10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

206 Bibliography[222] Oscar Seymour Rothaus. On "bent" functions. J. Comb. Theory, Ser. A, 20(3):300–305,1976. (Cited on pages 13 and 96.)[223] Jean-Jacques Rousseau. Les confessions. Les confessions. s.n., 1782. (Cited on page 95.)[224] Frank Ruskey. Combinatorial Generation. Unpublished manuscript, 2003. Working Version(1j-CSC 425/520). (Cited on page 89.)[225] Frank Ruskey, Carla Diane Savage, and Terry Min Yih Wang. Generating necklaces. J.Algorithms, 13(3):414–430, 1992. (Cited on page 89.)[226] Sondre Rønjom and Tor Helleseth. A new attack on the filter generator. IEEE Transactionson Information Theory, 53(5):1752–1758, 2007. (Cited on pages 10 and 219.)[227] Peter Sarnak. Selberg’s eigenvalue conjecture. Notices Amer. Math. Soc., 42(11):1272–1277,1995. (Cited on page 153.)[228] Takakazu Satoh. The canonical lift of an ordinary elliptic curve over a finite field andits point counting. J. Ramanujan Math. Soc., 15(4):247–270, 2000. (Cited on pages 107and 121.)[229] Takakazu Satoh, Berit Skjernaa, and Yuichiro Taguchi. Fast computation of canonical liftsof elliptic curves and its application to point counting. Finite Fields Appl., 9(1):89–101,2003. (Cited on page 107.)[230] Reinhard Schertz. Weber’s class invariants revisited. J. Théor. Nombres Bor<strong>de</strong>aux, 14(1):325–343, 2002. (Cited on page 153.)[231] René Schoof. Elliptic curves over finite fields and the computation of square roots mod p.Math. Comp., 44(170):483–494, 1985. (Cited on page 107.)[232] René Schoof. Nonsingular plane cubic curves over finite fields. J. Comb. Theory, Ser. A,46(2):183–211, 1987. (Cited on pages 104 and 146.)[233] René Schoof. Counting points on elliptic curves over finite fields. J. Théor. NombresBor<strong>de</strong>aux, 7(1):219–254, 1995. Les Dix-huitièmes Journées Arithmétiques (Bor<strong>de</strong>aux, 1993).(Cited on page 107.)[234] Jean-Pierre Serre. Géométrie algébrique et géométrie analytique. Ann. Inst. Fourier,Grenoble, 6:1–42, 1955–1956. (Cited on page 167.)[235] Adi Shamir. I<strong>de</strong>ntity-based cryptosystems and signature schemes. In CRYPTO, pages47–53, 1984. (Cited on page 156.)[236] Clau<strong>de</strong> Elwood Shannon. Communication theory of secrecy systems. Bell System Tech. J.,28:656–715, 1949. (Cited on page 8.)[237] Goro Shimura. Introduction to the arithmetic theory of automorphic functions, volume 11 ofPublications of the Mathematical Society of Japan. Princeton University Press, Princeton,NJ, 1994. Reprint of the 1971 original, Kanô Memorial Lectures, 1. (Cited on pages 178and 240.)[238] Goro Shimura. Abelian varieties with complex multiplication and modular functions, volume46 of Princeton Mathematical Series. Princeton University Press, Princeton, NJ, 1998.(Cited on pages 160, 162, 165, 177, 178, 179, 180, and 241.)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!