Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of ...
obtain algorithmically effective versions of the dense lattice sphere packings constructed from orders in Q-division rings by the first author. The lattices in question are lifts of suitable codes from prime characteristic to orders O in Q-division rings a ...
Fix a prime number l. Graphs of isogenies of degree a power of l are well-understood for elliptic curves, but not for higher-dimensional abelian varieties. We study the case of absolutely simple ordinary abelian varieties over a finite field. We analyse gr ...
This thesis is concerned with the algebraic theory of hermitian forms. It is organized in two parts. The first, consisting of the first two chapters, deals with some descent properties of unimodular hermitian forms over central simple algebras with involut ...
Looking for hidden symmetry: The first asymmetric total synthesis of pentacyclic (E)- and (Z)-alstoscholarines is accomplished starting from cyclic meso-anhydride 9. The absolute configuration was set by an organocatalytic desymmetrization of 9. Other key ...