Elliptic functions

Results: 192



#Item
1Review of  Elliptic curves, by Anthony W. Knapp This book is about elliptic curves and modular functions, two topics that are intimately related in both accidental and essential ways. As emphasized by Andr´e Weil in his

Review of Elliptic curves, by Anthony W. Knapp This book is about elliptic curves and modular functions, two topics that are intimately related in both accidental and essential ways. As emphasized by Andr´e Weil in his

Add to Reading List

Source URL: sunsite.ubc.ca

Language: English - Date: 2001-05-12 20:16:30
    2Update: May 5, 2016 ALGEBRAIC INDEPENDENCE OF PERIODS OF ELLIPTIC FUNCTIONS MICHEL WALDSCHMIDT Abstract. This text is based on notes (taken by R. Thangadurai) of three courses given at Goa University on December 15 and 1

    Update: May 5, 2016 ALGEBRAIC INDEPENDENCE OF PERIODS OF ELLIPTIC FUNCTIONS MICHEL WALDSCHMIDT Abstract. This text is based on notes (taken by R. Thangadurai) of three courses given at Goa University on December 15 and 1

    Add to Reading List

    Source URL: webusers.imj-prg.fr

    Language: English - Date: 2016-05-06 03:35:36
      3arXiv:0901.1379v2 [math.CA] 31 MayPSEUDO-FACTORIALS, ELLIPTIC FUNCTIONS, AND CONTINUED FRACTIONS ROLAND BACHER AND PHILIPPE FLAJOLET

      arXiv:0901.1379v2 [math.CA] 31 MayPSEUDO-FACTORIALS, ELLIPTIC FUNCTIONS, AND CONTINUED FRACTIONS ROLAND BACHER AND PHILIPPE FLAJOLET

      Add to Reading List

      Source URL: algo.inria.fr

      Language: English - Date: 2009-05-31 11:37:26
        4On polynomials attached to curves F. Morain Laboratoire d’Informatique de l’École polytechnique logoUW ECOL E

        On polynomials attached to curves F. Morain Laboratoire d’Informatique de l’École polytechnique logoUW ECOL E

        Add to Reading List

        Source URL: www.lix.polytechnique.fr

        Language: English - Date: 2009-02-22 19:27:27
        51. Introduction 1.1. Background. L-functions and modular forms underlie much of twentieth century number theory and are connected to the practical applications of number theory in cryptography. The fundamental importance

        1. Introduction 1.1. Background. L-functions and modular forms underlie much of twentieth century number theory and are connected to the practical applications of number theory in cryptography. The fundamental importance

        Add to Reading List

        Source URL: www.williamstein.org

        Language: English - Date: 2009-02-03 20:12:03
        6Relaxation Notes jplewis General strategy: elliptic form (my term) such as ∇2 f = 0 also has a corresponding formulation which R eq ’static’

        Relaxation Notes jplewis General strategy: elliptic form (my term) such as ∇2 f = 0 also has a corresponding formulation which R eq ’static’

        Add to Reading List

        Source URL: scribblethink.org

        Language: English - Date: 2008-03-24 23:35:11
        7A generalisation of Miller’s algorithm and applications to pairing computations on abelian varieties David Lubicz1,2 , Damien Robert3 1

        A generalisation of Miller’s algorithm and applications to pairing computations on abelian varieties David Lubicz1,2 , Damien Robert3 1

        Add to Reading List

        Source URL: www.normalesup.org

        Language: English - Date: 2014-06-09 16:46:59
        8TRACES OF CLASS INVARIANTS DAEYEOL JEON, SOON-YI KANG*, CHANG HEON KIM Abstract. Zagier showed that the traces of singular values of the modular j-invariant are Fourier coefficients of a weakly holomorphic modular form o

        TRACES OF CLASS INVARIANTS DAEYEOL JEON, SOON-YI KANG*, CHANG HEON KIM Abstract. Zagier showed that the traces of singular values of the modular j-invariant are Fourier coefficients of a weakly holomorphic modular form o

        Add to Reading List

        Source URL: staff.miyakyo-u.ac.jp

        Language: English - Date: 2008-10-24 01:33:36
        9Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

        Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

        Add to Reading List

        Source URL: www.normalesup.org

        Language: English - Date: 2014-08-03 16:15:38
        10ES 111 Mathematical Methods in the Earth Sciences Lecture Outline 17 - Thurs 19th Nov 2015 Higher-Order Partial Differential Equations The last differential equation topic we are going to mention is higher-order PDE’s.

        ES 111 Mathematical Methods in the Earth Sciences Lecture Outline 17 - Thurs 19th Nov 2015 Higher-Order Partial Differential Equations The last differential equation topic we are going to mention is higher-order PDE’s.

        Add to Reading List

        Source URL: www.es.ucsc.edu

        Language: English - Date: 2015-11-16 14:32:21