COM-501: Advanced cryptographyThis course reviews some failure cases in public-key cryptography. It introduces some cryptanalysis techniques. It also presents fundamentals in cryptography such as interactive proofs. Finally, it pr
MATH-643: Applied l-adic cohomologyIn this course we will describe in numerous examples how methods from l-adic cohomology as developed by Grothendieck, Deligne and Katz can interact with methods from analytic number theory (prime numb
MATH-326: Rational quadratic formsGiven a quadratic equation, e.g. x^2 + 2*y^2 = 81, how can we decide whether there is a rational solution (x,y)? This basic question is what the theory of Rational Quadratic Forms is all about. The co