printable pdf
比利时vs摩洛哥足彩 ,
university of california san diego

****************************

math 209 - number theory

dr. kristin lauter

microsoft

computing modular polynomials and applications to cryptography

abstract:

(joint work with denis charles) the nth modular polynomial parameterizes pairs of elliptic curves with an isogeny of degree n between them. modular polynomials provide the defining equations for modular curves, and are useful in many different aspects of computational number theory and cryptography. for example, computations with modular polynomials have been used to speed elliptic curve point-counting algorithms. the standard method for computing modular polynomials consists of computing the fourier expansion of the modular j-function and solving a linear system of equations to obtain the integral coefficients. the computer algebra package magma incorporates a database of modular polynomials for n up to 59. the idea of the talk is to compute the modular polynomial directly modulo a prime p, without first computing the coefficients as integers. once the modular polynomial has been computed for enough small primes, our approach can also be combined with the chinese remainder theorem (crt) approach to obtain the modular polynomial with integral coefficients or with coefficients modulo a much larger prime using explicit crt. our algorithm does not involve computing fourier coefficients of modular functions.

host: audrey terras

october 14, 2004

2:00 pm

ap&m 7321

****************************