- Fadwa S. Abu Muriefah, Florian Luca, and Alain Togbé, On the Diophantine equation x2+5a13b=yn, Glasg. Math. J. 50 (2008), no. 1, 175–181.[MR]
- Edith Adan-Bante and Helena Verrill, Symmetric groups and conjugacy classes, J. Group Theory 11 (2008), no. 3, 371–379.[MR]
- M. Afzal and A. Masood, Algebraic cryptanalysis of a NLFSR based stream cipher, 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. (2008), 1-6.[doi]
- Mehreen Afzal and Ashraf Masood, Resistance of stream ciphers to algebraic recovery of internal secret states, Third International Conference on Convergence and Hybrid Information Technology, 2008. ICCIT '08 2 (2008), 625-630.[doi]
- Mehreen Afzal, Ashraf Masood, and Naveed Shehzad, Improved results on algebraic cryptanalysis of A5/2, Communications in Computer and Information Science 12 (2008), no. 4, 182–189.
- Scott Ahlgren, On the irreducibility of Hecke polynomials, Math. Comp. 77 (2008), no. 263, 1725–1731.[MR]
- Ali Akhavi and Damien Stehlé, Speeding-up lattice reduction with random projections (extended abstract), LATIN 2008: Theoretical informatics, Lecture Notes in Comput. Sci., vol. 4957, Springer, Berlin, 2008, pp. 293–305.[MR]
- S. Akhtari, A. Togbé, and P. G. Walsh, On the equation aX4-bY2 = 2, Acta Arith. 131 (2008), no. 2, 145–169.[MR]
- Martin Albrecht, Algebraic attacks on the Courtois Toy cipher, Cryptologia 32 (2008), no. 3, 220–276.
- Faryad Ali and Jamshid Moori, Fischer-Clifford matrices of the non-split group extension 26·U4(2), Quaest. Math. 31 (2008), no. 1, 27–36.[MR/doi]
- Salah A. Aly, Asymmetric and symmetric subsystem BCH codes and beyond, preprint (2008), 10 pages.[arXiv]
- Salah A. Aly, Andreas Klappenecker, and Kiran Sarvepalli Pradeep, Subsystem codes, IEEE International Symposium on Information Theory, Toronto, Canada, 2008 (ISIT 08), IEEE, New York, 2008, pp. 369–373.[doi/arXiv]
- Maria Carmen V. Amarra and Fidel R. Nemenzo, On: "(1 – u)-cyclic codes over Fpk+u Fpk", Appl. Math. Lett. 21 (2008), no. 11, 1129–1133.[MR]
- Jianbei An, John J. Cannon, E. A. O'Brien, and W. R. Unger, The Alperin weight conjecture and Dade's conjecture for the simple group Fi24', LMS J. Comput. Math. 11 (2008), 100–145.[MR]
- K. K. S. Andersen, J. Grodal, J. M. Møller, and A. Viruel, The classification of p-compact groups for p odd, Ann. of Math. (2) 167 (2008), no. 1, 95–210.[MR]
- A. O. L. Atkin, Wen-Ching Winnie Li, and Ling Long, On Atkin and Swinnerton-Dyer congruence relations (II), Math. Ann. 340 (2008), no. 2, 335–358.[MR/arXiv]
- Nir Avni and Shelly Garion, Connectivity of the product replacement graph of simple groups of bounded Lie rank, J. Algebra 320 (2008), no. 2, 945–960.[MR]
- Mohamed Ayad and Peter Fleischmann, On the decomposition of rational functions, J. Symbolic Comput. 43 (2008), no. 4, 259–274.[MR]
- Henrik Bäärnhielm, Algorithmic problems in twisted groups of Lie type, preprint (2008), 131 pages.[arXiv]
- Eric Bach and Denis Charles, The hardness of computing an eigenform, Computational arithmetic geometry, Contemp. Math., vol. 463, Amer. Math. Soc., Providence, RI, 2008, pp. 9–15.[MR/arXiv]
- John Bamberg, Geoffrey Pearce, and Cheryl E. Praeger, Transitive decompositions of graph products: Rank 3 grid type, J. Group Theory 11 (2008), no. 2, 185–228.[MR]
- M. Barbosa, A. Moss, and D. Page, Constructive and destructive use of compilers in elliptic curve cryptography, J. Cryptology Online first (2008), 23.
- Y. Barnea and D. S. Passman, Filtrations in semisimple Lie algebras. II, Trans. Amer. Math. Soc. 360 (2008), no. 2, 801–817 (electronic).[MR]
- Tathagata Basak, On Coxeter diagrams of complex reflection groups, preprint (2008), 17 pages.[arXiv]
- I. C. Bauer, F. Catanese, and F. Grunewald, The classification of surfaces with pg = q = 0 isogenous to a product of curves, Pure Appl. Math. Q. 4 (2008), no. 2, part 1, 547–586.[MR/arXiv]
- Ingrid C. Bauer and Fabrizio Catanese, A volume maximizing canonical surface in 3-space, Comment. Math. Helv. 83 (2008), no. 2, 387–406.[MR]
- Ingrid Bauer, Fabrizio Catanese, Fritz Grunewald, and Roberto Pignatelli, Quotients of a product of curves by a finite group and their fundamental groups, preprint (2008), 37 pages.[arXiv]
- M. Bauer, M. J. Jacobson, Jr., Y. Lee, and R. Scheidler, Construction of hyperelliptic function fields of high three-rank, Math. Comp. 77 (2008), no. 261, 503–530 (electronic).[MR]
- Tobias Beck and Josef Schicho, Adjoint computation for hypersurfaces using formal desingularizations, J. Algebra 320 (2008), no. 11, 3984–3996.[MR/doi]
- Tobias Beck and Josef Schicho, Curve parametrization over optimal field extensions exploiting the Newton polygon, Geometric Modeling and Algebraic Geometry, Springer, Berlin, 2008, pp. 119–140.[MR]
- Mark Behrens and Gerd Laures, β-family congruences and the f-invariant, preprint (2008), 17 pages.[arXiv]
- B. Bekka, P. de la Harpe, and A. Valette, Kazhdan's Property (t), New Mathematical Monographs, Cambridge University Press, Cambridge, 2008, 492 pages.[link]
- Daniel J. Bernstein, Peter Birkner, Tanja Lange, and Christiane Peters, ECM using Edwards curves, IACR (2008), 18 pages.[eprint]
- Amnon Besser and Rob De Jeu, Li(p)-service? an algorithm for computing p-adic polyalgorithms, Math. Comp. 77 (2008), no. 262, 1105–1134.[MR]
- Koichi Betsumiya, Minimum Lee weights of type II codes over F2r, Discrete Math. 308 (2008), no. 14, 3018–3022.[MR]
- Luk Bettale, Jean-Charles Faugère, and Ludovic Perret, Cryptanalysis of the TRMS signature scheme of PKC'05, Progress in Cryptology, AfricaCrypt 2008, Lecture Notes in Computer Science, vol. 5023, Springer Berlin/Heidelberg, 2008, pp. 143-155.
- Jonah Blasiak, W-graph versions of tensoring with the Sn defining representation, preprint (2008), 43 pages.[arXiv]
- Werner Bley and Henri Johnston, Computing generators of free modules over orders in group algebras, J. Algebra 320 (2008), no. 2, 836–852.[MR]
- Christian Böhning, The rationality of the moduli space of curves of genus 3 after P. Katsylo, preprint (2008), 39 pages.[arXiv]
- M. Borovoi, J. -L. Colliot-Thélène, and A. N. Skorobogatov, The elementary obstruction and homogeneous spaces, Duke Math. J. 141 (2008), no. 2, 321–364.[MR]
- Alin Bostan, Frédéric Chyzak, and Nicolas Le Roux, Products of ordinary differential operators by evaluation and interpolation, in ISSAC '08: International Symposium on Symbolic and Algebraic Computation, ACM, New York, NY, USA, 2008, pp. 23–30.[doi/arXiv]
- Hans-Christian Graf v. Bothmer, Finite field experiments, Higher-dimensional Geometry over Finite Fields, NATO Sci. Peace Secur. Ser. D Inf. Commun. Secur., vol. 16, IOS, Amsterdam, 2008, pp. 1–62.[MR]
- Hans-Christian Graf v. Bothmer, Finite field experiments (with an appendix by Stefan Wiedmann), Higher-Dimensional Geometry over Finite Fields, NATO Science for Peace and Security Series, D: Information and Communication Security, vol. 16, IOS Press, 2008, pp. 1–62.
- Delphine Boucher, Patrick Solé, and Felix Ulmer, Skew constacyclic codes over Galois rings, Adv. Math. Commun. 2 (2008), no. 3, 273–292.[MR]
- Iliya Bouyukliev and Valentin Bakoev, A method for efficiently computing the number of codewords of fixed weights in linear codes, Discrete Appl. Math. 156 (2008), no. 15, 2986–3004.[MR]
- Anne Desideri Bracco, Ann Marie Natividad, and Patrick Solé, On quintic quasi-cyclic codes, Discrete Appl. Math. 156 (2008), no. 18, 3362–3375.[MR/doi]
- Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire, A few more quadratic APN functions, preprint (2008), 12 pages.[arXiv]
- Carl Bracken, Eimear Byrne, Nadya Markin, and Gary McGuire, New families of quadratic almost perfect nonlinear trinomials and multinomials, Finite Fields Appl. 14 (2008), no. 3, 703–714.[MR]
- Kristian Brander, An optimal unramified tower of function fields, Algebraic geometry and its applications, Ser. Number Theory Appl., vol. 5, World Sci. Publ., Hackensack, NJ, 2008, pp. 351–365.[MR/doi]
- John Bray and Henrik Bäärnhielm, Standard generators for the Suzuki groups, Preprint (2008), 1–13.[link]
- John N. Bray and Robert A. Wilson, Examples of 3-dimensional 1-cohomology for absolutely irreducible modules of finite simple groups, J. Group Theory 11 (2008), no. 5, 669–673.[MR]
- Andrew Bremner, On the equation Y2=X5 + k, Experiment. Math. 17 (2008), no. 3, 371–374.[MR]
- Richard Brent and Paul Zimmermann, A multi-level blocking distinct degree factorization algorithm, Finite Fields and Applications, Contemporary Mathematics, vol. 461, 2008, 47–58 pages.
- R. de la Bret'che and T. D. Browning, Manin's conjecture for quartic del Pezzo surfaces with a conic fibration, preprint (2008).[arXiv]
- Louis Hugo Brewis, Liftable D4-covers, Manuscripta Math. 126 (2008), no. 3, 293–313.[MR]
- Marcus Brinkmann and Gregor Leander, On the classification of APN functions up to dimension five, Des. Codes Cryptogr. 49 (2008), no. 1-3, 273–288.[MR]
- Thomas Britz and Keisuke Shiromoto, Designs from subcode supports of linear codes, Des. Codes Cryptogr. 46 (2008), no. 2, 175–189.[MR]
- Peter A. Brooksbank, Fast constructive recognition of black box symplectic groups, J. Algebra 320 (2008), no. 2, 885–909.[MR]
- Peter A. Brooksbank and Eugene M. Luks, Testing isomorphism of modules, J. Algebra 320 (2008), no. 11, 4020–4029.[MR/doi]
- Peter A. Brooksbank and E. A. O'Brien, Constructing the group preserving a system of forms, Internat. J. Algebra Comput. 18 (2008), no. 2, 227–241.[MR]
- Peter A. Brooksbank and E. A. O'Brien, On intersections of classical groups, J. Group Theory 11 (2008), no. 4, 465–478.[MR]
- David Brown, The Chabauty-Coleman bound at a prime of bad reduction, preprint (2008), 10 pages.[arXiv]
- Nils Bruin, The arithmetic of Prym varieties in genus 3, Compos. Math. 144 (2008), no. 2, 317–338.[MR/link]
- Nils Bruin and Michael Stoll, Deciding existence of rational points on curves: an experiment, Experiment. Math. 17 (2008), no. 2, 181–189.[MR/arXiv]
- Nils Bruin and Michael Stoll, Two-cover descent on hyperelliptic curves, preprint (2008), 19 pages.[arXiv]
- Ralph H. Buchholz and James A. MacDougall, Cyclic polygons with rational sides and area, J. Number Theory 128 (2008), no. 1, 17–48.[MR]
- Yann Bugeaud, Maurice Mignotte, and Samir Siksek, A multi-Frey approach to some multi-parameter families of Diophantine equations, Canad. J. Math. 60 (2008), no. 3, 491–519.[MR/link]
- Yann Bugeaud, Maurice Mignotte, Samir Siksek, Michael Stoll, and Szabolcs Tengely, Integral points on hyperelliptic curves, Algebra Number Theory 2 (2008), no. 8, 859–885.[MR/arXiv]
- Stanislav Bulygin and Michael Brickenstein, Obtaining and solving systems of equations in key variables only for the small variants of AES, IACR (2008), 26 pages.[eprint]
- Timothy C. Burness, E. A. O'Brien, and Robert A. Wilson, Base sizes for sporadic simple groups, Israel J. Math., to appear (2008), 19 pages.
- Cecilia Busuioc, The Steinberg symbol and special values of L-functions, Trans. Amer. Math. Soc. 360 (2008), no. 11, 5999–6015.[MR]
- J. S. Calcut, Torelli actions and smooth structures on four manifolds, J. Knot Theory Ramifications 17 (2008), no. 2, 171–190.[MR]
- John J. Cannon and Derek F. Holt, The transitive permutation groups of degree 32, Experiment. Math. 17 (2008), no. 3, 307–314.[MR]
- David P. Cargo, Warwick de Launey, Martin W. Liebeck, and Richard M. Stafford, Short two-variable identities for finite groups, J. Group Theory 11 (2008), no. 5, 675–690.[MR]
- Robert Carls, David Kohel, and David Lubicz, Higher-dimensional 3-adic CM construction, J. Algebra 319 (2008), no. 3, 971–1006.[MR/arXiv]
- Bill Casselman, Computation in Coxeter groups. II. Constructing minimal roots, Represent. Theory 12 (2008), 260–293.[MR]
- Carlos Castaño-Bernard, Further properties of a function of Ogg and Ligozat, Ramanujan J. 17 (2008), no. 1, 107–121.[MR]
- Wouter Castryck, Hendrik Hubrechts, and Frederik Vercauteren, Computing zeta functions in families of Ca, b curves using deformation, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 296-311.
- Alberto Cavicchioli, E. A. O'Brien, and Fulvia Spaggiari, On some questions about a family of cyclically presented groups, J. Algebra 320 (2008), no. 11, 4063–4072.[MR]
- Gweltaz Chatel and David Lubicz, A point counting algorithm using cohomology with compact support, preprint (2008), 32 pages.[arXiv]
- Lionel Chaussade, Pierre Loidreau, and Felix Ulmer, Skew codes of prescribed distance or rank, Des. Codes Cryptogr. Online first (2008), 18.
- Chia-Hsin Owen Chen, Ming-Shing Chen, Jintai Ding, Fabian Werner, and Bo-Yin Yang, Odd-char multivariate hidden field equations, IACR eprint2008:543 (2008), 18 pages.
- Imin Chen, On the equation s2 + y2p = α3, Math. Comp. 77 (2008), no. 262, 1223–1227.[MR]
- C. Chisholm and J. A. MacDougall, Rational tetrahedra with edges in geometric progression, J. Number Theory 128 (2008), no. 2, 251–262.[MR]
- Mihai Cipu, Gröbner bases and Diophantine analysis, J. Symbolic Comput. 43 (2008), no. 10, 681–687.[MR]
- Mihai Cipu and Stephen D. Cohen, Dickson polynomial permutations, Finite Fields and Applications, Contemporary Mathematics, vol. 461, 2008, 79–91 pages.
- Mihai Cipu, Florian Luca, and Maurice Mignotte, Solutions of the Diophantine equation xy+yz+zx = n!, Glasg. Math. J. 50 (2008), no. 2, 217–232.[MR]
- A. Clingher, C. F. Doran, J. Lewis, and U. Whitcher, Normal forms, K3 surface moduli, and modular parametrizations, in Groups and Symmetries: Proceedings of the CRM conference in honor of John McKay,, CRM-AMS Proceedings and Lecture Notes, vol. 47, 2008, 18 pages.
- Arjeh M. Cohen, Sergei Haller, and Scott H. Murray, Computing in unipotent and reductive algebraic groups, LMS J. Comput. Math. 11 (2008), 343–366.[MR/arXiv]
- Marston Conder, Combinatorial and computational group-theoretic methods in the study of graphs, maps and polytopes with maximal symmetry, Jack Koolen and Jin Ho Kwak and Ming-Yao Xu, Eds. Applications of Group Theory to Combinatorics, Taylor &Francis Group, London, 2008, pp. 1–11.
- Marston Conder, Genus spectra for symmetric embeddings of graphs on surfaces, Electronic Notes in Discrete Mathematics 31 (2008), 27–31.[doi]
- Marston Conder, Isabel Hubard, and Tomaž Pisanski, Constructions for chiral polytopes, J. Lond. Math. Soc. (2) 77 (2008), no. 1, 115–129.[MR]
- Marston Conder, Primož Potočnik, and Jozef Širáň, Regular hypermaps over projective linear groups, J. Aust. Math. Soc. 85 (2008), 155–175 pages.
- Roberto Conti, Jason Kimberley, and Wojciech Szymanski, More localized automorphisms of the Cuntz algebras, preprint (2008), 17 pages.[arXiv]
- Roberto Conti and Wojciech Szymanski, Labeled trees and localized automorphisms of the Cuntz algebras, preprint (2008), 37 pages.[arXiv]
- A. Cossidente, C. Culbert, G. L. Ebert, and G. Marino, On m-ovoids of W3(q), Finite Fields Appl. 14 (2008), no. 1, 76–84.[MR]
- A. Cossidente and A. Sonnino, A geometric construction of a [110,5,90]9-linear code admitting the Mathieu group M11, IEEE Trans. Inform. Theory 54 (2008), no. 11, 5251-5252.[doi]
- Antonio Cossidente, Gary L. Ebert, and Giuseppe Marino, A complete span of H(4,4) admitting PSL2(11) and related structures, Contrib. Discrete Math. 3 (2008), no. 1, 52–57.[MR]
- Antonio Cossidente and Marialuisa J. de Resmini, The transitive and co-transitive blocking sets in P2(Fq), Contrib. Discrete Math. 3 (2008), no. 1, 47–51.[MR]
- Robert S. Coulter and Marie Henderson, Commutative presemifields and semifields, Adv. Math. 217 (2008), no. 1, 282–304.[MR]
- J. E. Cremona, Unimodular integer circulants, Math. Comp. 77 (2008), no. 263, 1639–1652.[MR]
- J. E. Cremona, T. A. Fisher, C. O'Neil, D. Simon, and M. Stoll, Explicit n-descent on elliptic curves. I. Algebra, J. reine angew. Math. 615 (2008), 121–155.[MR]
- Maria Cristeta Cuaresma, Michael Giudici, and Cheryl E. Praeger, Homogeneous factorisations of Johnson graphs, Des. Codes Cryptogr. 46 (2008), no. 3, 303–327.[MR]
- Jennifer R. Daniel and Aloysius G. Helminck, Algorithms for computations in local symmetric spaces, Comm. Algebra 36 (2008), no. 5, 1758–1788.[MR]
- Susanne Danz, Vertices of low-dimensional simple modules for symmetric groups, Comm. Algebra 36 (2008), no. 12, 4521–4539.[MR]
- Susanne Danz, Burkhard Külshammer, and René Zimmermann, On vertices of simple modules for symmetric groups of small degrees, J. Algebra 320 (2008), no. 2, 680–707.[MR]
- Susanne Danz and René Zimmermann, Vertices of simple modules for the symmetric groups in blocks of small weights, Beiträge Algebra Geom. 49 (2008), no. 2, 409–427.[MR]
- Chantal David and Tom Weston, Local torsion on elliptic curves and the deformation theory of Galois representations, Math. Res. Lett. 15 (2008), no. 3, 599–611.[MR/arXiv]
- Donald M. Davis, Homotopy type and v1-periodic homotopy groups of p-compact groups, Topology and its Applications 156 (2008), no. 2, 300–321.[doi/arXiv]
- Paul-Olivier Dehaye, Joint moments of derivatives of characteristic polynomials, Algebra Number Theory 2 (2008), no. 1, 31–68.[MR]
- Daniel Delbourgo and Tom Ward, Non-abelian congruences between L-values of elliptic curves, Ann. Inst. Fourier (Grenoble) 58 (2008), no. 3, 1023–1055.[MR/link]
- Lassina Dembélé and Steve Donnelly, Computing Hilbert modular forms over fields with nontrivial class group, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 371–386.[MR/doi]
- A. S. Detinko and D. L. Flannery, Algorithms for computing with nilpotent matrix groups over infinite domains, J. Symbolic Comput. 43 (2008), no. 1, 8–26.[MR]
- Alice Devillers and Michael Giudici, Involution graphs where the product of two adjacent vertices has order three, J. Aust. Math. Soc. 85 (2008), no. 3, 305–322.
- Alice Devillers, Michael Giudici, Cai Heng Li, and Cheryl E. Praeger, Primitive decompositions of Johnson graphs, J. Combin. Theory Ser. A 115 (2008), no. 6, 925–966.[MR]
- Claus Diem and Emmanuel Thomé, Index calculus in class groups of non-hyperelliptic curves of genus three, J. Cryptology 21 (2008), no. 4, 593–611.[MR]
- Jintai Ding, Dieter Schmidt, and Fabian Werner, Algebraic attack on HFE revisited, Information Security, Lecture Notes in Comput. Sci., vol. 5222, Springer, Berlin, 2008, pp. 215–227.
- Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, and Chen-Mou Cheng, New differential-algebraic attacks and reparametrization of Rainbow, Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 5037, Springer, 2008, pp. 242–257.
- Galyna Dobrovolska and Pavel Etingof, An upper bound for the lower central series quotients of a free associative algebra, Int. Math. Res. Not. IMRN (2008), no. 12, Art. ID rnn039, 10.[MR]
- Galyna Dobrovolska, John Kim, and Xiaoguang Ma, On the lower central series of an associative algebra (with an appendix by Pavel Etingof), J. Algebra 320 (2008), no. 1, 213–237.[MR]
- Edward Dobson and Dragan Marušič, An unusual decomposition of a complete 7-partite graph of order 28, Discrete Math. 308 (2008), no. 20, 4595–4598.[MR]
- Tim Dokchitser and Vladimir Dokchitser, Root numbers of elliptic curves in residue characteristic 2, Bull. Lond. Math. Soc. 40 (2008), no. 3, 516–524.[MR]
- Darrin Doud, Distinguishing contragredient Galois representations in characteristic two, Rocky Mountain J. Math. 38 (2008), no. 3, 835–848.[MR]
- S. T. Dougherty, S. Mesnager, and P. Sole, Secret-sharing schemes based on self-dual codes, Information Theory Workshop, 2008. ITW '08. IEEE (2008), 338-342.[doi]
- Jan Draisma, Gregor Kemper, and David Wehlau, Polarization of separating invariants, Canad. J. Math. 60 (2008), no. 3, 556–571.[MR]
- Jean-Guillaume Dumas, Pascal Giorgi, and Clément Pernet, Dense linear algebra over word-size prime fields: The FFLAS and FFPACK packages, ACM Trans. Math. Softw. 35 (2008), no. 3, 1–42.[doi]
- Sylvain Duquesne, Montgomery ladder for all genus 2 curves in characteristic 2, Arithmetic of Finite Fields, Lecture Notes in Computer Science, vol. 5130, Springer, 2008, pp. 174–188.
- Clémence Durvye and Grégoire Lecerf, A concise proof of the Kronecker polynomial system solver from scratch, Expo. Math. 26 (2008), no. 2, 101–139.[MR]
- Mathieu Dutour Sikirić, Achill Schürmann, and Frank Vallentin, A generalization of Voronoi's reduction theory and its application, Duke Math. J. 142 (2008), no. 1, 127–164.[MR/arXiv]
- Tobias Eibach, Enrico Pilz, and Gunnar Völkel, Attacking Bivium using SAT solvers, Theory and Applications of Satisfiability Testing, SAT 2008, Lecture Notes in Computer Science, vol. 4996, Springer, Berlin, 2008, pp. 63–76.
- Soren Eilers and Ian Kiming, On some new invariants for strong shift equivalence for shifts of finite type, preprint (2008), 8 pages.[arXiv]
- Kirsten Eisentraeger, Dimitar Jetchev, and Kristin Lauter, On the computation of the Cassels pairing for certain Kolyvagin classes in the Shafarevich-Tate group, preprint 5209 (2008), 113–125.
- Noam D. Elkies, Shimura curve computations via K3 surfaces of Neron-Severi rank at least 19, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 196-211.[arXiv]
- Andreas-Stephan Elsenhans and Jörg Jahnel, K3 surfaces of Picard rank one and degree two, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 212–225.
- Pavel Etingof and Eric Rains, New deformations of group algebras of Coxeter groups. II, Geom. Funct. Anal. 17 (2008), no. 6, 1851–1871.[MR/link]
- Graham Everest, Patrick Ingram, Valéry Mahé, and Shaun Stevens, The uniform primality conjecture for elliptic curves, Acta Arith. 134 (2008), no. 2, 157–181.[MR/arXiv]
- Xander Faber and Benjamin Hutz, On the number of rational iterated pre-images of the origin under quadratic dynamical systems, preprint (2008), 18 pages.[arXiv]
- Reza Rezaeian Farashahi, Ruud Pellikaan, and Andrey Sidorenko, Extractors for binary elliptic curves, Des. Codes Cryptogr. 49 (2008), no. 1-3, 171–186.[MR]
- Majid Farhadi and Marc Perret, Twisting geometric codes, Finite Fields Appl. 14 (2008), no. 4, 1091–1100.[MR]
- D. G. Farmer and K. J. Horadam, Presemifield bundles over GF(p3), IEEE International Symposium on Information Theory, 2008. ISIT 2008 (2008), 2613-2616.[doi]
- Jean-Charles Faug'ere, Françoise Levy-dit-Vehel, and Ludovic Perret, Cryptanalysis of MinRank, Advances in Cryptology, CRYPTO 2008, Lecture Notes in Computer Science, vol. 5157, Springer, 2008, pp. 280–296.
- Jean-Charles Faugère, Guillaume Moroz, Fabrice Rouillier, and Mohab Safey El Din, Classification of the perspective-three-point problem, discriminant variety and real solving polynomial systems of inequalities, in ISSAC '08: International Symposium on Symbolic and Algebraic Computation, ACM, New York, NY, USA, 2008, pp. 79–86.[doi]
- Jean-Charles Faugére and Ludovic Perret, Algebraic cryptanalysis of Curry and Flurry using correlated messages, IACR (2008), 14 pages.[eprint]
- Yan-Quan Feng, Klavdija Kutnar, Aleksander Malnič, and Dragan Marušič, On 2-fold covers of graphs, J. Combin. Theory Ser. B 98 (2008), no. 2, 324–341.[MR/arXiv]
- Claus Fieker and Michael E. Pohst, A lower regulator bound for number fields, J. Number Theory 128 (2008), no. 10, 2767–2775.[MR]
- Carla Fiori and Beatrice Ruini, Infinite classes of dihedral snarks, Mediterr. J. Math. 5 (2008), no. 2, 199–210.[MR]
- Tom Fisher, Finding rational points on elliptic curves using 6-descent and 12-descent, J. Algebra 320 (2008), no. 2, 853–884.[MR]
- Tom Fisher, Some improvements to 4-descent on an elliptic curve, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 125–138.[MR/doi]
- Tom Fisher, The invariants of a genus one curve, Proc. Lond. Math. Soc. (3) 97 (2008), no. 3, 753–782.[MR/arXiv]
- Stéphane Flon, Roger Oyono, and Christophe Ritzenthaler, Fast addition on non-hyperelliptic genus 3 curves, Algebraic geometry and its applications, Ser. Number Theory Appl., vol. 5, World Sci. Publ., Hackensack, NJ, 2008, pp. 1–28.[MR]
- E. V. Flynn and C. Grattoni, Descent via isogeny on elliptic curves with large rational torsion subgroups, J. Symbolic Comput. 43 (2008), no. 4, 293–303.[MR]
- E. V. Flynn and J. Wunderle, Cycles of covers, Monatsh. Math. Online first (2008), 16.
- Felix Fontein, The infrastructure of a global field of arbitrary unit rank, preprint (2008), 36 pages.[arXiv]
- Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, and Jacques Stern, Total break of the l-IC signature scheme, Public Key Cryptography, PKC 2008, Lecture Notes in Computer Science, vol. 4939, Springer, 2008, pp. 1–17.
- Pierre-Alain Fouque, Gilles Macario-Rat, and Jacques Stern, Key recovery on hidden monomial multivariate schemes, Advances in Cryptology, EUROCRYPT 2008, Lecture Notes in Computer Science, vol. 4965, Springer Berlin/Heidelberg, 2008, pp. 19–30.
- David Freeman and Kristin Lauter, Computing endomorphism rings of Jacobians of genus 2 curves over finite fields, Algebraic geometry and its applications, Ser. Number Theory Appl., vol. 5, World Sci. Publ., Hackensack, NJ, 2008, pp. 29–66.[MR]
- David Freeman, Peter Stevenhagen, and Marco Streng, Abelian varieties with prescribed embedding degree, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 60-73.[arXiv]
- S. Galbraith, F. Hess, and F. Vercauteren, Aspects of pairing inversion, IEEE Transactions on Information Theory 54 (2008), no. 12, 5719-5728.[doi/eprint]
- S. D. Galbraith, X. Lin, and D. J. Mireles, Pairings on hyperelliptic curves with a real model, in LNCS 5209, Eds. Galbraith, S. D. and Paterson, K. G.., Springer, 2008, pp. 256–281.
- Steven D. Galbraith, Michael Harrison, and David J. Mireles Morales, Efficient hyperelliptic arithmetic using balanced representation for divisors, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 342–356.[MR/doi/eprint]
- Steven D. Galbraith, Xibin Lin, and David J. Mireles Morales, Pairings on hyperelliptic curves with a real model, Pairing-Based Cryptography, Pairing 2008, Lecture Notes in Computer Science, vol. 5209, Springer, 2008, pp. 265–281.
- Shuhong Gao, Guangran Jiang, and Mingfu Zhu, Solving the 100 Swiss Francs problem, preprint (2008), 16 pages.[arXiv]
- Rohit Ghosh, Incompleteness of the Giulietti-Ughi arc for large primes, Discrete Math. 308 (2008), no. 17, 3824–3835.[MR]
- Edray Goins, Florian Luca, and Alain Togbé, On the Diophantine equation x2+2α 5β 13γ=yn, Algorithmic number theory, Lecture Notes in Comput. Sci., vol. 5011, Springer, Berlin, 2008, pp. 430–442.[MR/doi]
- Santos González, Consuelo Martínez, and Alejandro P. Nicolás, Classic and quantum error correcting codes, Coding Theory and Applications, Lecture Notes in Computer Science, vol. 5228, Springer, 2008, pp. 56-68.
- Nikolai Gordeev, Fritz Grunewald, Boris Kunyavskii, and Eugene Plotkin, A commutator description of the solvable radical of a finite group, Groups Geom. Dyn. 2 (2008), no. 1, 85–120.[MR]
- Daniel M. Gordon, Victor Miller, and Peter Ostapenko, Optimal hash functions for approximate closest pairs on the n-cube, preprint (2008).[arXiv]
- M. Grassl and T. A. Gulliver, On self-dual MDS codes, IEEE International Symposium on Information Theory, 2008. ISIT 2008 (2008), 1954-1957.[doi]
- Markus Grassl, Computing equiangular lines in complex space, Mathematical Methods in Computer Science, Lecture Notes in Comput. Sci., vol. 5393, 2008, pp. 89-104.
- Markus Grassl and Rainer Steinwandt, Cryptanalysis of an authentication scheme using truncated polynomials, IACR (2008), 4 pages.[eprint]
- Jordi Guardia, Jesus Montes, and Enric Nart, Higher Newton polygons in the computation of discriminants and prime ideal decomposition in number fields, preprint (2008), 24 pages.[arXiv]
- Renault Guénaél and Yokoyama Kazuhiro, Multi-modular algorithm for computing the splitting field of a polynomial, in ISSAC '08: International Symposium on Symbolic and Algebraic Computation, ACM, New York, NY, USA, 2008, pp. 247–254.[doi]
- T. Aaron Gulliver and Masaaki Harada, On double circulant doubly even self-dual [72,36,12] codes and their neighbors, Australas. J. Combin. 40 (2008), 137–144.[MR]
- T. Aaron Gulliver, Jon-Lark Kim, and Yoonjin Lee, New MDS or near-MDS self-dual codes, IEEE Trans. Inform. Theory 54 (2008), no. 9, 4354–4360.[MR/doi]
- C. Guneri and F. Ozbudak, Weil-Serre type bounds for cyclic codes, IEEE Transactions on Information Theory 54 (2008), no. 12, 5381-5395.[doi]
- R. M. Guralnick, W. M. Kantor, M. Kassabov, and A. Lubotzky, Presentations of finite simple groups: A quantitative approach, J. Amer. Math. Soc. 21 (2008), no. 3, 711–774.[MR/arXiv]
- Sunghyu Han and Jon-Lark Kim, On self-dual codes over F5, Des. Codes Cryptogr. 48 (2008), no. 1, 43–58.[MR]
- Darrel Hankerson, Koray Karabina, and Alfred Menezes, Analyzing the Galbraith-Lin-Scott point multiplication method for elliptic curves over binary fields, IACR (2008), 15 pages.[eprint]
- Masaaki Harada, An extremal doubly even self-dual code of length 112, Electron. J. Combin. 15 (2008), no. 1, Note 33, 5.[MR]
- Michael I. Hartley and Dimitri Leemans, A new Petrie-like construction for abstract polytopes, J. Combin. Theory Ser. A 115 (2008), no. 6, 997–1007.[MR]
- Robin Hartshorne and Ronald van Luijk, Non-Euclidean Pythagorean triples, a problem of Euler, and rational points on K3 surfaces, Math. Intelligencer 30 (2008), no. 4, 4–10.[MR/arXiv]
- George Havas, Edmund F. Robertson, and Dale C. Sutherland, Behind and beyond a theorem on groups related to trivalent graphs, J. Aust. Math. Soc. 85 (2008), no. 3, 323–332.
- Bo He and Alain Togbé, On the number of solutions of Goormaghtigh equation for given x and y, Indag. Math. (N.S.) 19 (2008), no. 1, 65–72.[MR]
- Anthony Henderson and Eric Rains, The cohomology of real De Concini-Procesi models of Coxeter type, Int. Math. Res. Not. IMRN (2008), no. 7, Art. ID rnn001, 29.[MR]
- Fernando Hernando and Diego Ruano, Sixteen new linear codes with Plotkin sum, preprint (2008), 2 pages.[arXiv]
- Russell John Higgs, Nice error bases and Sylow subgroups, IEEE Trans. Inform. Theory 54 (2008), no. 9, 4199–4207.[MR/doi]
- Christopher Holden, Mod 4 Galois representations and elliptic curves, Proc. Amer. Math. Soc. 136 (2008), no. 1, 31–39 (electronic).[MR]
- C. Hollanti, J. Lahtonen, and Hsiao-feng Lu, Maximal orders in the design of dense space-time lattice codes, IEEE Transactions on Information Theory 54 (2008), no. 10, 4493-4510.[doi]
- Camilla J. Hollanti, Order-theoretic methods for space-time coding: Symmetric and asymmetric designs, PhD Thesis, Turku Centre for Computer Science, 2008.
- Camilla Hollanti and Kalle Ranto, Maximal orders in space-time coding: Construction and decoding, 2008.
- P. E. Holmes, A classification of subgroups of the Monster isomorphic to S4 and an application, J. Algebra 319 (2008), no. 8, 3089–3099.[MR]
- P. E. Holmes, S. A. Linton, E. A. O'Brien, A. J. E. Ryba, and R. A. Wilson, Constructive membership in black-box groups, J. Group Theory 11 (2008), no. 6, 747–763.[MR]
- Derek F. Holt and Mark J. Stather, Computing a chief series and the soluble radical of a matrix group over a finite field, LMS J. Comput. Math. 11 (2008), 223–251.[MR]
- K. J. Horadam and D. G. Farmer, Bundles, presemifields and nonlinear functions, Des. Codes Cryptogr. 49 (2008), no. 1-3, 79–94.[MR]
- Naoyuki Horiguchi, Masaaki Kitazume, and Hiroyuki Nakasora, The Hall-Janko graph and the Witt system W10, European J. Combin. 29 (2008), no. 1, 1–8.[MR]
- Ben Howard, John Millson, Andrew Snowden, and Ravi Vakil, The ring of projective invariants of eight points on the line via representation theory, preprint (2008), 16 pages.[arXiv]
- Everett W. Howe, Supersingular genus-2 curves over fields of characteristic 3, Computational arithmetic geometry, Contemp. Math., vol. 463, Amer. Math. Soc., Providence, RI, 2008, pp. 49–69.[MR/arXiv]
- David Hubbard, Dihedral side extensions and class groups, J. Number Theory 128 (2008), no. 4, 731–737.[MR]
- Hendrik Hubrechts, Point counting in families of hyperelliptic curves, Found. Comput. Math. 8 (2008), no. 1, 137–169.[MR/arXiv]
- Stephen P. Humphries and Kenneth W. Johnson, Fusions of character tables and Schur rings of abelian groups, Comm. Algebra 36 (2008), no. 4, 1437–1460.[MR]
- Nathan Owen Ilten and Hendrik Süß, AG codes from polyhedral divisors, preprint (2008), 30 pages.[arXiv]
- Enrico Jabara, Automorphisms with finite Reidemeister number in residually finite groups, J. Algebra 320 (2008), no. 10, 3671–3679.[MR]
- Mariusz Jakubowski, Prasad Naldurg, Vijay Patankar, and Ramarathnam Venkatesan, Software integrity checking expressions (ICEs) for robust tamper detection, Information Hiding, Lecture Notes in Computer Science, vol. 4567, 2008, pp. 96–111.
- Martin Janošov, Martin Husák, Peter Farkaš, and Ana Garcia Armada, New [47,15,16] linear binary block code, IEEE Trans. Inform. Theory 54 (2008), no. 1, 423–424.[MR]
- Jean-François Jaulent, Sebastian Pauli, Michael E. Pohst, and Florence Soriano-Gafiuk, Computation of 2-groups of positive classes of exceptional number fields, J. Théor. Nombres Bordeaux 20 (2008), no. 3, 715–732.[MR]
- Xin Jiang, Jintai Ding, and Lei Hu, Kipnis-Shamir attack on HFE revisited, Information Security and Cryptology, Lecture Notes in Computer Science, vol. 4990, Springer Berlin/Heidelberg, 2008, pp. 399–411.
- Florent Jouve, Emmanuel Kowalski, and David Zywina, An explicit integral polynomial whose splitting field has galois group W(E8), J. Théor. Nombres Bordeaux 20 (2008), no. 3, 761–782.[MR]
- Antoine Joux, Reynald Lercier, David Naccache, and Emmanuel Thomé, Oracle-assisted static Diffie-Hellman is easier than discrete logarithms, IACR (2008).[eprint]
- Arkadius Kalka, Mina Teicher, and Boaz Tsaban, Cryptanalysis of the algebraic eraser and short expressions of permutations as products, preprint (2008), 19 pages.[arXiv]
- Koray Karabina and Edlyn Teske, On prime-order elliptic curves with embedding degrees k=3,4, and 6, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 102–117.
- Kiran S. Kedlaya, Search techniques for root-unitary polynomials, Computational arithmetic geometry, Contemp. Math., vol. 463, Amer. Math. Soc., Providence, RI, 2008, pp. 71–81.[MR/arXiv]
- Kiran S. Kedlaya and Andrew V. Sutherland, Computing L-series of hyperelliptic curves, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, 2008, pp. 312–326.
- J. D. Key, T. P. McDonough, and V. C. Mavron, Partial permutation decoding for codes from affine geometry designs, J. Geom. 88 (2008), no. 1-2, 101–109.[MR]
- J. D. Key and J. Moori, Some irreducible codes invariant under the Janko group, J1 or J2, preprint (2008), 20 pages.
- J. D. Key and P. Seneviratne, Permutation decoding for binary codes from lattice graphs, Discrete Math. 308 (2008), no. 13, 2862–2867.[MR]
- M. Kiermaier and A. Wassermann, On the minimum Lee distance of quadratic residue codes over Z4, IEEE International Symposium on Information Theory, 2008. ISIT 2008. (2008), 2617-2619.[doi]
- L. J. P. Kilford, Modular forms, Imperial College Press, London, 2008, pp. xxii+224.[MR]
- L. J. P. Kilford, On a p-adic extension of the Jacquet-Langlands correspondence to weight 1, preprint (2008), 17 pages.[arXiv]
- L. J. P. Kilford, On mod p modular representations which are defined over Fp, Glas. Mat. Ser. III 43(63) (2008), no. 1, 1–6.[MR/arXiv]
- L. J. P. Kilford, On the slopes of the U5 operator acting on overconvergent modular forms, J. Théor. Nombres Bordeaux 20 (2008), no. 1, 165–182.[MR/arXiv]
- L. J. P. Kilford and Gabor Wiese, On the failure of the Gorenstein property for Hecke algebras of prime weight, Experiment. Math. 17 (2008), no. 1, 37–52.[MR/arXiv]
- Dae San Kim, Codes associated with O+(2n,2r) and power moments of Kloosterman sums, preprint (2008), 9 pages.[arXiv]
- Dae San Kim, Codes associated with orthogonal groups and power moments of Kloosterman sums, preprint (2008).[arXiv]
- Dae San Kim, Codes associated with special linear groups and power moments of multi-dimensional Kloosterman sums, preprint (2008), 7 pages.[arXiv]
- Jon-Lark Kim and Patrick Solé, Skew Hadamard designs and their codes, Des. Codes Cryptogr. 49 (2008), no. 1-3, 135–145.[MR]
- A. Klappenecker and P. K. Sarvepalli, Clifford code constructions of operator quantum error-correcting codes, IEEE Transactions on Information Theory 54 (2008), no. 12, 5760-5765.[arXiv]
- Conrad Kobel, On the classification of solvable Lie algebras of finite dimension containing an abelian ideal of codimension one, Master's Thesis, Halmstad University, 2008.
- Alexey Koloydenko, Symmetric measures via moments, Bernoulli 14 (2008), no. 2, 362-390.[arXiv]
- A. Kontogeorgis, The ramification sequence for a fixed point of an automorphism of a curve and the Weierstrass gap sequence, Math. Z. 259 (2008), no. 3, 471–479.[MR]
- Aristides Kontogeorgis and Victor Rotger, On the non-existence of exceptional automorphisms on Shimura curves, Bull. Lond. Math. Soc. 40 (2008), no. 3, 363–374.[MR/arXiv]
- C. Koukouvinos and S. Stylianou, On skew-Hadamard matrices, Discrete Math. 308 (2008), no. 13, 2723–2731.[MR]
- Tünde Kovács, Combinatorial Diophantine equations—the genus 1 case, Publ. Math. Debrecen 72 (2008), no. 1-2, 243–255.[MR]
- Emmanuel Kowalski, The large sieve, monodromy, and zeta functions of algebraic curves. II. Independence of the zeros, Int. Math. Res. Not. IMRN (2008), Art. ID rnn 091, 57.[MR/arXiv]
- Andrew Kresch and Yuri Tschinkel, Effectivity of Brauer-Manin obstructions, Adv. Math. 218 (2008), no. 1, 1–27.[MR]
- Hans-Joachim Kroll and Rita Vincenti, PD-sets for binary RM-codes and the codes related to the Klein quadric and to the Schubert variety of PG(5,2), Discrete Math. 308 (2008), no. 2-3, 408–414.[MR]
- Klavdija Kutnar and Dragan Marušič, Hamiltonicity of vertex-transitive graphs of order 4p, European J. Combin. 29 (2008), no. 2, 423–438.[MR/arXiv]
- Gilles Lachaud and Christophe Ritzenthaler, On a conjecture of Serre on abelian threefolds, in Algebraic Geometry and its applications, Proceedings od the First SAGA conference, Papeete, France 2007, 2008, pp. 1–28.
- Sefi Ladkani, On the periodicity of Coxeter transformations and the non-negativity of their Euler forms, Linear Algebra Appl. 428 (2008), no. 4, 742–753.[MR]
- Shanta Laishram, T. N. Shorey, and Szabolcs Tengely, Squares in products in arithmetic progression with at most one term omitted and common difference a prime power, Acta Arith. 135 (2008), no. 2, 143–158.[MR]
- Dominic Lanphier, Combinatorics of Maass-Shimura operators, J. Number Theory 128 (2008), no. 8, 2467–2487.[MR]
- Alan G. B. Lauder, Ranks of elliptic curves over function fields, LMS J. Comput. Math. 11 (2008), 172–212.[MR]
- Grégoire Lecerf, Fast separable factorization and applications, Appl. Algebra Engrg. Comm. Comput. 19 (2008), no. 2, 135–160.[MR]
- Heisook Lee and Yoonjin Lee, Construction of self-dual codes over finite rings Zpm, J. Combin. Theory Ser. A 115 (2008), no. 3, 407–422.[MR]
- Dimitri Leemans, On computing the subgroup lattice of O'N, preprint (2008), 23.
- Dimitri Leemans, Residually weakly primitive and locally two-transitive geometries for sporadic groups, Mémoires de la Classe des Sciences, vol. 3, Académie royale de Belgique, 2008, pp. 173.
- G. I. Lehrer and R. B. Zhang, A Temperley-Lieb analogue for the BMW algebra, preprint (2008), 31 pages.[arXiv]
- Reynald Lercier and Thomas Sirvent, On Elkies subgroups of l-torsion points in elliptic curves defined over a finite field, J. Théor. Nombres Bordeaux 20 (2008), no. 3, 783–797.[MR/arXiv]
- Aaron Levin, Ideal class groups and torsion in Picard groups of varieties, preprint (2008), 31 pages.[arXiv]
- Xin Li, Marc Moreno Maza, Raqeeb Rasheed, and Eric Schost, High-performance symbolic computation in a hybrid compiled-interpreted programming environment, International Conference on Computational Sciences and Its Applications. ICCSA. June 30- July 3, 2008, 2008, pp. 331–341.
- Martin W. Liebeck, Aner Shalev, Pham Huu Tiep, and E. A. O'Brien, The Ore conjecture, Preprint (2008).
- Petr Lisoněk, On the connection between Kloosterman sums and elliptic curves, Sequences and Their Applications – SETA 2008: Proceedings, Lecture Notes in Computer Science, vol. 5203, Springer, Berlin Heidelberg, 2008, pp. 182–187.
- Petr Lisoněk, Stefano Marcugini, and Fernanda Pambianco, Constructions of small complete arcs with prescribed symmetry, Contrib. Discrete Math. 3 (2008), no. 1, 14–19.[MR]
- David Loeffler, Explicit calculations of automorphic forms for definite unitary groups, LMS J. Comput. Math. 11 (2008), 326–342.[MR]
- Adam Logan, The Brauer-Manin obstruction on del Pezzo surfaces of degree 2 branched along a plane section of a Kummer surface, Math. Proc. Cambridge Philos. Soc. 144 (2008), no. 3, 603–622.[MR]
- Ling Long, On Atkin and Swinnerton-Dyer congruence relations. III, J. Number Theory 128 (2008), no. 8, 2413–2429.[MR/arXiv]
- Ling Long and Chris Kurth, On modular forms for some noncongruence subgroups of SL2Z) II, preprint (2008), 13 pages.[arXiv]
- F. Luca, P. Stanica, and A. Togbé, On a Diophantine equation of Stroeker, Bull. Belg. Math. Soc. Simon Stevin (2008), 10.
- Florian Luca and Peter Gareth Walsh, On a sequence of integers arising from simultaneous Pell equations, Funct. Approx. Comment. Math. 38 (2008), no. , part 2, 221–226.[MR/link]
- Melissa L. Macasieb, Derived arithmetic Fuchsian groups of genus two, Experiment. Math. 17 (2008), no. 3, 347–369.[MR/arXiv]
- Kay Magaard, E. A. O'Brien, and Ákos Seress, Recognition of small dimensional representations of general linear groups, J. Aust. Math. Soc. 85 (2008), no. 2, 229–250.[MR]
- Michelle Manes, Q-rational cycles for degree-2 rational maps having an automorphism, Proc. Lond. Math. Soc. (3) 96 (2008), no. 3, 669–696.[MR]
- José M. Martín-García, xPerm: Fast index canonicalization for tensor computer algebra, Comput. Phys. Comm. 179 (2008), no. 8, 597–603.[doi/arXiv]
- Coy L. May and Jay Zimmerman, The groups of symmetric genus σ ≤ 8, Comm. Algebra 36 (2008), no. 11, 4078–4095.[MR]
- Coy L. May and Jay Zimmerman, The symmetric genus of groups of odd order, Houston J. Math. 34 (2008), no. 2, 319–338.[MR]
- Kelly McKinnie, Indecomposable p-algebras and Galois subfields in generic abelian crossed products, J. Algebra 320 (2008), no. 5, 1887–1907.[MR/arXiv]
- C. A. Melchor and P. Gaborit, On the classification of extremal [36,18,8] binary self-dual codes, IEEE Trans. Inform. Theory 54 (2008), no. 10, 4743-4750.[doi]
- Sihem Mesnager, P. Solé, and Steven T. Dougherty, Secret sharing schemes based on self-dual codes, Information Theory Workshop, 2008. ITW '08. IEEE (2008), 338–342.
- Gerhard O. Michler and Lizhong Wang, Another existence and uniqueness proof of the Tits group, Algebra Colloq. 15 (2008), no. 2, 241–278.[MR]
- J. Miret, R. Moreno, D. Sadornil, J. Tena, and M. Valls, Computing the height of volcanoes of l-isogenies of elliptic curves over finite fields, Appl. Math. Comput. 196 (2008), no. 1, 67–76.[MR]
- Mohammad Reza R. Moghaddam, Ali Reza Salemkar, and Taghi Karimi, Some inequalities for the order of the Schur multiplier of a pair of groups, Comm. Algebra 36 (2008), no. 7, 2481–2486.[MR]
- Mohamed Saied Emam Mohamed, Jintai Ding, and Johannes Buchmann, Algebraic cryptanalysis of MQQ public key cryptosystem by mutantxl, IACR (2008).[eprint]
- Mohamed Saied Emam Mohamed, Wael Said Abd Elmageed Mohamed, Jintai Ding, and Johannes Buchmann, MXL2: solving polynomial equations over GF(2) using an improved mutant strategy, Post-Quantum Cryptography, Lecture Notes in Comput. Sci., vol. 5299, Springer, Berlin, 2008, pp. 203–215.
- Marko Moisio, Kloosterman sums, elliptic curves, and irreducible polynomials with prescribed trace and norm, Acta Arith. 132 (2008), no. 4, 329–350.[MR/arXiv]
- Bernard Mourrain and Philippe Trébuchet, Stable normal forms for polynomial system solving, Theoret. Comput. Sci. 409 (2008), no. 2, 229–240.[MR/doi]
- F. S. Abu Muriefah, F. Luca, S. Siksek, and S. Tengely, On the Diophantine equation x2+C=2yn, Int. J. Number Theory (2008).
- Mona B. Musa, On some double circulant binary extended quadratic residue codes, IEEE Trans. Inform. Theory 54 (2008), no. 2, 898–905.[MR]
- Tetsuo Nakano, On the moduli space of pointed algebraic curves of low genus. II. Rationality, Tokyo J. Math. 31 (2008), no. 1, 147–160.[MR]
- Tran Ngoc Nam, Transfert algébrique et action du groupe linéaire sur les puissances divisées modulo 2, Ann. Inst. Fourier (Grenoble) 58 (2008), no. 5, 1785–1837.[MR/link]
- Gabriele Nebe and Chaoping Xing, A Gilbert-Varshamov type bound for Euclidean packings, Math. Comp. 77 (2008), no. 264, 2339–2344.[MR]
- Max Neunhöffer and Cheryl E. Praeger, Computing minimal polynomials of matrices, LMS J. Comput. Math. 11 (2008), 252–279.[MR]
- Mara D. Neusel and Müfit Sezer, The invariants of modular indecomposable representations of Zp2, Math. Ann. 341 (2008), no. 3, 575–587.[MR]
- M. F. Newman, Automorphism groups of free groups, J. Aust. Math. Soc. 85 (2008), no. 3, 341–345.[MR/doi]
- Laura Hitt O'Connor, Gary McGuire, Michael Naehrig, and Marco Streng, CM construction of genus 2 curves with p-rank 1, preprint (2008), 19 pages.[arXiv]
- Naoki Ogura and Shigenori Uchiyama, Remarks on the attack of Fouque et al. against the lIC scheme, IACR (2008).[eprint]
- Ayoub Otmani, Jean-Pierre Tillich, and Leonard Dallot, Cryptanalysis of two McEliece cryptosystems based on quasi-cyclic codes, preprint (2008), 17 pages.[arXiv]
- Manabu Oura, Cris Poor, and David S. Yuen, Towards the Siegel ring in genus four, Int. J. Number Theory 4 (2008), no. 4, 563–586.[MR]
- F. Pambianco and L. Storme, Minimal blocking sets in PG(2,9), Ars Combin. 89 (2008), 223–234.[MR]
- Christopher Parker and Peter Rowley, A 3-local identification of the alternating group of degree 8, the McLaughlin simple group and their automorphism groups, J. Algebra 319 (2008), no. 4, 1752–1775.[MR]
- Geoffrey Pearce, Examples of rank 3 product action transitive decompositions, Des. Codes Cryptogr. 47 (2008), no. 1-3, 289–303.[MR]
- J. Pernas, J. Pujol, and M. Villanueva, Kernel dimension for some families of quaternary Reed-Muller codes, Information Security, Lecture Notes in Comput. Sci., vol. 5393, Springer, Berlin, 2008, pp. 128–141.
- Norbert Peyerimhoff and Alina Vdovina, Cayley graph expanders and groups of finite width, preprint (2008), 18 pages.[arXiv]
- Francesco Dalla Piazza and Bert van Geemen, Siegel modular forms and finite symplectic groups, preprint (2008), 33 pages.[arXiv]
- Adolfo Piperno, Search space contraction in canonical labeling of graphs (preliminary version), preprint (2008).[arXiv]
- Michel Planat and Philippe Jorrand, Group theory for quantum gates and quantum coherence, J. Phys. A 41 (2008), no. 18, 182001, 8.[MR/arXiv]
- Vladimir L. Popov, Irregular and singular loci of commuting varieties, Transform. Groups 13 (2008), no. 3-4, 819–837.[arXiv]
- Håvard Raddum and Igor Semaev, Solving multiple right hand sides linear equations, Des. Codes Cryptogr. 49 (2008), no. 1-3, 147–160.[MR/eprint]
- Colin Reid, A problem in the Kourovka notebook concerning the number of conjugacy classes of a finite group, preprint (2008), 25 pages.[arXiv]
- Jonathan Reynolds, Extending Siegel's theorem for elliptic curves, PhD Thesis, University of East Anglia, 2008.[link]
- Guillaume Ricotta and Thomas Vidick, Hauteur asymptotique des points de Heegner, Canad. J. Math. 60 (2008), no. 6, 1406–1436.[MR]
- Daniel Robbins, Broue's abelian defect group conjecture for the Tits group, preprint (2008), 23 pages.[arXiv]
- B. G. Rodrigues, Self-orthogonal designs and codes from the symplectic groups S4(3) and S4(4), Discrete Math. 308 (2008), no. 10, 1941–1950.[MR]
- Jeremy Rouse, Bounds for the coefficients of powers of the Delta-function, Bull. London Math. Soc. 40 (2008), no. 6, 1081-1090.[doi]
- Sasha Rubin, Automata presenting structures: a survey of the finite string case, Bull. Symbolic Logic 14 (2008), no. 2, 169–209.[MR]
- Kira Samol and Duco van Straten, Frobenius polynomials for Calabi-Yau equations, Commun. Number Theory Phys. 2 (2008), no. 3, 537–561.[MR/arXiv]
- Chekad Sarami and Vladimir D. Tonchev, Cyclic quasi-symmetric designs and self-orthogonal codes of length 63, J. Statist. Plann. Inference 138 (2008), no. 1, 80–85.[MR]
- Neil Saunders, Minimal faithful permutation degrees for irreducible Coxeter groups, preprint (2008), 11 pages.[arXiv]
- Marcus du Sautoy and Luke Woodward, Nilpotent groups: explicit examples, Zeta Functions of Groups and Rings, Lecture Notes in Computer Science, vol. 1925/2008, Springer Berlin / Heidelberg, 2008, pp. 21–68.
- Mohamed Sayed, Combinatorial method in the coset enumeration of symmetrically generated groups, Int. J. Comput. Math. 85 (2008), no. 7, 993–1001.[MR]
- Luciano Sbaiz, Patrick Vandewalle, and Martin Vetterli, Groebner basis methods for multichannel sampling with unknown offsets, Appl. Comput. Harmon. Anal. 25 (2008), no. 3, 277–294.[doi]
- Michael M. Schein, Weights in Serre's conjecture for Hilbert modular forms: the ramified case, Israel J. Math. 166 (2008), 369–391.[MR]
- Josef Schicho and David Sevilla, Tschirnhaus-Weierstrass curves, preprint (2008), 14 pages.[arXiv]
- René Schoof, Computing Arakelov class groups, Algorithmic number theory: lattices, number fields, curves and cryptography, Math. Sci. Res. Inst. Publ., vol. 44, Cambridge Univ. Press, Cambridge, 2008, pp. 447–495.[MR/arXiv]
- Stefan Schröer, Singularities appearing on generic fibers of morphisms between smooth schemes, Michigan Math. J. 56 (2008), no. 1, 55–76.[MR/doi/arXiv]
- Romyar T. Sharifi, On Galois groups of unramified pro-p extensions, Math. Ann. 342 (2008), no. 2, 297–308.[MR]
- R. Shaw, The polynomial degrees of Grassmann and Segre varieties over GF(2), Discrete Math. 308 (2008), no. 5-6, 872–879.[MR]
- Junichi Shigezumi, On 3-lattices and spherical designs, preprint (2008), 199 pages.[arXiv]
- Benjamin Smith, Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves, Advances in Cryptology, Eurocrypt 2008, Lecture Notes in Computer Science, vol. 4965, Springer Berlin/Heidelberg, 2008, pp. 163–180.[eprint]
- Britta Späth, The McKay conjecture for exceptional groups and odd primes, Math. Z. Online first (2008), 25.
- P. Christopher Staecker, Remnant properties in nielsen coincidence theory, preprint (2008), 16 pages.[arXiv]
- William A. Stein, An introduction to computing modular forms using modular symbols, Algorithmic number theory: lattices, number fields, curves and cryptography, Math. Sci. Res. Inst. Publ., vol. 44, Cambridge Univ. Press, Cambridge, 2008, pp. 641–652.[MR]
- Rainer Steinwandt and Viktória I. Villányi, A one-time signature using run-length encoding, Inform. Process. Lett. 108 (2008), no. 4, 179–185.[MR]
- Michael Stoll, Rational 6-cycles under iteration of quadratic polynomials, LMS J. Comput. Math. 11 (2008), 367–380.[arXiv]
- Katsuyuki Takashima, Efficiently computable distortion maps for supersingular curves, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer Berlin/Heidelberg, 2008, pp. 88–101.
- Satoru Tanaka and Ken Nakamula, Constructing pairing-friendly elliptic curves using factorization of cyclotomic polynomials, Pairing-Based Cryptography, Pairing 2008, Lecture Notes in Computer Science, vol. 5209, Springer, 2008, pp. 136–145.
- Sz. Tengely, Note on the paper: "An extension of a theorem of Euler" by N. Hirata-Kohno, S. Laishram, T. N. Shorey and R. Tijdeman, Acta Arith. 134 (2008), no. 4, 329–335.[MR]
- Thotsaphon Thongjunthug, Computing a lower bound for the canonical height on elliptic curves over totally real number fields, Algorithmic Number Theory, Lecture Notes in Computer Science, vol. 5011, Springer, 2008, pp. 139-152.
- Shigeo Tsujii, Kohtaro Tadaki, and Ryou Fujita, Nonlinear piece-in-hand matrix method for enhancing security of multivariate public key cryptosystems, IACR (2008).[eprint]
- Anthony Várilly-Alvarado, Weak approximation on del Pezzo surfaces of degree 1, Adv. Math. 219 (2008), no. 6, 2123–2145.[MR]
- Roope Vehkalahti, Class field theoretic methods in the design of lattice signal constellations, PhD Thesis, University of Turku, 2008.
- Frederik Vercauteren, The hidden root problem, Pairing-Based Cryptography - Pairing, Lecture Notes in Computer Science, vol. 5209, SpringerLink, Berlin, 2008, pp. 89–99.
- Bogdan G. Vioreanu, Mordell-Weil problem for cubic surfaces, numerical evidence, preprint (2008), 22 pages.[arXiv]
- Yimin Wang, Bastiaan J. Braams, Joel M. Bowman, Stuart Carter, and D. P. Tew, Full-dimensional quantum calculations of ground-state tunneling splitting of malonaldehyde using an accurate ab initio potential energy surface, J. Chem. Phys 128 (2008), no. 224314, 9 pages.
- Yimin Wang, Stuart Carter, Bastiaan J. Braams, and Joel M. Bowman, Multimode quantum calculations of intramolecular vibrational energies of the water dimer and trimer using ab initio-based potential energy surfaces, J. Chem. Phys 128 (2008), no. 071101, 5 pages.
- Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, and Zhihui Zhang, A new construction of multivariate Public Key Encryption Scheme through internally perturbed plus, Computational Science and Its Applications, ICCSA 2008, Lecture Notes in Computer Science, vol. 5073, Springer, 2008, pp. 1-13.
- Kenneth L. Wantz, Unitals in the regular nearfield planes, J. Geom. 88 (2008), no. 1-2, 169–177.[MR]
- Mark Watkins, Some heuristics about elliptic curves, Experiment. Math. 17 (2008), no. 1, 105–125.[MR/arXiv]
- Oliver Wienand, Markus Wedler, Dominik Stoffel, Wolfgang Kunz, and Gert-Martin Greuel, An algebraic approach for proving data correctness in arithmetic data paths, Computer Aided Verification, Lecture Notes in Computer Science, vol. 5123, Springer Berlin/Heidelberg, 2008, pp. 473–486.
- Gabor Wiese, On projective linear groups over finite fields as Galois groups over the rational numbers, Edixhoven, Bas et al., Modular forms on Schiermonnikoog. Based on the conference on modular forms, Schiermonnikoog, Netherlands, October 2006, Cambridge University Press, Cambridge, 2008, pp. 343–350.[arXiv]
- Mark Wildon, Character values and decomposition matrices of symmetric groups, J. Algebra 319 (2008), no. 8, 3382–3397.[MR/arXiv]
- Rolf Stefan Wilke, On rational embeddings of curves in the second Garcia-Stichtenoth tower, Finite Fields Appl. 14 (2008), no. 2, 494–504.[MR]
- Kenneth Koon-Ho Wong, Applications of finite field computation to cryptology: Extension field arithmetic in public key systems and algebraic attacks on stream ciphers, PhD Thesis, Queensland University of Technology, 2008.[link]
- Chaoping Xing and Sze Ling Yeo, Construction of global function fields from linear codes and vice versa, Trans. Amer. Math. Soc. 361 (2008), no. 3, 1333-1349.
- Jian Xu, MEI - A module system for mechanized mathematics, PhD Thesis, McMasters University, 2008.[link]
- Radinka Aleksandrova Yorgova, On binary self-dual codes with automorphisms, IEEE Trans. Inform. Theory 54 (2008), no. 7, 3345–3351.[MR/doi]
- Radinka Yorgova and Alfred Wassermann, Binary self-dual codes with automorphisms of order 23, Des. Codes Cryptogr. 48 (2008), no. 2, 155–164.[MR]
- Fangguo Zhang, Twisted ate pairing on hyperelliptic curves and applications, IACR (2008), 15 pages.[eprint]
- Chang-An Zhao, Fangguo Zhang, and Jiwu Huang, All pairings are in a group, IEICE Trans A: Fundamentals E91-A (2008), no. 10, 3084-3087.[doi]