Description
I will describe an algorithm for computing the zeta function of an arbitrary hyperelliptic curve in characteristic 2. This is a generalisation of an earlier method of myself and Wan, which tackled a restricted class of curves. The algorithm reduces the problem to that of computing the L-function of an additive character sum over an open subset of the projective line. This latter task can be achieved using the Dwork-Reich trace formula, Dwork's analytic construction of an additive character, and a method for `cohomological reduction' similar to the `Hermite reduction' algorithm used in the symbolic integration of rational functions. The talk is based upon joint work with Daqing Wan. See http://web.comlab.ox.ac.uk/oucl/work/alan.lauder/ for a version of the earlier paper, which has now appeared in LMS JCM, and also two other related papers.
Prochains exposés
-
Dual attacks in code-based (and lattice-based) cryptography
Orateur : Charles Meyer-Hilfiger - Inria Rennes
The hardness of the decoding problem and its generalization, the learning with errors problem, are respectively at the heart of the security of the Post-Quantum code-based scheme HQC and the lattice-based scheme Kyber. Both schemes are to be/now NIST standards. These problems have been actively studied for decades, and the complexity of the state-of-the-art algorithms to solve them is crucially[…]-
Cryptography
-
-
Lie algebras and the security of cryptosystems based on classical varieties in disguise
Orateur : Mingjie Chen - KU Leuven
In 2006, de Graaf et al. proposed a strategy based on Lie algebras for finding a linear transformation in the projective linear group that connects two linearly equivalent projective varieties defined over the rational numbers. Their method succeeds for several families of “classical” varieties, such as Veronese varieties, which are known to have large automorphism groups. In this talk, we[…]-
Cryptography
-