Notice: The Lfant has exceeded its natural life span of twelve years and has been replaced by CANARI. These pages will no longer be updated.
2022
Doctoral dissertations
- Jared Asuncion:
Complex multiplication constructions of abelian extensions of quartic fields.
Université de Bordeaux and Universiteit Leiden 2022.
Journals
- Razvan Barbulescu and Sudarshan Shinde:
A classification of ECM-friendly families using modular curves.
Mathematics of Computation 91 (335), 2022, pp. 1405–1436. - Jean-François Biasse, Claus Fieker, Tommy Hofmann and Aurel Page:
Norm relations and computational problems in number fields.
Journal of the London Mathematical Society 105 (4), 2022, pp. 2373–2414. - Guilhem Castagnos, Fabien Laguillaumie and Ida Tucker:
A tighter proof for CCA secure inner product functional encryption: Genericity meets efficiency.
Theoretical Computer Science 914, 2022, pp. 84–113. - Xavier Caruso:
Where are the zeroes of a random $p$-adic polynomial?.
Forum of Mathematics, Sigma 10, 2022, pp. e55. - Alina Dudeanu, Dimitar Jetchev, Damien Robert and Marius Vuille:
Cyclic Isogenies for Abelian Varieties with Real Multiplication.
Moscow Mathematical Journal 22 (4), 2022, pp. 613–655. - Jean Kieffer:
Degree and height estimates for modular equations on PEL Shimura varieties.
Journal of the London Mathematical Society 105 (2), 2022, pp. 1314–1361. - Jean Kieffer:
Sign choices in the AGM for genus two theta constants.
Publications mathématiques de Besançon. Algèbre et théorie des nombres 2022, 2022, pp. 37–58. - Jean Kieffer:
Upper bounds on the heights of polynomials and rational fractions from their values.
Acta Arithmetica 203, 2022, pp. 49–68. - Thorsten Kleinjung and Benjamin Wesolowski:
Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic.
Journal of the American Mathematical Society 35 (2), 2022, pp. 581–624.
Conferences
- Katharina Boudgoust, Erell Gachon and Alice Pellet-Mary:
Some Easy Instances of Ideal-SVP and Implications on the Partial Vandermonde Knapsack Problem.
In Yevgeniy Dodis and Thomas Shrimpton (editors):
Advances in Cryptology – CRYPTO 2022, Part II
Lecture Notes in Computer Science vol. 13510.
Springer, Cham 2022, pp. 480–509. - Guilhem Castagnos, Fabien Laguillaumie and Ida Tucker:
Threshold Linearly Homomorphic Encryption on $Z/2^k Z$.
In Shweta Agrawal and Dongdai Lin (editors):
Advances in Cryptology – ASIACRYPT 2022, Part II
Lecture Notes in Computer Science vol. 13792.
Springer Nature Switzerland, Cham 2022, pp. 99–129. - Xavier Caruso, Tristan Vaccon and Thibaut Verron:
On Polynomial Ideals And Overconvergence In Tate Algebras.
In Marc Moreno Maza, Lihong Zhi and Amir Hashemi (editors):
ISSAC '22 — Proceedings of the 2022 International Symposium on Symbolic and Algebraic Computation
ACM, New York 2022, pp. 489–497. - Joël Felderhoff, Alice Pellet-Mary and Damien Stehlé:
On Module Unique-SVP and NTRU.
In Shweta Agrawal and Dongdai Lin (editors):
Advances in Cryptology – ASIACRYPT 2022, Part III
Lecture Notes in Computer Science vol. 13793.
Springer Nature Switzerland, Cham 2022, pp. 709–740. - Abdoulaye Maiga and Damien Robert:
Computing the 2-Adic Canonical Lift of Genus 2 Curves.
In Debasis Giri, Kim-Kwang Raymond Choo, Saminathan Ponnusamy, Weizhi Meng, Sedat Akleylek and Santi Prasad Maity (editors):
Proceedings of the Seventh International Conference on Mathematics and Computing – ICMC 2021
Advances in Intelligent Systems and Computing vol. 1412.
Springer, Singapore 2022, pp. 637–672. - Pascal Molin and Aurel Page:
Computing groups of Hecke characters.
In: ANTS XV
Research in Number Theory vol. 8.
2022. - Benjamin Wesolowski:
The supersingular isogeny path and endomorphism ring problems are equivalent.
In Nisheeth K. Vishnoi (editors):
IEEE Symposium on Foundations of Computer Science — FOCS 2021
The Institute of Electrical and Electronics Engineers, Los Alamitos 2022, pp. 1100–1111. - Benjamin Wesolowski:
Orientations and the Supersingular Endomorphism Ring Problem.
In Orr Dunkelman and Stefan Dziembowski (editors):
Advances in Cryptology – EUROCRYPT 2022, Part III
Lecture Notes in Computer Science vol. 13275.
International Association for Cryptologic Research 2022, pp. 345–371.