skip to main content
Skip header Section
Modern Computer AlgebraApril 2003
Publisher:
  • Cambridge University Press
  • 40 W. 20 St. New York, NY
  • United States
ISBN:978-0-521-82646-4
Published:01 April 2003
Pages:
800
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

"Computer algebra systems are gaining more and more importance in all areas of science and engineering. This textbook gives a thorough introduction to the algorithmic basis of the mathematical engine in computer algebra systems." It is designed to accompany one- or two-semester courses for advanced undergraduate or graduate students in computer science or mathematics. Its comprehensiveness and authority make it also an essential reference for professionals in the area.

Cited By

  1. Barbagallo M, Jeronimo G and Sabia J (2024). Decision problem for a class of univariate Pfaffian functions, Applicable Algebra in Engineering, Communication and Computing, 35:2, (207-232), Online publication date: 1-Mar-2024.
  2. ACM
    Bhargava V, Ghosh S, Kumar M and Mohapatra C (2023). Fast, Algebraic Multivariate Multipoint Evaluation in Small Characteristic and Applications, Journal of the ACM, 70:6, (1-46), Online publication date: 31-Dec-2024.
  3. Brandt A, Kazemi M and Moreno-Maza M Power Series Arithmetic with the BPAS Library Computer Algebra in Scientific Computing, (108-128)
  4. Jing R, Moreno-Maza M and Talaashrafi D Complexity Estimates for Fourier-Motzkin Elimination Computer Algebra in Scientific Computing, (282-306)
  5. Cho G, Go B, Kim C, Koo N and Kwon S (2019). On the Cipolla---Lehmer type algorithms in finite fields, Applicable Algebra in Engineering, Communication and Computing, 30:2, (135-145), Online publication date: 1-Mar-2019.
  6. ACM
    Roche D What Can (and Can't) we Do with Sparse Polynomials? Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation, (25-30)
  7. ACM
    Aoyama T and Noro M Modular Algorithms for Computing Minimal Associated Primes and Radicals of Polynomial Ideals Proceedings of the 2018 ACM International Symposium on Symbolic and Algebraic Computation, (31-38)
  8. Weimann M (2017). Bivariate Factorization Using a Critical Fiber, Foundations of Computational Mathematics, 17:5, (1219-1263), Online publication date: 1-Oct-2017.
  9. Li Y, Ma X, Zhang Y and Qi C (2017). Mastrovito Form of Non-Recursive Karatsuba Multiplier for All Trinomials, IEEE Transactions on Computers, 66:9, (1573-1584), Online publication date: 1-Sep-2017.
  10. ACM
    Monagan M and Wong A Fast Parallel Multi-point Evaluation of Sparse Polynomials Proceedings of the International Workshop on Parallel Symbolic Computation, (1-7)
  11. ACM
    Alvandi P, Ataei M and Moreno Maza M On the Extended Hensel Construction and its Application to the Computation of Limit Points Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (13-20)
  12. ACM
    Chen L, Covanov S, Mohajerani D and Moreno Maza M Big Prime Field FFT on the GPU Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (85-92)
  13. ACM
    van der Hoeven J and Lecerf G Composition Modulo Powers of Polynomials Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (445-452)
  14. ACM
    Caruso X and Le Borgne J Fast Multiplication for Skew Polynomials Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (77-84)
  15. ACM
    Dahan X Gcd Modulo a Primary Triangular Set of Dimension Zero Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (109-116)
  16. ACM
    Allem L, Capaverde J, van Hoeij M and Szutkoski J Functional Decomposition Using Principal Subfields Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation, (421-428)
  17. Caruso X and Le Borgne J (2017). A new faster algorithm for factoring skew polynomials over finite fields, Journal of Symbolic Computation, 79:P2, (411-443), Online publication date: 1-Mar-2017.
  18. Wei Y, Xu G and Zou Y (2016). Dynamics of linear systems over finite commutative rings, Applicable Algebra in Engineering, Communication and Computing, 27:6, (469-479), Online publication date: 1-Dec-2016.
  19. Bigou K and Tisserand A (2016). Binary-Ternary Plus-Minus Modular Inversion in RNS, IEEE Transactions on Computers, 65:11, (3495-3501), Online publication date: 1-Nov-2016.
  20. ACM
    Hoeven J, Lecerf G and Quintin G (2016). Modular SIMD arithmetic in Mathemagix, ACM Transactions on Mathematical Software, 43:1, (1-37), Online publication date: 29-Aug-2016.
  21. ACM
    Harvey D, van der Hoeven J and Lecerf G Fast Polynomial Multiplication over F260 Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, (255-262)
  22. ACM
    Melczer S and Salvy B Symbolic-Numeric Tools for Analytic Combinatorics in Several Variables Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, (333-340)
  23. ACM
    Bostan A, Dumont L and Salvy B Efficient Algorithms for Mixed Creative Telscoping Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, (127-134)
  24. ACM
    Bostan A, Caruso X and Schost É Computation of the Similarity Class of the p-Curvature Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation, (111-118)
  25. Arnold A, Giesbrecht M and Roche D (2016). Faster sparse multivariate polynomial interpolation of straight-line programs, Journal of Symbolic Computation, 75:C, (4-24), Online publication date: 1-Jul-2016.
  26. Grenet B, Hoeven J and Lecerf G (2016). Deterministic root finding over finite fields using Graeffe transforms, Applicable Algebra in Engineering, Communication and Computing, 27:3, (237-257), Online publication date: 1-Jun-2016.
  27. de Beaudrap N and Gharibian S A linear time algorithm for quantum 2-SAT Proceedings of the 31st Conference on Computational Complexity, (1-21)
  28. Albrecht M, Faugère J, Farshim P, Herold G and Perret L (2016). Polly Cracker, revisited, Designs, Codes and Cryptography, 79:2, (261-302), Online publication date: 1-May-2016.
  29. ACM
    Moroz G and Aronov B (2016). Computing the Distance between Piecewise-Linear Bivariate Functions, ACM Transactions on Algorithms, 12:1, (1-13), Online publication date: 8-Feb-2016.
  30. ACM
    Khot S and Shinkar I On Hardness of Approximating the Parameterized Clique Problem Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, (37-45)
  31. ACM
    Miles E and Viola E (2015). Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs, Journal of the ACM, 62:6, (1-29), Online publication date: 10-Dec-2015.
  32. Kim T Multiple Discrete Logarithm Problems with Auxiliary Inputs Proceedings, Part I, of the 21st International Conference on Advances in Cryptology -- ASIACRYPT 2015 - Volume 9452, (174-188)
  33. Joswig M, Loho G, Lorenz B and Schröter B Linear Programs and Convex Hulls Over Fields of Puiseux Fractions Revised Selected Papers of the 6th International Conference on Mathematical Aspects of Computer and Information Sciences - Volume 9582, (429-445)
  34. ACM
    Meng L and Johnson J High performance implementation of the inverse TFT Proceedings of the 2015 International Workshop on Parallel Symbolic Computation, (87-94)
  35. ACM
    Gastineau M and Laskar J Parallel sparse multivariate polynomial division Proceedings of the 2015 International Workshop on Parallel Symbolic Computation, (25-33)
  36. ACM
    Bostan A, Caruso X and Schost É A Fast Algorithm for Computing the P-curvature Proceedings of the 2015 ACM on International Symposium on Symbolic and Algebraic Computation, (69-76)
  37. ACM
    Bostan A, Dumont L and Salvy B Algebraic Diagonals and Walks Proceedings of the 2015 ACM on International Symposium on Symbolic and Algebraic Computation, (77-84)
  38. ACM
    Grenet B, van der Hoeven J and Lecerf G Randomized Root Finding over Finite FFT-fields using Tangent Graeffe Transforms Proceedings of the 2015 ACM on International Symposium on Symbolic and Algebraic Computation, (197-204)
  39. Fournier H, Ismail A and Vigneron A (2015). Computing the Gromov hyperbolicity of a discrete metric space, Information Processing Letters, 115:6, (576-579), Online publication date: 1-Jun-2015.
  40. Bouzidi Y, Lazard S, Pouget M and Rouillier F (2015). Separating linear forms and Rational Univariate Representations of bivariate systems, Journal of Symbolic Computation, 68:P1, (84-119), Online publication date: 1-May-2015.
  41. D'Andrea C, Krick T and Szanto A (2015). Subresultants, Sylvester sums and the rational interpolation problem, Journal of Symbolic Computation, 68:P1, (72-83), Online publication date: 1-May-2015.
  42. ACM
    van der Hoeven J and Lecerf G (2015). Sparse Polynomial Interpolation in Practice, ACM Communications in Computer Algebra, 48:3/4, (187-191), Online publication date: 5-Feb-2015.
  43. Alcázar J, Hermoso C and Muntingh G (2015). Symmetry detection of rational space curves from their curvature and torsion, Computer Aided Geometric Design, 33:C, (51-65), Online publication date: 1-Feb-2015.
  44. ACM
    Giesbrecht M and Haraldson J Computing GCRDs of approximate differential polynomials Proceedings of the 2014 Symposium on Symbolic-Numeric Computation, (78-87)
  45. ACM
    Bouzidi Y, Lazard S, Moroz G, Pouget M and Rouillier F Improved algorithm for computing separating linear forms for bivariate systems Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (75-82)
  46. ACM
    Bostan A, Caruso X and Schost É A fast algorithm for computing the characteristic polynomial of the p-curvature Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (59-66)
  47. ACM
    Grenet B Computing low-degree factors of lacunary polynomials Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (224-231)
  48. ACM
    Bläser M and Jindal G A new deterministic algorithm for sparse multivariate polynomial interpolation Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (51-58)
  49. ACM
    Zhou W and Labahn G Unimodular completion of polynomial matrices Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (413-420)
  50. ACM
    Johansson F Evaluating parametric holonomic sequences using rectangular splitting Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, (256-263)
  51. Shparlinski I and Sutherland A (2014). On the Distribution of Atkin and Elkies Primes, Foundations of Computational Mathematics, 14:2, (285-297), Online publication date: 1-Apr-2014.
  52. Albrecht M, Faugére J, Fitzpatrick R, Perret L, Todo Y and Xagawa K Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions Proceedings of the 17th International Conference on Public-Key Cryptography --- PKC 2014 - Volume 8383, (446-464)
  53. Lipmaa H Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269, (41-60)
  54. ACM
    Cheung H, Kwok T and Lau L (2013). Fast matrix rank algorithms and applications, Journal of the ACM, 60:5, (1-25), Online publication date: 1-Oct-2013.
  55. Arnold A, Giesbrecht M and Roche D Faster Sparse Interpolation of Straight-Line Programs Proceedings of the 15th International Workshop on Computer Algebra in Scientific Computing - Volume 8136, (61-74)
  56. Nagasaka K and Masui T Extended QRGCD Algorithm Proceedings of the 15th International Workshop on Computer Algebra in Scientific Computing - Volume 8136, (257-272)
  57. ACM
    Arnold A A new truncated fourier transform algorithm Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (15-22)
  58. ACM
    Zhou W and Labahn G Computing column bases of polynomial matrices Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (379-386)
  59. ACM
    Pan V and Tsigaridas E On the boolean complexity of real root refinement Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (299-306)
  60. ACM
    Bostan A, Lairez P and Salvy B Creative telescoping for rational functions using the griffiths Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (93-100)
  61. ACM
    Chattopadhyay A, Grenet B, Koiran P, Portier N and Strozecki Y Factoring bivariate lacunary polynomials without heights Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (141-148)
  62. ACM
    van der Hoeven J, Lebreton R and Schost É Structured FFT and TFT Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (355-362)
  63. ACM
    Bouzidi Y, Lazard S, Pouget M and Rouillier F Rational univariate representations of bivariate systems and applications Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (109-116)
  64. ACM
    Bouzidi Y, Lazard S, Pouget M and Rouillier F Separating linear forms for bivariate systems Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (117-124)
  65. ACM
    Berthé V, Creusefond J, Lhote L and Vallée B Multiple GCDs. probabilistic analysis of the plain algorithm Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation, (37-44)
  66. Allem L, Gao S and Trevisan V (2013). Extracting sparse factors from multivariate integral polynomials, Journal of Symbolic Computation, 52, (3-16), Online publication date: 1-May-2013.
  67. ACM
    Yan S (2012). Review of modern computer arithmetic, by Richard Brent and Paul Zimmermann, ACM SIGACT News, 43:4, (49-51), Online publication date: 19-Dec-2012.
  68. Mezzarobba M A note on the space complexity of fast D-finite function evaluation Proceedings of the 14th international conference on Computer Algebra in Scientific Computing, (212-223)
  69. Diatta D, Mourrain B and Ruatta O (2012). On the isotopic meshing of an algebraic implicit surface, Journal of Symbolic Computation, 47:8, (903-925), Online publication date: 1-Aug-2012.
  70. ACM
    Zhou W, Labahn G and Storjohann A Computing minimal nullspace bases Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (366-373)
  71. ACM
    Pauderis C and Storjohann A Deterministic unimodularity certification Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (281-288)
  72. ACM
    Lebreton R and Schost É Algorithms for the universal decomposition algebra Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (234-241)
  73. ACM
    van der Hoeven J and Lecerf G On the complexity of multivariate blockwise polynomial multiplication Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (211-218)
  74. ACM
    Bostan A, Chyzak F, Salvy B and Li Z Fast computation of common left multiples of linear ordinary differential operators Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (99-106)
  75. ACM
    Berthomieu J and Lebreton R Relaxed p-adic Hensel lifting for algebraic systems Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation, (59-66)
  76. Harasawa R, Sueyoshi Y and Kudo A Improving the berlekamp algorithm for binomials x-a Proceedings of the 4th international conference on Arithmetic of Finite Fields, (225-235)
  77. El Mrabet N and Gama N Efficient multiplication over extension fields Proceedings of the 4th international conference on Arithmetic of Finite Fields, (136-151)
  78. ACM
    Berberich E, Emeliyanenko P, Kobel A and Sagraloff M Arrangement computation for planar algebraic curves Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation, (88-98)
  79. ACM
    Cheung H, Kwok T and Lau L Fast matrix rank algorithms and applications Proceedings of the forty-fourth annual ACM symposium on Theory of computing, (549-562)
  80. Chen Y and Nguyen P Faster algorithms for approximate common divisors Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, (502-519)
  81. Moroz G and Aronov B Computing the distance between piecewise-linear bivariate functions Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete algorithms, (288-293)
  82. Bernstein D Simplified high-speed high-distance list decoding for alternant codes Proceedings of the 4th international conference on Post-Quantum Cryptography, (200-216)
  83. Cao Z and Fan X Extension of Barreto-Voloch root extraction method Proceedings of the 13th international conference on Information and communications security, (184-189)
  84. Murphy B Acceleration of the inversion of triangular Toeplitz matrices and polynomial division Proceedings of the 13th international conference on Computer algebra in scientific computing, (321-332)
  85. ACM
    Bostan A, Chyzak F, Li Z and Salvy B (2011). Fast computation of common left multiples of linear ordinary differential operators, ACM Communications in Computer Algebra, 45:1/2, (111-112), Online publication date: 25-Jul-2011.
  86. El Mrabet N, Guillevic A and Ionica S Efficient multiplication in finite field extensions of degree 5 Proceedings of the 4th international conference on Progress in cryptology in Africa, (188-205)
  87. ACM
    Saunders B, Wood D and Youse B Numeric-symbolic exact rational linear system solver Proceedings of the 36th international symposium on Symbolic and algebraic computation, (305-312)
  88. ACM
    Sarkar S and Storjohann A Normalization of row reduced matrices Proceedings of the 36th international symposium on Symbolic and algebraic computation, (297-304)
  89. ACM
    Pospelov A Fast fourier transforms over poor fields Proceedings of the 36th international symposium on Symbolic and algebraic computation, (289-296)
  90. ACM
    Hart W, van Hoeij M and Novocin A Practical polynomial factoring in polynomial time Proceedings of the 36th international symposium on Symbolic and algebraic computation, (163-170)
  91. ACM
    Giesbrecht M and Roche D Diversification improves interpolation Proceedings of the 36th international symposium on Symbolic and algebraic computation, (123-130)
  92. ACM
    Bright C and Storjohann A Vector rational number reconstruction Proceedings of the 36th international symposium on Symbolic and algebraic computation, (51-58)
  93. Stehlé D and Steinfeld R Making NTRU as secure as worst-case problems over ideal lattices Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology, (27-47)
  94. ACM
    Mayer D, Teubert D, Wetzel S and Meyer U Implementation and performance evaluation of privacy-preserving fair reconciliation protocols on ordered sets Proceedings of the first ACM conference on Data and application security and privacy, (109-120)
  95. ACM
    Cook W and Steffy D (2011). Solving Very Sparse Rational Systems of Equations, ACM Transactions on Mathematical Software, 37:4, (1-21), Online publication date: 1-Feb-2011.
  96. ACM
    Steffy D (2011). Exact solutions to linear systems of equations using output sensitive lifting, ACM Communications in Computer Algebra, 44:3/4, (160-182), Online publication date: 28-Jan-2011.
  97. Nojoumian M and Stinson D Unconditionally secure first-price auction protocols using a multicomponent commitment scheme Proceedings of the 12th international conference on Information and communications security, (266-280)
  98. Nojoumian M and Stinson D Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme Information and Communications Security, (266-280)
  99. Gao S and Mateer T (2010). Additive fast Fourier transforms over finite fields, IEEE Transactions on Information Theory, 56:12, (6265-6272), Online publication date: 1-Dec-2010.
  100. Bertone C, Chèze G and Galligo A (2010). Modular Las Vegas algorithms for polynomial absolute factorization, Journal of Symbolic Computation, 45:12, (1280-1295), Online publication date: 1-Dec-2010.
  101. Lobachev O and Loogen R Implementing data parallel rational multiple-residue arithmetic in eden Proceedings of the 12th international conference on Computer algebra in scientific computing, (178-193)
  102. Abramov S, Gheffar A and Khmelnov D Factorization of polynomials and GCD computations for finding universal denominators Proceedings of the 12th international conference on Computer algebra in scientific computing, (4-18)
  103. Cai J, Chen X, Lipton R and Lu P On tractable exponential sums Proceedings of the 4th international conference on Frontiers in algorithmics, (148-159)
  104. ACM
    Harvey D and Roche D An in-place truncated fourier transform and applications to polynomial multiplication Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, (325-329)
  105. ACM
    Abramov S On some decidable and undecidable problems related to q-difference equations with parameters Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, (311-317)
  106. ACM
    Jeannerod C and Mouilleron C Computing specified generators of structured matrix inverses Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, (281-288)
  107. ACM
    Bostan A, Chen S, Chyzak F and Li Z Complexity of creative telescoping for bivariate rational functions Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, (203-210)
  108. ACM
    Gerhard J Asymptotically fast algorithms for modern computer algebra Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, (9-10)
  109. ACM
    Javadi S and Monagan M Parallel sparse polynomial interpolation over finite fields Proceedings of the 4th International Workshop on Parallel and Symbolic Computation, (160-168)
  110. ACM
    Li Y and Reis G A quantitative study of reductions in algebraic libraries Proceedings of the 4th International Workshop on Parallel and Symbolic Computation, (98-104)
  111. Ding J and Schmidt D Mutant zhuang-zi algorithm Proceedings of the Third international conference on Post-Quantum Cryptography, (28-40)
  112. Emiris I and Pan V Applications of FFT and structured matrices Algorithms and theory of computation handbook, (18-18)
  113. Emiris I, Pan V and Tsigaridas E Algebraic and numerical algorithms Algorithms and theory of computation handbook, (17-17)
  114. Carlsson G, Singh G and Zomorodian A Computing Multidimensional Persistence Proceedings of the 20th International Symposium on Algorithms and Computation, (730-739)
  115. Hubrechts H (2009). Quasi-quadratic elliptic curve point counting using rigid cohomology, Journal of Symbolic Computation, 44:9, (1255-1267), Online publication date: 1-Sep-2009.
  116. Durvye C (2009). Evaluation techniques for zero-dimensional primary decomposition, Journal of Symbolic Computation, 44:9, (1089-1113), Online publication date: 1-Sep-2009.
  117. ACM
    Pan V, Murphy B and Rosholt R Nearly optimal symbolic-numerical algorithms for structured integer matrices and polynomials Proceedings of the 2009 conference on Symbolic numeric computation, (105-114)
  118. ACM
    Storjohann A Integer matrix rank certification Proceedings of the 2009 international symposium on Symbolic and algebraic computation, (333-340)
  119. ACM
    Roche D Space- and time-efficient polynomial multiplication Proceedings of the 2009 international symposium on Symbolic and algebraic computation, (295-302)
  120. Diochnos D, Emiris I and Tsigaridas E (2009). On the asymptotic and practical complexity of solving bivariate systems over the reals, Journal of Symbolic Computation, 44:7, (818-835), Online publication date: 1-Jul-2009.
  121. Mrabet N and Negre C Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography Proceedings of the 14th Australasian Conference on Information Security and Privacy, (422-436)
  122. Li X, Jiang T, Zhang Q and Wang L (2009). Binary linear multicast network coding on acyclic networks, IEEE Journal on Selected Areas in Communications, 27:5, (738-748), Online publication date: 1-Jun-2009.
  123. Satoh T Generating Genus Two Hyperelliptic Curves over Large Characteristic Finite Fields Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (536-553)
  124. Ye Q, Wang H, Pieprzyk J and Zhang X (2009). Unconditionally secure disjointness tests for private datasets, International Journal of Applied Cryptography, 1:3, (225-235), Online publication date: 1-Feb-2009.
  125. Bläser M, Hardt M, Lipton R and Vishnoi N (2009). Deterministically testing sparse polynomial identities of unbounded degree, Information Processing Letters, 109:3, (187-192), Online publication date: 1-Jan-2009.
  126. Haramoto H, Matsumoto M and L'Ecuyer P A Fast Jump Ahead Algorithm for Linear Recurrences in a Polynomial Space Proceedings of the 5th international conference on Sequences and Their Applications, (290-298)
  127. Lobachev O and Loogen R Towards an Implementation of a Computer Algebra System in a Functional Language Proceedings of the 9th AISC international conference, the 15th Calculemas symposium, and the 7th international MKM conference on Intelligent Computer Mathematics, (141-154)
  128. ACM
    Renault G and Yokoyama K Multi-modular algorithm for computing the splitting field of a polynomial Proceedings of the twenty-first international symposium on Symbolic and algebraic computation, (247-254)
  129. ACM
    Kaltofen E and Koiran P Expressing a fraction of two determinants as a determinant Proceedings of the twenty-first international symposium on Symbolic and algebraic computation, (141-146)
  130. Negre C and Plantard T Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation Proceedings of the 13th Australasian conference on Information Security and Privacy, (463-477)
  131. Ye Q, Wang H, Pieprzyk J and Zhang X Efficient Disjointness Tests for Private Datasets Proceedings of the 13th Australasian conference on Information Security and Privacy, (155-169)
  132. Shpilrain V and Ushakov A An authentication scheme based on the twisted conjugacy problem Proceedings of the 6th international conference on Applied cryptography and network security, (366-372)
  133. Shallue A An improved multi-set algorithm for the dense subset sum problem Proceedings of the 8th international conference on Algorithmic number theory, (416-429)
  134. Akhavi A and Stehlé D Speeding-up lattice reduction with random projections Proceedings of the 8th Latin American conference on Theoretical informatics, (293-305)
  135. Von Zur Gathen J and Shparlinski I Approximate polynomial gcd Proceedings of the 8th Latin American conference on Theoretical informatics, (276-283)
  136. Chen N and Yan Z (2008). Complexity analysis of Reed-Solomon decoding over GF(2m) without using syndromes, EURASIP Journal on Wireless Communications and Networking, 2008, (1-11), Online publication date: 1-Jan-2008.
  137. ACM
    Kaltofen E and Yang Z On exact and approximate interpolation of sparse rational functions Proceedings of the 2007 international symposium on Symbolic and algebraic computation, (203-210)
  138. ACM
    Bostan A, Jeannerod C and Schost É Solving toeplitz- and vandermonde-like linear systems with large displacement rank Proceedings of the 2007 international symposium on Symbolic and algebraic computation, (33-40)
  139. ACM
    Bostan A, Chyzak F, Salvy B, Lecerf G and Schost É Differential equations for algebraic functions Proceedings of the 2007 international symposium on Symbolic and algebraic computation, (25-32)
  140. Ziegler M (Short) Survey of Real Hypercomputation Proceedings of the 3rd conference on Computability in Europe: Computation and Logic in the Real World, (809-824)
  141. Bollman D, Colón-Reyes O and Orozco E (2007). Fixed points in discrete models for regulatory genetic networks, EURASIP Journal on Bioinformatics and Systems Biology, 2007, (10-10), Online publication date: 1-Jan-2007.
  142. Gathen J and Shparlinski I (2006). GCD of Random Linear Combinations, Algorithmica, 46:1, (137-148), Online publication date: 1-Sep-2006.
  143. Finiasz M and Vaudenay S When stream cipher analysis meets public-key cryptography Proceedings of the 13th international conference on Selected areas in cryptography, (266-284)
  144. ACM
    Cowles J and Gamboa R Unique factorization in ACL2 Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications, (21-27)
  145. Renault G and Yokoyama K A modular method for computing the splitting field of a polynomial Proceedings of the 7th international conference on Algorithmic Number Theory, (124-140)
  146. ACM
    van de Woestijne C Surface parametrisation without diagonalisation Proceedings of the 2006 international symposium on Symbolic and algebraic computation, (340-344)
  147. ACM
    Turner W A block Wiedemann rank algorithm Proceedings of the 2006 international symposium on Symbolic and algebraic computation, (332-339)
  148. ACM
    Khodadad S and Monagan M Fast rational function reconstruction Proceedings of the 2006 international symposium on Symbolic and algebraic computation, (184-190)
  149. Mohassel P and Franklin M Efficient polynomial operations in the shared-coefficients setting Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography, (44-57)
  150. Baignères T and Vaudenay S Proving the security of AES substitution-permutation network Proceedings of the 12th international conference on Selected Areas in Cryptography, (65-81)
  151. von zur Gathen J and Shokrollahi J Efficient FPGA-based karatsuba multipliers for polynomials over F2 Proceedings of the 12th international conference on Selected Areas in Cryptography, (359-369)
  152. ACM
    van de Woestijne C Deterministic equation solving over finite fields Proceedings of the 2005 international symposium on Symbolic and algebraic computation, (348-353)
  153. ACM
    Chen Z and Storjohann A A BLAS based C library for exact linear algebra on integer matrices Proceedings of the 2005 international symposium on Symbolic and algebraic computation, (92-99)
  154. Ardizzoni E, Bertossi A, Pinotti M, Ramaprasad S, Rizzi R and Shashanka M (2005). Optimal Skewed Data Allocation on Multiple Channels with Flat Broadcast per Channel, IEEE Transactions on Computers, 54:5, (558-572), Online publication date: 1-May-2005.
  155. Satoh T On degrees of polynomial interpolations related to elliptic curve cryptography Proceedings of the 2005 international conference on Coding and Cryptography, (155-163)
  156. Kiltz E, Leander G and Malone-Lee J Secure computation of the mean and related statistics Proceedings of the Second international conference on Theory of Cryptography, (283-302)
  157. von zur Gathen J and Shparlinski I GCD of random linear forms Proceedings of the 15th international conference on Algorithms and Computation, (464-469)
  158. ACM
    Carette J Understanding expression simplification Proceedings of the 2004 international symposium on Symbolic and algebraic computation, (72-79)
  159. Luks E and Roy A (2004). The Complexity of Symmetry-Breaking Formulas, Annals of Mathematics and Artificial Intelligence, 41:1, (19-45), Online publication date: 1-May-2004.
Contributors
  • Waterloo Maple Inc.

Recommendations

Reviews

Joel Cohen

This is the second edition of a comprehensive textbook on the mathematical and algorithmic foundations of computer algebra. This edition is similar to the first edition [1], with corrections and some changes to chapters 3, 15, and 22. The authors' stated goal is to provide an introduction to the subject that includes the mathematical underpinnings of the field, the asymptotic analysis of algorithms, and a description of asymptotic fast methods for symbolic problems. The book provides this, and much more. The book is organized into five sections: Euclid, Newton, Gauss, Fermat, and Hilbert. These (roughly) reflect five areas of mathematical concepts, algorithmic concepts, and approaches in computer algebra. The Euclid section is roughly organized around, and motivated by, the concept of a Euclidean algorithm for integers and polynomials. It includes a description of the basic algebraic concepts that are used to describe and analyze the algorithms, as well as classical and modern algorithms for basic arithmetic, classical greatest common divisor (gcd) computation, modular approaches for gcd computation, the Chinese remainder problem, determinant computation, and partial fraction decomposition. Most of the material in this section is similar to what is found in the first edition, although chapter 3 ("The Euclidean Algorithm") has been reorganized. The Newton section is roughly motivated by, and organized around, Newton's root finding algorithm, in a symbolic rather than numeric setting. It includes algorithms for fast multiplication of integers and polynomials, and the fast Fourier transform, a Newton-type iteration algorithm for polynomial division, a p -adic expansion algorithm for polynomials, fast polynomial evaluation and interpolation algorithms, a fast Euclidean algorithm, and fast algorithms in linear algebra. The chapters in this section are similar to those in the first edition. The Gauss section, which takes its name from the early work of Gauss on polynomial factorization, is concerned with polynomial factorization algorithms, including the Berlekamp/Hensel algorithm, and the polynomial time factorization algorithm of Lenstra, Lenstra, and Lovász. Most of the material in this section is similar to what is found in the first edition, although parts of chapter 15 ("Hensel Lifting and Factoring Polynomials") have been reorganized. The Fermat section, which is roughly motivated by, and organized around, Fermat's little theorem, is concerned with various approaches to primality testing, one integer factorization, and its applications to RSA encryption. The chapters in this section are similar to those in the first edition. The Hilbert section is primarily organized and motivated by Hilbert's two well-known algebraic theorems-the Nullstellensatz theorem and the irreducibility theorem-which provide a theoretical basis for some topics. It includes a description of Gröbner bases and Buchberger's algorithm, and a brief introduction to symbolic integration and symbolic summation. Most of the material in this section is similar to what is found in the first edition, although chapter 22 ("Symbolic Integration") has been expanded to include the integration of hyperexponential functions. This book differs from others in computer algebra by its large variety of topics, and connections to other areas of mathematics and computer science. The authors have an encyclopedic knowledge of computer algebra, its historical background, some related mathematical fields, and important application areas. The book is full of historical anecdotes, insights, and surprising connections to other mathematical areas, such as fractals, coding theory, and Diophantine equations, and application areas, such as audio and image compression, the analysis of musical scales, robotics, automated theorem proving in geometry, and general proof systems. It also includes suggestions for research problems. All this makes for great reading and reviewing. The authors have used the text for one- and two-semester courses in computer algebra at both the undergraduate and graduate levels. Although the stated prerequisites for the book include linear algebra, and a "certain level of mathematical maturity," it will also be very useful to have some background in abstract algebra, discrete mathematics, probability theory, number theory, and algorithm analysis. (An appendix briefly reviews some of these topics.) In any event, instructors will have to carefully pick and choose topics that address the time constraints of their courses, and the backgrounds of their students. The book's Web site, http://www-math.upb.de/mca, contains answers to some exercises, as well as errata and other reviews. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.