![]() |
![]() |
Your cart is empty |
||
Books > Science & Mathematics > Mathematics > Number theory
The book is primarily intended as a textbook on modern algebra for undergraduate mathematics students. It is also useful for those who are interested in supplementary reading at a higher level. The text is designed in such a way that it encourages independent thinking and motivates students towards further study. The book covers all major topics in group, ring, vector space and module theory that are usually contained in a standard modern algebra text. In addition, it studies semigroup, group action, Hopf's group, topological groups and Lie groups with their actions, applications of ring theory to algebraic geometry, and defines Zariski topology, as well as applications of module theory to structure theory of rings and homological algebra. Algebraic aspects of classical number theory and algebraic number theory are also discussed with an eye to developing modern cryptography. Topics on applications to algebraic topology, category theory, algebraic geometry, algebraic number theory, cryptography and theoretical computer science interlink the subject with different areas. Each chapter discusses individual topics, starting from the basics, with the help of illustrative examples. This comprehensive text with a broad variety of concepts, applications, examples, exercises and historical notes represents a valuable and unique resource.
Nolan Wallach's mathematical research is remarkable in both its breadth and depth. His contributions to many fields include representation theory, harmonic analysis, algebraic geometry, combinatorics, number theory, differential equations, Riemannian geometry, ring theory, and quantum information theory. The touchstone and unifying thread running through all his work is the idea of symmetry. This volume is a collection of invited articles that pay tribute to Wallach's ideas, and show symmetry at work in a large variety of areas. The articles, predominantly expository, are written by distinguished mathematicians and contain sufficient preliminary material to reach the widest possible audiences. Graduate students, mathematicians, and physicists interested in representation theory and its applications will find many gems in this volume that have not appeared in print elsewhere. Contributors: D. Barbasch, K. Baur, O. Bucicovschi, B. Casselman, D. Ciubotaru, M. Colarusso, P. Delorme, T. Enright, W.T. Gan, A Garsia, G. Gour, B. Gross, J. Haglund, G. Han, P. Harris, J. Hong, R. Howe, M. Hunziker, B. Kostant, H. Kraft, D. Meyer, R. Miatello, L. Ni, G. Schwarz, L. Small, D. Vogan, N. Wallach, J. Wolf, G. Xin, O. Yacobi.
Exploring the Riemann Zeta Function: 190 years from Riemann's Birth presents a collection of chapters contributed by eminent experts devoted to the Riemann Zeta Function, its generalizations, and their various applications to several scientific disciplines, including Analytic Number Theory, Harmonic Analysis, Complex Analysis, Probability Theory, and related subjects. The book focuses on both old and new results towards the solution of long-standing problems as well as it features some key historical remarks. The purpose of this volume is to present in a unified way broad and deep areas of research in a self-contained manner. It will be particularly useful for graduate courses and seminars as well as it will make an excellent reference tool for graduate students and researchers in Mathematics, Mathematical Physics, Engineering and Cryptography.
This book is the English translation of Baumgart's thesis on the early proofs of the quadratic reciprocity law ("UEber das quadratische Reciprocitatsgesetz. Eine vergleichende Darstellung der Beweise"), first published in 1885. It is divided into two parts. The first part presents a very brief history of the development of number theory up to Legendre, as well as detailed descriptions of several early proofs of the quadratic reciprocity law. The second part highlights Baumgart's comparisons of the principles behind these proofs. A current list of all known proofs of the quadratic reciprocity law, with complete references, is provided in the appendix. This book will appeal to all readers interested in elementary number theory and the history of number theory.
This book is summarizing the results of the workshop "Uniform Distribution and Quasi-Monte Carlo Methods" of the RICAM Special Semester on "Applications of Algebra and Number Theory" in October 2013. The survey articles in this book focus on number theoretic point constructions, uniform distribution theory, and quasi-Monte Carlo methods. As deterministic versions of the Monte Carlo method, quasi-Monte Carlo rules enjoy increasing popularity, with many fruitful applications in mathematical practice, as for example in finance, computer graphics, and biology. The goal of this book is to give an overview of recent developments in uniform distribution theory, quasi-Monte Carlo methods, and their applications, presented by leading experts in these vivid fields of research.
Three major branches of number theory are included in the volume: namely analytic number theory, algebraic number theory, and transcendental number theory. Original research is presented that discusses modern techniques and survey papers from selected academic scholars.
As a first comprehensive overview on Farey sequences and subsequences, this monograph is intended as a reference for anyone looking for specific material or formulas related to the subject. Duality of subsequences and maps between them are discussed and explicit proofs are shown in detail. From the Content Basic structural and enumerative properties of Farey sequences, Collective decision making, Committee methods in pattern recognition, Farey duality, Farey sequence, Fundamental Farey subsequences, Monotone bijections between Farey subsequences
The algebraic techniques developed by Kakde will almost certainly lead eventually to major progress in the study of congruences between automorphic forms and the main conjectures of non-commutative Iwasawa theory for many motives. Non-commutative Iwasawa theory has emerged dramatically over the last decade, culminating in the recent proof of the non-commutative main conjecture for the Tate motive over a totally real p-adic Lie extension of a number field, independently by Ritter and Weiss on the one hand, and Kakde on the other. The initial ideas for giving a precise formulation of the non-commutative main conjecture were discovered by Venjakob, and were then systematically developed in the subsequent papers by Coates-Fukaya-Kato-Sujatha-Venjakob and Fukaya-Kato. There was also parallel related work in this direction by Burns and Flach on the equivariant Tamagawa number conjecture. Subsequently, Kato discovered an important idea for studying the K_1 groups of non-abelian Iwasawa algebras in terms of the K_1 groups of the abelian quotients of these Iwasawa algebras. Kakde's proof is a beautiful development of these ideas of Kato, combined with an idea of Burns, and essentially reduces the study of the non-abelian main conjectures to abelian ones. The approach of Ritter and Weiss is more classical, and partly inspired by techniques of Frohlich and Taylor. Since many of the ideas in this book should eventually be applicable to other motives, one of its major aims is to provide a self-contained exposition of some of the main general themes underlying these developments. The present volume will be a valuable resource for researchers working in both Iwasawa theory and the theory of automorphic forms.
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
This book gathers nineteen papers presented at the first NLAGA-BIRS Symposium, which was held at the Cheikh Anta Diop University in Dakar, Senegal, on June 24-28, 2019. The four-day symposium brought together African experts on nonlinear analysis and geometry and their applications, as well as their international partners, to present and discuss mathematical results in various areas. The main goal of the NLAGA project is to advance and consolidate the development of these mathematical fields in West and Central Africa with a focus on solving real-world problems such as coastal erosion, pollution, and urban network and population dynamics problems. The book addresses a range of topics related to partial differential equations, geometrical analysis of optimal shapes, geometric structures, optimization and optimal transportation, control theory, and mathematical modeling.
This monograph describes and implements partially homomorphic encryption functions using a unified notation. After introducing the appropriate mathematical background, the authors offer a systematic examination of the following known algorithms: Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh; Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik; Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years partially and fully homomorphic encryption algorithms have been proposed and researchers have addressed issues related to their formulation, arithmetic, efficiency and security. Formidable efficiency barriers remain, but we now have a variety of algorithms that can be applied to various private computation problems in healthcare, finance and national security, and studying these functions may help us to understand the difficulties ahead. The book is valuable for researchers and graduate students in Computer Science, Engineering, and Mathematics who are engaged with Cryptology.
This richly illustrated textbook explores the amazing interaction between combinatorics, geometry, number theory, and analysis which arises in the interplay between polyhedra and lattices. Highly accessible to advanced undergraduates, as well as beginning graduate students, this second edition is perfect for a capstone course, and adds two new chapters, many new exercises, and updated open problems. For scientists, this text can be utilized as a self-contained tooling device. The topics include a friendly invitation to Ehrhart's theory of counting lattice points in polytopes, finite Fourier analysis, the Frobenius coin-exchange problem, Dedekind sums, solid angles, Euler-Maclaurin summation for polytopes, computational geometry, magic squares, zonotopes, and more. With more than 300 exercises and open research problems, the reader is an active participant, carried through diverse but tightly woven mathematical fields that are inspired by an innocently elementary question: What are the relationships between the continuous volume of a polytope and its discrete volume? Reviews of the first edition: "You owe it to yourself to pick up a copy of Computing the Continuous Discretely to read about a number of interesting problems in geometry, number theory, and combinatorics." - MAA Reviews "The book is written as an accessible and engaging textbook, with many examples, historical notes, pithy quotes, commentary integrating the mate rial, exercises, open problems and an extensive bibliography." - Zentralblatt MATH "This beautiful book presents, at a level suitable for advanced undergraduates, a fairly complete introduction to the problem of counting lattice points inside a convex polyhedron." - Mathematical Reviews "Many departments recognize the need for capstone courses in which graduating students can see the tools they have acquired come together in some satisfying way. Beck and Robins have written the perfect text for such a course." - CHOICE
This volume is dedicated to Robert F. Tichy on the occasion of his 60th birthday. Presenting 22 research and survey papers written by leading experts in their respective fields, it focuses on areas that align with Tichy's research interests and which he significantly shaped, including Diophantine problems, asymptotic counting, uniform distribution and discrepancy of sequences (in theory and application), dynamical systems, prime numbers, and actuarial mathematics. Offering valuable insights into recent developments in these areas, the book will be of interest to researchers and graduate students engaged in number theory and its applications.
This collaborative book presents recent trends on the study of sequences, including combinatorics on words and symbolic dynamics, and new interdisciplinary links to group theory and number theory. Other chapters branch out from those areas into subfields of theoretical computer science, such as complexity theory and theory of automata. The book is built around four general themes: number theory and sequences, word combinatorics, normal numbers, and group theory. Those topics are rounded out by investigations into automatic and regular sequences, tilings and theory of computation, discrete dynamical systems, ergodic theory, numeration systems, automaton semigroups, and amenable groups. This volume is intended for use by graduate students or research mathematicians, as well as computer scientists who are working in automata theory and formal language theory. With its organization around unified themes, it would also be appropriate as a supplemental text for graduate level courses.
This book discusses the mathematical interests of Joachim Schwermer, who throughout his career has focused on the cohomology of arithmetic groups, automorphic forms and the geometry of arithmetic manifolds. To mark his 66th birthday, the editors brought together mathematical experts to offer an overview of the current state of research in these and related areas. The result is this book, with contributions ranging from topology to arithmetic. It probes the relation between cohomology of arithmetic groups and automorphic forms and their L-functions, and spans the range from classical Bianchi groups to the theory of Shimura varieties. It is a valuable reference for both experts in the fields and for graduate students and postdocs wanting to discover where the current frontiers lie.
The book provides a self-contained introduction to classical Number Theory. All the proofs of the individual theorems and the solutions of the exercises are being presented step by step. Some historical remarks are also presented. The book will be directed to advanced undergraduate, beginning graduate students as well as to students who prepare for mathematical competitions (ex. Mathematical Olympiads and Putnam Mathematical competition).
This volume marks the 20th anniversary of the New York Number Theory Seminar (NYNTS). Beginning in 1982, the NYNTS has tried to present a broad spectrum of research in number theory and related fields of mathematics, from physics to geometry to combinatorics and computer science. The list of seminar speakers includes not only Fields Medallists and other established researchers, but also many other younger and less well known mathematicians whose theorems are significant and whose work may become the next big thing in number theory.
Spinors are used extensively in physics. It is widely accepted that they are more fundamental than tensors, and the easy way to see this is through the results obtained in general relativity theory by using spinors -- results that could not have been obtained by using tensor methods only. The foundation of the concept of spinors is groups; spinors appear as representations of groups. This textbook expounds the relationship between spinors and representations of groups. As is well known, spinors and representations are both widely used in the theory of elementary particles. The authors present the origin of spinors from representation theory, but nevertheless apply the theory of spinors to general relativity theory, and part of the book is devoted to curved space-time applications. Based on lectures given at Ben Gurion University, this textbook is intended for advanced undergraduate and graduate students in physics and mathematics, as well as being a reference for researchers.
This volume, as Andrew M. Odlzyko writes in the foreword, commemorates and celebrates the life and achievements of an extraordinary person. Originally conceived as an 80th birthday tribute to Herbert Wilf, the well-known combinatorialist, the book has evolved beyond the proceeds of the W80 tribute. Professor Wilf was an award-winning teacher, who was supportive of women mathematicians, and who had an unusually high proportion of women among his PhD candidates. He was Editor-in-chief of the American Mathematical Monthly and a founder of both the Journal of Algorithms and of the Electronic Journal of Combinatorics. But he was first a researcher, driven by his desire to know and explain the inner workings of the mathematical world. The book collects high-quality, refereed research contributions by some of Professor Wilf s colleagues, students, and collaborators. Many of the papers presented here were featured in the Third Waterloo Workshop on Computer Algebra (WWCA 2011, W80), held May 26-29, 2011 at Wilfrid Laurier University, Waterloo, Canada. Others were included because of their relationship to his important work in combinatorics. All are presented as a tribute to Herb Wilf s contributions to mathematics and mathematical life."
This volume presents the collection of mathematical articles by Martin Kneser, reprinted in the original language - mostly German -, including one yet unpublished. Moreover, also included is an article by Raman Parimala, discussing Kneser's work concerning algebraic groups and the Hasse principle, which has been written especially for this volume, as well as an article by Rudolf Scharlau about Kneser's work on quadratic forms, published elsewhere before. Another commentary article, written by Gunter M. Ziegler especially for this volume, describes the astounding influence on the field of combinatorics of what was published as "Aufgabe 360" and its subsequent solution in 1955 resp. 1957 in the "Jahresbericht der Deutschen Mathematiker-Vereinigung". However, as the titles of the articles show, Kneser's mathematical interests were much broader, which is beautifully discussed in an obituary by Ulrich Stuhler, included as well in this volume.
The main topics of this volume, dedicated to Lance Littlejohn, are operator and spectral theory, orthogonal polynomials, combinatorics, number theory, and the various interplays of these subjects. Although the event, originally scheduled as the Baylor Analysis Fest, had to be postponed due to the pandemic, scholars from around the globe have contributed research in a broad range of mathematical fields. The collection will be of interest to both graduate students and professional mathematicians. Contributors are: G.E. Andrews, B.M. Brown, D. Damanik, M.L. Dawsey, W.D. Evans, J. Fillman, D. Frymark, A.G. Garcia, L.G. Garza, F. Gesztesy, D. Gomez-Ullate, Y. Grandati, F.A. Grunbaum, S. Guo, M. Hunziker, A. Iserles, T.F. Jones, K. Kirsten, Y. Lee, C. Liaw, F. Marcellan, C. Markett, A. Martinez-Finkelshtein, D. McCarthy, R. Milson, D. Mitrea, I. Mitrea, M. Mitrea, G. Novello, D. Ong, K. Ono, J.L. Padgett, M.M.M. Pang, T. Poe, A. Sri Ranga, K. Schiefermayr, Q. Sheng, B. Simanek, J. Stanfill, L. Velazquez, M. Webb, J. Wilkening, I.G. Wood, M. Zinchenko.
Ring theory provides the algebraic underpinnings for many areas of mathematics, computer science, and physics. For example, ring theory appears in: functional analysis; algebraic topology; algebraic number theory; coding theory; and in the study of quantum theory. This volume is a collection of research papers, many presented at the 3rd Korea-China-Japan International Symposium on Ring Theory held jointly with the 2nd Korea-Japan Ring Theory Seminar, in Korea, The articles examine wide-ranging developments and methodologies in various areas, including classical Hopf algebras and quantum groups.
The aim of this book is to provide a comprehensive account of higher dimensional Nevanlinna theory and its relations with Diophantine approximation theory for graduate students and interested researchers. This book with nine chapters systematically describes Nevanlinna theory of meromorphic maps between algebraic varieties or complex spaces, building up from the classical theory of meromorphic functions on the complex plane with full proofs in Chap. 1 to the current state of research. Chapter 2 presents the First Main Theorem for coherent ideal sheaves in a very general form. With the preparation of plurisubharmonic functions, how the theory to be generalized in a higher dimension is described. In Chap. 3 the Second Main Theorem for differentiably non-degenerate meromorphic maps by Griffiths and others is proved as a prototype of higher dimensional Nevanlinna theory. Establishing such a Second Main Theorem for entire curves in general complex algebraic varieties is a wide-open problem. In Chap. 4, the Cartan-Nochka Second Main Theorem in the linear projective case and the Logarithmic Bloch-Ochiai Theorem in the case of general algebraic varieties are proved. Then the theory of entire curves in semi-abelian varieties, including the Second Main Theorem of Noguchi-Winkelmann-Yamanoi, is dealt with in full details in Chap. 6. For that purpose Chap. 5 is devoted to the notion of semi-abelian varieties. The result leads to a number of applications. With these results, the Kobayashi hyperbolicity problems are discussed in Chap. 7. In the last two chapters Diophantine approximation theory is dealt with from the viewpoint of higher dimensional Nevanlinna theory, and the Lang-Vojta conjecture is confirmed in some cases. In Chap. 8 the theory over function fields is discussed. Finally, in Chap. 9, the theorems of Roth, Schmidt, Faltings, and Vojta over number fields are presented and formulated in view of Nevanlinna theory with results motivated by those in Chaps. 4, 6, and 7. |
![]() ![]() You may like...
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
C++ How to Program: Horizon Edition
Harvey Deitel, Paul Deitel
Paperback
R1,917
Discovery Miles 19 170
Programming for Computations - Python
Hans Petter Langtangen, Svein Linge
Hardcover
R1,627
Discovery Miles 16 270
Analog and Mixed-Signal Hardware…
A. Vachoux, Jean-Michel Berge, …
Hardcover
R2,971
Discovery Miles 29 710
|