MATH-489: Number theory II.c - CryptographyThe goal of the course is to introduce basic notions from public key cryptography (PKC) as well as basic number-theoretic methods and algorithms for cryptanalysis of protocols and schemes based on PKC
COM-401: Cryptography and securityThis course introduces the basics of cryptography. We review several types of cryptographic primitives, when it is safe to use them and how to select the appropriate security parameters. We detail how
MATH-310: AlgebraThis is an introduction to modern algebra: groups, rings and fields.
MATH-643: Applied l-adic cohomologyIn this course we will describe in numerous examples how methods from l-adic cohomology as developed by Grothendieck, Deligne and Katz can interact with methods from analytic number theory (prime numb
MATH-326: Rational quadratic formsGiven a quadratic equation, e.g. x^2 + 2*y^2 = 81, how can we decide whether there is a rational solution (x,y)? This basic question is what the theory of Rational Quadratic Forms is all about. The co