, 273–306.[MR]
  15. A. Bérczes, A. Pethő, and V. Ziegler, Parameterized norm form equations with arithmetic progressions, J. Symbolic Comput. 41 (2006), no. 7, 790–810.[MR]
  16. Attila Bérczes and Attila Pethő, Computational experiences on norm form equations with solutions forming arithmetic progressions, Glas. Mat. Ser. III 41(61) (2006), no. 1, 1–8.[MR]
  17. Thomas Beth, Jörn Müller-Quade, and Rainer Steinwandt, Computing restrictions of ideals in finitely generated k-algebras by means of Buchberger's algorithm, J. Symbolic Comput. 41 (2006), no. 3-4, 372–380.[MR]
  18. Daniel Bierbrauer, Codes auf hyperelliptischen und trigonalen kurven, PhD Thesis, Ruprecht-Karls-Universität Heidelberg, 2006.
  19. Werner Bley and Robert Boltje, Computation of locally free class groups, Algorithmic Number Theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 72–86.[MR/link]
  20. Jens-Matthias Bohli, Stefan Röhrich, and Rainer Steinwandt, Key substitution attacks revisited: Taking into account malicious signers, International Journal of Information Security 5 (2006), no. 1, 30–36.
  21. Wieb Bosma, Some computational experiments in number theory, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 1–30.[MR]
  22. Wieb Bosma and John Cannon (eds.), Discovering Mathematics with Magma, Algorithms and Computation in Mathematics, vol. 19, Springer-Verlag, Berlin, 2006, pp. xxiv+374.[MR]
  23. Wieb Bosma, Karma Dajani, and Cor Kraaikamp, Entropy quotients and correct digits in number-theoretic expansions, Dynamics and Stochastics, IMS Lecture Notes Monogr. Ser., vol. 48, Inst. Math. Statist., Beachwood, OH, 2006, pp. 176–188.[MR]
  24. Nigel Boston, Embedding 2-groups in groups generated by involutions, J. Algebra 300 (2006), no. 1, 73–76.[MR]
  25. Nigel Boston, Galois p-groups unramified at p—a survey, Primes and knots, Contemp. Math., vol. 416, Amer. Math. Soc., Providence, RI, 2006, pp. 31–40.[MR]
  26. Nigel Boston and Jordan S. Ellenberg, Pro-p groups and towers of rational homology spheres, Geom. Topol. 10 (2006), 331–334 (electronic).[MR/doi]
  27. Nigel Boston and Harris Nover, Computing pro-p-Galois groups, Algorithmic Number Theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 1–10.[MR]
  28. Irene I. Bouw and Stefan Wewers, Indigenous bundles with nilpotent p-curvature, Int. Math. Res. Not. (2006), Art. ID 89254, 37.[MR]
  29. Stefka Bouyuklieva, E. A. O'Brien, and Wolfgang Willems, The automorphism group of a binary self-dual doubly even [72,36,16] code is solvable, IEEE Trans. Inform. Theory 52 (2006), no. 9, 4244–4248.[MR]
  30. J. D. Bradley and R. T. Curtis, Symmetric generation and existence of J3 : 2, the automorphism group of the third Janko group, J. Algebra 304 (2006), no. 1, 256–270.[MR]
  31. Aaron Bradord, Michael Monagan, and Colin Percival, Integer factorization and computing discrete logarithms in Maple, in Proceedings of the 2006 Maple Conference, 2006, pp. 2–13.
  32. John Bray, Marston Conder, Charles Leedham-Green, and Eamonn O'Brien, Short presentations for alternating and symmetric groups, Preprint (2006), 24 pages.
  33. John N. Bray and Robert A. Wilson, Explicit representations of maximal subgroups of the Monster, J. Algebra 300 (2006), no. 2, 834–857.[MR]
  34. John N. Bray and Robert A. Wilson, On the orders of automorphism groups of finite groups. II, J. Group Theory 9 (2006), no. 4, 537–545.[MR]
  35. Martin Bright, Brauer groups of diagonal quartic surfaces, J. Symbolic Comput. 41 (2006), no. 5, 544–558.[MR]
  36. Peter A. Brooksbank and William M. Kantor, Fast constructive recognition of black box orthogonal groups, J. Algebra 300 (2006), no. 1, 256–288.[MR]
  37. Gavin Brown, Graded rings and special K3 surfaces, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 137–159.[MR]
  38. Ronald Brown, Neil Ghani, Anne Heyworth, and Christopher D. Wensley, String rewriting for double coset systems, J. Symbolic Comput. 41 (2006), no. 5, 573–590.[MR/arXiv]
  39. N. Bruin, K. Győry, L. Hajdu, and Sz. Tengely, Arithmetic progressions consisting of unlike powers, Indag. Math. (N.S.) 17 (2006), no. 4, 539–555.[MR]
  40. Nils Bruin, Some ternary Diophantine equations of signature (n,n,2), Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 63–91.[MR]
  41. Nils Bruin, E. Victor Flynn, Josep González, and Victor Rotger, On finiteness conjectures for endomorphism algebras of abelian surfaces, Math. Proc. Cambridge Philos. Soc. 141 (2006), no. 3, 383–408.[MR/arXiv]
  42. Jan Hendrik Bruinier and Tonghai Yang, CM-values of Hilbert modular functions, Invent. Math. 163 (2006), no. 2, 229-288.
  43. Johannes Buchmann, Andrei Pyshkin, and Ralf-Philipp Weinmann, Block ciphers sensitive to Gröbner basis attacks, Topics in Cryptology—CT-RSA 2006, Lecture Notes in Comput. Sci., vol. 3860, Springer, Berlin, 2006, pp. 313–331.[MR]
  44. Jarosław Buczyński, Legendrian subvarieties of projective space, Geom. Dedicata 118 (2006), 87–103.[MR]
  45. Yann Bugeaud, Maurice Mignotte, and Samir Siksek, Classical and modular approaches to exponential Diophantine equations I: Fibonacci and Lucas perfect powers, Ann. of Math. (2) 163 (2006), no. 3, 969–1018.[MR]
  46. Yann Bugeaud, Maurice Mignotte, and Samir Siksek, Classical and modular approaches to exponential Diophantine equations II: The Lebesgue-Nagell equation, Compos. Math. 142 (2006), no. 1, 31–62.[MR]
  47. David M. Bundy and Peter J. Rowley, Symmetric groups and completions of the Goldschmidt amalgams of type G1, J. Group Theory 9 (2006), no. 5, 627–640.[MR]
  48. J. S. Calcut, Rationality and the tangent function, Preprint (2006), 22 pages.
  49. Frank Calegari and Nathan M. Dunfield, Automorphic forms and rational homology 3-spheres, Geom. Topol. 10 (2006), 295–329 (electronic).[MR/arXiv]
  50. H. E. A. Campbell, B. Fodden, and David L. Wehlau, Invariants of the diagonal Cp-action on V3, J. Algebra 303 (2006), no. 2, 501–513.[MR]
  51. John J. Cannon and Derek F. Holt, Computing conjugacy class representatives in permutation groups, J. Algebra 300 (2006), no. 1, 213–222.[MR]
  52. Anne Canteaut, Open problems related to algebraic attacks on stream ciphers, WCC 2005, Lecture Notes in Comput. Sci., vol. 3969, Springer, Berlin, 2006, pp. 120–134.[link]
  53. Jorge Caravantes, Low codimension Fano–Enriques threefolds, preprint (2006), 27 pages.[arXiv]
  54. Gabriel Cardona, Representations of Gk-groups and twists of the genus two curve y2=x5 – x, J. Algebra 303 (2006), no. 2, 707–721.[MR]
  55. Jon F. Carlson, Constructing endotrivial modules, J. Pure Appl. Algebra 206 (2006), no. 1-2, 83–110.[MR]
  56. Jon F. Carlson, Support varieties for modules, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 187–204.[MR]
  57. Jon F. Carlson, When is projectivity detected on subalgebras?, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 205–220.[MR]
  58. Jon F. Carlson and Graham Matthews, Generators and relations for matrix algebras, J. Algebra 300 (2006), no. 1, 134–159.[MR]
  59. Jon F. Carlson, Nadia Mazza, and Daniel K. Nakano, Endotrivial modules for finite groups of Lie type, J. Reine Angew. Math. 595 (2006), 93–119.[MR]
  60. Antoine Chambert-Loir, Compter (rapidement) le nombre de solutions d'equations dans les corps finis, preprint (2006), 46 pages.[arXiv]
  61. C. Chisholm and J. A. MacDougall, Rational and Heron tetrahedra, J. Number Theory 121 (2006), no. 1, 153–185.[MR]
  62. Tracey Cicco, Algorithms for Computing Restricted Root Systems and Weyl Groups, PhD Thesis, North Carolina State University, 2006.
  63. Carlos Cid, Sean Murphy, and Matthew Robshaw, Algebraic Aspects of the Advanced Encryption Standard, Springer, New York, 2006, pp. viii+147.[MR]
  64. Stephen D. Cohen, Primitive polynomials with a prescribed coefficient, Finite Fields Appl. 12 (2006), no. 3, 425–491.[MR]
  65. Marston Conder and Peter Dobcsányi, Normal subgroups of the modular group and other Hecke groups, Combinatorial group theory, discrete groups, and number theory, Contemp. Math., vol. 421, Amer. Math. Soc., Providence, RI, 2006, pp. 65–86.[MR]
  66. Marston Conder, George Havas, and Colin Ramsay, Efficient presentations for the Mathieu simple group M22 and its cover, Finite geometries, groups, and computation, Walter de Gruyter GmbH &Co. KG, Berlin, 2006, pp. 33–41.[MR]
  67. Marston Conder and Vaughan Jones, Highly transitive imprimitivities, J. Algebra 300 (2006), no. 1, 44–56.[MR]
  68. Marston Conder, C. R. Leedham-Green, and E. A. O'Brien, Constructive recognition of PSL(2,q), Trans. Amer. Math. Soc. 358 (2006), no. 3, 1203–1221 (electronic).[MR]
  69. Marston Conder, Aleksander Malnič, Dragan Marušič, and Primož Potočnik, A census of semisymmetric cubic graphs on up to 768 vertices, J. Algebraic Combin. 23 (2006), no. 3, 255–294.[MR]
  70. Marston Conder, Gaven Martin, and Anna Torstensson, Maximal symmetry groups of hyperbolic 3-manifolds, New Zealand J. Math. 35 (2006), no. 1, 37–62.[MR]
  71. A. Cossidente, G. L. Ebert, G. Marino, and A. Siciliano, Shult sets and translation ovoids of the Hermitian surface, Adv. Geom. 6 (2006), no. 4, 523–542.[MR]
  72. Robert S. Coulter, Marie Henderson, and Felix Lazebnik, On certain combinatorial Diophantine equations and their connection to Pythagorean numbers, Acta Arith. 122 (2006), no. 4, 395–406.[MR]
  73. J. E. Cremona, M. Prickett, and Samir Siksek, Height difference bounds for elliptic curves over number fields, J. Number Theory 116 (2006), no. 1, 42–68.[MR]
  74. John Cremona, The elliptic curve database for conductors to 130000, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 11–29.[MR]
  75. Deepak Dalai, On some necessary conditions of boolean functions to resist algebraic attacks, PhD Thesis, Indian Statistical Institute, Kolkata, India, 2006.
  76. Lars Eirik Danielsen and Matthew G. Parker, On the classification of all self-dual additive codes over GF(4) of length up to 12, J. Combin. Theory Ser. A 113 (2006), no. 7, 1351–1367.[MR]
  77. Henri Darmon and Robert Pollack, Efficient calculation of Stark-Heegner points via overconvergent modular symbols, Israel J. Math. 153 (2006), 319–354.[MR]
  78. Wolfram Decker and Christoph Lossen, Computing in algebraic geometry, Algorithms and Computation in Mathematics, vol. 16, Springer-Verlag, Berlin, 2006, pp. xvi+327.[MR]
  79. U. Dempwolff, Automorphisms and equivalence of bent functions and of difference sets in elementary abelian 2-groups, Comm. Algebra 34 (2006), no. 3, 1077–1131.[MR]
  80. Alexander W. Dent and Steven D. Galbraith, Hidden pairings and trapdoor DDH groups, Algorithmic Number Theory (Berlin, 2006), Lecture Notes in Comput. Sci., vol. 2369, Springer, Berlin, 2006, pp. pp.15.
  81. Ulrich Derenthal, On the Cox ring of del Pezzo surfaces, preprint (2006), 17 pages.[arXiv]
  82. Michael Dettweiler, Galois realizations of classical groups and the middle convolution, preprint (2006), 94 pages.[arXiv]
  83. Michael Dettweiler and Stefan Reiter, On exceptional rigid local systems, preprint (2006), 11 pages.[arXiv]
  84. Claus Diem, An index calculus algorithm for plane curves of small degree, Algorithmic Number Theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 543–557.[MR]
  85. Cunsheng Ding and Jin Yuan, A family of skew Hadamard difference sets, J. Combin. Theory Ser. A 113 (2006), no. 7, 1526–1535.[MR]
  86. Jintai Ding, Jason E. Gower, and Dieter Schmidt, Multivariate public key cryptosystems, Springer, Berlin, 2006, pp. xviii+260.
  87. Jintai Ding, Jason E. Gower, and Dieter S. Schmidt, Zhuang-Zi: a new algorithm for solving multivariate polynomial equations over a finite field, Preprint (2006), 14 pages.[link]
  88. C. Dominquez, J. Rubio, and F. Sergeraert, Modelling inheritance as coercion in the Kenzo system, Journal of Universal Computer Science 12 (2006), 1701–1730.
  89. Darrin Doud and Brian Hansen, Explicit Frobenius calculations supporting a generalization of a conjecture of Serre, JP J. Algebra Number Theory Appl. 6 (2006), no. 2, 381–398.[MR/link]
  90. Konstantinos A. Draziotis, Integer points on the curve Y2=X3±pkX, Math. Comp. 75 (2006), no. 255, 1493–1505 (electronic).[MR]
  91. Konstantinos Draziotis and Dimitrios Poulakis, Practical solution of the Diophantine equation y2=x(x+2apb)(x-2apb), Math. Comp. 75 (2006), no. 255, 1585–1593 (electronic).[MR]
  92. Sean V. Droms, Keith E. Mellinger, and Chris Meyer, LDPC codes generated by conics in the classical projective plane, Des. Codes Cryptogr. 40 (2006), no. 3, 343–356.[MR]
  93. Jacques Dubrois and Jean-Guillaume Dumas, Efficient polynomial time algorithms computing industrial-strength primitive roots, Inform. Process. Lett. 97 (2006), no. 2, 41–45.[MR]
  94. Jean-Guillaume Dumas, Thierry Gautier, Pascal Giorgi, and Clément Pernet, Dense linear algebra over finite fields: The FFLAS and FFPACK packages, preprint (2006), 69 pages.[arXiv]
  95. Jean-Guillaume Dumas and Anna Urbanska, An introspective algorithm for the integer determinant, preprint (2006), 32 pages.[arXiv]
  96. Freddy Dumortier, Jaume Llibre, and Joan C. Artés, Qualitative Theory of Planar Differential Systems, Universitext, Springer-Verlag, Berlin, 2006, pp. xvi+298.[MR]
  97. Bas Edixhoven, Comparison of integral structures on spaces of modular forms of weight two, and computation of spaces of forms mod 2 of weight one, J. Inst. Math. Jussieu 5 (2006), no. 1, 1–34.[MR]
  98. Bas Edixhoven, On the computation of the coefficients of a modular form, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 30–39.[MR]
  99. Bettina Eick, M. F. Newman, and E. A. O'Brien, The class-breadth conjecture revisited, J. Algebra 300 (2006), no. 1, 384–393.[MR]
  100. Bettina Eick and Bernd Souvignier, Algorithms for crystallographic groups, Int. J. Quantum. Chem 106 (2006), no. 1, 316–343.
  101. Arsen Elkin, Hyperelliptic Jacobians with real multiplication, J. Number Theory 117 (2006), no. 1, 53–86.[MR]
  102. Arsen Elkin and Yuri G. Zarhin, Endomorphism algebras of hyperelliptic Jacobians and finite projective lines, J. Ramanujan Math. Soc. 21 (2006), 169-187.[MR]
  103. Jordan S. Ellenberg and Akshay Venkatesh, The number of extensions of a number field with fixed degree and bounded discriminant, Ann. of Math. (2) 163 (2006), no. 2, 723–741.[MR]
  104. Nicholas Eriksson, Algebraic Combinatorics for Computational Biology, PhD Thesis, University of California, Berkeley, 2006.[link]
  105. Pavel Etingof and Eric Rains, Central extensions of preprojective algebras, the quantum Heisenberg algebra, and 2-dimensional complex reflection groups, J. Algebra 299 (2006), no. 2, 570–588.[MR/arXiv]
  106. Jeffrey B. Farr and Shuhong Gao, Computing Gröbner bases for vanishing ideals of finite sets of points, Applied Algebra, Algebraic Algorithms and Error-correcting Codes, Lecture Notes in Comput. Sci., vol. 3857, Springer, Berlin, 2006, pp. 118–127.[MR]
  107. Jeffrey B. Farr and Shuhong Gao, Gröbner bases and generalized Padé approximation, Math. Comp. 75 (2006), no. 253, 461–473 (electronic).[MR]
  108. Arash Farzan and J. Ian Munro, Succinct representation of finite abelian groups, in ISSAC '06: Proceedings of the 2006 international symposium on Symbolic and algebraic computation, ACM Press, New York, NY, USA, 2006, pp. 87–92.[doi]
  109. Claus Fieker, Applications of the class field theory of global fields, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 31–62.[MR]
  110. Claus Fieker and Michael E. Pohst, Dependency of units in number fields, Math. Comp. 75 (2006), no. 255, 1507–1518 (electronic).[MR]
  111. Akpodigha Filatei, Implementation of fast polynomial arithmentic in Aldor, Master's Thesis, University of Western Ontario, 2006.
  112. Akpodigha Filatei, Xin Li, Marc Moreno Maza, and Éric Schost, Implementation techniques for fast polynomial arithmetic in a high-level programming environment, in ISSAC '06: Proceedings of the 2006 International Symposium on Symbolic and Algebraic Computation, ACM Press, New York, NY, USA, 2006, pp. 93–100.[doi]
  113. Luís R. A. Finotti, Minimal degree liftings in characteristic 2, J. Pure Appl. Algebra 207 (2006), no. 3, 631–673.[MR]
  114. Tom Fisher, Testing equivalence of ternary cubics, Algorithmic Number Theory (Berlin, 2006), Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 333–345.[MR]
  115. Tom Fisher, The Hessian of a genus one curve, preprint (2006), 28 pages.[arXiv]
  116. P. Fleischmann, M. Sezer, R. J. Shank, and C. F. Woodcock, The Noether numbers for cyclic groups of prime order, Adv. Math. 207 (2006), no. 1, 149–155.[MR]
  117. S. Fritzsche, Application of point-group symmetries in chemistry and physics: a computer-algebraic approach, Int. J. Quantum. Chem 106 (2006), 98-129.
  118. Joseph H. G. Fu, Structure of the unitary valuation algebra, J. Differential Geom. 72 (2006), no. 3, 509–533.[MR/arXiv]
  119. Steven Galbraith, Disguising tori and elliptic curves, Preprint (2006), 12 pages.[link]
  120. Skip Garibaldi and Michael Carr, Geometries, the principle of duality, and algebraic groups, Expo. Math. 24 (2006), no. 3, 195–234.[MR]
  121. P. Gaudry, T. Houtmann, D. Kohel, C. Ritzenthaler, and A. Weng, The 2-adic CM method for genus 2 curves with application to cryptography, Advances in cryptology—ASIACRYPT 2006, Lecture Notes in Comput. Sci., vol. 4284, Springer, Berlin, 2006, pp. 114–129.[MR]
  122. Volker Gebhardt, Computer aided discovery of a fast algorithm for testing conjugacy in braid groups, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 261–285.[MR]
  123. Volker Gebhardt, Conjugacy search in braid groups: From a braid-based cryptography point of view, Appl. Algebra Engrg. Comm. Comput. 17 (2006), no. 3-4, 219–238.[MR]
  124. Vladimir P. Gerdt and Yuri A. Blinkov, On computing Janet bases for degree compatible orderings, Proceedings of the 10th Rhine Workshop on Computer Algebra (Basel), 2006, University of Basel, Basel, 2006, pp. 107–117.
  125. Vladimir P. Gerdt, Yuri A. Blinkov, and Vladimir V. Mozzhilkin, Gröbner bases and generation of difference schemes for partial differential equations, SIGMA Symmetry Integrability Geom. Methods Appl. 2 (2006), Paper 051, 26 pp. (electronic).[MR]
  126. Lothar Gerritzen, Tree polynomials and non-associative Gröbner bases, J. Symbolic Comput. 41 (2006), no. 3-4, 297–316.[MR]
  127. Modjtaba Ghorbani and Ali Reza Ashrafi, Counting the number of hetero fullerenes, Journal of Computational and Theoretical Nanoscience 3 (2006), no. 5, 803–810.[link]
  128. Martine Girard, The group of Weierstrass points of a plane quartic with at least eight hyperflexes, Math. Comp. 75 (2006), no. 255, 1561–1583 (electronic).[MR]
  129. Martine Girard and David R. Kohel, Classification of genus 3 curves in special strata of the moduli space, Algorithmic Number Theory (Berlin, 2006), Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 346–360.[MR]
  130. Michael Giudici, Factorisations of sporadic simple groups, J. Algebra 304 (2006), no. 1, 311–323.[MR]
  131. S. P. Glasby, C. R. Leedham-Green, and E. A. O'Brien, Writing projective representations over subfields, J. Algebra 295 (2006), no. 1, 51–61.[MR]
  132. David G. Glynn, T. Aaron Gulliver, Johannes G. Maks, and Manish K. Gupta, The geometry of additive quantum codes, Springer, 2006, pp. 219.
  133. Edray Herber Goins and Davin Maddox, Heron triangles via elliptic curves, Rocky Mountain J. Math. 36 (2006), no. 5, 1511–1526.[MR]
  134. Josep González and Victor Rotger, Non-elliptic Shimura curves of genus one, J. Math. Soc. Japan 58 (2006), no. 4, 927–948.[MR]
  135. Nikolai Gordeev, Fritz Grunewald, Boris Kunyavskii, and Eugene Plotkin, On the number of conjugates defining the solvable radical of a finite group, C. R. Math. Acad. Sci. Paris 343 (2006), no. 6, 387–392.[MR]
  136. Willem A. de Graaf, Michael Harrison, Jana Pílniková, and Josef Schicho, A Lie algebra method for rational parametrization of Severi-Brauer surfaces, J. Algebra 303 (2006), no. 2, 514–529.[MR]
  137. Markus Grassl, Constructing matrix representations of finite groups in characteristic zero, Proceedings 10th Rhine Workshop on Computer Algebra (RWCA06, 2006, pp. 143-148.
  138. Markus Grassl, Searching for linear codes with large minimum distance, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 287–313.[MR/doi]
  139. Markus Grassl and Martin Rötteler, Quantum convolutional codes: Encoders and structural properties, Forty-Fourth Annual Allerton Conference,Allerton House, UIUC, Illinois, USA Sept 27-29, 2006, 2006, pp. 510–519.
  140. Matthew Greenberg, Computing Heegner points arising from Shimura curve parametrizations, Preprint (2006), 11 pages.[link]
  141. Matthew Greenberg, Heegner Points and Rigid Analytic Modular Forms, PhD Thesis, McGill University, 2006.[link]
  142. Matthew Greenberg, Heegner point computations via numerical p-adic integration, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 4076, Springer Berlin / Heidelberg, 2006, pp. 361–376.[link]
  143. Ralph Greenberg, On the structure of certain Galois cohomology groups, Doc. Math. (2006), no. Extra Vol., 335–391 (electronic).[MR]
  144. Anja Groch, Dennis Hofheinz, and Rainer Steinwandt, A practical attack on the root problem in braid groups, Algebraic methods in cryptography, Contemp. Math., vol. 418, Amer. Math. Soc., Providence, RI, 2006, pp. 121–131.[MR/link]
  145. T. Aaron Gulliver and Masaaki Harada, Classification of extremal double circulant self-dual codes of lengths 74–88, Discrete Math. 306 (2006), no. 17, 2064–2072.[MR]
  146. R. Haas and A. G. Helminck, Algorithms for twisted involutions in Weyl groups, Preprint (2006), 10 pages.
  147. Emmanuel Hallouin and Christian Maire, Cancellation in totally definite quaternion algebras, J. Reine Angew. Math. 595 (2006), 189–213.[MR]
  148. Masaaki Harada, Self-orthogonal 3-(56,12,65) designs and extremal doubly-even self-dual codes of length 56, Des. Codes Cryptogr. 38 (2006), no. 1, 5–16.[MR]
  149. Masaaki Harada and Hadi Kharaghani, Orthogonal designs and MDS self-dual codes, Australas. J. Combin. 35 (2006), 57–67.[MR]
  150. Michael Harrison and Josef Schicho, Rational parametrisation for degree 6 Del Pezzo surfaces using Lie algebras, ISSAC 2006, ACM, New York, 2006, pp. 132–137.[MR]
  151. Evelyn L. Hart and Edward C. Keppelmann, Nielsen periodic point theory for periodic maps on orientable surfaces, Topology Appl. 153 (2006), no. 9, 1399–1420.[MR]
  152. G. Havas, C. R. Leedham-Green, E. A. O'Brien, and M. C. Slattery, Certain Roman and flock generalized quadrangles have nonisomorphic elation groups, Adv. Geom. 6 (2006), no. 3, 389–395.[MR]
  153. George Havas, C. R. Leedham-Green, E. A. O'Brien, and Michael C. Slattery, Computing with elation groups, Finite Geometries, Groups, and Computation, Walter de Gruyter GmbH &Co. KG, Berlin, 2006, pp. 95–102.[MR]
  154. Mark van Hoeij and John Cremona, Solving conics over function fields, J. Théor. Nombres Bordeaux 18 (2006), no. 3, 595–606.[MR]
  155. Camilla Hollanti, Jyrki Lahtonen, Kalle Ranto, and Roope Vehkalahti, Optimal matrix lattices for MIMO codes from division algebras, in IEEE International Symposium on Information Theory. ISIT 2006, July 2006, pp. 783-787.[doi]
  156. Derek F. Holt, Cohomology and group extensions in Magma, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 221–241.[MR]
  157. Derek F. Holt and E. A. O'Brien, A computer-assisted analysis of some matrix groups, J. Algebra 300 (2006), no. 1, 199–212.[MR]
  158. Shih-Chang Huang, Uno's conjecture for the Chevalley simple groups G2(3) and G2(4), New Zealand J. Math. 35 (2006), no. 2, 155–182.[MR]
  159. Hendrik Hubrechts, Memory efficient hyperelliptic curve point counting, preprint (2006), 10 pages.[arXiv]
  160. Stephen P. Humphries, Representations and rigidity of Aut(F3), Internat. J. Algebra Comput. 16 (2006), no. 5, 925–929.[MR]
  161. Robert E. Jamison and Gretchen L. Matthews, Distance k colorings of Hamming graphs, in Proceedings of the Thirty-Seventh Southeastern International Conference on Combinatorics, Graph Theory and Computing, vol. 183, 2006, pp. 193–202.[MR]
  162. Henri Johnston, On the trace map between absolutely abelian number fields of equal conductor, Acta Arith. 122 (2006), no. 1, 63–74.[MR]
  163. John W. Jones and David P. Roberts, A database of local fields, J. Symbolic Comput. 41 (2006), no. 1, 80–97.[MR]
  164. Antoine Joux and Reynald Lercier, Counting points on elliptic curves in medium characteristic, Preprint (2006), 15.[link]
  165. David Joyner and Amy Ksir, Automorphism groups of some AG codes, IEEE Trans. Inform. Theory 52 (2006), no. 7, 3325–3329.[MR]
  166. M. Kasatani, T. Miwa, A. N. Sergeev, and A. P. Veselov, Coincident root loci and Jack and Macdonald polynomials for special values of the parameters, Jack, Hall-Littlewood and Macdonald Polynomials, Contemp. Math., vol. 417, Amer. Math. Soc., Providence, RI, 2006, pp. 207–225.[MR]
  167. Masanobu Katagi, Toru Akishita, Izuru Kitamura, and Tsuyoshi Takagi, Efficient hyperelliptic curve cryptosystems using theta divisors, IEICE Trans. Fundamentals E89-A (2006), no. 1, 151–160.
  168. J. D. Key, Recent developments in permutation decoding, Not. S. Afr. Math. Soc. 37 (2006), no. 1, 2–13.[MR]
  169. J. D. Key, T. P. McDonough, and V. C. Mavron, Information sets and partial permutation decoding for codes from finite geometries, Finite Fields Appl. 12 (2006), no. 2, 232–247.[MR]
  170. Sara Khodadad and Michael Monagan, Fast rational function reconstruction, ISSAC 2006, ACM, New York, 2006, pp. 184–190.[MR]
  171. Aristides Kontogeorgis and Victor Rotger, On abelian automorphism groups of Mumford curves and applications to Shimura curves, preprint (2006), 16 pages.[arXiv]
  172. Ilias S. Kotsireas and Christos Koukouvinos, Constructions for Hadamard matrices of Williamson type, J. Combin. Math. Combin. Comput. 59 (2006), 17–32.[MR]
  173. Ilias S. Kotsireas and Christos Koukouvinos, Orthogonal designs via computational algebra, J. Combin. Des. 14 (2006), no. 5, 351–362.[MR]
  174. Ilias S. Kotsireas, Christos Koukouvinos, and Jennifer Seberry, Hadamard ideals and Hadamard matrices with circulant core, J. Combin. Math. Combin. Comput. 57 (2006), 47–63.[MR]
  175. Ilias S. Kotsireas, Christos Koukouvinos, and Jennifer Seberry, Hadamard ideals and Hadamard matrices with two circulant cores, European J. Combin. 27 (2006), no. 5, 658–668.[MR]
  176. Greg Kuperberg, Numerical cubature from Archimedes' hat-box theorem, SIAM J. Numer. Anal. 44 (2006), no. 3, 908–935 (electronic).[MR/link]
  177. Greg Kuperberg, Numerical cubature using error-correcting codes, SIAM J. Numer. Anal. 44 (2006), no. 3, 897–907 (electronic).[MR/arXiv]
  178. Klavdija Kutnar, Aleksander Malnič, Dragan Marušič, and Štefko Miklavič, Distance-balanced graphs: Symmetry conditions, Discrete Math. 306 (2006), no. 16, 1881–1894.[MR]
  179. Thorsten Lagemann, Codes und automorphismen optimaler artin-schreier-turme, PhD Thesis, Ruprecht-Karls-Universität Heidelberg, 2006.
  180. Jyrki Lahtonen and Camilla Hollanti, A new tool: constructing STBCs from maximal orders in central simple algebras, in IEEE Information Theory Workshop, Punta del Este, Uruguay, March 13–17, 2006, 2006.
  181. Alan G. B. Lauder, A recursive method for computing zeta functions of varieties, LMS J. Comput. Math. 9 (2006), 222–269 (electronic).[MR]
  182. Sonja Lauer, Entwurf von algorithmen zur konstruktion von differentialgleichungen mit vorgegebener endlicher galoisgruppe, PhD Thesis, Institut für Algorithmen und Kognitive Systeme, Universität Karlsruhe, 2006.
  183. Dimitri Leemans and Laurence Vauthier, An atlas of abstract regular polytopes for small groups, Aequationes Math. 72 (2006), no. 3, 313–320.[MR]
  184. Claus Lehr and Michel Matignon, Wild monodromy and automorphisms of curves, Duke Math. J. 135 (2006), no. 3, 569–586.[MR]
  185. Reynald Lercier and David Lubicz, A quasi-quadratic time algorithm for hyperelliptic curve point counting, Ramanujan J. 12 (2006), no. 3, 399–423.[MR/doi]
  186. Paulette Lieby, Colouring planar graphs, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 315–330.[MR]
  187. Tian Khoon Lim, Arc-transitive homogeneous factorizations and affine planes, J. Combin. Des. 14 (2006), no. 4, 290–300.[MR]
  188. San Ling, Chaoping Xing, and Ferruh Özbudak, An explicit class of codes with good parameters and their duals, Discrete Appl. Math. 154 (2006), no. 2, 346–356.[MR]
  189. John Little and Hal Schenck, Toric surface codes and Minkowski sums, SIAM J. Discrete Math. 20 (2006), no. 4, 999–1014 (electronic).[MR]
  190. Ronald van Luijk, Quartic K3 surfaces without nontrivial automorphisms, Math. Res. Lett. 13 (2006), no. 2-3, 423–439.[MR/arXiv]
  191. Benjamin Lundell and Jason McCullough, A generalized floor bound for the minimum distance of geometric Goppa codes, J. Pure Appl. Algebra 207 (2006), no. 1, 155–164.[MR]
  192. Le Van Ly, Polly Two: A new algebraic polynomial-based public-key scheme, Appl. Algebra Engrg. Comm. Comput. 17 (2006), no. 3-4, 267–283.[MR]
  193. Aleksander Malnič and Primož Potočnik, Invariant subspaces, duality, and covers of the Petersen graph, European J. Combin. 27 (2006), no. 6, 971–989.[MR]
  194. Stefano Marcugini, Alfredo Milani, and Fernanda Pambianco, Classification of linear codes exploiting an invariant, Contrib. Discrete Math. 1 (2006), no. 1, 1–7 (electronic).[MR]
  195. Phil Martin and Mark Watkins, Symmetric powers of elliptic curve L-functions, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 377–392.[MR]
  196. Krystian Matusiewicz, Scott Contini, and Josef Pieprzyk, Weaknesses of the fork-256 compression function, IACR ePrint 2006/317 (2006), 1–21.[link]
  197. Barry Mazur, William Stein, and John Tate, Computation of p-adic heights and log convergence, Doc. Math. (2006), no. Extra Vol., 577–614 (electronic).[MR]
  198. Gerhard O. Michler, Theory of finite simple groups, New Mathematical Monographs, vol. 8, Cambridge University Press, Cambridge, 2006, pp. 426,583.
  199. Jürgen Müller and Christophe Ritzenthaler, On the ring of invariants of ordinary quartic curves in characteristic 2, J. Algebra 303 (2006), no. 2, 530–542.[MR/link]
  200. G. Nebe, Kneser-Hecke-operators in coding theory, Abh. Math. Sem. Univ. Hamburg 76 (2006), 79–90.[MR]
  201. Gabriele Nebe, Eric M. Rains, and Neil J. A. Sloane, Self-dual Codes and Invariant Theory, Algorithms and Computation in Mathematics, vol. 17, Springer-Verlag, Berlin, 2006, pp. xxviii+430.[MR]
  202. Max Neunhöffer and Ákos Seress, A data structure for a uniform approach to computations with finite groups, ISSAC'06: Proceedings of the 2006 International Symposium on Symbolic and Algebraic Computation, ACM, New York, 2006, pp. 254–261.[MR/doi]
  203. Phong Q. Nguyen and Damien Stehlé, LLL on the average, Algorithmic Number Theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 238–256.[MR]
  204. Masayuki Noro, Modular dynamic evaluation, in ISSAC '06: Proceedings of the 2006 international symposium on Symbolic and algebraic computation, ACM Press, New York, NY, USA, 2006, pp. 262–268.[doi]
  205. E. A. O'Brien, Towards effective algorithms for linear groups, Finite Geometries, Groups, and Computation, Walter de Gruyter GmbH &Co. KG, Berlin, 2006, pp. 163–190.[MR]
  206. Michael E. O'Sullivan, Algebraic construction of sparse matrices with large girth, IEEE Trans. Inform. Theory 52 (2006), no. 2, 718–727.[MR/link]
  207. Stavros Argyrios Papadakis, Type II unprojection, J. Algebraic Geom. 15 (2006), no. 3, 399–414.[MR/arXiv]
  208. Christopher Parker and Peter Rowley, Local characteristic p completions of weak BN-pairs, Proc. London Math. Soc. (3) 93 (2006), no. 2, 325–394.[MR]
  209. Sebastian Pauli, Constructing class fields over local fields, J. Théor. Nombres Bordeaux 18 (2006), no. 3, 627–652.[MR]
  210. Tim Penttila, Applications of computer algebra to finite geometry, Finite geometries, groups, and computation, Walter de Gruyter GmbH &Co. KG, Berlin, 2006, pp. 203–221.[MR]
  211. Jana Pílniková, Parametrizing algebraic varieties using Lie algebras, preprint (2006), 74 pages.[arXiv]
  212. W. Plesken and D. Robertz, Representations, commutative algebra, and Hurwitz groups, J. Algebra 300 (2006), no. 1, 223–247.[MR]
  213. Alexandru A. Popa, Central values of Rankin L-series over real quadratic fields, Compos. Math. 142 (2006), no. 4, 811–866.[MR]
  214. Andrea Previtali, Irreducible constituents of monomial representations, J. Symbolic Comput. 41 (2006), no. 12, 1345–1359.[MR]
  215. Renault Guénaél Renault, Computation of the splitting field of a dihedral polynomial, in ISSAC '06: Proceedings of the 2006 International Symposium on Symbolic and Algebraic Computation, ACM Press, New York, NY, USA, 2006, pp. 290–297.[doi]
  216. I. I. Reznikov and V. I. Sushchanskii, A software system for growth analysis of Mealy automata, Cybernetics and Systems Analysis 42 (2006), no. 2, 265–276.[link]
  217. Eric Robinson and Gene Cooperman, A parallel architecture for disk-based computing over the baby monster and other large finite simple groups, in ISSAC '06: Proceedings of the 2006 international symposium on Symbolic and algebraic computation, ACM Press, New York, NY, USA, 2006, pp. 298–305.[doi]
  218. José L. Rodríguez, Jérôme Scherer, and Antonio Viruel, Non-simple localizations of finite simple groups, J. Algebra 305 (2006), no. 2, 765–774.[MR]
  219. Colva M. Roney-Dougal and William R. Unger, Computing the primitive permutation groups of degree less than 1000, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 243–260.[MR]
  220. Jeremy Rouse, Zagier duality for the exponents of Borcherds products for Hilbert modular forms, J. London Math. Soc. (2) 73 (2006), no. 2, 339–354.[MR]
  221. D. Schellekens, B. Preneel, and I. Verbauwhede, FPGA vendor agnostic true random number generator, Field Programmable Logic and Applications, 2006. FPL '06 (2006).
  222. Csaba Schneider, Small derived quotients in finite p-groups, Publ. Math. Debrecen 69 (2006), no. 3, 373–378.[MR]
  223. Andreas M. Schöpp, Fundamental units in a parametric family of not totally real quintic number fields, J. Théor. Nombres Bordeaux 18 (2006), no. 3, 693–706.[MR]
  224. Achill Schürmann and Frank Vallentin, Computational approaches to lattice packing and covering problems, Discrete Comput. Geom. 35 (2006), no. 1, 73–116.[MR]
  225. Ákos Seress, A unified approach to computations with permutation and matrix groups, International Congress of Mathematicians. Vol. II, Eur. Math. Soc., Zürich, 2006, pp. 245–258.[MR]
  226. Müfit Sezer and R. James Shank, On the coinvariants of modular representations of cyclic groups of prime order, J. Pure Appl. Algebra 205 (2006), no. 1, 210–225.[MR]
  227. Amit R. Sharma, J. Wu, B. J. Braams, S. Carter, R. Schneider, B. Shepler, and J. M. Bowman, Potential energy surfaces and MULTIMODE vibrational analysis of C2H3 + , J Chem Phys. 125 (2006), 224306.
  228. R. Shaw and N. A. Gordon, The polynomial degree of the Grassmannian G1,n,2, Des. Codes Cryptogr. 39 (2006), no. 2, 289–306.[MR]
  229. N. I. Shepherd-Barron, Perfect forms and the moduli space of abelian varieties, Invent. Math. 163 (2006), no. 1, 25–45.[MR]
  230. William Stein, Studying the Birch and Swinnerton-Dyer conjecture for modular abelian varieties using Magma, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 93–116.[MR]
  231. Makoto Sugita, Mitsuru Kawazoe, and Hideki Imai, Relation between the XL algorithm and Groebner basis algorithms, IEICE Trans. Fundamentals E89-A (2006), no. 1, 11–18.
  232. Katsuyuki Takashima, A new type of fast endomorphisms on Jacobians of hyperelliptic curves and their cryptographic application, IEICE Trans. Fundamentals E89-A (2006), no. 1, 124–133.
  233. M. Chiara Tamburini and M. Vsemirnov, Irreducible (2,3,7)-subgroups of PGLn(F), n ≤ 7, J. Algebra 300 (2006), no. 1, 339–362.[MR]
  234. Donald E. Taylor, Constructing the split octonions, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 161–185.[MR]
  235. Edlyn Teske, An elliptic curve trapdoor system, J. Cryptology 19 (2006), no. 1, 115–133.[MR]
  236. C. Tjhai, M. Tomlinson, M. Grassl, R. Horan, M. Ahmed, and M. Ambroze, New linear codes derived from binary cyclic codes of length 151, IEE Proceedings: Communications 153 (2006), no. 5, 581–585.
  237. W. R. Unger, Computing the character table of a finite group, J. Symbolic Comput. 41 (2006), no. 8, 847–862.[MR]
  238. W. R. Unger, Computing the soluble radical of a permutation group, J. Algebra 300 (2006), no. 1, 305–315.[MR]
  239. Michael Vaughan-Lee, Simple Lie algebras of low dimension over GF(2), LMS J. Comput. Math. 9 (2006), 174–192 (electronic).[MR]
  240. M. Vsemirnov, Groups G2(p) as quotients of (2,3,7;2p), Transform. Groups 11 (2006), no. 2, 295–304.[MR]
  241. M. A. Vsemirnov, Is the group SL(6,Z) (2,3)-generated?, Zap. Nauchn. Sem. S.-Peterburg. Otdel. Mat. Inst. Steklov. (POMI) 330 (2006), no. Vopr. Teor. Predst. Algebr. i Grupp. 13, 101–130, 272.[MR]
  242. Shayne Waldron and Nick Hay, On computing all harmonic frames of n vectors in Cd, Appl. Comput. Harmon. Anal. 21 (2006), no. 2, 168–181.[MR]
  243. Paul B. van Wamelen, Computing with the analytic Jacobian of a genus 2 curve, Discovering Mathematics with Magma, Algorithms Comput. Math., vol. 19, Springer, Berlin, 2006, pp. 117–135.[MR]
  244. Yan Wang, Xin Gui Fang, and D. F. Hsu, On the edge-forwarding indices of Frobenius graphs, Acta Math. Sin. (Engl. Ser.) 22 (2006), no. 6, 1735–1744.[MR/link]
  245. Mark Watkins, A note on integral points on elliptic curves, J. Théor. Nombres Bordeaux 18 (2006), no. 3, 707–720.[MR]
  246. Mark Watkins, Some remarks on Heegner point computations, preprint (2006), 14 pages.[arXiv]
  247. Michael Weller, Gerhard O. Michler, and Andrea Previtali, Thompson's sporadic group uniquely determined by the centralizer of a 2-central involution, J. Algebra 298 (2006), no. 2, 371–459.[MR]
  248. Annegret Weng, A low-memory algorithm for point counting on Picard curves, Des. Codes Cryptogr. 38 (2006), no. 3, 383–393.[MR]
  249. Greg White and Markus Grassl, A new minimum weight algorithm for additive codes, Proceedings 2006 IEEE International Symposium on Information Theory (ISIT 2006), Seattle, USA, July 2006, IEEE, 2006, pp. 1119-1123.
  250. Robert A. Wilson, New computations in the monster, Preprint (2006), 11.
  251. Pawel Wocjan, Efficient decoupling schemes with bounded controls based on Eulerian orthogonal arrays, Phy. Rev. A. 73 (2006), no. 6, 7.
  252. Christopher Wolf, An Braeken, and Bart Preneel, On the security of stepwise triangular systems, Des. Codes Cryptogr. 40 (2006), no. 3, 285–302.[MR]
  253. André Yamba Yamba, Krister Ahlander, and Malin Ljungberg, Designing for geometrical symmetry exploitation, Scientific Programming 14 (2006), no. 2, 61–80.[link]
  254. R. Yorgova, Constructing self-dual codes using an automorphism group, IEEE Information Theory Workshop, 2006. ITW '06 Chengdu (2006), 11-15.[doi]
  255. Robert Michael Zeier, Lie-theoretischer zugang zur erzeugung unitärer transformationen auf quantenrechnern, PhD Thesis, Institut für Algorithmen und Kognitive Systeme, Universität Karlsruhe, 2006.
  256. Huilin Zhu and Jianhua Chen, Integral points on a class of elliptic curve, Wuhan Univ. J. Nat. Sci. 11 (2006), no. 3, 477–480.[MR]
  257. Paul Zimmermann and Bruce Dodson, 20 years of ECM, Algorithmic Number Theory, Lecture Notes in Comput. Sci., vol. 4076, Springer, Berlin, 2006, pp. 525–542.[MR]
  258. Eliana Zoque, A counterexample to the existence of a Poisson structure on a twisted group algebra, preprint (2006), 4 pages.[arXiv]

2007

  1. David Abelson, Seok-Hee Hong, and D. E. Taylor, Geometric automorphism groups of graphs, Discrete Appl. Math. 155 (2007), no. 17, 2211–2226.[MR]
  2. Fatima K. Abu Salem and Kamal Khuri-Makdisi, Fast Jacobian group operations for C3,4 curves over a large finite field, LMS J. Comput. Math. 10 (2007), 307–328 (electronic).[MR]
  3. Sultan Zayid Al-Hinai1, Ed Dawson, Matt Henricksen, and Leonie Simpson, On the security of the LILI family of stream ciphers against algebraic attacks, Information Security and Privacy, Lecture Notes in Computer Science, vol. 4586/2007, Springer Berlin / Heidelberg, 2007, pp. 11–28.
  4. Christine Abegail Antonio, Satoru Nakamula, and Ken Nakamula, Comparing implementation efficiency of ordinary and squared pairings, IACR (2007), 13 pages.[eprint]
  5. Christine Abegail Antonio, Satoru Tanaka, and Ken Nakamula, Implementing cryptographic pairings over curves of embedding degrees 8 and 10, IACR (2007).[eprint]
  6. Tsvetan Asamov and Nuh Aydin, A search algorithm for linear codes: Progressive dimension growth, Des. Codes Cryptogr. 45 (2007), no. 2, 213–217.[MR]
  7. Avner Ash, Jos Brakenhoff, and Theodore Zarrabi, Equality of polynomial and field discriminants, Experiment. Math. 16 (2007), no. 3, 367–374.[MR/link]
  8. Björn Assmann and Stephen Linton, Using the Malcev correspondence for collection in polycyclic groups, J. Algebra 316 (2007), no. 2, 828–848.[MR]
  9. Sarah Astill, 3-local identifications of some finite simple groups, PhD Thesis, University of Birmingham, 2007.
  10. Roberto Maria Avanzi, Another look at square roots (and other less common operations) in fields of even characteristic, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 4876/2007, Springer Berlin / Heidelberg, 2007, pp. 138–154.[eprint]
  11. Nuh Aydin, Tsvetan Asamov, and T. Aaron Gulliver, Some open problems on quasi-twisted and related code constructions and good quaternary codes, IEEE International Symposium on Information Theory, 2007. ISIT 2007 (2007), 856-860.[doi]
  12. Werner Backes and Susanne Wetzel, An efficient LLL gram using buffered transformations, Computer Algebra in Scientific Computing, Lecture Notes in Computer Science, vol. 4770/2007, Springer Berlin / Heidelberg, 2007, pp. 31–44.
  13. Robert F. Bailey and John N. Bray, Decoding the Mathieu group M12, Adv. Math. Commun. 1 (2007), no. 4, 477–487.[MR]
  14. Simeon Ball, Gary Ebert, and Michel Lavrauw, A geometric construction of finite semifields, J. Algebra 311 (2007), no. 1, 117–129.[MR]
  15. Arthur Baragar and Ronald van Luijk, K3 surfaces with Picard number three and canonical vector heights, Math. Comp. 76 (2007), no. 259, 1493–1498 (electronic).[MR]
  16. M. Barbosa, A. Moss, and D. Page, Compiler assisted elliptic curve cryptography, On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, Lecture Notes in Computer Science, vol. 4804/2007, Springer Berlin / Heidelberg, 2007, pp. 1785–1802.
  17. Gregory V. Bard, Nicolas T. Courtois, and Chris Jefferson, Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over GF(2) via SAT-solvers, IACR (2007), 14 pages.[eprint]
  18. R. W. Barraclough and R. A. Wilson, The character table of a maximal subgroup of the Monster, LMS J. Comput. Math. 10 (2007), 161–175 (electronic).[MR]
  19. Laurent Bartholdi and Michael R. Bush, Maximal unramified 3-extensions of imaginary quadratic fields and SL2(Z3), J. Number Theory 124 (2007), no. 1, 159–166.[MR/arXiv]
  20. C. Bates, D. Bundy, S. Hart, and P. Rowley, Commuting involution graphs for sporadic simple groups, J. Algebra 316 (2007), no. 2, 849–868.[MR]
  21. Aurélie Bauer and Antoine Joux, Toward a rigorous variation of Coppersmith's algorithm on three variables, Advances in cryptology—EUROCRYPT 2007, Lecture Notes in Comput. Sci., vol. 4515, Springer, Berlin, 2007, pp. 361–378.[MR]
  22. Ingrid Bauer, Fabrizio Catanese, and Fritz Grunewald, The absolute Galois group acts faithfully on the connected components of the moduli space of surfaces of general type, preprint (2007), 13 pages.[arXiv]
  23. Michael Beck, Eric Pine, Wayne Tarrant, and Kim Yarbrough Jensen, New integer representations as the sum of three cubes, Math. Comp. 76 (2007), no. 259, 1683–1690 (electronic).[MR]
  24. Peter Beelen, The order bound for general algebraic geometric codes, Finite Fields Appl. 13 (2007), no. 3, 665–680.[MR]
  25. C. P. Bendel, D. K. Nakano, B. J. Parshall, and C. Pillen, Cohomology for quantum groups via the geometry of the Nullcone, Preprint (2007), 1–58.
  26. Christopher P. Bendel, Daniel K. Nakano, and Cornelius Pillen, Second cohomology groups for Frobenius kernels and related structures, Adv. Math. 209 (2007), no. 1, 162–197.[MR/link]
  27. Ingemar Bengtsson, Wojciech Bruzda, Asa Ericsson, Jan-Ake Larsson, Wojciech Tadej, and Karol Zyczkowski, Mutually unbiased bases and Hadamard matrices of order six, J. Math. Phys. 48 (2007), no. 052106, 1–21.[doi/arXiv]
  28. Michael A. Bennett, The Diophantine equation (xk-1)(yk-1)=(zk-1)t, Indag. Math. (N.S.) 18 (2007), no. 4, 507–525.[MR]
  29. David J. Benson, Philip Bergonio, Brian D. Boe, Leonard Chastkofsky, Bobbe Cooper, Jeremiah Hower, Jo Jang Hyun, Jonathan Kujawa, Nadia Mazza, Daniel K. Nakano, Kenyon J. Platt, and Caroline Wright, Support varieties for Weyl modules over bad primes, J. Algebra 312 (2007), no. 2, 602–633.
  30. Tobias Berger, An Eisenstein ideal for imaginary quadratic fields and the Bloch-Kato conjecture for Hecke characters, preprint (2007), 26 pages.[arXiv]
  31. Daniel J. Bernstein, Peter Birkner, Tanja Lange, and Christiane Peters, Optimizing double-base elliptic-curve single-scalar multiplication, Progress in cryptology—INDOCRYPT 2007, Lecture Notes in Comput. Sci., vol. 4859, Springer, Berlin, 2007, pp. 167–182.[MR/doi]
  32. Daniel J. Bernstein and Tanja Lange, Faster addition and doubling on elliptic curves, Advances in Cryptology - ASIACRYPT 2007, Lecture Notes in Computer Science, vol. 4833/2007, Springer Berlin / Heidelberg, 2007, pp. 29–50.
  33. Joan S. Birman, Volker Gebhardt, and Juan González-Meneses, Conjugacy in Garside groups. III. Periodic braids, J. Algebra 316 (2007), no. 2, 746–776.[MR]
  34. Philip Boalch, Higher genus icosahedral Painlevé curves, Funk. Ekvac. (Kobe), 50 (2007), 19–32.[arXiv]
  35. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, Cryptographic Hardware and Embedded Systems - CHES 2007, Lecture Notes in Computer Science, vol. 4727/2007, Springer Berlin / Heidelberg, 2007, pp. 450–466.
  36. Andrey Bogdanov and Andrey Pyshkin, Algebraic side-channel collision attacks on AES, IACR (2007).[eprint]
  37. Sean W. Bolt, John N. Bray, and Robert T. Curtis, Symmetric presentation of the Janko group J4, J. Lond. Math. Soc. (2) 76 (2007), no. 3, 683–701.[MR]
  38. Peter Borwein, Greg Fee, Ron Ferguson, and Alexa van der Waall, Zeros of partial sums of the Riemann zeta function, Experiment. Math. 16 (2007), no. 1, 21–39.[MR/link]
  39. Johan Bosman, A polynomial with Galois group SL2( F16), LMS J. Comput. Math. 10 (2007), 1461–1570 (electronic).[MR/arXiv]
  40. Johan Bosman, On the computation of Galois representations associated to level one modular forms, preprint (2007), 15 pages.[arXiv]
  41. A. Bostan, F. Chyzak, F. Ollivier, B. Salvy, É. Schost, and A. Sedoglavic, Fast computation of power series solutions of systems of differential equations, in SODA '07: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, Philadelphia, PA, USA, 2007, pp. 1012–1021.[arXiv]
  42. Alin Bostan, Frédéric Chyzak, Bruno Salvy, Grégoire Lecerf, and Éric Schost, Differential equations for algebraic functions, ISSAC 2007, ACM, New York, 2007, pp. 25–32.[MR/arXiv]
  43. Nigel Boston, Galois groups of tamely ramified p-extensions, J. Théor. Nombres Bordeaux 19 (2007), no. 1, 59–70.[MR]
  44. Nigel Boston and Rafe Jones, Arboreal Galois representations, Geom. Dedicata 124 (2007), 27–35.[MR]
  45. Hoans-Christian Graf von Bothmer, Oliver Labs, Josef Schicho, and Christiaan van de Woestijne, The Casas-Alvero conjecture for infinitely many degrees, J. Algebra 316 (2007), no. 1, 224–230.[MR/link]
  46. D. Boucher, W. Geiselmann, and F. Ulmer, Skew-cyclic codes, Appl. Algebra Engrg. Comm. Comput. 18 (2007), no. 4, 379–389.[MR/arXiv]
  47. N. Bourbaki, Algèbres tensorielles, algèbres extérieures, algèbres symétriques, Algèbre, Bourbaki, Springer, 2007, pp. 379–596.
  48. Mireille Boutin and Gregor Kemper, Lossless representation of graphs using distributions, preprint (2007), 19 pages.[arXiv]
  49. Mireille Boutin and Gregor Kemper, Which point configurations are determined by the distribution of their pairwise distances?, Internat. J. Comput. Geom. Appl. 17 (2007), no. 1, 31–43.[MR]
  50. J. D. Bradley and P. E. Holmes, Improved bounds for the spread of sporadic groups, LMS J. Comput. Math. 10 (2007), 132–140 (electronic).[MR]
  51. A. Bremner and N. Tzanakis, On squares in Lucas sequences, J. Number Theory 124 (2007), no. 2, 511–520.[MR]
  52. Florian Breuer, Ernest Lötter, and Brink van der Merwe, Ducci-sequences and cyclotomic polynomials, Finite Fields Appl. 13 (2007), no. 2, 293–304.[MR]
  53. M. J. Bright, N. Bruin, E. V. Flynn, and A. Logan, The Brauer-Manin obstruction and Sh[2], LMS J. Comput. Math. 10 (2007), 354–377 (electronic).[MR]
  54. Gavin Brown, A database of polarized K3 surfaces, Experiment. Math. 16 (2007), no. 1, 7–20.[MR]
  55. Gavin Brown and Kaori Suzuki, Computing certain Fano 3-folds, Japan J. Indust. Appl. Math. 24 (2007), no. 3, 241–250.[MR/link]
  56. Gavin Brown and Kaori Suzuki, Fano 3-folds with divisible anticanonical class, Manuscripta Math. 123 (2007), no. 1, 37–51.[MR/doi]
  57. Jim Brown, Saito-Kurokawa lifts and applications to the Bloch-Kato conjecture, Compos. Math. 143 (2007), no. 2, 290–322.[MR]
  58. Eimear Byrne, Marcus Greferath, and Michael E. O'Sullivan, The linear programming bound for codes over finite Frobenius rings, Des. Codes Cryptogr. 42 (2007), no. 3, 289–301.[MR]
  59. J. S. Calcut, Artin presentations from an algebraic viewpoint, J. Algebra Appl. 6 (2007), no. 2, 355–367.[MR]
  60. Colin M. Campbell, George Havas, Colin Ramsay, and Edmund F. Robertson, On the efficiency of the simple groups of order less than a million and their covers, Experiment. Math. 16 (2007), no. 3, 347–358.[MR]
  61. Colin M. Campbell, George Havas, and Edmund F. Robertson, Addendum to: "An elementary introduction to coset table methods in computational group theory", Groups—St. Andrews 1981, London Math. Soc. Lecture Note Ser., vol. 71, Cambridge Univ. Press, Cambridge, 2007, pp. 361–364.[MR]
  62. Jon F. Carlson, Maximal elementary abelian subgroups of rank 2, J. Group Theory 10 (2007), no. 1, 5–13.[MR]
  63. Abhijit Champanerkar, Jacob Lewis, Max Lipyanskiy, and Scott Meltzer, Exceptional regions and associated exceptional hyperbolic 3-manifolds, Experiment. Math. 16 (2007), no. 1, 107–118.[MR]
  64. Chao Chen, Benjamin C. Shepler, Bastiaan J. Braams, and Joel M. Bowman, Quasiclassical trajectory calculations of the OH+NO2 association reaction on a global potential energy surface, J. Chem. Phys 127 (2007), no. 104310, 11 pages.
  65. Guillaume Chèze and Grégoire Lecerf, Lifting and recombination techniques for absolute factorization, J. Complexity 23 (2007), no. 3, 380–420.[MR]
  66. Naoki Chigira, Masaaki Harada, and Masaaki Kitazume, Extremal self-dual codes of length 64 through neighbors and covering radii, Des. Codes Cryptogr. 42 (2007), no. 1, 93–101.[MR]
  67. Naoki Chigira, Masaaki Harada, and Masaaki Kitazume, Permutation groups and binary self-orthogonal codes, J. Algebra 309 (2007), no. 2, 610–621.[MR]
  68. Naoki Chigira, Masaaki Harada, and Masaaki Kitazume, Some self-dual codes invariant under the Hall-Janko group, J. Algebra 316 (2007), no. 2, 578–590.[MR]
  69. Robin Christian, Marston Conder, and Arkadii Slinko, Flippable pairs and subset comparisons in comparative probability orderings, Order 24 (2007), no. 3, 193–213.[MR]
  70. Henri Cohen, Number theory: volume I: tools and diophantine equations, Springer, Berlin, 2007, pp. xxii+650.
  71. Marston Conder, Robert Jajcay, and Thomas Tucker, Regular Cayley maps for finite abelian groups, J. Algebraic Combin. 25 (2007), no. 3, 259–283.[MR]
  72. Marston Conder, Simon Marshall, and Arkadii Slinko, Orders on multisets and discrete cones, Order 24 (2007), no. 4, 277–296.[MR]
  73. Marston Conder and Roman Nedela, Symmetric cubic graphs of small girth, J. Combin. Theory Ser. B 97 (2007), no. 5, 757–768.[MR]
  74. Marston Conder and Steve Wilson, Inner reflectors and non-orientable regular maps, Discrete Math. 307 (2007), no. 3-5, 367–372.[MR]
  75. Patrick Corn, Tate-Shafarevich groups and K3 surfaces, Math. Comp., to appear (2007), 17 pages.
  76. Patrick Corn, The Brauer-Manin obstruction on del Pezzo surfaces of degree 2, Proc. Lond. Math. Soc. (3) 95 (2007), no. 3, 735–777.[MR]
  77. Adán Cortés-Medina and Luis Valero-Elizondo, A computational verification of Alperin's weight conjecture for groups of small order and their prime fields, Rev. Colomb. Mat. 41 (2007), no. 2, 325–331.
  78. R. Coulangeon, M. I. Icaza, and M. O'Ryan, Lenstra's constant and extreme forms in number fields, Experiment. Math. 16 (2007), no. 4, 455–462.[MR/link]
  79. Robert S. Coulter, Marie Henderson, and Pamela Kosick, Planar polynomials for commutative semifields with specified nuclei, Des. Codes Cryptogr. 44 (2007), no. 1-3, 275–286.[MR]
  80. Nicolas T. Courtois and Gregory V. Bard, Algebraic cryptanalysis of the data encryption standard, Cryptography and Coding, Lecture Notes in Computer Science, vol. 4887/2007, Springer Berlin / Heidelberg, 2007, pp. 152–169.
  81. Nicolas T. Courtois, Gregory V. Bard, and David Wagner, Algebraic and slide attacks on KeeLoq, IACR (2007).[eprint]
  82. J. E. Cremona and M. P. Lingham, Finding all elliptic curves with good reduction outside a given set of primes, Experiment. Math. 16 (2007), no. 3, 303–312.[MR]
  83. Andrew W. Cross, David P. DiVincenzo, and Barbara M. Terhal, A comparative code study for quantum fault-tolerance, preprint (2007), 33 pages.[arXiv]
  84. John Cullinan, Local-global properties of torsion points on three-dimensional abelian varieties, J. Algebra 311 (2007), no. 2, 736–774.[MR]
  85. Robert T. Curtis, Symmetric generation of groups, Encyclopedia of Mathematics and its Applications, vol. 111, Cambridge University Press, Cambridge, 2007, pp. xiv+317.[MR]
  86. M. A. Dabkowska, M. K. Dabkowski, V. S. Harizanov, J. H. Przytycki, and M. A. Veve, Compactness of the space of left orders, J. Knot Theory Ramifications 16 (2007), no. 3, 257–266.[MR]
  87. Jennifer R. Daniel and Aloysius G. Helminck, Computing the fine structure of real reductive symmetric spaces, J. Symbolic Comput. 42 (2007), no. 5, 497–510.[MR]
  88. Susanne Danz, On vertices of exterior powers of the natural simple module for the symmetric group in odd characteristic, Arch. Math. (Basel) 89 (2007), no. 6, 485–496.[MR]
  89. Samit Dasgupta, Computations of elliptic units for real quadratic fields, Canad. J. Math. 59 (2007), no. 3, 553–574.[MR]
  90. Rumen Daskalov and Markus Grassl, New cyclic and quasi-cyclic quaternary linear codes, Proceedings Fifth International Workshop on Optimal Codes and Related Topics, (OC 2007) Balchik, Bulgaria, June 2007, 2007, pp. 56-61.
  91. Jennifer A. Davis, Algebraic geometric codes on anticanonical surfaces, PhD Thesis, University of Nebraska, 2007.[link]
  92. Italo J. Dejter, C-homogeneous graphs via ordered pencils, preprint (2007), 18 pages.[arXiv]
  93. Italo J. Dejter, On Clique Turan graph-homogeneity, preprint (2007), 20 pages.[arXiv]
  94. Lassina Dembélé, Quaternionic Manin symbols, Brandt matrices, and Hilbert modular forms, Math. Comp. 76 (2007), no. 258, 1039–1057 (electronic).[MR]
  95. Ulrich Derenthal, Universal torsors of del Pezzo surfaces and homogeneous spaces, Adv. Math. 213 (2007), no. 2, 849–864.[MR]
  96. Cunsheng Ding, Zeying Wang, and Qing Xiang, Skew Hadamard difference sets from the Ree-Tits slice symplectic spreads in PG(3,32h+1), J. Combin. Theory Ser. A 114 (2007), no. 5, 867–887.[MR/arXiv]
  97. Jintai Ding and John Wagner, Cryptanalysis of rational multivariate public key cryptosystems, IACR (2007).[eprint]
  98. Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Owen Chen, and Vivien Dubois, Breaking the symmetry: A way to resist the new differential attack, IACR (2007).[eprint]
  99. Shanshan Ding, Smallest irreducible of the form x2-dy2, Int. J. Number Theory (2007), 7 pages.
  100. T. Dokchitser and V. Dokchitser, Computations in non-commutative Iwasawa theory, Proc. Lond. Math. Soc. (3) 94 (2007), no. 1, 211–272.[MR/doi]
  101. Darrin Doud, Supersingular Galois representations and a generalization of a conjecture of Serre, Experiment. Math. 16 (2007), no. 1, 119–128.[MR/link]
  102. Steven T. Dougherty, Jon-Lark Kim, and Patrick Solé, Double circulant codes from two class association schemes, Adv. Math. Commun. 1 (2007), no. 1, 45–64.[MR]
  103. Andrej Dujella, On Mordell-Weil groups of elliptic curves induced by Diophantine triples, Glas. Mat. Ser. III 42(62) (2007), no. 1, 3–18.[MR/arXiv]
  104. Sylvain Duquesne, Elliptic curves associated with simplest quartic fields, J. Théor. Nombres Bordeaux 19 (2007), no. 1, 81–100.[MR]
  105. Wayne Eberly, Mark Giesbrecht, Pascal Giorgi, Arne Storjohann, and Gilles Villard, Faster inversion and other black box matrix computations using efficient block projections, ISSAC 2007, ACM, New York, 2007, pp. 143–150.[MR/arXiv]
  106. Kirsten Eisenträger and Kristin Lauter, A CRT algorithm for constructing genus 2 curves over finite fields, preprint (2007), 16 pages.[arXiv]
  107. Noam D. Elkies, Three lectures on elliptic surfaces and curves of high rank, preprint (2007), 14 pages.[arXiv]
  108. Harald Ellers and John Murray, Branching rules for Specht modules, J. Algebra 307 (2007), no. 1, 278–286.[MR/arXiv]
  109. Pavel Etingof and Victor Ginzburg, Noncommutative complete intersections and matrix integrals, Pure Appl. Math. Q. 3 (2007), no. 1, part 3, 107–151.[MR/arXiv]
  110. Pavel Etingof, Frédéric Latour, and Eric Rains, On central extensions of preprojective algebras, J. Algebra 313 (2007), no. 1, 165–175.[MR]
  111. Pavel Etingof, Alexei Oblomkov, and Eric Rains, Generalized double affine Hecke algebras of rank 1 and quantized del Pezzo surfaces, Adv. Math. 212 (2007), no. 2, 749–796.[MR]
  112. Reza Rezaeian Farashahi and Ruud Pellikaan, The quadratic extension extractor for (hyper)elliptic curves in odd characteristic, Arithmetic of finite fields, Lecture Notes in Comput. Sci., vol. 4547, Springer, Berlin, 2007, pp. 219–236.[MR]
  113. Boris Feigin and Boris Shoikhet, On [A,A]/[A, [A,A]] and on a Wn-action on the consecutive commutators of free associative algebra, Math. Res. Lett. 14 (2007), no. 5, 781–795.[MR/arXiv]
  114. Yan-Quan Feng, Jin Ho Kwak, and Chuixiang Zhou, Constructing even radius tightly attached half-arc-transitive graphs of valency four, J. Algebraic Combin. 26 (2007), no. 4, 431–451.[MR]
  115. Julio Fernández, Josep González, and Joan-C. Lario, Plane quartic twists of X(5,3), Canad. Math. Bull. 50 (2007), no. 2, 196–205.[MR]
  116. Claus Fieker, Sparse representation for cyclotomic fields, Experiment. Math. 16 (2007), no. 4, 493–500.[MR]
  117. Claus Fieker and Willem A. de Graaf, Finding integral linear dependencies of algebraic numbers and algebraic Lie algebras, LMS J. Comput. Math. 10 (2007), 271–287 (electronic).[MR]
  118. Chris M. Field and Chris M. Ormerod, An ultradiscrete matrix version of the fourth Painlevé equation, Adv. Difference Equ. (2007), Art. ID 96752, 14.[MR/arXiv]
  119. Tom Fisher, A new approach to minimising binary quartics and ternary cubics, Math. Res. Lett. 14 (2007), no. 4, 597–613.[MR/link]
  120. G. David Forney, Jr., Markus Grassl, and Saikat Guha, Convolutional and tail-biting quantum error-correcting codes, IEEE Trans. Inform. Theory 53 (2007), no. 3, 865–880.[MR]
  121. Laurent Fousse, Guillaume Hanrot, Vincent Lefèvre, Patrick Pélissier, and Paul Zimmermann, MPFR: a multiple-precision binary floating-point library with correct rounding, ACM Trans. Math. Software 33 (2007), no. 2, Art. 13, 15.[MR]
  122. Robert Fraatz, On the computation of integral closures of cyclic extensions of function fields, LMS J. Comput. Math. 10 (2007), 141–160 (electronic).[MR]
  123. David Freeman, Constructing pairing-friendly genus 2 curves with ordinary Jacobians, Pairing-based cryptography—Pairing 2007, Lecture Notes in Comput. Sci., vol. 4575, Springer, Berlin, 2007, pp. 152-176.[MR]
  124. Philippe Gaborit, A bound for certain s-extremal lattices and codes, Arch. Math. (Basel) 89 (2007), no. 2, 143–151.[MR]
  125. Victor A. Galaktionov and Sergey R. Svirshchevskii, Exact solutions and invariant subspaces of nonlinear partial differential equations in mechanics and physics, Chapman &Hall/CRC Applied Mathematics and Nonlinear Science Series, Chapman &Hall/CRC, Boca Raton, FL, 2007, pp. xxx+498.[MR]
  126. S. D. Galbraith, J. F. McKee, and P. C. Valença, Ordinary abelian varieties having small embedding degree, Finite Fields Appl. 13 (2007), no. 4, 800–814.[MR]
  127. Steven D. Galbraith, Colm Ó hÉigeartaigh, and Caroline Sheedy, Simplified pairing computation and security implications, J. Math. Cryptol. 1 (2007), no. 3, 267–281.[MR]
  128. Kseniya Garaschuk, On binary and ternary Kloosterman sums, PhD Thesis, Simon Fraser University, 2007.
  129. Sharon Anne Garthwaite, Convolution congruences for the partition function, Proc. Amer. Math. Soc. 135 (2007), no. 1, 13–20 (electronic).[MR]
  130. Pierrick Gaudry, Alexander Kruppa, and Paul Zimmermann, A GMP-based implementation of Schönhage-Strassen's large integer multiplication algorithm, ISSAC 2007, ACM, New York, 2007, pp. 167–174.[MR]
  131. Willi Geiselmann and Rainer Steinwandt, Cryptanalysis of a hash function proposed at ICISC 2006, Information Security and Cryptology - ICISC 2007, Lecture Notes in Computer Science, vol. 4817/2007, Springer Berlin / Heidelberg, 2007, pp. 1–10.
  132. Willi Geiselmann and Rainer Steinwandt, Non-wafer-scale sieving hardware for the NFS: another attempt to cope with 1024-bit, Advances in cryptology—EUROCRYPT 2007, Lecture Notes in Comput. Sci., vol. 4515, Springer, Berlin, 2007, pp. 466–481.[MR/link]
  133. University of Georgia VIGRE Algebra Group, Support varieties for Weyl modules over bad primes, J. Algebra 312 (2007), no. 2, 602–633.[MR]
  134. S. Georgiou, I. Kotsireas, and C. Koukouvinos, Inequivalent Hadamard matrices of order 2n constructed from Hadamard matrices of order n, J. Combin. Math. Combin. Comput. 63 (2007), 65–79.[MR]
  135. Stelios D. Georgiou, New two-variable full orthogonal designs and related experiments with linear regression models, Statist. Probab. Lett. 77 (2007), no. 1, 25–31.[MR]
  136. V. P. Gerdt and Yu. A. Blinkov, On selection of nonmultiplicative prolongations in computation of Janet bases, Programming and Computer Software 33 (2007), no. 3, 147–153.
  137. V. P. Gerdt and Yu. A. Blinkov, Strategies for selecting non-multiplicative prolongations in computing Janet bases, Programmirovanie (2007), no. 3, 34–43.[MR]
  138. Ralf Gerkmann, Relative rigid cohomology and deformation of hypersurfaces, Int. Math. Res. Pap. IMRP (2007), no. 1, Art. ID rpm003, 67.[MR]
  139. Ralf Gerkmann, Mao Sheng, and Kang Zuo, Computational details on the disproof of modularity, preprint (2007), 16 pages.[arXiv]
  140. Jean Gillibert, Invariants de classes: exemples de non-annulation en dimension supérieure, Math. Ann. 338 (2007), no. 2, 475–495.[MR]
  141. Victor Ginzburg, Calabi-Yau algebras, preprint (2007), 79 pages.[arXiv]
  142. Michael Giudici, Cai Heng Li, Primož Potočnik, and Cheryl E. Praeger, Homogeneous factorisations of complete multipartite graphs, Discrete Math. 307 (2007), no. 3-5, 415–431.[MR]
  143. Véronique Godin, The unstable integral homology of the mapping class groups of a surface with boundary, Math. Ann. 337 (2007), no. 1, 15–60.[MR]
  144. Daniel Goldstein and Robert Guralnick, Alternating forms and self-adjoint operators, J. Algebra 308 (2007), no. 1, 330–349.[MR]
  145. Willem A. de Graaf, Classification of 6-dimensional nilpotent Lie algebras over fields of characteristic not 2, J. Algebra 309 (2007), no. 2, 640–653.[MR]
  146. Markus Grassl, Computing extensions of linear codes, IEEE International Symposium on Information Theory, 2007. ISIT 2007 (2007), 476-480.[doi]
  147. Edward L. Green and Øyvind Solberg, An algorithmic approach to resolutions, J. Symbolic Comput. 42 (2007), no. 11-12, 1012–1033.[MR]
  148. V. A. Gritsenko, K. Hulek, and G. K. Sankaran, The Kodaira dimension of the moduli of K3 surfaces, Invent. Math. 169 (2007), no. 3, 519–567.[MR]
  149. Jordi Guàrdia, Jacobian Nullwerte, periods and symmetric equations for hyperelliptic curves, Ann. Inst. Fourier (Grenoble) 57 (2007), no. 4, 1253–1283.[MR]
  150. Pierre Guillot, The Chow rings of G2 and Spin(7), J. Reine Angew. Math. 604 (2007), 137–158.[MR]
  151. T. Aaron Gulliver, Masaaki Harada, and Hiroki Miyabayashi, Double circulant and quasi-twisted self-dual codes over F5 and F7, Adv. Math. Commun. 1 (2007), no. 2, 223–238.[MR]
  152. T. Aaron Gulliver, Masaaki Harada, and Hiroki Miyabayashi, Optimal double circulant self-dual codes over F4. II, Australas. J. Combin. 39 (2007), 163–174.[MR]
  153. Cem Güneri and Ferruh Özbudak, Cyclic codes and reducible additive equations, IEEE Trans. Inform. Theory 53 (2007), no. 2, 848–853.[MR]
  154. Robert Guralnick and John Shareshian, Symmetric and alternating groups as monodromy groups of Riemann surfaces. I. Generic covers and covers with many branch points, Mem. Amer. Math. Soc. 189 (2007), no. 886, vi+128.[MR]
  155. K. Győry and Á. Pintér, On the resolution of equations Axn-Byn = C in integers x,y and n ≥ 3. I, Publ. Math. Debrecen 70 (2007), no. 3-4, 483–501.[MR]
  156. Emmanuel Hallouin and Marc Perret, On the kernel of the norm in some unramified number fields extensions, preprint (2007), 6 pages.[arXiv]
  157. Marshall Hampton and Manuele Santoprete, Seven-body central configurations: A family of central configurations in the spatial seven-body problem, Cel. Mec. Dynam. Astron 99 (2007), no. 4, 293–305.[doi/arXiv]
  158. Timo Hanke, The isomorphism problem for cyclic algebras and an application, ISSAC 2007, ACM, New York, 2007, pp. 181–186.[MR/arXiv]
  159. Guillaume Hanrot and Damien Stehlé, Improved analysis of Kannan's shortest lattice vector algorithm (extended abstract), Advances in cryptology—CRYPTO 2007, Lecture Notes in Comput. Sci., vol. 4622, Springer, Berlin, 2007, pp. 170–186.[MR]
  160. Masaaki Harada, W. Holzmann, H. Kharaghani, and M. Khorvash, Extremal ternary self-dual codes constructed from negacirculant matrices, Graphs Combin. 23 (2007), no. 4, 401–417.[MR]
  161. Masaaki Harada and Takuji Nishimura, An extremal singly even self-dual code of length 88, Adv. Math. Commun. 1 (2007), no. 2, 261–267.[MR]
  162. Masaaki Harada, Takuji Nishimura, and Radinka Yorgova, New extremal self-dual codes of length 66, Math. Balkanica (N.S.) 21 (2007), no. 1-2, 113–121.[MR]
  163. David Harvey, Kedlaya's algorithm in larger characteristic, Int. Math. Res. Not. IMRN (2007), no. 22, Art. ID rnm095, 29.[MR]
  164. George Havas and Colin Ramsay, On proofs in finitely presented groups, Groups St. Andrews 2005. Vol. 2, London Math. Soc. Lecture Note Ser., vol. 340, Cambridge Univ. Press, Cambridge, 2007, pp. 457–474.[MR]
  165. George Havas and M. R. Vaughan-Lee, Computing with 4-Engel groups, Groups St. Andrews 2005. Vol. 2, London Math. Soc. Lecture Note Ser., vol. 340, Cambridge Univ. Press, Cambridge, 2007, pp. 475–485.[MR]
  166. Stuart Hendren, Extra special defect groups of order p3 and exponent p, J. Algebra 313 (2007), no. 2, 724–760.[MR]
  167. K. J. Horadam, Hadamard matrices and their applications, Princeton University Press, Princeton, NJ, 2007, pp. xiv+263.[MR]
  168. Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, and Michihiko Minoh, Fingerprinting codes for live pay-television broadcast via internet, Multimedia Content Analysis and Mining, Lecture Notes in Computer Science, vol. 4577/2007, Springer Berlin / Heidelberg, 2007, pp. 252–261.
  169. Min-Hsiu Hsieh, Igor Devetak, and Todd Brun, General entanglement-assisted quantum error-correcting codes, Physical Review A (Atomic, Molecular, and Optical Physics) 76 (2007), no. 6, 062313.[doi]
  170. Stephen P. Humphries, An action of subgroups of mapping class groups on polynomial algebras, Topology Appl. 154 (2007), no. 6, 1053–1083.[MR]
  171. Stephen P. Humphries, Intersection-number operators and Chebyshev polynomials. IV. Non-planar cases, Geom. Dedicata 130 (2007), 25–41.[MR]
  172. Stephen P. Humphries, Subgroups of pure braid groups generated by powers of Dehn twists, Rocky Mountain J. Math. 37 (2007), no. 3, 801–828.[MR]
  173. Stephen Humphries and Anthony Manning, Curves of fixed points of trace maps, Ergodic Theory Dynam. Systems 27 (2007), no. 4, 1167–1198.[MR]
  174. Georg Illies and Marian Margraf, Attacks on the ESA-PSS-04-151 MAC scheme, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 4876/2007, Springer Berlin / Heidelberg, 2007, pp. 296–310.
  175. I. M. Isaacs, Counting characters of upper triangular groups, J. Algebra 315 (2007), no. 2, 698–719.[MR]
  176. Samar Jaafar and Kamal Khuri-Makdisi, On the maps from X(4p) to X(4), preprint (2007), 11 pages.[arXiv]
  177. Dimitar P. Jetchev and William A. Stein, Visibility of the Shafarevich-Tate group at higher level, Doc. Math. 12 (2007), 673–696.[MR]
  178. Ellen Jochemsz and Alexander May, A polynomial time attack on RSA with private CRT-exponents smaller than N0.073, Advances in cryptology—CRYPTO 2007, Lecture Notes in Comput. Sci., vol. 4622, Springer, Berlin, 2007, pp. 395–411.[MR]
  179. John Jossey, Galois 2-extensions unramified outside 2, J. Number Theory 124 (2007), no. 1, 42–56.[MR]
  180. Michael Joswig and Nikolaus Witte, Products of foldable triangulations, Adv. Math. 210 (2007), no. 2, 769–796.[MR]
  181. Antoine Joux, David Naccache, and Emmanuel Thomé, When e-th roots become easier than factoring, Advances in Cryptology - ASIACRYPT 2007, Lecture Notes in Computer Science, vol. 4833/2007, Springer Berlin / Heidelberg, 2007, pp. 13–28.
  182. Waldyr D. Benits Junior and Steven D. Galbraith, Constructing pairing-friendly elliptic curves using Gröbner basis reduction, Cryptography and Coding, Lecture Notes in Computer Science, vol. 4887/2007, Springer Berlin / Heidelberg, 2007, pp. 336–345.
  183. Samuel Kadziela, Rigid analytic uniformization of curves and the study of isogenies, Acta Appl. Math. 99 (2007), no. 2, 185–204.[MR]
  184. Cezary Kaliszyk and Freek Wiedijk, Certified computer algebra on top of an interactive theorem prover, Towards Mechanized Mathematical Assistants, Lecture Notes in Computer Science, vol. 4573/2007, Springer Berlin / Heidelberg, 2007, pp. 94–105.
  185. Levent Kandiller, Principles of Mathematics in Operations Research, International Series in Operations Research &Management Science, 97, Springer, New York, 2007, pp. xii+297.[MR]
  186. Luise-Charlotte Kappe and Robert Fitzgerald Morse, On commutators in groups, Groups St. Andrews 2005. Vol. 2, London Math. Soc. Lecture Note Ser., vol. 340, Cambridge Univ. Press, Cambridge, 2007, pp. 531–558.[MR]
  187. Dikran B. Karagueuzian and Peter Symonds, The module structure of a group action on a polynomial ring: a finiteness theorem, J. Amer. Math. Soc. 20 (2007), no. 4, 931–967 (electronic).[MR]
  188. Christine A. Kelley, Deepak Sridhara, and Joachim Rosenthal, Tree-based construction of LDPC codes having good pseudocodeword weights, IEEE Trans. Inform. Theory 53 (2007), no. 4, 1460–1478.[MR]
  189. Gregor Kemper, The computation of invariant fields and a constructive version of a theorem by Rosenlicht, Transform. Groups 12 (2007), no. 4, 657–670.[MR]
  190. J. D. Key and P. Seneviratne, Binary codes from rectangular lattice graphs and permutation decoding, European J. Combin. 28 (2007), no. 1, 121–126.[MR]
  191. J. D. Key and P. Seneviratne, Codes from the line graphs of complete multipartite graphs and PD-sets, Discrete Math. 307 (2007), no. 17-18, 2217–2225.[MR]
  192. L. J. P. Kilford, Generating spaces of modular forms with η-quotients, JP J. Algebra Number Theory Appl. 8 (2007), no. 2, 213–226.[MR/arXiv]
  193. Jon-Lark Kim and Yoonjin Lee, Construction of MDS self-dual codes over Galois rings, Des. Codes Cryptogr. 45 (2007), no. 2, 247–258.[MR]
  194. Sunghwan Kim, Jong-Seon No, Habong Chung, and Dong-Joon Shin, Cycle analysis and construction of protographs for QC (LDPC) codes with girth larger than 12, IEEE International Symposium on Information Theory, 2007. ISIT 2007 (2007), 2256-2260.[doi]
  195. Simon King, Fast computation of secondary invariants, preprint (2007), 13 pages.[arXiv]
  196. Simon King, Minimal generating sets of non-modular invariant rings of finite groups, preprint (2007), 14 pages.[arXiv]
  197. Martin Kohls, Üeber die tiefe von invariantenringen unendlicher gruppen, PhD Thesis, Technische Universitaet Muechen, 2007.
  198. I. S. Kotsireas and C. Koukouvinos, Inequivalent hadamard matrices from orthogonal designs, in PASCO '07: Proceedings of the 2007 International Workshop on Parallel Symbolic Computation, ACM, New York, NY, USA, 2007, pp. 95–96.[doi]
  199. R. V. Kravchenko and B. V. Petrenko, Some formulas for the minimal number of generators of the direct sum of matrix rings, preprint (2007), 23 pages.[arXiv]
  200. Paul F. Kubwalo and John A. Ryan, Low density parity check irreducible Goppa codes, AFRICON 2007 (2007), 8 pages.[doi]
  201. Dimitri Leemans and Egon Schulte, Groups of type L2(q) acting on polytopes, Adv. Geom. 7 (2007), no. 4, 529–539.[MR]
  202. D. Lehavi and C. Ritzenthaler, An explicit formula for the arithmetic-geometric mean in genus 3, Experiment. Math. 16 (2007), no. 4, 421–440.[MR/arXiv]
  203. Franck Leprévost, Michael Pohst, and Andreas Schöpp, Units in some parametric families of quartic fields, Acta Arith. 127 (2007), no. 3, 205–216.[MR]
  204. Mark L. Lewis, Generalizing a theorem of Huppert and Manz, J. Algebra Appl. 6 (2007), no. 4, 687–695.[MR]
  205. Xin Li, Marc Moreno Maza, and Éric Schost, Fast arithmetic for triangular sets: from theory to practice, ISSAC 2007, ACM, New York, 2007, pp. 269–276.[MR]
  206. Xin Li, Marc Moreno Maza, and Éric Schost, On the virtues of generic programming for symbolic computation, Computational Science - ICCS 2007, Lecture Notes in Computer Science, vol. 4488/2007, Springer Berlin / Heidelberg, 2007, pp. 379–596.
  207. Martin W. Liebeck and E. A. O'Brien, Finding the characteristic of a group of Lie type, J. Lond. Math. Soc. (2) 75 (2007), no. 3, 741–754.[MR]
  208. John Little and Ryan Schwarz, On toric codes and multivariate Vandermonde matrices, Appl. Algebra Engrg. Comm. Comput. 18 (2007), no. 4, 349–367.[MR]
  209. Michael Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Yang, and Jintai Ding, Secure PRNGs from specialized polynomial maps over any Fq, IACR (2007).[eprint]
  210. Marko Lovrečič Saražin, Walter Pacco, and Andrea Previtali, Generalizing the generalized Petersen graphs, Discrete Math. 307 (2007), no. 3-5, 534–543.[MR]
  211. F. Lübeck, K. Magaard, and E. A. O'Brien, Constructive recognition of SL3(q), J. Algebra 316 (2007), no. 2, 619–633.[MR]
  212. Ronald van Luijk, K3 surfaces with Picard number one and infinitely many rational points, Algebra and Number Theory 1 (2007), no. 1, 1–15.
  213. Ronald van Luijk, An elliptic K3 surface associated to Heron triangles, J. Number Theory 123 (2007), no. 1, 92–119.[MR]
  214. Ronald van Luijk, Cubic points on cubic curves and the Brauer-Manin obstruction on K3 surfaces, preprint (2007), 17 pages.[arXiv]
  215. Jean-Gabriel Luque, Jean-Yves Thibon, and Frédéric Toumazet, Unitary invariants of qubit systems, Math. Structures Comput. Sci. 17 (2007), no. 6, 1133–1151.[MR/arXiv]
  216. Klaus M. Lux and Magdolna Szőke, Computing decompositions of modules over finite-dimensional algebras, Experiment. Math. 16 (2007), no. 1, 1–6.[MR]
  217. G. Malema, Constructing quasi-cyclic LDPC codes using a search algorithm, 2007 IEEE International Symposium on Signal Processing and Information Technology (2007), 956-960.[doi]
  218. Aleksander Malnič, Dragan Marušič, Štefko Miklavič, and Primož Potočnik, Semisymmetric elementary abelian covers of the Möbius-Kantor graph, Discrete Math. 307 (2007), no. 17-18, 2156–2175.[MR/arXiv]
  219. Aleksander Malnič, Dragan Marušič, and Primož Šparl, On strongly regular bicirculants, European J. Combin. 28 (2007), no. 3, 891–900.[MR]
  220. Stefano Marcugini, Alfredo Milani, and Fernanda Pambianco, Complete arcs in PG(2,25): the spectrum of the sizes and the classification of the smallest complete arcs, Discrete Math. 307 (2007), no. 6, 739–747.[MR]
  221. Ivan Marin and Jean Michel, Automorphisms of complex reflection groups, preprint (2007), 39 pages.[arXiv]
  222. Kazuo Matsuno, Construction of elliptic curves with large Iwasawa λ-invariants and large Tate-Shafarevich groups, Manuscripta Math. 122 (2007), no. 3, 289–304.[MR]
  223. Coy L. May, Groups of even real genus, J. Algebra Appl. 6 (2007), no. 6, 973–989.[MR]
  224. Coy L. May, The real genus of 2-groups, J. Algebra Appl. 6 (2007), no. 1, 103–118.[MR]
  225. Cameron McDonald, Chris Charnes, and Josef Pieprzyk, An algebraic analysis of Trivium ciphers based on the boolean satisfiability problem, IACR (2007).[eprint]
  226. Keith E. Mellinger, Classes of codes from quadratic surfaces of PG(3,q), Contrib. Discrete Math. 2 (2007), no. 1, 35–42 (electronic).[MR]
  227. Gerhard O. Michler and Andrea Previtali, O'Nan group uniquely determined by the centralizer of a 2-central involution, J. Algebra Appl. 6 (2007), no. 1, 135–171.[MR]
  228. J. Miret, D. Sadornil, J. Tena, R. Tomàs, and M. Valls, Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in ACSW '07: Proceedings of the fifth Australasian symposium on ACSW frontiers, Australian Computer Society, Inc., 2007, pp. 153–157.
  229. V. A. Mityunin and E. V. Pankratiev, Parallel algorithms for Gröbner-basis construction, J. Math. Sci. (N. Y.) 142 (2007), no. 4, 2248–2266.
  230. Jesper M. Møller, N-determined 2-compact groups. I, Fund. Math. 195 (2007), no. 1, 11–84.[MR]
  231. Jesper M. Møller, N-determined 2-compact groups. II, Fund. Math. 196 (2007), no. 1, 1–90.[MR]
  232. Jamshid Moori and B. G. Rodrigues, Some designs and codes invariant under the simple group Co2, J. Algebra 316 (2007), no. 2, 649–661.[MR]
  233. Marc Moreno Maza, Greg Reid, Robin Scott, and Wenyuan Wu, On approximate triangular decompositions in dimension zero, J. Symbolic Comput. 42 (2007), no. 7, 693–716.[MR]
  234. Alexander Moretó, Complex group algebras of finite groups: Brauer's problem 1, Adv. Math. 208 (2007), no. 1, 236–248.[MR]
  235. Peter Müller and Gábor P. Nagy, A note on the group of projectivities of finite projective planes, Innov. Incidence Geom. 6/7 (2007/08), 291–294.[MR]
  236. Koh-ichi Nagao, Decomposed attack for the jacobian of a hyperelliptic curve over an extension field, IACR (2007), 15 pages.[eprint]
  237. Gabriele Nebe and Kristina Schindelar, S-extremal strongly modular lattices, J. Théor. Nombres Bordeaux 19 (2007), no. 3, 683–701.[MR]
  238. Annika Niehage, Nonbinary quantum Goppa codes exceeding the quantum Gilbert-Varshamov bound, Quantum Inf. Process. 6 (2007), no. 3, 143–158.[MR]
  239. David Nister, Richard Hartley, and Henrik Stewenius, Using Galois theory to prove structure from motion algorithms are optimal, in Computer Vision and Pattern Recognition, 2007. CVPR '07, 17-22 June 2007, 8 pages.[doi]
  240. Alen Orbanić, F-actions and parallel-product decomposition of reflexible maps, J. Algebraic Combin. 26 (2007), no. 4, 507–527.[MR]
  241. Emmanuela Orsini and Massimiliano Sala, General error locator polynomials for binary cyclic codes with t ≤ 2 and n < 63, IEEE Trans. Inform. Theory 53 (2007), no. 3, 1095–1107.[MR]
  242. C. W. Parker, Semisymmetric cubic graphs of twice odd order, European J. Combin. 28 (2007), no. 2, 572–591.[MR]
  243. Clément Pernet and Arne Storjohann, Faster algorithms for the characteristic polynomial, ISSAC 2007, ACM, New York, 2007, pp. 307–314.[MR]
  244. Kathleen L. Petersen, One-cusped congruence subgroups of Bianchi groups, Math. Ann. 338 (2007), no. 2, 249–282.[MR]
  245. Albrecht Petzoldt and Johannes Buchmann, A multivariate signature scheme with an almost cyclic public key, IACR (2007), 6 pages.[eprint]
  246. Jana Pílniková, Trivializing a central simple algebra of degree 4 over the rational numbers, J. Symbolic Comput. 42 (2007), no. 6, 579–586.[MR]
  247. Ákos Pintér, On the power values of power sums, J. Number Theory 125 (2007), no. 2, 412–423.[MR/doi]
  248. Bjorn Poonen, Edward F. Schaefer, and Michael Stoll, Twists of X(7) and primitive solutions to x2+y3=z7, Duke Math. J. 137 (2007), no. 1, 103–158.[MR]
  249. Adrien Poteaux, Computing monodromy groups defined by plane algebraic curves, SNC'07, ACM, New York, 2007, pp. 36–45.[MR]
  250. Gopal Prasad and Sai-Kee Yeung, Fake projective planes, Invent. Math. 168 (2007), no. 2, 321–370.[MR]
  251. Carlos Rito, On surfaces with pg = q = 1 and non-ruled bicanonial involution, Ann. Sc. Norm. Super. Pisa Cl. Sci. (5) 6 (2007), no. 1, 81–102.[MR/arXiv]
  252. Eric Robinson, Jürgen Müller, and Gene Cooperman, A disk-based parallel implementation for direct condensation of large permutation modules, ISSAC 2007, ACM, New York, 2007, pp. 315–322.[MR]
  253. Emmanuel Royer, Evaluating convolution sums of the divisor function with quasimodular forms, Int. J. Number Theory 3 (2007), no. 2, 231–261.[arXiv]
  254. Diego Ruano, On the parameters of r-dimensional toric codes, Finite Fields Appl. 13 (2007), no. 4, 962–976.[MR]
  255. John A. Ryan and Kondwani Magamba, Equivalent irreducible Goppa codes and the precise number of quintic Goppa codes of length 32, AFRICON 2007 (2007), 1-4.[doi]
  256. Mohab Safey El Din, Testing sign conditions on a multivariate polynomial and applications, Math. Comput. Sci. 1 (2007), no. 1, 177–207.[MR]
  257. Massimiliano Sala, Gröbner basis techniques to compute weight distributions of shortened cyclic codes, J. Algebra Appl. 6 (2007), no. 3, 403–414.[MR]
  258. Tanaka Satoru and Nakamula Ken, More constructing pairing-friendly elliptic curves for cryptography, preprint (2007), 11 pages.[arXiv]
  259. Mohamed Sayed, Combinatorial method in the coset enumeration of symmetrically generated groups. II. Monomial modular representations, Int. J. Algebra 1 (2007), no. 9-12, 505–518.[MR/doi]
  260. Travis Schedler, Hochschild homology of preprojective algebras over the integers, preprint (2007), 103 pages.[arXiv]
  261. Stefan Schröer, Kummer surfaces for the self-product of the cuspidal rational curve, J. Algebraic Geom. 16 (2007), no. 2, 305–346.[MR/arXiv]
  262. Murat Sertel and Arkadii Slinko, Ranking committees, income streams or multisets, Economic Theory 30 (2007), no. 2, 265–287.[link]
  263. Romyar T. Sharifi, Iwasawa theory and the Eisenstein ideal, Duke Math. J. 137 (2007), no. 1, 63–101.[MR]
  264. Anuradha Sharma, Gurmeet K. Bakshi, and Madhu Raka, Polyadic codes of prime power length, Finite Fields Appl. 13 (2007), no. 4, 1071–1085.[MR]
  265. Mathieu Dutour Sikirić, Achill Schürmann, and Frank Vallentin, Classification of eight-dimensional perfect forms, Electron. Res. Announc. Amer. Math. Soc. 13 (2007), 21–32 (electronic).[MR]
  266. Samir Siksek, The modular approach to diophantine equations, Number Theory, Graduate Texts in Mathematics, vol. 240, Springer, New York, 2007, pp. 495-527.[doi]
  267. Michael C. Slattery, Generation of groups of square-free order, J. Symbolic Comput. 42 (2007), no. 6, 668–677.[MR]
  268. James P Smith, Picard-Fuchs differential equations for families of K3 surfaces, PhD Thesis, University of Warwick, 2007.[arXiv]
  269. Patrick Solé and Virgilio Sison, Bounds on the minimum homogeneous distance of the p-ary image of linear block codes over the Galois ring GR(pr,m), IEEE Trans. Inform. Theory 53 (2007), no. 6, 2270–2273.[MR]
  270. P. Christopher Staecker, Computing twisted conjugacy classes in free groups using nilpotent quotients, preprint (2007), 14 pages.[arXiv]
  271. Mark Stather, Constructive Sylow theorems for the classical groups, J. Algebra 316 (2007), no. 2, 536–559.[MR]
  272. William Stein, Modular Forms: A Computational Approach, Graduate Studies in Mathematics, vol. 79, American Mathematical Society, Providence, RI, 2007, pp. xvi+268.[MR]
  273. William A. Stein, Visibility of Mordell-Weil groups, Doc. Math. 12 (2007), 587–606.[MR]
  274. Aliza Steurer, On the Galois groups of the 2-class towers of some imaginary quadratic fields, J. Number Theory 125 (2007), no. 1, 235–246.[MR]
  275. A. Stoimenow, Generating functions, Fibonacci numbers and rational knots, J. Algebra 310 (2007), no. 2, 491–525.[MR]
  276. H. Strade, Lie algebras of small dimension, Lie algebras, vertex operator algebras and their applications, Contemp. Math., vol. 442, Amer. Math. Soc., Providence, RI, 2007, pp. 233–265.[MR]
  277. Peter Symonds, Cyclic group actions on polynomial rings, Bull. Lond. Math. Soc. 39 (2007), no. 2, 181–188.[MR/link]
  278. Katsuyuki Takashima, Scaling security of elliptic curves with fast pairing using efficient endomorphisms, IEICE Trans. Fundamentals E-90A (2007), no. 1, 152–159.
  279. Szabolcs Tengely, Triangles with two integral sides, Ann. Math. Inform. 34 (2007), 89–95.[MR]
  280. C. Tjhai and M. Tomlinson, Results on binary cyclic codes, Electronics Letters 43 (2007), no. 4, 234–235.
  281. Suratose Tritilanunt, Colin Boyd, Ernest Foo, and Juan Manuel González Nieto, Toward non-parallelizable client puzzles, Cryptology and Network Security, Lecture Notes in Computer Science, vol. 4856/2007, Springer, Berlin/Heidelberg, 2007, pp. 247–264.
  282. Shigeo Tsujii, Kohtaro Tadaki, and Ryou Fujita, Proposal for piece in hand matrix: General concept for enhancing security of multivariate public key cryptosystems, IEICE Trans A: Fundamentals E90-A (2007), no. 5, 992-999.[doi]
  283. Michael Vaughan-Lee, On 4-Engel groups, LMS J. Comput. Math. 10 (2007), 341–353 (electronic).[MR]
  284. Helena Verrill and David Joyner, Computing with toric varieties, J. Symbolic Comput. 42 (2007), no. 5, 511–532.[MR]
  285. Gilles Villard, Certification of the QR factor R and of lattice basis reducedness, ISSAC 2007, ACM, New York, 2007, pp. 361–368.[MR/arXiv]
  286. John Voight, Quadratic forms that represent almost the same primes, Math. Comp. 76 (2007), no. 259, 1589–1617 (electronic).[MR/arXiv]
  287. M. A. Vsemirnov, On the (2,3)-generation of matrix groups over the ring of integers, Algebra i Analiz 19 (2007), no. 6, 22–58.[MR]
  288. Maxim Vsemirnov, The group GL(6,Z) is (2,3)-generated, J. Group Theory 10 (2007), no. 4, 425–430.[MR]
  289. P. G. Walsh, On a very particular class of Ramanujan-Nagell type equations, Far East J. Math. Sci. (FJMS) 24 (2007), no. 1, 55–58.[MR]
  290. Paul van Wamelen, Enumerating Motzkin-Rabin geometries, J. Combin. Des. 15 (2007), no. 3, 179–194.[MR]
  291. Gregory White, Enumeration-based Algorithms in Coding Theory, PhD Thesis, University of Sydney, 2007.
  292. Doug Wiedemann and Michael Zieve, Equivalence of sparse circulants: The bipartite Adam problem, preprint (2007), 20 pages.[arXiv]
  293. Gabor Wiese, On the faithfulness of parabolic cohomology as a Hecke module over a finite field, J. reine angew. Math. 606 (2007), 79–103.[MR]
  294. Geordie Williamson, Intersection cohomology complexes on low rank flag varieties, preprint (2007), 17 pages.[arXiv]
  295. H. E. Winkelnkemper, AP theory II: Intrinsic 4D quantum YM theory with mass gap, preprint (2007), 54 pages.[arXiv]
  296. Qingquan Wu and Renate Scheidler, An explicit treatment of biquadratic function fields, Contrib. Discrete Math. 2 (2007), no. 1, 43–60 (electronic).[MR]
  297. Christian Wuthrich, Self-points on an elliptic curve of conductor 14, in Proceedings of the Symposium on Algebraic Number Theory and Related Topics, RIMS Kôkyûroku Bessatsu, B4, Res. Inst. Math. Sci. (RIMS), Kyoto, 2007, pp. 189–195.[MR]
  298. Christian Wuthrich, The fine Tate-Shafarevich group, Math. Proc. Cambridge Philos. Soc. 142 (2007), no. 1, 1–12.[MR]
  299. Şükrü Yalçinkaya, Black box groups, Turk. J. Math. 31 (2007), no. Suppl, 171–210.
  300. Dan Yasaki, Integral cohomology of certain Picard modular surfaces, preprint (2007), 14 pages.[arXiv]
  301. Marcos Zarzar, Error-correcting codes on low rank surfaces, Finite Fields Appl. 13 (2007), no. 4, 727–737.[MR]

2008

  1. Fadwa S. Abu Muriefah, Florian Luca, and Alain Togbé, On the Diophantine equation x2+5a13b=yn, Glasg. Math. J. 50 (2008), no. 1, 175–181.[MR]
  2. Edith Adan-Bante and Helena Verrill, Symmetric groups and conjugacy classes, J. Group Theory 11 (2008), no. 3, 371–379.[MR]
  3. M. Afzal and A. Masood, Algebraic cryptanalysis of a NLFSR based stream cipher, 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. (2008), 1-6.[doi]
  4. Mehreen Afzal and Ashraf Masood, Resistance of stream ciphers to algebraic recovery of internal secret states, Third International Conference on Convergence and Hybrid Information Technology, 2008. ICCIT '08 2 (2008), 625-630.[doi]
  5. Mehreen Afzal, Ashraf Masood, and Naveed Shehzad, Improved results on algebraic cryptanalysis of A5/2, Communications in Computer and Information Science 12 (2008), no. 4, 182–189.
  6. Scott Ahlgren, On the irreducibility of Hecke polynomials, Math. Comp. 77 (2008), no. 263, 1725–1731.[MR]
  7. Ali Akhavi and Damien Stehlé, Speeding-up lattice reduction with random projections (extended abstract), LATIN 2008: Theoretical informatics, Lecture Notes in Comput. Sci., vol. 4957, Springer, Berlin, 2008, pp. 293–305.[MR]
  8. S. Akhtari, A. Togbé, and P. G. Walsh, On the equation aX4-bY2 = 2, Acta Arith. 131 (2008), no. 2, 145–169.[MR]
  9. Martin Albrecht, Algebraic attacks on the Courtois Toy cipher, Cryptologia 32 (2008), no. 3, 220–276.
  10. Faryad Ali and Jamshid Moori, Fischer-Clifford matrices of the non-split group extension 26·U4(2), Quaest. Math. 31 (2008), no. 1, 27–36.[MR/doi]
  11. Salah A. Aly, Asymmetric and symmetric subsystem BCH codes and beyond, preprint (2008), 10 pages.[arXiv]
  12. Salah A. Aly, Andreas Klappenecker, and Kiran Sarvepalli Pradeep, Subsystem codes, IEEE International Symposium on Information Theory, Toronto, Canada, 2008 (ISIT 08), IEEE, New York, 2008, pp. 369–373.[doi/arXiv]
  13. Maria Carmen V. Amarra and Fidel R. Nemenzo, On: "(1 – u)-cyclic codes over Fpk+u Fpk", Appl. Math. Lett. 21 (2008), no. 11, 1129–1133.[MR]
  14. Jianbei An, John J. Cannon, E. A. O'Brien, and W. R. Unger, The Alperin weight conjecture and Dade's conjecture for the simple group Fi24', LMS J. Comput. Math. 11 (2008), 100–145.[MR]
  15. K. K. S. Andersen, J. Grodal, J. M. Møller, and A. Viruel, The classification of p-compact groups for p odd, Ann. of Math. (2) 167 (2008), no. 1, 95–210.[MR]
  16. A. O. L. Atkin, Wen-Ching Winnie Li, and Ling Long, On Atkin and Swinnerton-Dyer congruence relations (II), Math. Ann. 340 (2008), no. 2, 335–358.[MR/arXiv]
  17. Nir Avni and Shelly Garion, Connectivity of the product replacement graph of simple groups of bounded Lie rank, J. Algebra 320 (2008), no. 2, 945–960.[MR]
  18. Mohamed Ayad and Peter Fleischmann, On the decomposition of rational functions, J. Symbolic Comput. 43 (2008), no. 4, 259–274.[MR]
  19. Henrik Bäärnhielm, Algorithmic problems in twisted groups of Lie type, preprint (2008), 131 pages.[arXiv]
  20. Eric Bach and Denis Charles, The hardness of computing an eigenform, Computational arithmetic geometry, Contemp. Math., vol. 463, Amer. Math. Soc., Providence, RI, 2008, pp. 9–15.[MR/arXiv]
  21. John Bamberg, Geoffrey Pearce, and Cheryl E. Praeger, Transitive decompositions of graph products: Rank 3 grid type, J. Group Theory 11 (2008), no. 2, 185–228.[MR]
  22. M. Barbosa, A. Moss, and D. Page, Constructive and destructive use of compilers in elliptic curve cryptography, J. Cryptology Online first (2008), 23.
  23. Y. Barnea and D. S. Passman, Filtrations in semisimple Lie algebras. II, Trans. Amer. Math. Soc. 360 (2008), no. 2, 801–817 (electronic).[MR]
  24. Tathagata Basak, On Coxeter diagrams of complex reflection groups, preprint (2008), 17 pages.[arXiv]
  25. I. C. Bauer, F. Catanese, and F. Grunewald, The classification of surfaces with pg = q = 0 isogenous to a product of curves, Pure Appl. Math. Q. 4 (2008), no. 2, part 1, 547–586.[MR/arXiv]
  26. Ingrid C. Bauer and Fabrizio Catanese, A volume maximizing canonical surface in 3-space, Comment. Math. Helv. 83 (2008), no. 2, 387–406.[MR]
  27. Ingrid Bauer, Fabrizio Catanese, Fritz Grunewald, and Roberto Pignatelli, Quotients of a product of curves by a finite group and their fundamental groups, preprint (2008), 37 pages.[arXiv]
  28. M. Bauer, M. J. Jacobson, Jr., Y. Lee, and R. Scheidler, Construction of hyperelliptic function fields of high three-rank, Math. Comp. 77 (2008), no. 261, 503–530 (electronic).[MR]
  29. Tobias Beck and Josef Schicho, Adjoint computation for hypersurfaces using formal desingularizations, J. Algebra 320 (2008), no. 11, 3984–3996.[MR/doi]
  30. Tobias Beck and Josef Schicho, Curve parametrization over optimal field extensions exploiting the Newton polygon, Geometric Modeling and Algebraic Geometry, Springer, Berlin, 2008, pp. 119–140.[MR]
  31. Mark Behrens and Gerd Laures, β-family congruences and the f-invariant, preprint (2008), 17 pages.[arXiv]
  32. B. Bekka, P. de la Harpe, and A. Valette, Kazhdan's Property (t), New Mathematical Monographs, Cambridge University Press, Cambridge, 2008, 492 pages.[link]
  33. Daniel J. Bernstein, Peter Birkner, Tanja Lange, and Christiane Peters, ECM using Edwards curves, IACR (2008), 18 pages.[eprint]
  34. Amnon Besser and Rob De Jeu, Li(p)-service? an algorithm for computing p-adic polyalgorithms, Math. Comp. 77 (2008), no. 262, 1105–1134.[MR]
  35. Koichi Betsumiya, Minimum Lee weights of type II codes over F2r, Discrete Math. 308 (2008), no. 14, 3018–3022.[MR]
  36. Luk Bettale, Jean-Charles Faugère, and Ludovic Perret, Cryptanalysis of the TRMS signature scheme of PKC'05, Progress in Cryptology, AfricaCrypt 2008, Lecture Notes in Computer Science, vol. 5023, Springer Berlin/Heidelberg, 2008, pp. 143-155.
  37. Jonah Blasiak, W-graph versions of tensoring with the Sn defining representation, preprint (2008), 43 pages.[arXiv]
  38. Werner Bley and Henri Johnston, Computing generators of free modules over orders in group algebras, J. Algebra 320 (2008), no. 2, 836–852.[MR]
  39. Christian Böhning, The rationality of the moduli space of curves of genus 3 after P. Katsylo, preprint (2008), 39 pages.[arXiv]
  40. M. Borovoi, J. -L. Colliot-Thélène, and A. N. Skorobogatov, The elementary obstruction and homogeneous spaces, Duke Math. J. 141 (2008), no. 2, 321–364.[MR]
  41. Alin Bostan, Frédéric Chyzak, and Nicolas Le Roux, Products of ordinary differential operators by evaluation and interpolation, in ISSAC '08: International Symposium on Symbolic and Algebraic Computation, ACM, New York, NY, USA, 2008, pp. 23–30.[doi/arXiv]
  42. Hans-Christian Graf v. Bothmer, Finite field experiments, Higher-dimensional Geometry over Finite Fields, NATO Sci. Peace Secur. Ser. D Inf. Commun. Secur., vol. 16, IOS, Amsterdam, 2008, pp. 1–62.[MR]
  43. Hans-Christian Graf v. Bothmer, Finite field experiments (with an appendix by Stefan Wiedmann), Higher-Dimensional Geometry over Finite Fields, NATO Science for Peace and Security Series, D: Information and Communication Security, vol. 16, IOS Press, 2008, pp. 1–62.
  44. Delphine Boucher, Patrick Solé, and Felix Ulmer, Skew constacyclic codes over Galois rings, Adv. Math. Commun. 2 (2008), no. 3, 273–292.[MR]
  45. Iliya Bouyukliev and Valentin Bakoev, A method for efficiently computing the number of codewords of fixed weights in linear codes, Discrete Appl. Math. 156 (2008), no. 15, 2986–3004.[MR]
  46. Anne Desideri Bracco, Ann Marie Natividad, and Patrick Solé, On quintic quasi-cyclic codes, Discrete Appl. Math. 156 (2008), no. 18, 3362–3375.[MR/doi]
  47. Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire, A few more quadratic APN functions, preprint (2008), 12 pages.[arXiv]
  48. Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire, New families of quadratic almost perfect nonlinear trinomials and multinomials, Finite Fields Appl. 14 (2008), no. 3, 703–714.[MR]
  49. Kristian Brander, An optimal unramified tower of function fields, Algebraic geometry and its applications, Ser. Number Theory Appl., vol. 5, World Sci. Publ., Hackensack, NJ, 2008, pp. 351–365.[MR/doi]
  50. John Bray and Henrik Bäärnhielm, Standard generators for the Suzuki groups, Preprint (2008), 1–13.[link]
  51. John N. Bray and Robert A. Wilson, Examples of 3-dimensional 1-cohomology for absolutely irreducible modules of finite simple groups, J. Group Theory 11 (2008), no. 5, 669–673.[MR]
  52. Andrew Bremner, On the equation Y2=X5 + k, Experiment. Math. 17 (2008), no. 3, 371–374.[MR]
  53. Richard Brent and Paul Zimmermann, A multi-level blocking distinct degree factorization algorithm, Finite Fields and Applications, Contemporary Mathematics, vol. 461, 2008, 47–58 pages.
  54. R. de la Bret'che and T. D. Browning, Manin's conjecture for quartic del Pezzo surfaces with a conic fibration, preprint (2008).[arXiv]
  55. Louis Hugo Brewis, Liftable D4-covers, Manuscripta Math. 126 (2008), no. 3, 293–313.[MR]
  56. Marcus Brinkmann and Gregor Leander, On the classification of APN functions up to dimension five, Des. Codes Cryptogr. 49 (2008), no. 1-3, 273–288.[MR]
  57. Thomas Britz and Keisuke Shiromoto, Designs from subcode supports of linear codes, Des. Codes Cryptogr. 46 (2008), no. 2, 175–189.[MR]
  58. Peter A. Brooksbank, Fast constructive recognition of black box symplectic groups, J. Algebra 320 (2008), no. 2, 885–909.[MR]
  59. Peter A. Brooksbank and Eugene M. Luks, Testing isomorphism of modules, J. Algebra 320 (2008), no. 11, 4020–4029.[MR/doi]
  60. Peter A. Brooksbank and E. A. O'Brien, Constructing the group preserving a system of forms, Internat. J. Algebra Comput. 18 (2008), no. 2, 227–241.[MR]
  61. Peter A. Brooksbank and E. A. O'Brien, On intersections of classical groups, J. Group Theory 11 (2008), no. 4, 465–478.[MR]
  62. David Brown, The Chabauty-Coleman bound at a prime of bad reduction, preprint (2008), 10 pages.[arXiv]
  63. Nils Bruin, The arithmetic of Prym varieties in genus 3, Compos. Math. 144 (2008), no. 2, 317–338.[MR/link]
  64. Nils Bruin and Michael Stoll, Deciding existence of rational points on curves: an experiment, Experiment. Math. 17 (2008), no. 2, 181–189.[MR/arXiv]
  65. Nils Bruin and Michael Stoll, Two-cover descent on hyperelliptic curves, preprint (2008), 19 pages.[arXiv]
  66. Ralph H. Buchholz and James A. MacDougall, Cyclic polygons with rational sides and area, J. Number Theory 128 (2008), no. 1, 17–48.[MR]
  67. Yann Bugeaud, Maurice Mignotte, and Samir Siksek, A multi-Frey approach to some multi-parameter families of Diophantine equations, Canad. J. Math. 60 (2008), no. 3, 491–519.[MR/link]
  68. Yann Bugeaud, Maurice Mignotte, Samir Siksek, Michael Stoll, and Szabolcs Tengely, Integral points on hyperelliptic curves, Algebra Number Theory 2 (2008), no. 8, 859–885.[MR/arXiv]
  69. Stanislav Bulygin and Michael Brickenstein, Obtaining and solving systems of equations in key variables only for the small variants of AES, IACR (2008), 26 pages.[eprint]
  70. Timothy C. Burness, E. A. O'Brien, and Robert A. Wilson, Base sizes for sporadic simple groups, Israel J. Math., to appear (2008), 19 pages.
  71. Cecilia Busuioc, The Steinberg symbol and special values of L-functions, Trans. Amer. Math. Soc. 360 (2008), no. 11, 5999–6015.[MR]
  72. J. S. Calcut, Torelli actions and smooth structures on four manifolds, J. Knot Theory Ramifications 17 (2008), no. 2, 171–190.[MR]
  73. John J. Cannon and Derek F. Holt, The transitive permutation groups of degree 32, Experiment. Math. 17 (2008), no. 3, 307–314.[MR]
  74. David P. Cargo, Warwick de Launey, Martin W. Liebeck, and Richard M. Stafford, Short two-variable identities for finite groups, J. Group Theory 11 (2008), no. 5, 675–690.[MR]
  75. Robert Carls, David Kohel, and David Lubicz, Higher-dimensional 3-adic CM construction, J. Algebra 319 (2008), no. 3, 971–1006.[MR/arXiv]
  76. Bill Casselman, Computation in Coxeter groups. II. Constructing minimal roots, Represent. Theory 12 (2008), 260–293.[MR]
  77. Carlos Castaño-Bernard, Further properties of a function of Ogg and Ligozat, Ramanujan J. 17 (2008), no. 1, 107–121.[MR]
  78. Wouter Castryck, Hendrik Hubrechts, and Frederik Vercauteren, Computing zeta functions in families of Ca, b curves using deformation, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 296-311.
  79. Alberto Cavicchioli, E. A. O'Brien, and Fulvia Spaggiari, On some questions about a family of cyclically presented groups, J. Algebra 320 (2008), no. 11, 4063–4072.[MR]
  80. Gweltaz Chatel and David Lubicz, A point counting algorithm using cohomology with compact support, preprint (2008), 32 pages.[arXiv]
  81. Lionel Chaussade, Pierre Loidreau, and Felix Ulmer, Skew codes of prescribed distance or rank, Des. Codes Cryptogr. Online first (2008), 18.
  82. Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, and Bo-Yin Yang, Odd-char multivariate hidden field equations, IACR eprint2008:543 (2008), 18 pages.
  83. Imin Chen, On the equation s2 + y2p = α3, Math. Comp. 77 (2008), no. 262, 1223–1227.[MR]
  84. C. Chisholm and J. A. MacDougall, Rational tetrahedra with edges in geometric progression, J. Number Theory 128 (2008), no. 2, 251–262.[MR]
  85. Mihai Cipu, Gröbner bases and Diophantine analysis, J. Symbolic Comput. 43 (2008), no. 10, 681–687.[MR]
  86. Mihai Cipu and Stephen D. Cohen, Dickson polynomial permutations, Finite Fields and Applications, Contemporary Mathematics, vol. 461, 2008, 79–91 pages.
  87. Mihai Cipu, Florian Luca, and Maurice Mignotte, Solutions of the Diophantine equation xy+yz+zx = n!, Glasg. Math. J. 50 (2008), no. 2, 217–232.[MR]
  88. A. Clingher, C. F. Doran, J. Lewis, and U. Whitcher, Normal forms, K3 surface moduli, and modular parametrizations, in Groups and Symmetries: Proceedings of the CRM conference in honor of John McKay,, CRM-AMS Proceedings and Lecture Notes, vol. 47, 2008, 18 pages.
  89. Arjeh M. Cohen, Sergei Haller, and Scott H. Murray, Computing in unipotent and reductive algebraic groups, LMS J. Comput. Math. 11 (2008), 343–366.[MR/arXiv]
  90. Marston Conder, Combinatorial and computational group-theoretic methods in the study of graphs, maps and polytopes with maximal symmetry, Jack Koolen and Jin Ho Kwak and Ming-Yao Xu, Eds. Applications of Group Theory to Combinatorics, Taylor &Francis Group, London, 2008, pp. 1–11.
  91. Marston Conder, Genus spectra for symmetric embeddings of graphs on surfaces, Electronic Notes in Discrete Mathematics 31 (2008), 27–31.[doi]
  92. Marston Conder, Isabel Hubard, and Tomaž Pisanski, Constructions for chiral polytopes, J. Lond. Math. Soc. (2) 77 (2008), no. 1, 115–129.[MR]
  93. Marston Conder, Primož Potočnik, and Jozef Širáň, Regular hypermaps over projective linear groups, J. Aust. Math. Soc. 85 (2008), 155–175 pages.
  94. Roberto Conti, Jason Kimberley, and Wojciech Szymanski, More localized automorphisms of the Cuntz algebras, preprint (2008), 17 pages.[arXiv]
  95. Roberto Conti and Wojciech Szymanski, Labeled trees and localized automorphisms of the Cuntz algebras, preprint (2008), 37 pages.[arXiv]
  96. A. Cossidente, C. Culbert, G. L. Ebert, and G. Marino, On m-ovoids of W3(q), Finite Fields Appl. 14 (2008), no. 1, 76–84.[MR]
  97. A. Cossidente and A. Sonnino, A geometric construction of a [110,5,90]9-linear code admitting the Mathieu group M11, IEEE Trans. Inform. Theory 54 (2008), no. 11, 5251-5252.[doi]
  98. Antonio Cossidente, Gary L. Ebert, and Giuseppe Marino, A complete span of H(4,4) admitting PSL2(11) and related structures, Contrib. Discrete Math. 3 (2008), no. 1, 52–57.[MR]
  99. Antonio Cossidente and Marialuisa J. de Resmini, The transitive and co-transitive blocking sets in P2(Fq), Contrib. Discrete Math. 3 (2008), no. 1, 47–51.[MR]
  100. Robert S. Coulter and Marie Henderson, Commutative presemifields and semifields, Adv. Math. 217 (2008), no. 1, 282–304.[MR]
  101. J. E. Cremona, Unimodular integer circulants, Math. Comp. 77 (2008), no. 263, 1639–1652.[MR]
  102. J. E. Cremona, T. A. Fisher, C. O'Neil, D. Simon, and M. Stoll, Explicit n-descent on elliptic curves. I. Algebra, J. reine angew. Math. 615 (2008), 121–155.[MR]
  103. Maria Cristeta Cuaresma, Michael Giudici, and Cheryl E. Praeger, Homogeneous factorisations of Johnson graphs, Des. Codes Cryptogr. 46 (2008), no. 3, 303–327.[MR]
  104. Jennifer R. Daniel and Aloysius G. Helminck, Algorithms for computations in local symmetric spaces, Comm. Algebra 36 (2008), no. 5, 1758–1788.[MR]
  105. Susanne Danz, Vertices of low-dimensional simple modules for symmetric groups, Comm. Algebra 36 (2008), no. 12, 4521–4539.[MR]
  106. Susanne Danz, Burkhard Külshammer, and René Zimmermann, On vertices of simple modules for symmetric groups of small degrees, J. Algebra 320 (2008), no. 2, 680–707.[MR]
  107. Susanne Danz and René Zimmermann, Vertices of simple modules for the symmetric groups in blocks of small weights, Beiträge Algebra Geom. 49 (2008), no. 2, 409–427.[MR]
  108. Chantal David and Tom Weston, Local torsion on elliptic curves and the deformation theory of Galois representations, Math. Res. Lett. 15 (2008), no. 3, 599–611.[MR/arXiv]
  109. Donald M. Davis, Homotopy type and v1-periodic homotopy groups of p-compact groups, Topology and its Applications 156 (2008), no. 2, 300–321.[doi/arXiv]
  110. Paul-Olivier Dehaye, Joint moments of derivatives of characteristic polynomials, Algebra Number Theory 2 (2008), no. 1, 31–68.[MR]
  111. Daniel Delbourgo and Tom Ward, Non-abelian congruences between L-values of elliptic curves, Ann. Inst. Fourier (Grenoble) 58 (2008), no. 3, 1023–1055.[MR/link]
  112. Lassina Dembélé and Steve Donnelly, Computing Hilbert modular forms over fields with nontrivial class group, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 371–386.[MR/doi]
  113. A. S. Detinko and D. L. Flannery, Algorithms for computing with nilpotent matrix groups over infinite domains, J. Symbolic Comput. 43 (2008), no. 1, 8–26.[MR]
  114. Alice Devillers and Michael Giudici, Involution graphs where the product of two adjacent vertices has order three, J. Aust. Math. Soc. 85 (2008), no. 3, 305–322.
  115. Alice Devillers, Michael Giudici, Cai Heng Li, and Cheryl E. Praeger, Primitive decompositions of Johnson graphs, J. Combin. Theory Ser. A 115 (2008), no. 6, 925–966.[MR]
  116. Claus Diem and Emmanuel Thomé, Index calculus in class groups of non-hyperelliptic curves of genus three, J. Cryptology 21 (2008), no. 4, 593–611.[MR]
  117. Jintai Ding, Dieter Schmidt, and Fabian Werner, Algebraic attack on HFE revisited, Information Security, Lecture Notes in Comput. Sci., vol. 5222, Springer, Berlin, 2008, pp. 215–227.
  118. Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, and Chen-Mou Cheng, New differential-algebraic attacks and reparametrization of Rainbow, Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 5037, Springer, 2008, pp. 242–257.
  119. Galyna Dobrovolska and Pavel Etingof, An upper bound for the lower central series quotients of a free associative algebra, Int. Math. Res. Not. IMRN (2008), no. 12, Art. ID rnn039, 10.[MR]
  120. Galyna Dobrovolska, John Kim, and Xiaoguang Ma, On the lower central series of an associative algebra (with an appendix by Pavel Etingof), J. Algebra 320 (2008), no. 1, 213–237.[MR]
  121. Edward Dobson and Dragan Marušič, An unusual decomposition of a complete 7-partite graph of order 28, Discrete Math. 308 (2008), no. 20, 4595–4598.[MR]
  122. Tim Dokchitser and Vladimir Dokchitser, Root numbers of elliptic curves in residue characteristic 2, Bull. Lond. Math. Soc. 40 (2008), no. 3, 516–524.[MR]
  123. Darrin Doud, Distinguishing contragredient Galois representations in characteristic two, Rocky Mountain J. Math. 38 (2008), no. 3, 835–848.[MR]
  124. S. T. Dougherty, S. Mesnager, and P. Sole, Secret-sharing schemes based on self-dual codes, Information Theory Workshop, 2008. ITW '08. IEEE (2008), 338-342.[doi]
  125. Jan Draisma, Gregor Kemper, and David Wehlau, Polarization of separating invariants, Canad. J. Math. 60 (2008), no. 3, 556–571.[MR]
  126. Jean-Guillaume Dumas, Pascal Giorgi, and Clément Pernet, Dense linear algebra over word-size prime fields: The FFLAS and FFPACK packages, ACM Trans. Math. Softw. 35 (2008), no. 3, 1–42.[doi]
  127. Sylvain Duquesne, Montgomery ladder for all genus 2 curves in characteristic 2, Arithmetic of Finite Fields, Lecture Notes in Computer Science, vol. 5130, Springer, 2008, pp. 174–188.
  128. Clémence Durvye and Grégoire Lecerf, A concise proof of the Kronecker polynomial system solver from scratch, Expo. Math. 26 (2008), no. 2, 101–139.[MR]
  129. Mathieu Dutour Sikirić, Achill Schürmann, and Frank Vallentin, A generalization of Voronoi's reduction theory and its application, Duke Math. J. 142 (2008), no. 1, 127–164.[MR/arXiv]
  130. Tobias Eibach, Enrico Pilz, and Gunnar Völkel, Attacking Bivium using SAT solvers, Theory and Applications of Satisfiability Testing, SAT 2008, Lecture Notes in Computer Science, vol. 4996, Springer, Berlin, 2008, pp. 63–76.
  131. Soren Eilers and Ian Kiming, On some new invariants for strong shift equivalence for shifts of finite type, preprint (2008), 8 pages.[arXiv]
  132. Kirsten Eisentraeger, Dimitar Jetchev, and Kristin Lauter, On the computation of the Cassels pairing for certain Kolyvagin classes in the Shafarevich-Tate group, preprint 5209 (2008), 113–125.
  133. Noam D. Elkies, Shimura curve computations via K3 surfaces of Neron-Severi rank at least 19, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 196-211.[arXiv]
  134. Andreas-Stephan Elsenhans and Jörg Jahnel, K3 surfaces of Picard rank one and degree two, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 212–225.
  135. Pavel Etingof and Eric Rains, New deformations of group algebras of Coxeter groups. II, Geom. Funct. Anal. 17 (2008), no. 6, 1851–1871.[MR/link]
  136. Graham Everest, Patrick Ingram, Valéry Mahé, and Shaun Stevens, The uniform primality conjecture for elliptic curves, Acta Arith. 134 (2008), no. 2, 157–181.[MR/arXiv]
  137. Xander Faber and Benjamin Hutz, On the number of rational iterated pre-images of the origin under quadratic dynamical systems, preprint (2008), 18 pages.[arXiv]
  138. Reza Rezaeian Farashahi, Ruud Pellikaan, and Andrey Sidorenko, Extractors for binary elliptic curves, Des. Codes Cryptogr. 49 (2008), no. 1-3, 171–186.[MR]
  139. Majid Farhadi and Marc Perret, Twisting geometric codes, Finite Fields Appl. 14 (2008), no. 4, 1091–1100.[MR]
  140. D. G. Farmer and K. J. Horadam, Presemifield bundles over GF(p3), IEEE International Symposium on Information Theory, 2008. ISIT 2008 (2008), 2613-2616.[doi]
  141. Jean-Charles Faug'ere, Françoise Levy-dit-Vehel, and Ludovic Perret, Cryptanalysis of MinRank, Advances in Cryptology, CRYPTO 2008, Lecture Notes in Computer Science, vol. 5157, Springer, 2008, pp. 280–296.
  142. Jean-Charles Faugère, Guillaume Moroz, Fabrice Rouillier, and Mohab Safey El Din, Classification of the perspective-three-point problem, discriminant variety and real solving polynomial systems of inequalities, in ISSAC '08: International Symposium on Symbolic and Algebraic Computation, ACM, New York, NY, USA, 2008, pp. 79–86.[doi]
  143. Jean-Charles Faugére and Ludovic Perret, Algebraic cryptanalysis of Curry and Flurry using correlated messages, IACR (2008), 14 pages.[eprint]
  144. Yan-Quan Feng, Klavdija Kutnar, Aleksander Malnič, and Dragan Marušič, On 2-fold covers of graphs, J. Combin. Theory Ser. B 98 (2008), no. 2, 324–341.[MR/arXiv]
  145. Claus Fieker and Michael E. Pohst, A lower regulator bound for number fields, J. Number Theory 128 (2008), no. 10, 2767–2775.[MR]
  146. Carla Fiori and Beatrice Ruini, Infinite classes of dihedral snarks, Mediterr. J. Math. 5 (2008), no. 2, 199–210.[MR]
  147. Tom Fisher, Finding rational points on elliptic curves using 6-descent and 12-descent, J. Algebra 320 (2008), no. 2, 853–884.[MR]
  148. Tom Fisher, Some improvements to 4-descent on an elliptic curve, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 125–138.[MR/doi]
  149. Tom Fisher, The invariants of a genus one curve, Proc. Lond. Math. Soc. (3) 97 (2008), no. 3, 753–782.[MR/arXiv]
  150. Stéphane Flon, Roger Oyono, and Christophe Ritzenthaler, Fast addition on non-hyperelliptic genus 3 curves, Algebraic geometry and its applications, Ser. Number Theory Appl., vol. 5, World Sci. Publ., Hackensack, NJ, 2008, pp. 1–28.[MR]
  151. E. V. Flynn and C. Grattoni, Descent via isogeny on elliptic curves with large rational torsion subgroups, J. Symbolic Comput. 43 (2008), no. 4, 293–303.[MR]
  152. E. V. Flynn and J. Wunderle, Cycles of covers, Monatsh. Math. Online first (2008), 16.
  153. Felix Fontein, The infrastructure of a global field of arbitrary unit rank, preprint (2008), 36 pages.[arXiv]
  154. Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, and Jacques Stern, Total break of the l-IC signature scheme, Public Key Cryptography, PKC 2008, Lecture Notes in Computer Science, vol. 4939, Springer, 2008, pp. 1–17.
  155. Pierre-Alain Fouque, Gilles Macario-Rat, and Jacques Stern, Key recovery on hidden monomial multivariate schemes, Advances in Cryptology, EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, Springer Berlin/Heidelberg, 2008, pp. 19–30.
  156. David Freeman and Kristin Lauter, Computing endomorphism rings of Jacobians of genus 2 curves over finite fields, Algebraic geometry and its applications, Ser. Number Theory Appl., vol. 5, World Sci. Publ., Hackensack, NJ, 2008, pp. 29–66.[MR]
  157. David Freeman, Peter Stevenhagen, and Marco Streng, Abelian varieties with prescribed embedding degree, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 60-73.[arXiv]
  158. S. Galbraith, F. Hess, and F. Vercauteren, Aspects of pairing inversion, IEEE Transactions on Information Theory 54 (2008), no. 12, 5719-5728.[doi/eprint]
  159. S. D. Galbraith, X. Lin, and D. J. Mireles, Pairings on hyperelliptic curves with a real model, in LNCS 5209, Eds. Galbraith, S. D. and Paterson, K. G.., Springer, 2008, pp. 256–281.
  160. Steven D. Galbraith, Michael Harrison, and David J. Mireles Morales, Efficient hyperelliptic arithmetic using balanced representation for divisors, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 342–356.[MR/doi/eprint]
  161. Steven D. Galbraith, Xibin Lin, and David J. Mireles Morales, Pairings on hyperelliptic curves with a real model, Pairing-Based Cryptography, Pairing 2008, Lecture Notes in Computer Science, vol. 5209, Springer, 2008, pp. 265–281.
  162. Shuhong Gao, Guangran Jiang, and Mingfu Zhu, Solving the 100 Swiss Francs problem, preprint (2008), 16 pages.[arXiv]
  163. Rohit Ghosh, Incompleteness of the Giulietti-Ughi arc for large primes, Discrete Math. 308 (2008), no. 17, 3824–3835.[MR]
  164. Edray Goins, Florian Luca, and Alain Togbé, On the Diophantine equation x2+2α 5β 13γ=yn, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 430–442.[MR/doi]
  165. Santos González, Consuelo Martínez, and Alejandro P. Nicolás, Classic and quantum error correcting codes, Coding Theory and Applications, Lecture Notes in Computer Science, vol. 5228, Springer, 2008, pp. 56-68.
  166. Nikolai Gordeev, Fritz Grunewald, Boris Kunyavskii, and Eugene Plotkin, A commutator description of the solvable radical of a finite group, Groups Geom. Dyn. 2 (2008), no. 1, 85–120.[MR]
  167. Daniel M. Gordon, Victor Miller, and Peter Ostapenko, Optimal hash functions for approximate closest pairs on the n-cube, preprint (2008).[arXiv]
  168. M. Grassl and T. A. Gulliver, On self-dual MDS codes, IEEE International Symposium on Information Theory, 2008. ISIT 2008 (2008), 1954-1957.[doi]
  169. Markus Grassl, Computing equiangular lines in complex space, Mathematical Methods in Computer Science, Lecture Notes in Comput. Sci., vol. 5393, 2008, pp. 89-104.
  170. Markus Grassl and Rainer Steinwandt, Cryptanalysis of an authentication scheme using truncated polynomials, IACR (2008), 4 pages.[eprint]
  171. Jordi Guardia, Jesus Montes, and Enric Nart, Higher Newton polygons in the computation of discriminants and prime ideal decomposition in number fields, preprint (2008), 24 pages.[arXiv]
  172. Renault Guénaél and Yokoyama Kazuhiro, Multi-modular algorithm for computing the splitting field of a polynomial, in ISSAC '08: International Symposium on Symbolic and Algebraic Computation, ACM, New York, NY, USA, 2008, pp. 247–254.[doi]
  173. T. Aaron Gulliver and Masaaki Harada, On double circulant doubly even self-dual [72,36,12] codes and their neighbors, Australas. J. Combin. 40 (2008), 137–144.[MR]
  174. T. Aaron Gulliver, Jon-Lark Kim, and Yoonjin Lee, New MDS or near-MDS self-dual codes, IEEE Trans. Inform. Theory 54 (2008), no. 9, 4354–4360.[MR/doi]
  175. C. Guneri and F. Ozbudak, Weil-Serre type bounds for cyclic codes, IEEE Transactions on Information Theory 54 (2008), no. 12, 5381-5395.[doi]
  176. R. M. Guralnick, W. M. Kantor, M. Kassabov, and A. Lubotzky, Presentations of finite simple groups: A quantitative approach, J. Amer. Math. Soc. 21 (2008), no. 3, 711–774.[MR/arXiv]
  177. Sunghyu Han and Jon-Lark Kim, On self-dual codes over F5, Des. Codes Cryptogr. 48 (2008), no. 1, 43–58.[MR]
  178. Darrel Hankerson, Koray Karabina, and Alfred Menezes, Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields, IACR (2008), 15 pages.[eprint]
  179. Masaaki Harada, An extremal doubly even self-dual code of length 112, Electron. J. Combin. 15 (2008), no. 1, Note 33, 5.[MR]
  180. Michael I. Hartley and Dimitri Leemans, A new Petrie-like construction for abstract polytopes, J. Combin. Theory Ser. A 115 (2008), no. 6, 997–1007.[MR]
  181. Robin Hartshorne and Ronald van Luijk, Non-Euclidean Pythagorean triples, a problem of Euler, and rational points on K3 surfaces, Math. Intelligencer 30 (2008), no. 4, 4–10.[MR/arXiv]
  182. George Havas, Edmund F. Robertson, and Dale C. Sutherland, Behind and beyond a theorem on groups related to trivalent graphs, J. Aust. Math. Soc. 85 (2008), no. 3, 323–332.
  183. Bo He and Alain Togbé, On the number of solutions of Goormaghtigh equation for given x and y, Indag. Math. (N.S.) 19 (2008), no. 1, 65–72.[MR]
  184. Anthony Henderson and Eric Rains, The cohomology of real De Concini-Procesi models of Coxeter type, Int. Math. Res. Not. IMRN (2008), no. 7, Art. ID rnn001, 29.[MR]
  185. Fernando Hernando and Diego Ruano, Sixteen new linear codes with Plotkin sum, preprint (2008), 2 pages.[arXiv]
  186. Russell John Higgs, Nice error bases and Sylow subgroups, IEEE Trans. Inform. Theory 54 (2008), no. 9, 4199–4207.[MR/doi]
  187. Christopher Holden, Mod 4 Galois representations and elliptic curves, Proc. Amer. Math. Soc. 136 (2008), no. 1, 31–39 (electronic).[MR]
  188. C. Hollanti, J. Lahtonen, and Hsiao-feng Lu, Maximal orders in the design of dense space-time lattice codes, IEEE Transactions on Information Theory 54 (2008), no. 10, 4493-4510.[doi]
  189. Camilla J. Hollanti, Order-theoretic methods for space-time coding: Symmetric and asymmetric designs, PhD Thesis, Turku Centre for Computer Science, 2008.
  190. Camilla Hollanti and Kalle Ranto, Maximal orders in space-time coding: Construction and decoding, 2008.
  191. P. E. Holmes, A classification of subgroups of the Monster isomorphic to S4 and an application, J. Algebra 319 (2008), no. 8, 3089–3099.[MR]
  192. P. E. Holmes, S. A. Linton, E. A. O'Brien, A. J. E. Ryba, and R. A. Wilson, Constructive membership in black-box groups, J. Group Theory 11 (2008), no. 6, 747–763.[MR]
  193. Derek F. Holt and Mark J. Stather, Computing a chief series and the soluble radical of a matrix group over a finite field, LMS J. Comput. Math. 11 (2008), 223–251.[MR]
  194. K. J. Horadam and D. G. Farmer, Bundles, presemifields and nonlinear functions, Des. Codes Cryptogr. 49 (2008), no. 1-3, 79–94.[MR]
  195. Naoyuki Horiguchi, Masaaki Kitazume, and Hiroyuki Nakasora, The Hall-Janko graph and the Witt system W10, European J. Combin. 29 (2008), no. 1, 1–8.[MR]
  196. Ben Howard, John Millson, Andrew Snowden, and Ravi Vakil, The ring of projective invariants of eight points on the line via representation theory, preprint (2008), 16 pages.[arXiv]
  197. Everett W. Howe, Supersingular genus-2 curves over fields of characteristic 3, Computational arithmetic geometry, Contemp. Math., vol. 463, Amer. Math. Soc., Providence, RI, 2008, pp. 49–69.[MR/arXiv]
  198. David Hubbard, Dihedral side extensions and class groups, J. Number Theory 128 (2008), no. 4, 731–737.[MR]
  199. Hendrik Hubrechts, Point counting in families of hyperelliptic curves, Found. Comput. Math. 8 (2008), no. 1, 137–169.[MR/arXiv]
  200. Stephen P. Humphries and Kenneth W. Johnson, Fusions of character tables and Schur rings of abelian groups, Comm. Algebra 36 (2008), no. 4, 1437–1460.[MR]
  201. Nathan Owen Ilten and Hendrik Süß, AG codes from polyhedral divisors, preprint (2008), 30 pages.[arXiv]
  202. Enrico Jabara, Automorphisms with finite Reidemeister number in residually finite groups, J. Algebra 320 (2008), no. 10, 3671–3679.[MR]
  203. Mariusz Jakubowski, Prasad Naldurg, Vijay Patankar, and Ramarathnam Venkatesan, Software integrity checking expressions (ICEs) for robust tamper detection, Information Hiding, Lecture Notes in Computer Science, vol. 4567, 2008, pp. 96–111.
  204. Martin Janošov, Martin Husák, Peter Farkaš, and Ana Garcia Armada, New [47,15,16] linear binary block code, IEEE Trans. Inform. Theory 54 (2008), no. 1, 423–424.[MR]
  205. Jean-François Jaulent, Sebastian Pauli, Michael E. Pohst, and Florence Soriano-Gafiuk, Computation of 2-groups of positive classes of exceptional number fields, J. Théor. Nombres Bordeaux 20 (2008), no. 3, 715–732.[MR]
  206. Xin Jiang, Jintai Ding, and Lei Hu, Kipnis-Shamir attack on HFE revisited, Information Security and Cryptology, Lecture Notes in Computer Science, vol. 4990, Springer Berlin/Heidelberg, 2008, pp. 399–411.
  207. Florent Jouve, Emmanuel Kowalski, and David Zywina, An explicit integral polynomial whose splitting field has galois group W(E8), J. Théor. Nombres Bordeaux 20 (2008), no. 3, 761–782.[MR]
  208. Antoine Joux, Reynald Lercier, David Naccache, and Emmanuel Thomé, Oracle-assisted static Diffie-Hellman is easier than discrete logarithms, IACR (2008).[eprint]
  209. Arkadius Kalka, Mina Teicher, and Boaz Tsaban, Cryptanalysis of the algebraic eraser and short expressions of permutations as products, preprint (2008), 19 pages.[arXiv]
  210. Koray Karabina and Edlyn Teske, On prime-order elliptic curves with embedding degrees k=3,4, and 6, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 102–117.
  211. Kiran S. Kedlaya, Search techniques for root-unitary polynomials, Computational arithmetic geometry, Contemp. Math., vol. 463, Amer. Math. Soc., Providence, RI, 2008, pp. 71–81.[MR/arXiv]
  212. Kiran S. Kedlaya and Andrew V. Sutherland, Computing L-series of hyperelliptic curves, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, 2008, pp. 312–326.
  213. J. D. Key, T. P. McDonough, and V. C. Mavron, Partial permutation decoding for codes from affine geometry designs, J. Geom. 88 (2008), no. 1-2, 101–109.[MR]
  214. J. D. Key and J. Moori, Some irreducible codes invariant under the Janko group, J1 or J2, preprint (2008), 20 pages.
  215. J. D. Key and P. Seneviratne, Permutation decoding for binary codes from lattice graphs, Discrete Math. 308 (2008), no. 13, 2862–2867.[MR]
  216. M. Kiermaier and A. Wassermann, On the minimum Lee distance of quadratic residue codes over Z4, IEEE International Symposium on Information Theory, 2008. ISIT 2008. (2008), 2617-2619.[doi]
  217. L. J. P. Kilford, Modular forms, Imperial College Press, London, 2008, pp. xxii+224.[MR]
  218. L. J. P. Kilford, On a p-adic extension of the Jacquet-Langlands correspondence to weight 1, preprint (2008), 17 pages.[arXiv]
  219. L. J. P. Kilford, On mod p modular representations which are defined over Fp, Glas. Mat. Ser. III 43(63) (2008), no. 1, 1–6.[MR/arXiv]
  220. L. J. P. Kilford, On the slopes of the U5 operator acting on overconvergent modular forms, J. Théor. Nombres Bordeaux 20 (2008), no. 1, 165–182.[MR/arXiv]
  221. L. J. P. Kilford and Gabor Wiese, On the failure of the Gorenstein property for Hecke algebras of prime weight, Experiment. Math. 17 (2008), no. 1, 37–52.[MR/arXiv]
  222. Dae San Kim, Codes associated with O+(2n,2r) and power moments of Kloosterman sums, preprint (2008), 9 pages.[arXiv]
  223. Dae San Kim, Codes associated with orthogonal groups and power moments of Kloosterman sums, preprint (2008).[arXiv]
  224. Dae San Kim, Codes associated with special linear groups and power moments of multi-dimensional Kloosterman sums, preprint (2008), 7 pages.[arXiv]
  225. Jon-Lark Kim and Patrick Solé, Skew Hadamard designs and their codes, Des. Codes Cryptogr. 49 (2008), no. 1-3, 135–145.[MR]
  226. A. Klappenecker and P. K. Sarvepalli, Clifford code constructions of operator quantum error-correcting codes, IEEE Transactions on Information Theory 54 (2008), no. 12, 5760-5765.[arXiv]
  227. Conrad Kobel, On the classification of solvable Lie algebras of finite dimension containing an abelian ideal of codimension one, Master's Thesis, Halmstad University, 2008.
  228. Alexey Koloydenko, Symmetric measures via moments, Bernoulli 14 (2008), no. 2, 362-390.[arXiv]
  229. A. Kontogeorgis, The ramification sequence for a fixed point of an automorphism of a curve and the Weierstrass gap sequence, Math. Z. 259 (2008), no. 3, 471–479.[MR]
  230. Aristides Kontogeorgis and Victor Rotger, On the non-existence of exceptional automorphisms on Shimura curves, Bull. Lond. Math. Soc. 40 (2008), no. 3, 363–374.[MR/arXiv]
  231. C. Koukouvinos and S. Stylianou, On skew-Hadamard matrices, Discrete Math. 308 (2008), no. 13, 2723–2731.[MR]
  232. Tünde Kovács, Combinatorial Diophantine equations—the genus 1 case, Publ. Math. Debrecen 72 (2008), no. 1-2, 243–255.[MR]
  233. Emmanuel Kowalski, The large sieve, monodromy, and zeta functions of algebraic curves. II. Independence of the zeros, Int. Math. Res. Not. IMRN (2008), Art. ID rnn 091, 57.[MR/arXiv]
  234. Andrew Kresch and Yuri Tschinkel, Effectivity of Brauer-Manin obstructions, Adv. Math. 218 (2008), no. 1, 1–27.[MR]
  235. Hans-Joachim Kroll and Rita Vincenti, PD-sets for binary RM-codes and the codes related to the Klein quadric and to the Schubert variety of PG(5,2), Discrete Math. 308 (2008), no. 2-3, 408–414.[MR]
  236. Klavdija Kutnar and Dragan Marušič, Hamiltonicity of vertex-transitive graphs of order 4p, European J. Combin. 29 (2008), no. 2, 423–438.[MR/arXiv]
  237. Gilles Lachaud and Christophe Ritzenthaler, On a conjecture of Serre on abelian threefolds, in Algebraic Geometry and its applications, Proceedings od the First SAGA conference, Papeete, France 2007, 2008, pp. 1–28.
  238. Sefi Ladkani, On the periodicity of Coxeter transformations and the non-negativity of their Euler forms, Linear Algebra Appl. 428 (2008), no. 4, 742–753.[MR]
  239. Shanta Laishram, T. N. Shorey, and Szabolcs Tengely, Squares in products in arithmetic progression with at most one term omitted and common difference a prime power, Acta Arith. 135 (2008), no. 2, 143–158.[MR]
  240. Dominic Lanphier, Combinatorics of Maass-Shimura operators, J. Number Theory 128 (2008), no. 8, 2467–2487.[MR]
  241. Alan G. B. Lauder, Ranks of elliptic curves over function fields, LMS J. Comput. Math. 11 (2008), 172–212.[MR]
  242. Grégoire Lecerf, Fast separable factorization and applications, Appl. Algebra Engrg. Comm. Comput. 19 (2008), no. 2, 135–160.[MR]
  243. Heisook Lee and Yoonjin Lee, Construction of self-dual codes over finite rings Zpm, J. Combin. Theory Ser. A 115 (2008), no. 3, 407–422.[MR]
  244. Dimitri Leemans, On computing the subgroup lattice of O'N, preprint (2008), 23.
  245. Dimitri Leemans, Residually weakly primitive and locally two-transitive geometries for sporadic groups, Mémoires de la Classe des Sciences, vol. 3, Académie royale de Belgique, 2008, pp. 173.
  246. G. I. Lehrer and R. B. Zhang, A Temperley-Lieb analogue for the BMW algebra, preprint (2008), 31 pages.[arXiv]
  247. Reynald Lercier and Thomas Sirvent, On Elkies subgroups of l-torsion points in elliptic curves defined over a finite field, J. Théor. Nombres Bordeaux 20 (2008), no. 3, 783–797.[MR/arXiv]
  248. Aaron Levin, Ideal class groups and torsion in Picard groups of varieties, preprint (2008), 31 pages.[arXiv]
  249. Xin Li, Marc Moreno Maza, Raqeeb Rasheed, and Eric Schost, High-performance symbolic computation in a hybrid compiled-interpreted programming environment, International Conference on Computational Sciences and Its Applications. ICCSA. June 30- July 3, 2008, 2008, pp. 331–341.
  250. Martin W. Liebeck, Aner Shalev, Pham Huu Tiep, and E. A. O'Brien, The Ore conjecture, Preprint (2008).
  251. Petr Lisoněk, On the connection between Kloosterman sums and elliptic curves, Sequences and Their Applications – SETA 2008: Proceedings, Lecture Notes in Computer Science, vol. 5203, Springer, Berlin Heidelberg, 2008, pp. 182–187.
  252. Petr Lisoněk, Stefano Marcugini, and Fernanda Pambianco, Constructions of small complete arcs with prescribed symmetry, Contrib. Discrete Math. 3 (2008), no. 1, 14–19.[MR]
  253. David Loeffler, Explicit calculations of automorphic forms for definite unitary groups, LMS J. Comput. Math. 11 (2008), 326–342.[MR]
  254. Adam Logan, The Brauer-Manin obstruction on del Pezzo surfaces of degree 2 branched along a plane section of a Kummer surface, Math. Proc. Cambridge Philos. Soc. 144 (2008), no. 3, 603–622.[MR]
  255. Ling Long, On Atkin and Swinnerton-Dyer congruence relations. III, J. Number Theory 128 (2008), no. 8, 2413–2429.[MR/arXiv]
  256. Ling Long and Chris Kurth, On modular forms for some noncongruence subgroups of SL2Z) II, preprint (2008), 13 pages.[arXiv]
  257. F. Luca, P. Stanica, and A. Togbé, On a Diophantine equation of Stroeker, Bull. Belg. Math. Soc. Simon Stevin (2008), 10.
  258. Florian Luca and Peter Gareth Walsh, On a sequence of integers arising from simultaneous Pell equations, Funct. Approx. Comment. Math. 38 (2008), no. , part 2, 221–226.[MR/link]
  259. Melissa L. Macasieb, Derived arithmetic Fuchsian groups of genus two, Experiment. Math. 17 (2008), no. 3, 347–369.[MR/arXiv]
  260. Kay Magaard, E. A. O'Brien, and Ákos Seress, Recognition of small dimensional representations of general linear groups, J. Aust. Math. Soc. 85 (2008), no. 2, 229–250.[MR]
  261. Michelle Manes, Q-rational cycles for degree-2 rational maps having an automorphism, Proc. Lond. Math. Soc. (3) 96 (2008), no. 3, 669–696.[MR]
  262. José M. Martín-García, xPerm: Fast index canonicalization for tensor computer algebra, Comput. Phys. Comm. 179 (2008), no. 8, 597–603.[doi/arXiv]
  263. Coy L. May and Jay Zimmerman, The groups of symmetric genus σ ≤ 8, Comm. Algebra 36 (2008), no. 11, 4078–4095.[MR]
  264. Coy L. May and Jay Zimmerman, The symmetric genus of groups of odd order, Houston J. Math. 34 (2008), no. 2, 319–338.[MR]
  265. Kelly McKinnie, Indecomposable p-algebras and Galois subfields in generic abelian crossed products, J. Algebra 320 (2008), no. 5, 1887–1907.[MR/arXiv]
  266. C. A. Melchor and P. Gaborit, On the classification of extremal [36,18,8] binary self-dual codes, IEEE Trans. Inform. Theory 54 (2008), no. 10, 4743-4750.[doi]
  267. Sihem Mesnager, P. Solé, and Steven T. Dougherty, Secret sharing schemes based on self-dual codes, Information Theory Workshop, 2008. ITW '08. IEEE (2008), 338–342.
  268. Gerhard O. Michler and Lizhong Wang, Another existence and uniqueness proof of the Tits group, Algebra Colloq. 15 (2008), no. 2, 241–278.[MR]
  269. J. Miret, R. Moreno, D. Sadornil, J. Tena, and M. Valls, Computing the height of volcanoes of l-isogenies of elliptic curves over finite fields, Appl. Math. Comput. 196 (2008), no. 1, 67–76.[MR]
  270. Mohammad Reza R. Moghaddam, Ali Reza Salemkar, and Taghi Karimi, Some inequalities for the order of the Schur multiplier of a pair of groups, Comm. Algebra 36 (2008), no. 7, 2481–2486.[MR]
  271. Mohamed Saied Emam Mohamed, Jintai Ding, and Johannes Buchmann, Algebraic cryptanalysis of MQQ public key cryptosystem by mutantxl, IACR (2008).[eprint]
  272. Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, and Johannes Buchmann, MXL2: solving polynomial equations over GF(2) using an improved mutant strategy, Post-Quantum Cryptography, Lecture Notes in Comput. Sci., vol. 5299, Springer, Berlin, 2008, pp. 203–215.
  273. Marko Moisio, Kloosterman sums, elliptic curves, and irreducible polynomials with prescribed trace and norm, Acta Arith. 132 (2008), no. 4, 329–350.[MR/arXiv]
  274. Bernard Mourrain and Philippe Trébuchet, Stable normal forms for polynomial system solving, Theoret. Comput. Sci. 409 (2008), no. 2, 229–240.[MR/doi]
  275. F. S. Abu Muriefah, F. Luca, S. Siksek, and S. Tengely, On the Diophantine equation x2+C=2yn, Int. J. Number Theory (2008).
  276. Mona B. Musa, On some double circulant binary extended quadratic residue codes, IEEE Trans. Inform. Theory 54 (2008), no. 2, 898–905.[MR]
  277. Tetsuo Nakano, On the moduli space of pointed algebraic curves of low genus. II. Rationality, Tokyo J. Math. 31 (2008), no. 1, 147–160.[MR]
  278. Tran Ngoc Nam, Transfert algébrique et action du groupe linéaire sur les puissances divisées modulo 2, Ann. Inst. Fourier (Grenoble) 58 (2008), no. 5, 1785–1837.[MR/link]
  279. Gabriele Nebe and Chaoping Xing, A Gilbert-Varshamov type bound for Euclidean packings, Math. Comp. 77 (2008), no. 264, 2339–2344.[MR]
  280. Max Neunhöffer and Cheryl E. Praeger, Computing minimal polynomials of matrices, LMS J. Comput. Math. 11 (2008), 252–279.[MR]
  281. Mara D. Neusel and Müfit Sezer, The invariants of modular indecomposable representations of Zp2, Math. Ann. 341 (2008), no. 3, 575–587.[MR]
  282. M. F. Newman, Automorphism groups of free groups, J. Aust. Math. Soc. 85 (2008), no. 3, 341–345.[MR/doi]
  283. Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, and Marco Streng, CM construction of genus 2 curves with p-rank 1, preprint (2008), 19 pages.[arXiv]
  284. Naoki Ogura and Shigenori Uchiyama, Remarks on the attack of Fouque et al. against the lIC scheme, IACR (2008).[eprint]
  285. Ayoub Otmani, Jean-Pierre Tillich, and Leonard Dallot, Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes, preprint (2008), 17 pages.[arXiv]
  286. Manabu Oura, Cris Poor, and David S. Yuen, Towards the Siegel ring in genus four, Int. J. Number Theory 4 (2008), no. 4, 563–586.[MR]
  287. F. Pambianco and L. Storme, Minimal blocking sets in PG(2,9), Ars Combin. 89 (2008), 223–234.[MR]
  288. Christopher Parker and Peter Rowley, A 3-local identification of the alternating group of degree 8, the McLaughlin simple group and their automorphism groups, J. Algebra 319 (2008), no. 4, 1752–1775.[MR]
  289. Geoffrey Pearce, Examples of rank 3 product action transitive decompositions, Des. Codes Cryptogr. 47 (2008), no. 1-3, 289–303.[MR]
  290. J. Pernas, J. Pujol, and M. Villanueva, Kernel dimension for some families of quaternary Reed-Muller codes, Information Security, Lecture Notes in Comput. Sci., vol. 5393, Springer, Berlin, 2008, pp. 128–141.
  291. Norbert Peyerimhoff and Alina Vdovina, Cayley graph expanders and groups of finite width, preprint (2008), 18 pages.[arXiv]
  292. Francesco Dalla Piazza and Bert van Geemen, Siegel modular forms and finite symplectic groups, preprint (2008), 33 pages.[arXiv]
  293. Adolfo Piperno, Search space contraction in canonical labeling of graphs (preliminary version), preprint (2008).[arXiv]
  294. Michel Planat and Philippe Jorrand, Group theory for quantum gates and quantum coherence, J. Phys. A 41 (2008), no. 18, 182001, 8.[MR/arXiv]
  295. Vladimir L. Popov, Irregular and singular loci of commuting varieties, Transform. Groups 13 (2008), no. 3-4, 819–837.[arXiv]
  296. Håvard Raddum and Igor Semaev, Solving multiple right hand sides linear equations, Des. Codes Cryptogr. 49 (2008), no. 1-3, 147–160.[MR/eprint]
  297. Colin Reid, A problem in the Kourovka notebook concerning the number of conjugacy classes of a finite group, preprint (2008), 25 pages.[arXiv]
  298. Jonathan Reynolds, Extending Siegel's theorem for elliptic curves, PhD Thesis, University of East Anglia, 2008.[link]
  299. Guillaume Ricotta and Thomas Vidick, Hauteur asymptotique des points de Heegner, Canad. J. Math. 60 (2008), no. 6, 1406–1436.[MR]
  300. Daniel Robbins, Broue's abelian defect group conjecture for the Tits group, preprint (2008), 23 pages.[arXiv]
  301. B. G. Rodrigues, Self-orthogonal designs and codes from the symplectic groups S4(3) and S4(4), Discrete Math. 308 (2008), no. 10, 1941–1950.[MR]
  302. Jeremy Rouse, Bounds for the coefficients of powers of the Delta-function, Bull. London Math. Soc. 40 (2008), no. 6, 1081-1090.[doi]
  303. Sasha Rubin, Automata presenting structures: a survey of the finite string case, Bull. Symbolic Logic 14 (2008), no. 2, 169–209.[MR]
  304. Kira Samol and Duco van Straten, Frobenius polynomials for Calabi-Yau equations, Commun. Number Theory Phys. 2 (2008), no. 3, 537–561.[MR/arXiv]
  305. Chekad Sarami and Vladimir D. Tonchev, Cyclic quasi-symmetric designs and self-orthogonal codes of length 63, J. Statist. Plann. Inference 138 (2008), no. 1, 80–85.[MR]
  306. Neil Saunders, Minimal faithful permutation degrees for irreducible Coxeter groups, preprint (2008), 11 pages.[arXiv]
  307. Marcus du Sautoy and Luke Woodward, Nilpotent groups: explicit examples, Zeta Functions of Groups and Rings, Lecture Notes in Computer Science, vol. 1925/2008, Springer Berlin / Heidelberg, 2008, pp. 21–68.
  308. Mohamed Sayed, Combinatorial method in the coset enumeration of symmetrically generated groups, Int. J. Comput. Math. 85 (2008), no. 7, 993–1001.[MR]
  309. Luciano Sbaiz, Patrick Vandewalle, and Martin Vetterli, Groebner basis methods for multichannel sampling with unknown offsets, Appl. Comput. Harmon. Anal. 25 (2008), no. 3, 277–294.[doi]
  310. Michael M. Schein, Weights in Serre's conjecture for Hilbert modular forms: the ramified case, Israel J. Math. 166 (2008), 369–391.[MR]
  311. Josef Schicho and David Sevilla, Tschirnhaus-Weierstrass curves, preprint (2008), 14 pages.[arXiv]
  312. René Schoof, Computing Arakelov class groups, Algorithmic number theory: lattices, number fields, curves and cryptography, Math. Sci. Res. Inst. Publ., vol. 44, Cambridge Univ. Press, Cambridge, 2008, pp. 447–495.[MR/arXiv]
  313. Stefan Schröer, Singularities appearing on generic fibers of morphisms between smooth schemes, Michigan Math. J. 56 (2008), no. 1, 55–76.[MR/doi/arXiv]
  314. Romyar T. Sharifi, On Galois groups of unramified pro-p extensions, Math. Ann. 342 (2008), no. 2, 297–308.[MR]
  315. R. Shaw, The polynomial degrees of Grassmann and Segre varieties over GF(2), Discrete Math. 308 (2008), no. 5-6, 872–879.[MR]
  316. Junichi Shigezumi, On 3-lattices and spherical designs, preprint (2008), 199 pages.[arXiv]
  317. Benjamin Smith, Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves, Advances in Cryptology, Eurocrypt 2008, Lecture Notes in Computer Science, vol. 4965, Springer Berlin/Heidelberg, 2008, pp. 163–180.[eprint]
  318. Britta Späth, The McKay conjecture for exceptional groups and odd primes, Math. Z. Online first (2008), 25.
  319. P. Christopher Staecker, Remnant properties in nielsen coincidence theory, preprint (2008), 16 pages.[arXiv]
  320. William A. Stein, An introduction to computing modular forms using modular symbols, Algorithmic number theory: lattices, number fields, curves and cryptography, Math. Sci. Res. Inst. Publ., vol. 44, Cambridge Univ. Press, Cambridge, 2008, pp. 641–652.[MR]
  321. Rainer Steinwandt and Viktória I. Villányi, A one-time signature using run-length encoding, Inform. Process. Lett. 108 (2008), no. 4, 179–185.[MR]
  322. Michael Stoll, Rational 6-cycles under iteration of quadratic polynomials, LMS J. Comput. Math. 11 (2008), 367–380.[arXiv]
  323. Katsuyuki Takashima, Efficiently computable distortion maps for supersingular curves, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer Berlin/Heidelberg, 2008, pp. 88–101.
  324. Satoru Tanaka and Ken Nakamula, Constructing pairing-friendly elliptic curves using factorization of cyclotomic polynomials, Pairing-Based Cryptography, Pairing 2008, Lecture Notes in Computer Science, vol. 5209, Springer, 2008, pp. 136–145.
  325. Sz. Tengely, Note on the paper: "An extension of a theorem of Euler" by N. Hirata-Kohno, S. Laishram, T. N. Shorey and R. Tijdeman, Acta Arith. 134 (2008), no. 4, 329–335.[MR]
  326. Thotsaphon Thongjunthug, Computing a lower bound for the canonical height on elliptic curves over totally real number fields, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 139-152.
  327. Shigeo Tsujii, Kohtaro Tadaki, and Ryou Fujita, Nonlinear piece-in-hand matrix method for enhancing security of multivariate public key cryptosystems, IACR (2008).[eprint]
  328. Anthony Várilly-Alvarado, Weak approximation on del Pezzo surfaces of degree 1, Adv. Math. 219 (2008), no. 6, 2123–2145.[MR]
  329. Roope Vehkalahti, Class field theoretic methods in the design of lattice signal constellations, PhD Thesis, University of Turku, 2008.
  330. Frederik Vercauteren, The hidden root problem, Pairing-Based Cryptography - Pairing, Lecture Notes in Computer Science, vol. 5209, SpringerLink, Berlin, 2008, pp. 89–99.
  331. Bogdan G. Vioreanu, Mordell-Weil problem for cubic surfaces, numerical evidence, preprint (2008), 22 pages.[arXiv]
  332. Yimin Wang, Bastiaan J. Braams, Joel M. Bowman, Stuart Carter, and D. P. Tew, Full-dimensional quantum calculations of ground-state tunneling splitting of malonaldehyde using an accurate ab initio potential energy surface, J. Chem. Phys 128 (2008), no. 224314, 9 pages.
  333. Yimin Wang, Stuart Carter, Bastiaan J. Braams, and Joel M. Bowman, Multimode quantum calculations of intramolecular vibrational energies of the water dimer and trimer using ab initio-based potential energy surfaces, J. Chem. Phys 128 (2008), no. 071101, 5 pages.
  334. Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, and Zhihui Zhang, A new construction of multivariate Public Key Encryption Scheme through internally perturbed plus, Computational Science and Its Applications, ICCSA 2008, Lecture Notes in Computer Science, vol. 5073, Springer, 2008, pp. 1-13.
  335. Kenneth L. Wantz, Unitals in the regular nearfield planes, J. Geom. 88 (2008), no. 1-2, 169–177.[MR]
  336. Mark Watkins, Some heuristics about elliptic curves, Experiment. Math. 17 (2008), no. 1, 105–125.[MR/arXiv]
  337. Oliver Wienand, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, and Gert-Martin Greuel, An algebraic approach for proving data correctness in arithmetic data paths, Computer Aided Verification, Lecture Notes in Computer Science, vol. 5123, Springer Berlin/Heidelberg, 2008, pp. 473–486.
  338. Gabor Wiese, On projective linear groups over finite fields as Galois groups over the rational numbers, Edixhoven, Bas et al., Modular forms on Schiermonnikoog. Based on the conference on modular forms, Schiermonnikoog, Netherlands, October 2006, Cambridge University Press, Cambridge, 2008, pp. 343–350.[arXiv]
  339. Mark Wildon, Character values and decomposition matrices of symmetric groups, J. Algebra 319 (2008), no. 8, 3382–3397.[MR/arXiv]
  340. Rolf Stefan Wilke, On rational embeddings of curves in the second Garcia-Stichtenoth tower, Finite Fields Appl. 14 (2008), no. 2, 494–504.[MR]
  341. Kenneth Koon-Ho Wong, Applications of finite field computation to cryptology: Extension field arithmetic in public key systems and algebraic attacks on stream ciphers, PhD Thesis, Queensland University of Technology, 2008.[link]
  342. Chaoping Xing and Sze Ling Yeo, Construction of global function fields from linear codes and vice versa, Trans. Amer. Math. Soc. 361 (2008), no. 3, 1333-1349.
  343. Jian Xu, MEI - A module system for mechanized mathematics, PhD Thesis, McMasters University, 2008.[link]
  344. Radinka Aleksandrova Yorgova, On binary self-dual codes with automorphisms, IEEE Trans. Inform. Theory 54 (2008), no. 7, 3345–3351.[MR/doi]
  345. Radinka Yorgova and Alfred Wassermann, Binary self-dual codes with automorphisms of order 23, Des. Codes Cryptogr. 48 (2008), no. 2, 155–164.[MR]
  346. Fangguo Zhang, Twisted ate pairing on hyperelliptic curves and applications, IACR (2008), 15 pages.[eprint]
  347. Chang-An Zhao, Fangguo Zhang, and Jiwu Huang, All pairings are in a group, IEICE Trans A: Fundamentals E91-A (2008), no. 10, 3084-3087.[doi]

2009

  1. Kanat Abdukhalikov and Rudolf Scharlau, Unimodular lattices in dimensions 14 and 15 over the Eisenstein integers, Math. Comp. 78 (2009), no. 265, 387–403.[MR]
  2. Jaume Aguadé, Four lines in space, J. Geom. 92 (2009), no. 1-2, 1–16.[MR/doi]
  3. Jaume Aguadé, The arboreal approach to pairs of involutions in rank two, Comm. Algebra 37 (2009), no. 3, 1104–1116.[MR/doi]
  4. Shabnam Akhtari, The diophantine equation aX4 – bY2 = 1, Journal fur die Reine und Angewandte Mathematik, to appear (2009), 20 pages.[arXiv]
  5. Shabnam Akhtari, The method of Thue-Siegel for binary quartic forms, preprint (2009), 35 pages.[arXiv]
  6. Maximilian Albert and Annette Maier, Additive polynomials for finite groups of Lie type, preprint (2009), 59 pages.[arXiv]
  7. Martin Albrecht and Carlos Cid, Algebraic techniques in differential cryptanalysis, Fast Software Encryption, Lecture Notes in Computer Science, vol. 5665, Springer, 2009, pp. 193–208.[doi/eprint]
  8. T. L. Alderson and Keith E. Mellinger, 2-dimensional optical orthogonal codes from Singer groups, Discrete Appl. Math. 157 (2009), no. 14, 3008–3019.[MR/doi]
  9. Habib Amiri, S. M. Jafarian Amiri, and I. M. Isaacs, Sums of element orders in finite groups, Comm. Algebra 37 (2009), no. 9, 2978–2980.[MR/doi]
  10. Daniel Appel and Evija Ribnere, On the index of congruence subgroups of Aut(Fn), J. Algebra 321 (2009), no. 10, 2875–2889.[MR/arXiv]
  11. João Araújo and Csaba Schneider, The rank of the endomorphism monoid of a uniform partition, Semigroup Forum 78 (2009), no. 3, 498–510.[MR/arXiv]
  12. Sarah Astill and Chris Parker, A 3-local characterization of M12 and SL3(3), Arch. Math. (Basel) 92 (2009), no. 2, 99–110.[MR/arXiv]
  13. Nuh Aydin, Enhancing undergraduate mathematics curriculum via coding theory and cryptography, PRIMUS 19 (2009), no. 3, 296–309.
  14. Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Gneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, and Leif Uhsadel, The Certicom Challenges ECC2-X, Workshop Record of SHARCS'09 - Special-purpose Hardware for Attacking Cryptographic Systems (2009).
  15. E. Ballico, E. Gasparim, and T. Kölppe, Vector bundles near negative curves: moduli and local Euler characteristic, Comm. Algebra 37 (2009), no. 8, 2688–2713.
  16. John Bamberg and Tim Penttila, A classification of transitive ovoids, spreads, and m-systems of polar spaces, Forum Math. 21 (2009), no. 2, 181–216.[MR]
  17. Eiichi Bannai, Osamu Shimabukuro, and Hajime Tanaka, Finite Euclidean graphs and Ramanujan graphs, Discrete Math. 309 (2009), no. 20, 6126–6134.[MR/doi]
  18. Gregory V. Bard, The application of polynomials over the field of two elements to a problem in intellectual property, IACR (2009), 6 pages.[eprint]
  19. Wayne Barrett, Jason Grout, and Raphael Loewy, The minimum rank problem over the finite field of order 2: minimum rank 3, Linear Algebra and its Applications 430 (2009), no. 4, 890–923.[doi]
  20. C. Bates, D. Bundy, S. Hart, and P. Rowley, A note on commuting graphs for symmetric groups, Electron. J. Combin. 16 (2009), no. 1, 13.[MR]
  21. Chris Bates and Peter Rowley, Normalizers of p-subgroups in finite groups, Arch. Math. (Basel) 92 (2009), no. 1, 7–13.[MR]
  22. Barbara Baumeister and Alexander Stein, Commuting graphs of odd prime order elements in simple groups, preprint (2009), 28 pages.[arXiv]
  23. Tobias Beck, Formal desingularization of surfaces: the Jung method revisited, J. Symb. Comput. 44 (2009), no. 2, 131–160.[doi/arXiv]
  24. Antonio Behn, Alberto Elduque, and Alicia Labra, A class of locally nilpotent commutative algebras, preprint (2009), 12 pages.[arXiv]
  25. Karim. Belabas, Mark van Hoeij, J. Klüners, and Allan Steel, Factoring polynomials over global fields, Journal de Théorie des Nombres de Bordeaux (2009), no. 21, 15–39.
  26. Dave Benson, An algebraic model for chains on Ω BGp, Trans. Amer. Math. Soc. 361 (2009), no. 4, 2225-2242.
  27. Tobias Berger and Krzysztof Klosin, A deformation problem for Galois representations over imaginary quadratic fields, J. Inst. Math. Jussieu 8 (2009), no. 4, 669–692.[MR/doi]
  28. Tobias Berger and Krzysztof Klosin, A deformation problem for Galois representations over imaginary quadratic fields, J. Inst. Math. Jussieu, to appear (2009), 19.
  29. Alexander Berkovich and William C. Jagy, Ternary quadratic forms, modular equations and certain positivity conjectures, The Legacy of Alladi Ramakrishnan in the Mathematical Sciences, Springer, New York, 2009, pp. 211–241.[doi]
  30. Daniel J. Bernstein, Batch binary edwards, Advances in Cryptology - CRYPTO 2009, Lecture Notes in Comput. Sci., vol. 5677, Springer, Berlin, 2009, pp. 317–336.[doi]
  31. Olivier Billet and Gilles Macario-Rat, Cryptanalysis of the square cryptosystems, Advances in Cryptology – ASIACRYPT 2009, Lecture Notes in Comput. Sci., vol. 5912, Springer, Berlin, 2009, pp. 451–468.[doi]
  32. Gilberto Bini, Quotients of hypersurfaces in weighted projective space, preprint (2009), 13 pages.[arXiv]
  33. Peter Birkner, Efficient arithmetic on low-genus curves, PhD Thesis, Technische Universiteit Eindhoven, 2009.
  34. Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolić, Josef Pieprzyk, and Huaxiong Wang, Cryptanalysis of the LAKE hash family, Fast Software Encryption, Lecture Notes in Computer Science, vol. 5665, Springer, Berlin, 2009, pp. 156–179.[doi]
  35. Werner Bley and Stephen M. J. Wilson, Computations in relative algebraic K-groups, LMS J. Comput. Math. 12 (2009), 166–194.[MR/doi]
  36. Russell D. Blyth and Robert Fitzgerald Morse, Computing the nonabelian tensor squares of polycyclic groups, J. Algebra 321 (2009), no. 8, 2139–2148.[MR]
  37. Siegfried Boecherer and Gabriele Nebe, On theta series attached to maximal lattices and their adjoints, preprint (2009), 16 pages.[arXiv]
  38. Tomas J. Boothby and Robert W. Bradshaw, Bitslicing and the method of four Russians over larger finite fields, preprint (2009), 1–10.[arXiv]
  39. Wieb Bosma and Ben Kane, The Aliquot constant, preprint (2009), 16 pages.[arXiv]
  40. Delphine Boucher and Felix Ulmer, Coding with skew polynomial rings, J. Symbolic Comput. 44 (2009), no. 12, 1644–1656.[MR/doi]
  41. Irene I. Bouw and Brian Osserman, Some 4-point Hurwitz numbers in positive characteristic, preprint (2009), 23 pages.[arXiv]
  42. John N. Bray, Derek F. Holt, and Colva M. Roney-Dougal, Certain classical groups are not well-defined, J. Group Theory 12 (2009), no. 2, 171–180.[MR]
  43. A. Bremner and Jean-Joël Delorme., On equal sums of ninth powers, Math. Comp 79 (2009), 603–612.
  44. Andrew Bremner, A problem of Ozanam, Proc. Edinb. Math. Soc. (2) 52 (2009), no. 1, 37–44.[MR/doi]
  45. Richard P. Brent and Paul Zimmermann, Ten new primitive binary trinomials, Math. Comp. 78 (2009), no. 266, 1197–1199.[MR]
  46. Michael Brickenstein and Alexander Dreyer, PolyBoRi: a framework for Gröbner-basis computations with Boolean polynomials, J. Symbolic Comp. 44 (2009), no. 9, 1326–1345.
  47. Michael Brickenstein, Alexander Dreyer, Gert-Martin Greuel, Markus Wedler, and Oliver Wienand, New developments in the theory of Gröbner bases and applications to formal verification, J. Pure Appl. Algebra 213 (2009), no. 8, 1612–1635.[MR]
  48. Andries E. Brouwer, Naoyuki Horiguchi, Masaaki Kitazume, and Hiroyuki Nakasora, A construction of the sporadic Suzuki graph from U3(4), J. Combin. Theory Ser. A 116 (2009), no. 5, 1056–1062.[MR]
  49. David Brown, Primitive integral solutions to x2 + y3 = z10, preprint (2009), 11 pages.[arXiv]
  50. Gavin Brown, Alexander Kasprzyk, and Daniel Ryder, Computational birational geometry of minimal rational surfaces, preprint (2009), 20 pages.[arXiv]
  51. F. Buekenhout and D. Leemans, On apartments in incidence geometry, preprint (2009), 17.
  52. Stanislav Bulygin and Ruud Pellikaan, Bounded distance decoding of linear error-correcting codes with Gröbner bases, J. Symb. Comput. 44 (2009), no. 12, 1626–1643.
  53. Dietrich Burde, Bettina Eick, and Willem de Graaf, Computing faithful representations for nilpotent Lie algebras, J. Algebra 322 (2009), no. 3, 602–612.[MR/doi]
  54. Jessica F. Burkhart, Neil J. Calkin, Shuhong Gao, Justine C. Hyde-Volpe, Kevin James, Hiren Maharaj, Shelly Manber, Jared Ruiz, and Ethan Smith, Finite field elements of high order arising from modular curves, Des. Codes Cryptogr. 51 (2009), no. 3, 301–314.[MR/doi]
  55. Timothy C. Burness, Martin W. Liebeck, and Aner Shalev, Base sizes for simple groups and a conjecture of Cameron, Proc. Lond. Math. Soc. (3) 98 (2009), no. 1, 116–162.[MR/doi]
  56. Jason Callahan, Jorgensen number and arithmeticity, Conform. Geom. Dyn 13 (2009), 160–186.[arXiv]
  57. Jason Todd Callahan, The arithmetic and geometry of two-generator Kleinian groups, PhD Thesis, University of Texas at Austin, 2009.[link]
  58. Lisa Carbone, Leigh Cobbs, and Scott H. Murray, Fundamental domains for congruence subgroups of SL2 in positive characteristic, preprint (2009).[arXiv]
  59. Robert Carls, Explicit Frobenius lifts on elliptic curves, preprint (2009), 26 pages.[arXiv]
  60. Robert Carls and David Lubicz, A p-adic quasi-quadratic time point counting algorithm, Int. Math. Res. Not. IMRN (2009), no. 4, 698–735.[MR/arXiv]
  61. Jon F. Carlson, Nadia Mazza, and Daniel K. Nakano, Endotrivial modules for the symmetric and alternating groups, Proc. Edinb. Math. Soc. (2) 52 (2009), 45–66.[MR/doi]
  62. Wouter Castryck and John Voight, Nondegenerate curves of low genus over small finite fields, Arithmetic, Geometry, Cryptography and Coding Theory, Contemporary Mathematics, vol. 521, AMS, Providence, R.I., 2009, pp. 21–28.[arXiv]
  63. Hugo Chapdelaine, Computation of p-units in ray class fields of real quadratic number fields, Math. Comp. 78 (2009), 2307–2345.
  64. Denis Charles, Kamal Jain, and Kristin Lauter, Signatures for network coding, International Journal of Information and Coding Theory 1 (2009), no. 1, 3–14.[link]
  65. Imin Chen and Samir Siksek, Perfect powers expressible as sums of two cubes, J. Algebra 322 (2009), no. 3, 638–656.[MR/doi]
  66. Serena Cicalò and Willem A. de Graaf, Non-associative Gröbner bases, finitely-presented Lie rings and the Engel condition: II, J. Symbolic Comput. 44 (2009), no. 7, 786–800.
  67. Arjeh M. Cohen, Sergei Haller, and Scott H. Murray, Computing with root subgroups of twisted reductive groups, preprint Submitted (2009).
  68. Arjeh M. Cohen and Scott H. Murray, An algorithm for Lang's Theorem, J. Algebra 322 (2009), no. 3, 675–702.[MR/arXiv]
  69. Arjeh M. Cohen and Dan Roozemond, Computing Chevalley bases in small characteristics, J. Algebra 322 (2009), no. 3, 703–721.[MR/doi]
  70. Marston Conder, On symmetries of Cayley graphs and the graphs underlying regular maps, J. Algebra 321 (2009), no. 11, 3112–3127.[MR]
  71. Marston D. E. Conder, Regular maps and hypermaps of Euler characteristic -1 to -200, J. Combin. Theory Ser. B 99 (2009), no. 2, 455–459.[MR/doi]
  72. Marston Conder and Roman Nedela, A refined classification of symmetric cubic graphs, J. Algebra 322 (2009), no. 3, 722–740.[MR/doi]
  73. Marston Conder and Roman Nedela, A refined classification of symmetric cubic graphs, J. Algebra 322 (2009), no. 1, 722–740.
  74. Antonio Cossidente and Tim Penttila, On m-regular systems on H(5,q2), J. Algebraic Combin. 29 (2009), no. 4, 437–445.[MR]
  75. J. -M. Couveignes, Linearizing torsion classes in the Picard group of algebraic curves over finite fields, J. Algebra 321 (2009), no. 8, 2085–2118.[MR/arXiv]
  76. Jean-Marc Couveignes and Reynald Lercier, Elliptic periods for finite fields, Finite Fields Appl. 15 (2009), no. 1, 1–22.[MR/doi]
  77. David A. Craven, Simple modules for groups with abelian Sylow 2-subgroups are algebraic, J. Algebra 321 (2009), no. 5, 1473–1479.[MR/arXiv]
  78. J. E. Cremona, T. A. Fisher, C. O'Neil, D. Simon, and M. Stoll, Explicit n-descent on elliptic curves, II: Geometry, J. reine angew. Math 2009 (2009), no. 632, 63–84.[arXiv]
  79. John Cullinan, A computational approach to the 2-torsion structure of abelian threefolds, Math. Comp. 78 (2009), no. 267, 1825–1836.[MR]
  80. C. J. Cummins, On conjugacy classes of congruence subgroups of PSL(2,R), LMS J. Comput. Math. 12 (2009), 264–274.[MR/doi]
  81. M. Cuntz and I. Heckenberger, Finite Weyl groupoids of rank three, preprint (2009), 31 pages.[arXiv]
  82. R. T. Curtis and B. T. Fairbairn, Symmetric representation of the elements of the Conway group ·0, J. Symbolic Comput. 44 (2009), no. 8, 1044–1067.[MR]
  83. Susanne Danz, On vertices of completely spittable modules for symmetric groups and simple modules labelled by two part partitions, J. Group Theory 12 (2009), no. 3, 351–385.[MR]
  84. Susanne Danz and Burkhard Külshammer, The vertices and sources of the basic spin module for the symmetric group in characteristic 2, J. Pure Appl. Algebra 213 (2009), no. 7, 1264–1282.[MR]
  85. Susanne Danz and Burkhard Külshammer, Vertices of simple modules for symmetric groups: A survey, in Proceedings of the International Conference on Modules and Representation Theory, Presa Univ. Clujeană, Cluj-Napoca, 2009, pp. 61–77.[MR/link]
  86. Susanne Danz and Burkhard Külshammer, Vertices, sources and Green correspondents of the simple modules for the large Mathieu groups, J. Algebra 322 (2009), no. 11, 3919–3949.[MR/doi]
  87. M. R. Darafsheh, A. Iranmanesh, and R. Kahkeshani, Some designs and codes invariant under the groups S9 and A8, Des. Codes Cryptogr. 51 (2009), no. 2, 211–223.[MR/doi]
  88. Italo J. Dejter, On a {K4,K2,2,2}-ultrahomogeneous graph., Australas. J. Comb. 44 (2009), 63–75.
  89. Christophe Delaunay and Christian Wuthrich, Self-points on elliptic curves of prime conductor, Int. J. Number Theory 5 (2009), no. 5, 911–932.[MR/doi]
  90. Lassina Dembélé, A non-solvable Galois extension of Q ramified at 2 only, C. R. Math. Acad. Sci. Paris 347 (2009), no. 3-4, 111–116.[MR/doi]
  91. Lassina Dembélé, On the computation of algebraic modular forms on compact inner forms of GSp4, preprint (2009), 21 pages.[arXiv]
  92. Lassina Dembele, Matthew Greenberg, and John Voight, Nonsolvable number fields ramified only at 3 and 5, preprint (2009), 18 pages.[arXiv]
  93. A. S. Detinko and D. L. Flannery, On deciding finiteness of matrix groups, J. Symbolic Comput. 44 (2009), no. 8, 1037–1043.[MR]
  94. A. S. Detinko, D. L. Flannery, and E. A. O'Brien, Deciding finiteness of matrix groups in positive characteristic, J. Algebra 322 (2009), no. 11, 4151–4160.[MR/doi]
  95. Alice Devillers, Michael Giudici, Cai Heng Li, and Cheryl E. Praeger, An infinite family of biquasiprimitive 2-arc transitive cubic graphs, Preprint (2009), 1–19.
  96. Michael Dewar and Olav K. Richter, Ramanujan congruences for Siegel modular forms, preprint (2009), 11 pages.[arXiv]
  97. Meghan DeWitt and Darrin Doud, Finding Galois representations corresponding to certain Hecke eigenclasses, Int. J. Number Theory 5 (2009), no. 1, 1–11.[MR/doi]
  98. Persi Diaconis, The Markov chain Monte Carlo revolution, Bull. Amer. Math. Soc. (N.S.) 46 (2009), no. 2, 179–205.[MR]
  99. Luis Dieulefait, E. Gonzalez-Jimenez, and J. Jimenez Urroz, On fields of definition of torsion points of elliptic curves with complex multiplication, preprint (2009).[arXiv]
  100. Luis Dieulefait and Xavier Taixes i Ventosa, Congruences between modular forms and lowering the level mod ln, Journal de Theorie des Nombres de Bordeaux 31 (2009), no. 1, 109–118.[arXiv]
  101. Tim Dokchitser and Vladimir Dokchitser, A note on the Mordell-Weil rank modulo n, preprint (2009), 7 pages.[arXiv]
  102. Konstantinos Draziotis and Dimitrios Poulakis, Corrigendum to "Solving the Diophantine equation y2=x(x2-n2)" [J. Number Theory 129 (1) (2009) 102–121] [mr2468473], J. Number Theory 129 (2009), no. 3, 739–740.[MR/doi]
  103. Konstantinos Draziotis and Dimitrios Poulakis, Solving the Diophantine equation y2=x(x2-n2), J. Number Theory 129 (2009), no. 1, 102–121.[MR/doi]
  104. Laurent Ducrohet, The Frobenius action on rank 2 vector bundles over curves in small genus and small characteristic, Ann. Inst. Fourier (Grenoble) 59 (2009), no. 4, 1641–1669.[MR/link]
  105. Emilie Dufresne, Jonathan Elmer, and Martin Kohls, The Cohen-Macaulay property of separating invariants of finite groups, Transform. Groups 14 (2009), no. 4, 771–785.[MR/doi]
  106. Alexander Duncan, Michael LeBlanc, and David L. Wehlau, A SAGBI basis for F[V2⊕V2⊕V3]C p, Canad. Math. Bull. 52 (2009), no. 1, 72–83.[MR]
  107. Matthew J. Dyer, Elementary roots and admissible subsets of coxeter groups, J. Group Theory, to appear (2009).
  108. G. L. Ebert, O. Polverino, G. Marino, and R. Trombetti, Semifields in class F4(a), Electron. J. Combin. 16 (2009), no. 1, 20.[MR]
  109. Gary L. Ebert, Giuseppe Marino, Olga Polverino, and Rocco Trombetti, On the multiplication of some semifields of order q6, Finite Fields Appl. 15 (2009), no. 2, 160–173.[MR]
  110. Yves Edel and Alexander Pott, A new almost perfect nonlinear function which is not quadratic, Adv. Math. Commun. 3 (2009), no. 1, 59–81.[MR/doi]
  111. Jonathan Elmer, Depth and detection in modular invariant theory, J. Algebra 322 (2009), no. 5, 1653–1666.[MR/doi]
  112. L. Hernandez Encinas, J. Munoz Masque, and A. Queiruga Dios, Analysis of the efficiency of the Chor–Rivest cryptosystem implementation in a safe-parameter range, Information Sciences, to appear (2009), 8 pages.
  113. M. Esmaeili and S. Yari, On complementary-dual quasi-cyclic codes, Finite Fields Appl. 15 (2009), no. 3, 375–386.[MR]
  114. Pavel Etingof, John Kim, and Xiaoguang Ma, On universal Lie nilpotent associative algebras, J. Algebra 321 (2009), no. 2, 697–703.[MR/doi]
  115. Ching-Hwa Eu and Travis Schedler, Calabi-Yau Frobenius algebras, J. Alg. 321 (2009), no. 3, 774-815.[arXiv]
  116. Anthony B. Evans, The admissibility of sporadic simple groups, Journal of Algebra 321 (2009), no. 1, 105–116.[doi]
  117. Graham Everest, Patrick Ingram, and Shaun Stevens, Primitive divisors on twists of Fermat's cubic, LMS J. Comput. Math. 12 (2009), 54–81.[MR/arXiv]
  118. Graham Everest and Valéry Mahé, A generalization of Siegel's theorem and Hall's conjecture, Experiment. Math. 18 (2009), no. 1, 1–9.[MR/arXiv]
  119. Xander Faber, Benjamin Hutz, Patrick Ingram, Rafe Jones, Michelle Manes, Thomas J. Tucker, and Michael E. Zieve, Uniform bounds on pre-images under quadratic dynamical systems, Math. Res. Lett. 16 (2009), no. 1, 87–101.[MR/arXiv]
  120. Ben Fairbairn, Improved upper bounds on the spreads of some large sporadic groups, preprint (2009), 11 pages.[arXiv]
  121. Tao Feng, Non-abelian skew hadamard difference sets fixed by a prescribed automorphism, J Combin. Theory Ser. A, to appear (2009).[doi]
  122. Thomas Feulner, The automorphism groups of linear codes and canonical representatives of their semilinear isometry classes, Adv. Math. Commun. 3 (2009), no. 4, 363–383.[MR/doi]
  123. Claus Fieker, Minimizing representations over number fields II. Computations in the Brauer group, J. Algebra 322 (2009), no. 3, 752–765.[MR/doi]
  124. W. Fish, J. D. Key, and E. Mwambene, Graphs, designs and codes related to the n-cube, Discrete Math. 309 (2009), no. 10, 3255–3269.[MR]
  125. Steven D. Galbraith and Xibin Lin, Computing pairings using x-coordinates only, Des. Codes Cryptogr. 50 (2009), no. 3, 305–324.[MR/eprint]
  126. Shuhong Gao, Daqing Wan, and Mingsheng Wang, Primary decomposition of zero-dimensional ideals over finite fields, Math. Comp. 78 (2009), no. 265, 509–521.[MR/link]
  127. Alice Garbagnati and Alessandra Sarti, Elliptic fibrations and symplectic automorphisms on K3 surfaces, Comm. Algebra 37 (2009), no. 10, 3601–3631.[MR/doi]
  128. Cesar A. Garcia-Vazquez and Carlos A. Lopez-Andrade, D-Heaps as hash tables for vectors over a finite ring, 2009 WRI World Conference on Computer Science and Information Engineering, WRI World Congress on Computer Science and Information Engineering, vol. 3, IEEE, 2009, pp. 162–166.[doi]
  129. Shelly Garion and Matteo Penegini, New Beauville surfaces, moduli spaces and finite groups, preprint (2009), 36 pages.[arXiv]
  130. Shelly Garion and Aner Shalev, Commutator maps, measure preservation, and T-systems, Trans. Amer. Math. Soc. 361 (2009), no. 9, 4631–4651.[MR]
  131. F. G. Garvan, Biranks for partitions into 2 colors, preprint (2009), 20 pages.[arXiv]
  132. University of Georgia VIGRE Algebra Group, On Kostant's theorem for Lie algebra cohomology, Lin, Zongzhu (ed.) et al., Representation Theory. Fourth International Conference on Representation Theory, Lhasa, China, July 16–20, 2007., Contemporary Mathematics, vol. 478, American Mathematical Society (AMS), Providence, RI, 2009, pp. 39–60.
  133. D. Ghinelli, M. J. de Resmini, and J. D. Key, Minimum words of codes from affine planes, J. Geom. 91 (2009), no. 1-2, 43–51.
  134. S. P. Glasby and Cheryl E. Praeger, Towards an efficient Meat-axe algorithm using f-cyclic matrices: the density of uncyclic matrices in M(n,q), J. Algebra 322 (2009), no. 3, 766–790.
  135. H. H. Glover, K. Kutnar, and Dragan Marušič, Hamiltonian cycles in cubic Cayley graphs: The <2, 4k, 3> case, J. Algebraic Combin., to appear (2009).
  136. Josep González and Jordi Guàrdia, Genus two curves with quaternionic multiplication and modular Jacobian, Math. Comp. 78 (2009), no. 265, 575–589.[MR]
  137. Enrique Gonzalez-Jimenez and Xavier Xarles, Five squares in arithmetic progression over quadratic fields, preprint (2009), 24 pages.[arXiv]
  138. Nikolai Gordeev, Fritz Grunewald, Boris Kunyavskii, and Eugene Plotkin, A description of Baer-Suzuki type of the solvable radical of a finite group, J. Pure Appl. Algebra 213 (2009), no. 2, 250–258.[MR/doi]
  139. Eyal Z. Goren and Kristin E. Lauter, The distance between superspecial abelian varieties with real multiplication, J. Number Theory 129 (2009), no. 6, 1562–1578.[MR]
  140. Willem A. de Graaf, Constructing algebraic groups from their Lie algebras, J. Symbolic Comput. 44 (2009), no. 9, 1223–1233.[arXiv]
  141. Willem A. de Graaf and Andrea Pavan, Constructing arithmetic subgroups of unipotent groups, J. Algebra 322 (2009), no. 11, 3950–3970.[MR/doi]
  142. Willem A. de Graaf, Jana Pílniková, and Josef Schicho, Parametrizing del Pezzo surfaces of degree 8 using Lie algebras, J. Symbolic Comput. 44 (2009), no. 1, 1–14.[arXiv]
  143. Markus Grassl and T. Aaron Gulliver, On circulant self-dual codes over small fields, Des. Codes Cryptogr. 52 (2009), no. 1, 57–81.[MR]
  144. Markus Grassl and T. Aaron Gulliver, On circulant self-dual codes over small fields, Des. Codes Cryptogr. 52 (2009), no. 1, 57–81.
  145. Markus Grassl and Rainer Steinwandt, Cryptanalysis of an authentication scheme using truncated polynomials, Inform. Process. Lett. Article in Press (2009).
  146. David J. Green, Gröbner bases for p-group algebras, preprint (2009).[arXiv]
  147. Grigor Grigorov, Andrei Jorza, Stefan Patrikis, William A. Stein, and Corina Tarnita, Computational verification of the birch and swinnerton-dyer conjecture for individual elliptic curves, Math. Comp 78 (2009), 2397–2425.
  148. J. Guardia, J. Montes, and E. Nart, Higher Newton polygons and integral bases, preprint (2009).[arXiv]
  149. Xavier Guitart and Jordi Quer, Modular abelian varieties over number fields, preprint (2009), 24 pages.[arXiv]
  150. Cem Güneri, Henning Stichtenoth, and Ihsan Taşkın, Further improvements on the designed minimum distance of algebraic geometry codes, J. Pure Appl. Algebra 213 (2009), no. 1, 87–97.[MR]
  151. Paul E. Gunnells and Dan Yasaki, Perfect forms over totally real number fields, preprint (2009), 11 pages.[arXiv]
  152. Annika Günther, A mass formula for self-dual permutation codes, Finite Fields Appl. 15 (2009), no. 4, 517–533.[MR/doi]
  153. Robert Guralnick and Susan Montgomery, Frobenius-Schur indicators for subgroups and the Drinfeld double of Weyl groups, Trans. Amer. Math. Soc. 361 (2009), no. 7, 3611–3632.[MR/arXiv]
  154. K. Győry, L. Hajdu, and Á. Pintér, Perfect powers from products of consecutive terms in arithmetic progression, Compos. Math. 145 (2009), no. 4, 845–864.[MR/doi]
  155. Lajos Hajdu, Optimal systems of fundamental S-units for LLL-reduction, Period. Math. Hungar. 59 (2009), no. 1, 53–79.[MR/doi]
  156. Lajos Hajdu and Szabolcs Tengely, Arithmetic progressions of squares, cubes and n-th powers, Funct. Approx. Comment. Math. 41 (2009), no. 2, 129–138.[MR/arXiv]
  157. Lajos Hajdu, Szabolcs Tengely, and Robert Tijdeman, Cubes in products of terms in arithmetic progression, Publ. Math. Debrecen 74 (2009), no. 1-2, 215–232.[MR]
  158. Marshall Hampton and Richard Moeckel, Finiteness of stationary configurations of the four-vortex problem, Trans. Amer. Math. Soc. 361 (2009), no. 3, 1317-1332.
  159. Masaaki Harada, On the existence of frames of the Niemeier lattices and self-dual codes over Fp, J. Algebra 321 (2009), no. 8, 2345–2352.[MR/doi]
  160. Masaaki Harada and Akihiro Munemasa, A complete classification of ternary self-dual codes of length 24, J. Combin. Theory Ser. A 116 (2009), no. 5, 1063–1072.[MR/arXiv]
  161. Masaaki Harada, Akihiro Munemasa, and Boris Venkov, Classification of ternary extremal self-dual codes of length 28, Math. Comp. 78 (2009), no. 267, 1787–1796.[MR]
  162. David Harari and Tamás Szamuely, Galois sections for abelianized fundamental groups, Math. Ann. 344 (2009), no. 4, 779–800.[MR/arXiv]
  163. David Harvey, A cache-friendly truncated FFT, Theor. Comput. Sci. 410 (2009), no. 27-29, 2649–2658.[arXiv]
  164. David Harvey, Faster polynomial multiplication via multipoint Kronecker substitution, J. Symbolic Comp. 44 (2009), no. 10, 1502–1510.
  165. George Havas and Michael Vaughan-Lee, On counterexamples to the Hughes conjecture, J. Algebra 322 (2009), no. 3, 791–801.
  166. David J. Hemmer, The complexity of certain Specht modules for the symmetric group, J. Algebraic Combin. 30 (2009), no. 4, 421–427.[MR/doi]
  167. Laura Hitt, Families of genus 2 curves with small embedding degree, J. Math. Cryptol. 3 (2009), no. 1, 19–36.[MR/link]
  168. C. Hollanti, J. Lahtonen, K. Ranto, and R. Vehkalahti, On the densest MIMO lattices from cyclic division algebras, IEEE Trans. Comp. 55 (2009), no. 8, 3751–3780.[arXiv]
  169. Camilla Hollanti and Hsiao-Feng Lu, Construction methods for asymmetric multiblock space-time codes, IEEE Trans. Inform. Theory 55 (2009), no. 3, 1086–1103.
  170. Benjamin Howard, John Millson, Andrew Snowden, and Ravi Vakil, The equations for the moduli space of n points on the line, Duke Math. J. 146 (2009), no. 2, 175–226.[MR/doi]
  171. Robert B. Howlett and Yunchuan Yin, Computational construction of irreducible W-graphs for types E6 and E7, J. Algebra 321 (2009), no. 8, 2055–2067.[MR]
  172. Isabel Hubard, Alen Orbanić, and Asia Ivić Weiss, Monodromy groups and self-invariance, Canad. J. Math. 61 (2009), no. 6, 1300–1324.[MR/link]
  173. Hendrik Hubrechts, Quasi-quadratic elliptic curve point counting using rigid cohomology, J. Symb. Comput. 44 (2009), no. 9, 1255–1267.[arXiv]
  174. Stephen P. Humphries, Subgroups of free groups generated by conjugates of powers of the generators, J. Group Theory 12 (2009), no. 3, 465–485.[MR/doi]
  175. Stephen P. Humphries and Kenneth W. Johnson, Fusions of character tables II. p-groups, Comm. Algebra 37 (2009), no. 12, 4296–4315.[MR/doi]
  176. Stephen P. Humphries and Zane Kun Li, Counting powers of words in monoids, European J. Combin. 30 (2009), no. 5, 1297–1308.[MR]
  177. Paul Hurley and Ted Hurley, Codes from zero-divisors and units in group rings, International Journal of Information and Coding Theory 1 (2009), no. 1, 57–87.[arXiv]
  178. Ted Hurley, Convolutional codes from units in matrix and group rings, Int. J. Pure Appl. Math. 50 (2009), no. 3, 431–463.[MR/arXiv]
  179. Patrick Ingram, Cubic polynomials with periodic cycles of a specified multiplier, preprint (2009), 26 pages.[arXiv]
  180. Patrick Ingram, Multiples of integral points on elliptic curves, J. Number Theory 129 (2009), no. 1, 182–208.[MR/doi]
  181. A. Jaikin-Zapirain, M. F. Newman, and E. A. O'Brien, On p-groups having the minimal number of conjugacy classes of maximal size, Israel J. Math. 172 (2009), 119–123.[MR/doi]
  182. David Jao and Kayo Yoshida, Boneh-Boyen signatures and the strong Diffie-Hellman problem, IACR (2009), 24 pages.[eprint]
  183. Jean-François Jaulent, Sebastian Pauli, Michael E. Pohst, and Florence Soriano-Gafiuk, Computation of 2-groups of narrow logarithmic divisor classes of number fields, J. Symbolic Comput. 44 (2009), no. 7, 852–863.[MR/doi]
  184. Dimitar Jetchev, Kristin Lauter, and William Stein, Explicit Heegner points: Kolyvagin's conjecture and non-trivial elements in the Shafarevich-Tate group, J. Number Theory 129 (2009), no. 2, 284–302.[doi]
  185. Masakazu Jimbo and Keisuke Shiromoto, A construction of mutually disjoint Steiner systems from isomorphic Golay codes, J. Combin. Theory Ser. A 116 (2009), no. 7, 1245–1251.[MR/doi]
  186. Norman L. Johnson, Giuseppe Marino, Olga Polverino, and Rocco Trombetti, On a generalization of cyclic semifields, J. Algebraic Combin. 29 (2009), no. 1, 1–34.[MR/doi]
  187. Ben Kane, CM liftings of supersingular elliptic curves, preprint (2009), 26 pages.[arXiv]
  188. Benjamin Kane, Representing sets with sums of triangular numbers, Int. Math. Res. Not. IMRN (2009), no. 17, 3264–3285.[MR]
  189. Kerem Kaskaloglu and Ferruh Özbudak, A simple scheme for hierarchical threshold access structures, IACR (2009), 8.[eprint]
  190. Brent Kerby, Automorphism groups of Schur rings, preprint (2009), 21 pages.[arXiv]
  191. J. D. Key, T. P. McDonough, and V. C. Mavron, An upper bound for the minimum weight of the dual codes of Desarguesian planes, European J. Combin. 30 (2009), no. 1, 220–229.[MR]
  192. J. D. Key, J. Moori, and B. G. Rodrigues, Partial permutation decoding of some binary codes from graphs on triples, Ars Combin. 91 (2009), 363–371.[MR]
  193. J. D. Key, J. Moori, and B. G. Rodrigues, Ternary codes from graphs on triples, Discrete Math. 309 (2009), no. 14, 4663–4681.[MR/doi]
  194. Masanari Kida, Guénaël Renault, and Kazuhiro Yokoyama, Quintic polynomials of Hashimoto-Tsunogai, Brumer and Kummer, Int. J. Number Theory 5 (2009), no. 4, 555–571.[MR/doi]
  195. Michael Kiermaier and Sascha Kurz, Maximal integral point sets in affine planes over finite fields, Discrete Math. 309 (2009), no. 13, 4564–4575.[MR]
  196. L. J. P. Kilford, Experimental finding of modular forms for noncongruence subgroups, preprint (2009), 12 pages.[arXiv]
  197. Hyun Kyu Kim, Representation theoretic existence proof for Fischer group Fi23, Master's Thesis, Cornell University, 2009.[arXiv]
  198. Hyun Kyu Kim and Gerhard O. Michler, Construction of Co1 from an irreducible subgroup M24 of GL11(2), preprint (2009), 220 pages.[arXiv]
  199. M. Klin, G. A. Jones, A. Jurisic, M. Muzychuk, and I. Ponomarenko (eds.), Algorithmic algebraic combinatorics and gröbner bases, Springer, Berlin, 2009, pp. 309.
  200. Martin Kohls, On the depth of invariant rings of infinite groups, J. Algebra 322 (2009), no. 1, 210–218.[MR/arXiv]
  201. Joachim König, Solvability of generalized monomial groups, J. Group Theory, to appear (2009).
  202. Joachim König, Solvability of generalized monomial groups, preprint (2009), 21 pages.[arXiv]
  203. Elisavet Konstantinou and Aristides Kontogeorgis, Computing polynomials of the Ramanujan tn class invariants, Canad. Math. Bull. 52 (2009), no. 4, 583–597.[MR/link]
  204. Christos Koukouvinos and Dimitris E. Simos, Improving the lower bounds on inequivalent Hadamard matrices through orthogonal designs and meta-programming techniques, Applied Numerical Mathematics, to appear (2009).
  205. István Kovács, Aleksander Malnič, Dragan Marušič, and Štefko Miklavič, One-matching bi-Cayley graphs over abelian groups, European J. Combin. 30 (2009), no. 2, 602–616.[MR]
  206. Tünde Kovács, Combinatorial numbers in binary recurrences, Period. Math. Hungar. 58 (2009), no. 1, 83–98.[MR/doi]
  207. Matthias Krause and Dirk Stegemann, More on the security of linear RFID authentication protocols, Selected Areas in Cryptography, Lecture Notes in Comput. Sci., vol. 5867, Springer, Berlin, 2009, pp. 182–196.[doi]
  208. Matthias Künzer, Nonisomorphic Verdier octahedra on the same base, J. Homotopy Relat. Struct. 4 (2009), no. 1, 7–38.[MR/arXiv]
  209. K. Kutnar, Aleksander Malnič, Dragan Marušič, and Štefko Miklavič, The strongly distance-balanced property of the generalized Petersen graphs, Ars Math. Contemp. 2 (2009), no. 1, 41–47.
  210. Klavdija Kutnar and Dragan Marušič, A complete classification of cubic symmetric graphs of girth 6, J. Combin. Theory Ser. B 99 (2009), no. 1, 162–184.[MR]
  211. Klavdija Kutnar, Dragan Marušič, Štefko Miklavič, and Primož Šparl, Strongly regular tri-Cayley graphs, European J. Combin. 30 (2009), no. 4, 822–832.[MR]
  212. Klavdija Kutnar and Primož Šparl, Hamilton paths and cycles in vertex-transitive graphs of order 6p, Discrete Math. 309 (2009), no. 17, 5444–5460.[MR/doi]
  213. Reinhard Laubenbacher and Bernd Sturmfels, Computer algebra in systems biology, American Mathematical Monthly 116 (2009), no. 10, 882–891.
  214. Alan G. B. Lauder, Degenerations and limit Frobenius structures in rigid cohomology, preprint (2009), 41 pages.[arXiv]
  215. Eunjeong Lee, Hyang-Sook Lee, and Cheol-Min Park, Efficient and generalized pairing computation on abelian varieties, IEEE Trans. Inform. Theory 55 (2009), no. 4, 1793–1803.[MR/doi/eprint]
  216. C. R. Leedham-Green and E. A. O'Brien, Constructive recognition of classical groups in odd characteristic, J. Algebra 322 (2009), no. 3, 833–881.[MR/doi]
  217. Dimitri Leemans, Locally s-arc-transitive graphs related to sporadic simple groups, J. Algebra 322 (2009), no. 3, 882–892.[MR/doi]
  218. Douglas A. Leonard, A weighted module view of integral closures of affine domains of type I, Adv. Math. Commun. 3 (2009), no. 1, 1-11.
  219. Ka Hin Leung and Qing Xiang, On the dimensions of the binary codes of a class of unitals, Discrete Math. 309 (2009), no. 3, 570–575.[MR/doi]
  220. Mark L. Lewis, A group with three real irreducible characters: answering a question of Moretó and Navarro, J. Algebra Appl. 8 (2009), no. 4, 453–459.[MR/doi/arXiv]
  221. Mark L. Lewis, Brauer pairs of Camina p-groups of nilpotence class 2, Arch. Math. (Basel) 92 (2009), no. 2, 95–98.[MR/arXiv]
  222. Mark L. Lewis, The vanishing-off subgroup, J. Algebra 321 (2009), no. 4, 1313–1325.[MR]
  223. Cai Heng Li, Tian Khoon Lim, and Cheryl E. Praeger, Homogeneous factorisations of complete graphs with edge-transitive factors, J. Algebraic Combin. 29 (2009), no. 1, 107–132.[MR]
  224. Xin Li, Marc Moreno Maza, and Éric Schost, Fast arithmetic for triangular sets: from theory to practice, J. Symbolic Comput. 44 (2009), no. 7, 891–907.[MR]
  225. Kay Jin Lim, The varieties for some Specht modules, J. Algebra 321 (2009), no. 8, 2287–2301.[MR]
  226. Tian Khoon Lim and Cheryl E. Praeger, On generalized Paley graphs and their automorphism groups, Michigan Math. J. 58 (2009), no. 1, 293–308.[MR/arXiv]
  227. Adam Logan and Ronald van Luijk, Nontrivial elements of Sha explained through K3 surfaces, Math. Comp. 78 (2009), no. 265, 441–483.[MR]
  228. Álvaro Lozano-Robledo, On the product of twists of rank two and a conjecture of Larsen, Ramanujan J. 19 (2009), no. 1, 53–61.[MR/doi]
  229. Florian Luca and Alain Togbé, On the Diophantine equation x2+2α13β=yn, Colloq. Math. 116 (2009), no. 1, 139–146.[MR/doi]
  230. Piotr Maciak, Primes of the form x2+n*y2 in function fields, preprint (2009), 12 pages.[arXiv]
  231. Kay Magaard, Tanush Shaska, and Helmut Völklein, Genus 2 curves that admit a degree 5 map to an elliptic curve, Forum Math. 21 (2009), no. 3, 547–566.[MR]
  232. A. Marschner and J. Müller, On a certain algebra of higher modular forms, Algebra Colloq. 16 (2009), 371–380.
  233. Jacques Martinet and Achill Schürmann, On classifying Minkowskian sublattices, preprint (2009), 29 pages.[arXiv]
  234. Conchita Martinez-Perez and Wolfgang Willems, The trivial intersection problem for characters of principal indecomposable modules, Adv. Math. 222 (2009), no. 4, 1197–1219.
  235. Sandro Mattarei and Marina Avitabile, Diamonds of finite type in thin Lie algebras, J. Lie Theory 19 (2009), no. 1, 431–439.
  236. Stefan Maubach and Roel Willems, Polynomial automorphisms over finite fields: Mimicking non-tame and tame maps by the Derksen group, preprint (2009), 22 pages.[arXiv]
  237. J. C van der Meer, Generic one-parameter versal unfoldings of symmetric hamiltonian systems in 1 : 1 resonance, Int. J. Pure Appl. Math 53 (2009), no. 4, 547–561.
  238. J. M. Miret, R. Moreno, J. Pujolàs, and A. Rio, Halving for the 2-Sylow subgroup of genus 2 curves over binary fields, Finite Fields Appl. 15 (2009), no. 5, 569–579.[MR/doi]
  239. J. Miret, R. Moreno, A. Rio, and M. Valls, Computing the l-power torsion of an elliptic curve over a finite field, Math. Comp. 78 (2009), no. 267, 1767–1786.[MR]
  240. Josep M. Miret, Jordi Pujolàs, and Anna Rio, Bisection for genus 2 curves in odd characteristic, Proc. Japan Acad. Ser. A Math. Sci. 85 (2009), no. 4, 55–60.[MR/doi]
  241. Marcel Mohyla and Gabor Wiese, A computational study of the asymptotic behaviour of coefficient fields of modular forms, preprint (2009), 19 pages.[arXiv]
  242. Teo Mora, The FGLM problem and Möller's algorithm on zero-dimensional ideals, Sala, Massimiliano (ed.) and Mora, Teo (ed.) and Perret, Ludovic (ed.) and Sakata, Shojiro (ed.) and Traverso, Carlo (ed.), Gröbner Bases, Coding, and Cryptography, Springer, Berlin, 2009.
  243. I. Morel, D. Stehlé, and G. Villard, Analyse numerique et reduction de reseaux, Technique et Science Informatiques, to appear (2009), 29 pages.
  244. Ian Morrison and David Swinarski, Groebner techniques for low degree Hilbert stability, preprint (2009), 25 pages.[arXiv]
  245. Nadia El Mrabet, Nicolas Guillermin, and Sorina Ionica, A study of pairing computation for curves with embedding degree 15, IACR (2009), 13 pages.[eprint]
  246. J. -M. Muller, N. Brisebarre, F. de Dinechin, C. -P. Jeannerod, L. Vincent, G. Melquiond, N. Revol, D. Stehlé, and S. Torres, Handbook of floating-point arithmetic, Birkhäuser, Boston, MA, 2009, pp. 660.
  247. Gabriele Nebe and Allan Steel, Recognition of division algebras, J. Algebra 322 (2009), no. 3, 903–909.[doi]
  248. M. F. Newman, On coclass and trivial Schur multiplicator, J. Algebra 322 (2009), no. 3, 910–913.[MR/doi]
  249. Harris Nover, Computation of Galois groups associated to the 2-class towers of some imaginary quadratic fields with 2-class group C2×C2×C2, Journal of Number Theory 129 (2009), no. 1, 231–245.[doi]
  250. Hiroshi Nozaki, Geometrical approach to Seidel's switching for strongly regular graphs, preprint (2009), 9 pages.[arXiv]
  251. Naoki Ogura and Shigenori Uchiyama, Cryptanalysis of the birational permutation signature scheme over a non-commutative ring, IACR (2009), 13 pages.[eprint]
  252. Ju-Mok Oh, A classification of cubic s-regular graphs of order 14p, Discrete Math. 309 (2009), no. 9, 2721–2726.[MR]
  253. Ju-Mok Oh, A classification of cubic s-regular graphs of order 16p, Discrete Math. 309 (2009), no. 10, 3150–3155.[MR]
  254. Ju-Mok Oh, Arc-transitive elementary abelian covers of the Pappus graph, Discrete Math. 309 (2009), no. 23-24, 6590–6611.[MR/doi]
  255. Roger Oyono, Non-hyperelliptic modular Jacobians of dimension 3, Math. Comp. 78 (2009), no. 266, 1173–1191.[MR]
  256. Ekin Ozman, Local points on quadratic twists of X0(N), preprint (2009), 26 pages.[arXiv]
  257. David Pask, Iain Raeburn, and Natasha A. Weaver, A family of 2-graphs arising from two-dimensional subshifts, Ergodic Theory Dynam. Systems 29 (2009), no. 5, 1613–1639.[MR/doi]
  258. David Penneys, A cyclic approach to the annular Temperley-Lieb category, preprint (2009), 35 pages.[arXiv]
  259. L. J. D. Perez, Ezekiel J. Kachisa, and Michael Scott, Implementing cryptographic pairings: A Magma tutorial, IACR (2009), 30 pages.[eprint]
  260. Á. Pintér, On a class of Diophantine equations related to the numbers of cells in hyperplane arrangements, J. Number Theory 129 (2009), no. 7, 1664–1668.[MR]
  261. Michel Planat, Clifford group dipoles and the enactment of Weyl/Coxeter group W(E8) by entangling gates, preprint (2009).[arXiv]
  262. Michel Planat, Peter Levay, and Metod Saniga, Balanced tripartite entanglement, the alternating group A4 and the Lie algebra sl(3,C)⊕u(1), preprint (2009), 14 pages.[arXiv]
  263. W. Plesken and A. Fabiańska, An L2-quotient algorithm for finitely presented groups, J. Algebra 322 (2009), no. 3, 914–935.[MR/doi]
  264. Francesco Polizzi, Standard isotrivial fibrations with pg = q = 1, Journal of Algebra 321 (2009), no. 6, 1600–1631.[doi/arXiv]
  265. Primož Potočnik, A list of 4-valent 2-arc-transitive graphs and finite faithful amalgams of index (4,2), European J. Combin. 30 (2009), no. 5, 1323–1336.[MR]
  266. Jordi Quer, Fields of definition of building blocks, Math. Comp. 78 (2009), no. 265, 537–554.[MR]
  267. Evija Ribnere, Sequences of words characterizing finite solvable groups, Monatsh. Math. 157 (2009), no. 4, 387–401.[MR/doi]
  268. Evija Ribnere, Sequences of words characterizing finite solvable groups, Monatsh. Math 157 (2009), no. 4, 387–401.
  269. Carlos Rito, A note on Todorov surfaces, Osaka J. Math. 46 (2009), no. 3, 685–693.[MR/link]
  270. Daniel Robertz, Noether normalization guided by monomial cone decompositions, J. Symbolic Comput. 44 (2009), no. 10, 1359–1373.[MR/doi]
  271. Magali Rocher, Large p-group actions with a p-elementary abelian derived group, Journal of Algebra 321 (2009), no. 2, 704–740.[doi]
  272. I. F. Rúa, Elías F. Combarro, and J. Ranilla, Classification of semifields of order 64, J. Algebra 322 (2009), no. 11, 4011–4029.[MR/doi]
  273. Núria Vila Sara Arias-de-Reyna, Tame Galois realizations of GSp4(Fl) over Q, preprint (2009), 29 pages.[arXiv]
  274. Diana Savin, About certain prime numbers, preprint (2009), 9.[arXiv]
  275. Roberto La Scala and Viktor Levandovskyy, Letterplace ideals and non-commutative Gröbner bases, J. Symbolic Comp. 44 (2009), no. 10, 1374-1393.
  276. Achill Schürmann, Enumerating perfect forms, Proceedings of the International Conference on Quadratic Forms, Chile 2007, Contemporary Mathematics, vol. To appear, 2009, 22 pages.[arXiv]
  277. Igor Semaev, Sparse boolean equations and circuit lattices, IACR (2009), 15 pages.[eprint]
  278. Mehmet Haluk Şengün, The nonexistence of certain representations of the absolute Galois group of quadratic fields, Proc. Amer. Math. Soc. 137 (2009), no. 1, 27–35.[MR]
  279. Amit R. Sharma, Bastiaan J. Braams, Stuart Carter, Benjamin C. Shepler, and Joel M. Bowman, Full-dimensional ab initio potential energy surface and vibrational configuration interaction calculations for vinyl, J. Chem. Phys 130 (2009), no. 174301, 9 pages.
  280. Jessica Sidman and Seth Sullivant, Prolongations and computational algebra, Canad. J. Math. 61 (2009), no. 4, 930–949.[MR/link]
  281. Samir Siksek, Chabauty for symmetric powers of curves, Algebra Number Theory 3 (2009), no. 2, 209–236.[MR/doi]
  282. Samir Siksek and Michael Stoll, On a problem of Hajdu and Tengely, preprint (2009), 8 pages.[arXiv]
  283. Sean Simmons, Algebraic cryptanalysis of simplified AES*, Cryptologia 33 (2009), no. 4, 305–314.[doi]
  284. Vijaykumar Singh and Gary McGuire, The intersection of two Fermat hypersurfaces in P3 via computation of quotient curves, preprint (2009), 16 pages.[arXiv]
  285. B. Smith, Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves, J. Cryptology 22 (2009), no. 4, 505–529.
  286. Benjamin Smith, Families of explicit isogenies of hyperelliptic Jacobians, Arithmetic, Geometry, Cryptography and Coding Theory, Contemporary Mathematics, vol. 521, AMS, Providence, R.I., 2009, pp. 121–144.[arXiv]
  287. Bernd Souvignier, Decomposing homogeneous modules of finite groups in characteristic zero, J. Algebra 322 (2009), no. 3, 948–956.
  288. Pablo Spiga, CI-property of elementary abelian 3-groups, Discrete Math. 309 (2009), no. 10, 3393–3398.[MR]
  289. Damien Stehlé, Floating-point LLL: Theoretical and practical aspects, Proceedings of LLL+25 Conference, 2007 (2009), 36 pages.
  290. Alexander Stein, On Bruck loops of 2-power exponent, II, preprint (2009), 30 pages.[arXiv]
  291. M. Chiara Tamburini and M. A. Vsemirnov, Irreducible (237)-subgroups of n[less-than-or-equals slant]7 ii, Journal of Algebra, to appear (2009).[doi]
  292. Stephen Tawn, A presentation for the pure Hilden group, preprint (2009), 26 pages.[arXiv]
  293. Agnese Ilaria Telloni, On the groups of some fibered spaces, J. Group Theory, to appear (2009).
  294. Damiano Testa, Anthony Vàrilly-Alvarado, and Mauricio Velasco, Cox rings of degree one del Pezzo surfaces, Algebra and Number Theory 3 (2009), 729–761.[arXiv]
  295. Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita, and Masao Kasahara, Proposal of PPS multivariate public key cryptosystems, IACR (2009), 21 pages.[eprint]
  296. Valeérie Gauthier Umaña and Gregor Leander, Practical key recovery attacks on two McEliece variants, IACR eprint:2009/509 (2009), 1–19.[link]
  297. Anthony Várilly-Alvarado and David Zywina, Arithmetic E8 lattices with maximal Galois action, LMS J. Comput. Math. 12 (2009), 144–165.[MR/arXiv]
  298. Xavier Taixes i Ventosa and Gabor Wiese, Computing congruences of modular forms and Galois representations modulo prime powers, preprint (2009), 26 pages.[arXiv]
  299. Bianca Viray, A family of varieties with exactly one pointless rational fiber, preprint (2009), 4 pages.[arXiv]
  300. John Voight, Computing fundamental domains for Fuchsian groups, J. Théor. Nombres Bordeaux 21 (2009), no. 2, 469–491.[MR/link]
  301. John Voight, Shimura curves of genus at most two, Math. Comp. 78 (2009), no. 266, 1155–1172.[MR]
  302. John Voight, The gauss higher relative class number problem, Ann. Sci. Math. Québec Accepted (2009), 10 pages.[arXiv]
  303. Xiuyun Wang and Yan-Quan Feng, Hexavalent half-arc-transitive graphs of order 4p, European J. Combin. 30 (2009), no. 5, 1263–1270.[MR]
  304. Yimin Wang, Benjamin C. Shepler, Bastiaan J. Braams, and Joel M. Bowman, Full-dimensional, ab initio potential energy and dipole moment surfaces for water, J. Chem. Phys 131 (2009), no. 054511, 8 pages.
  305. Uri Weiss, On Shephard groups with large triangles, preprint (2009), 30 pages.[arXiv]
  306. Gabor Wiese, On modular symbols and the cohomology of Hecke triangle surfaces, Int. J. Number Theory 5 (2009), no. 1, 89–108.[MR/arXiv]
  307. Stewart Wilcox, Reduction of the Hall-Paige conjecture to sporadic simple groups, J. Algebra 321 (2009), no. 5, 1407–1428.[MR]
  308. Mark Wildon, Multiplicity-free representations of symmetric groups, J. Pure Appl. Algebra 213 (2009), no. 7, 1464–1477.[MR]
  309. Gerald Williams, The aspherical Cavicchioli-Hegenbarth-Pepovš generalized Fibonacci groups, J. Group Theory 12 (2009), no. 1, 139–149.[MR/doi]
  310. J. B. Wilson, Finding central decompositions of p-groups, J. Group Theory 12 (2009), 813–830.[doi]
  311. Kenneth Koon-Ho Wong, Gregory V. Bard, and Robert H. Lewis, Partitioning multivariate polynomial equations via vertex separators for algebraic cryptanalysis and mathematical applications, IACR (2009), 33 pages.[eprint]
  312. Dan Yasaki, Binary Hermitian forms over a cyclotomic field, J. Algebra 322 (2009), no. 11, 4132–4142.[MR/doi]
  313. Dan Yasaki, Elliptic points of the Picard modular group, Monatsh. Math. 156 (2009), no. 4, 391–396.[MR]
  314. Stephen S. -T. Yau and Huaiqing Zuo, Notes on classification of toric surface codes of dimension 5, Appl. Algebra Engrg. Comm. Comput. 20 (2009), no. 2, 175–185.[MR/doi]
  315. Jahan Zahid, Zeros of p-adic forms, J. Number Theory 129 (2009), no. 10, 2439–2456.[MR/doi]
  316. Yuri G. Zarhin, Absolutely simple Prymians of trigonal curves, Proceedings of the Steklov Institute of Mathematics 264 (2009), no. 1, 204-215.[arXiv]
  317. Alexey Zaytsev and Gary McGuire, On the zeta functions of an optimal tower of function fields over F4, preprint (2009), 14 pages.[arXiv]
  318. Cui Zhang, Jin-Xin Zhou, and Yan-Quan Feng, Automorphisms of cubic Cayley graphs of order 2pq, Discrete Math. 309 (2009), no. 9, 2687–2695.[MR]
  319. Haina Zhang and Xiaoyun Wang, Cryptanalysis of stream cipher grain family, IACR (2009), 14 pages.[eprint]
  320. Peng Zhang, Satoshi Maeda, Keiji Morokuma, and Bastiaan J. Braams, Photochemical reactions of the low-lying excited states of formaldehyde: T1/S0 intersystem crossings, characteristics of the S1 and T1 potential energy surfaces, and a global T1 potential energy surface, J. Chem. Phys 130 (2009), no. 114304, 10 pages.
  321. Jin-Xin Zhou, Tetravalent s-transitive graphs of order 4p, Discrete Math. 309 (2009), no. 20, 6081–6086.[MR/doi]
  322. Jin-Xin Zhou and Yan-Quan Feng, Tetravalent one-regular graphs of order 2pq, J. Algebraic Combin. 29 (2009), no. 4, 457–471.[MR]
  323. David Zywina, A refinement of Koblitz's conjecture, preprint (2009).[arXiv]