Publications

Books

  1. p-adic Numbers, p-adic Analysis, and Zeta-Functions, Graduate Texts in Mathematics No. 58, Springer-Verlag, 1977. Second edition, 1984.
  2. p-adic Analysis: A Short Course on Recent Work, London Mathematical Society Lecture Note Series No. 46, Cambridge University Press, Cambridge, 1980.
  3. Introduction to Elliptic Curves and Modular Forms, Graduate Texts in Math. No. 97, Springer-Verlag, 1984. Second edition, 1993.
  4. A Course in Number Theory and Cryptography, Graduate Texts in Math. No. 114, Springer-Verlag, 1987. Second edition, 1994.
  5. Algebraic Aspects of Cryptography, Algorithms and Computation in Mathematics Vol. 3, Springer-Verlag, 1998.
  6. Random Curves: Journeys of a Mathematician, Springer-Verlag, 2007.

Books Edited

  1. Number Theory Related to Fermat's Last Theorem, Progress in Math. No. 26, Birkhauser, Boston, 1982.
  2. Advances in Cryptology - Crypto '96, Lec. Notes in Computer Science No. 1109, Springer, 1996.
  3. Towards a Quarter-Century of Public Key Cryptography, Springer, 2000.

Videotapes

  1. Mathematics under hardship conditions in the Third World, AMS-MAA Joint Lecture Series, 1992.
  2. The story of the proof of Fermat's Last Theorem, Undergraduate Mathematical Sciences Colloquium, Univ. Washington, 1993.

Research Articles

  1. p-adic variation of the zeta-function over families of varieties defined over finite fields, Compositio Mathematica, Vol. 31, 1975, 119-218.
  2. Netselostnost periodov parabolicheskikh form vne kriticheskoi polosy (Non-integrality of the periods of cusp forms outside the critical strip), Funktsional'nyi Analiz i ego Prilozheniya, Vol. 9, 1975, 52-55.
  3. 2-adic and 3-adic ordinals of 1/j-expansion coefficients for the weight 2 Eisenstein series, Bulletin of the London Mathematical Society, Vol. 9, 1977, 188-192.
  4. Interpretation of the p-adic log gamma function and Euler constants using the Bernoulli measure, Transactions of the American Mathematical Society, Vol. 242, 1978, 261-269.
  5. Gamma function identities and elliptic differentials on Fermat curves, Duke Mathematical Journal, Vol. 45, 1978, 87-99.
  6. (with D. Rohrlich) Simple factors in the Jacobian of a Fermat curve, Canadian Journal of Mathematics, Vol. 30, 1978, 1183-1205.
  7. (with A. Ogus) Algebraicity of some products of values of the gamma function, Appendix to: P. Deligne, Valeurs de fonctions L et périodes d'intégrales, Proceedings of Symposia in Pure Mathematics, Vol. 33 Part 2, 1979, 313-346.
  8. (with B. H. Gross) Gauss sums and the p-adic gamma-function, Annals of Mathematics, Vol. 109, 1979, 569-581.
  9. A new proof of certain relations between p-adic L-functions and log gamma-functions, Duke Mathematical Journal, Vol. 46, 1979, 455-468.
  10. q-extension of the p-adic gamma function, Transactions of the American Mathematical Society, Vol. 260, 1980, 449-457.
  11. The hypergeometric function with p-adic parameters, Proceedings of the Queen's Number Theory Conference 1979, Queen's University, Kingston, Ontario, 1980, 319-328.
  12. On Carlitz's q-Bernoulli numbers, Journal of Number Theory, Vol. 14, 1982, 332-339.
  13. p-adic analog of Heine's hypergeometric q-series, Pacific Journal of Mathematics, Vol. 102, 1982, 373-383.
  14. q-extension of the p-adic gamma function. II, Transactions of the American Mathematical Society, Vol. 273, 1982, 111-129.
  15. The number of points on certain families of hypersurfaces over finite fields, Compositio Mathematica, Vol. 48, 1983, 3-23.
  16. p-adic eigen-functions for Kubert distributions, Canadian Journal of Mathematics, Vol. 35, 1983, 674-686.
  17. p-adic integral transforms on compact subgroups of Cp, Pacific Journal of Mathematics, Vol. 120, 1985.
  18. p-adic congruences and modular forms of half integer weight, Mathematische Annalen, Vol. 274, 1986, 199-220.
  19. Elliptic curve cryptosystems, Mathematics of Computation, Vol. 48, 1987, 203-209.
  20. Congruences for periods of modular forms, Duke Mathematical Journal, Vol. 54, 1987, 361-373.
  21. Primality of the number of points on an elliptic curve over a finite field, Pacific Journal of Mathematics, Vol. 131, 1988, 157-165.
  22. Hyperelliptic cryptosystems, Journal of Cryptology, Vol. 1, 1989, 139-150.
  23. A family of jacobians suitable for discrete log cryptosystems, Advances in Cryptology - Crypto '88, Springer-Verlag, 1990, 94-99.
  24. Discrete logarithms and discreet curves, in: A Perspective in Theoretical Computer Science - Commemorative Volume for Gift Siromoney, World Sci. Publ. Co. Ltd, 1989, 106-120.
  25. Jacobi sums, irreducible zeta-polynomials, and cryptography, Canadian Math. Bulletin, Vol. 34 (2), 1991, 229-235.
  26. Constructing elliptic curve cryptosystems in characteristic 2, Advances in Cryptology - Crypto '90, Springer-Verlag, 1991, 156-167.
  27. Elliptic curve implementation of zero-knowledge blobs, Journal of Cryptology, Vol. 4, 1991, 207-213.
  28. CM-curves with good cryptographic properties, Advances in Cryptology - Crypto '91, Springer-Verlag, 1992, 279-287.
  29. (with M. R. Fellows) Self-witnessing polynomial-time complexity and prime factorization, Designs, Codes and Cryptography, Vol. 2, 1992, 231-235.
  30. (with M. R. Fellows) Fixed-parameter complexity and cryptography, in G. Cohen, Teo Mora, and O. Moreno Eds., Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Proc. 10th Intern. Symp., San Juan, Puerto Rico, May 1993, Springer-Verlag, 1993, 121-131.
  31. (with M. R. Fellows) Combinatorially based cryptography for children (and adults), Proc. 24th Southeastern Intern. Conf. Combinatorics, Graph Theory and Computing (Boca Raton, Florida, February 1993), Congressus Numerantium, Vol. 99, 1994, 9-41.
  32. (with M. R. Fellows) Combinatorial cryptosystems galore!, in Finite Fields: Theory, Applications, and Algorithms, Second Intern. Conf. Finite Fields (Las Vegas, August 1993), Contemporary Math. Vol. 168, 1994, 51-61.
  33. Computational algebra problems arising from combinatorial cryptography, Proceedings of Discussion Meeting on Cryptography and Computation (31 August - 1 September, 1995, Jawaharlal Nehru Centre for Advanced Scientific Research, Bangalore), 12 pages.
  34. (with R. Balasubramanian) The improbability that an elliptic curve has subexponential discrete logarithm problem under the Menezes-Okamoto-Vanstone algorithm, Journal of Cryptology, Vol. 11, 1998, 141-145.
  35. (with J. P. Buhler) Lattice basis reduction, Jacobi sums, and hyperelliptic cryptosystems, Bulletin of the Australian Mathematical Society, Vol. 57, 1998, 147-154.
  36. An elliptic curve implementation of the finite field digital signature algorithm, Advances in Cryptology - Crypto '98, Springer-Verlag, 1998, 327-337.
  37. (with R. G. Downey and M. R. Fellows) Techniques for exponential parameterized reductions in vertex set problems, unpublished but included in R. G. Downey and M. R. Fellows, Parameterized Complexity, Springer-Verlag, 1999, 220-222.
  38. (with M. J. Jacobson, J. H. Silverman, A. Stein, and E. Teske) Analysis of the xedni calculus attack, Designs, Codes and Cryptography, Vol. 20, 2000, 41-64.
  39. Almost primality of group orders of elliptic curves defined over small finite fields, Experimental Mathematics, Vol. 10, 2001, 553-558.
  40. (with A. J. Menezes) Obstacles to the torsion-subgroup attack on the Decision Diffie-Hellman problem, Mathematics of Computation, Vol. 73, 2004, 2027-2041.
  41. (with A. J. Menezes) Another look at `provable security,' Journal of Cryptology, Vol. 20, 2007, 3-37; available here.
  42. (with A. J. Menezes) Pairing-based cryptography at high security levels, Proceedings of the Tenth IMA International Conference on Cryptography and Coding, Springer-Verlag, LNCS 3796, 2005, 13-36; available here.
  43. (with A. J. Menezes) Another look at generic groups, Advances in Mathematics of Communications, Vol. 1, 2007, 13-28; available here.
  44. (with A. J. Menezes) Another look at `provable security'. II, Advances in Cryptology - Indocrypt 2006, Springer-Verlag, LNCS 4329, 2006, 148-175; available here.
  45. Another look at automated theorem-proving, Journal of Mathematical Cryptology, Vol. 1, 2007, 385-403; available here.
  46. (with A. J. Menezes) Another look at non-standard discrete log and Diffie-Hellman problems, Journal of Mathematical Cryptology, Vol. 2, 2008, 311-326; available here.
  47. (with A. H. Koblitz and A. J. Menezes) Elliptic curve cryptography: The serpentine course of a paradigm shift, Journal of Number Theory Vol. 131, 2011, 781-814; available here. Videoabstract available here.
  48. (with A. J. Menezes) Intractable assumptions in cryptography, Proc. 9th International Conf. Finite Fields and Their Applications, Contemporary Mathematics, Vol. 518, 2010, 279-300.
  49. A security weakness in composite-order pairing-based protocols with imbedding degree k>2, available here.
  50. (with A. J. Menezes and I. E. Shparlinski) Discrete logarithms, Diffie-Hellman, and reductions, Vietnam Journal of Mathematics, Vol. 39, 2011, 267-285; available here.
  51. Another look at automated theorem-proving. II, Journal of Mathematical Cryptology, Vol. 5, 2011, 205-224; available here.
  52. (with A. J. Menezes) Another look at security definitions, Advances in Mathematics of Communications, Vol. 7, 2013, 1-38; available here.
  53. (with A. J. Menezes) Another look at HMAC, Journal of Mathematical Cryptology, Vol. 7, 2013, 225-251; available here.
  54. (with A. J. Menezes) Another look at non-uniformity, Groups, Complexity, Cryptology, Vol. 5, No. 2, 2013, 117-139; available here.
  55. (with A. J. Menezes) Another look at security theorems for 1-key nested MACs, Open Problems in Mathematics and Computational Science, Springer-Verlag, 2014, 69-89; available here.
  56. (with A. J. Menezes) The random oracle model: A twenty-year retrospective, Designs, Codes and Cryptography, Vol. 77, 2015, 587-610; available here.

Survey Articles

  1. Number theory and cryptography, in M. Artin, H. Kraft, and R. Remmert, eds., Duration and Change: Fifty Years at Oberwolfach, Springer-Verlag, 1994, 211-236.
  2. Elliptic curve cryptosystems: An overview, Proceedings of Discussion Meeting on Cryptography and Computation (31 August - 1 September, 1995, Jawaharlal Nehru Centre for Advanced Scientific Research, Bangalore), 8 pages.
  3. (with A. Menezes and S. A. Vanstone) The state of elliptic curve cryptography, Designs, Codes and Cryptography, Vol. 19, 2000, 173-194.
  4. A survey of number theory and cryptography, in R. P. Bambah, V. C. Dumir, and R. J. Hans Gill, eds, Number Theory, Indian National Science Academy, 2000, 217-239.
  5. Cryptography, in B. Engquist and W. Schmid, eds., Mathematics Unlimited - 2001 and Beyond, Springer-Verlag, 2001, 749-769.
  6. Some number-theoretic issues in modern cryptography, Newsletter of the Ramanujan Mathematical Society (Madras), Vol. 11, No. 1-2, 2001, 1-14.
  7. Good and bad uses of elliptic curves in cryptography, Moscow Math. Journal, Vol. 2, 2002, 693-715.
  8. (with A. J. Menezes) A survey of public-key cryptosystems, SIAM Review, Vol. 46, 2004, 599-634.
  9. (with A. J. Menezes) Cryptocash, cryptocurrencies, and cryptocontracts, Designs, Codes and Cryptography, Vol. 78, 2016, 87-102.

Other Articles

  1. A mathematical visit to Hanoi, The Mathematical Intelligencer, Vol. 2, No. 1, 1979, 38-42.
  2. The p-adic approach to solutions of equations over finite fields, The American Mathematical Monthly, Vol. 87, 1980, 115-118.
  3. Mathematics as propaganda, in L.A. Steen, ed., Mathematics Tomorrow, Springer-Verlag, New York, 1981.
  4. Why study equations over finite fields?, Mathematics Magazine, May 1982, 144-149.
  5. (with Ann Hibner Koblitz) Mathematics and the external world, an interview with A.T. Fomenko, The Mathematical Intelligencer, Vol. 8, No. 2, 1986, 8-17, 25.
  6. Book review of Ultrametric Calculus: An Introduction to p-adic Analysis by W. H. Schikhof, American Scientist, Vol. 74, 1986, 681-682.
  7. Vietnam after the agony, Frontline (Madras, India), Vol. 4, No. 14 (July 11-24, 1987), 48-56; Triumphs and problems of science in Vietnam, Frontline, Vol. 4, No. 15 (July 25-August 7, 1987), 52-55.
  8. Problems that teach the obvious but difficult, The American Mathematical Monthly, Vol. 95, 1988, 254-257.
  9. A tale of three equations; or the emperors have no clothes, The Mathematical Intelligencer, Vol. 10, No. 1, 1988, 4-11; and: Reply to unclad emperors, ibid., 14-16.
  10. Book review of A Course in Number Theory by H. E. Rose, American Scientist, March 1990.
  11. Three practical applications of algebraic curves, Journal of Sichuan University Natural Science Edition, Vol. 26, Special Issue, December 1989, 28-35.
  12. Book review of Primes of the Form x²+ny²: Fermat, Class Field Theory, and Complex Multiplication by D. A. Cox, Mathematics of Computation, Vol. 56, 1991, 401-403.
  13. Recollections of mathematics in a country under siege, Interview with Professor Hoang Tuy, Director of the Hanoi Mathematical Institute, The Mathematical Intelligencer, Vol. 12, No. 3, 1990, 16-34.
  14. Are student ratings unfair to women?, Association for Women in Mathematics Newsletter, Vol. 20, No. 5, 1990, 17-19.
  15. Mathematics under hardship conditions in the Third World, Notices of the Amer. Math. Soc., Vol. 38, 1991, 1123-1128.
  16. The profit motive: the bane of mathematics education, Humanistic Mathematics Network Journal, No. 7, 1992, 89-92.
  17. (with M. R. Fellows) Kid Krypto, Advances in Cryptology - Crypto '92, Springer-Verlag, 1993, 378-396.
  18. Foreword to Alfred J. Menezes' book Elliptic Curve Public Key Cryptosystems, Kluwer Publishers, 1993.
  19. (with M. R. Fellows and Ann Hibner Koblitz) Cultural aspects of math education reform, Notices of the Amer. Math. Society, Vol. 41, 1994, 5-9.
  20. Math majors learn from sixth grade experience, Paideia, U.W. Office of Undergraduate Education, Spring 1994.
  21. Book review of Multicultural Mathematics by David Nelson et al., American Scientist, Vol. 83 (March-April 1995), 194-195.
  22. The case against computers in K-13 math education (kindergarten through calculus), The Mathematical Intelligencer, Vol. 18, No. 1, 1996, 9-16.
  23. Cryptography as a teaching tool, Cryptologia, Vol. 21, 1997, 317-326.
  24. Book review of Discrete Mathematics in the Schools, edited by J. G. Rosenstein, D. S. Franzblau, and F. S. Roberts, SIGACT News (publication of the ACM Special Interest Group on Automata and Computability Theory), Vol. 29, No. 1, 1998, 8-12.
  25. (with Tim Bell, Michael Fellows, Matthew Powell, Harold Thimbleby, and Ian Witten) Explaining cryptographic systems to the general public, IFIP First World Conference on Information Security Education, 1999, 221-233. Also in: Computers and Education, Vol. 40, 2003, 199-215.
  26. (with Ann Hibner Koblitz) The Kovalevskaia Fund, The Mathematical Intelligencer, Vol. 22, No. 2, 2000, 62-65.
  27. (with Ann Hibner Koblitz) Book review of In Code: A Voyage of Mathematical Discovery by Sarah and David Flannery, London Times Higher Education Supplement, Nov. 10, 2000.
  28. Essay-review of three books on cryptography, Amer. Math. Monthly, Vol. 108, 2001, 983-988.
  29. Book review of Radical Equations: Math Literacy and Civil Rights by Robert P. Moses and Charles E. Cobb Jr. (Beacon Press, 2001), Notices of the Amer. Math. Society, Vol. 49, 2002, 328-332.
  30. Book review of El Ultimo Secreto de Colonia Dignidad by Carlos Basso, Notices of the Amer. Math. Society, Vol. 51, 2004, 32-33.
  31. The uneasy relationship between mathematics and cryptography, Notices of the Amer. Math. Society, Vol. 54, 2007, 972-979; available here.
  32. Book review of Elliptic Curves: Number Theory and Cryptography, 2nd Edition, by L. C. Washington, SIAM Review, Vol. 51, 2009, 230-231.
  33. (with A. J. Menezes) The brave new world of bodacious assumptions in cryptography, Notices of the Amer. Math. Society, Vol. 57, 2010, 357-365; available here.
  34. Secret codes and online security: A seminar for entering students, Cryptologia, Vol. 34, 2010, 145-154.
  35. Book review of Decrypted Secrets: Methods and Maxims of Cryptology, 4th Edition, by F. L. Bauer, SIAM Review, Vol. 52, 2010, 777-778.
  36. Interview with Professor Ngo Bao Chau, The Mathematical Intelligencer, Vol. 33, No. 1, 2011, 46-50; available here.
  37. "The Word for World is Forest": A long-range funding source for women in math in developing countries, The Mathematical Intelligencer, Vol. 33, No. 4, 2011, 21-24; available here.
  38. Crypto galore!, in H. L. Bodlaender, R. Downey, F. V. Fomin, and D. Marx (eds.), The Multivariate Algorithmic Revolution and Beyond: Essays Dedicated to Michael R. Fellows on the Occasion of His 60th Birthday, LNCS 7370, Springer-Verlag, 2012, 39-50.
  39. Grothendieck's 1967 lectures in the forest in Vietnam, The Mathematical Intelligencer, Vol. 35, No. 2, 2013, 32-34; available here.
  40. (with F. Verhulst and S. Krantz) Hype! An exchange of views, The Mathematical Intelligencer, Vol. 36, No. 3, 2014, 8-13; available here. \end{document}

Return to my home page.
Return to Math Department home page.