# Publications Citing Sage

Below is a list of publications that cite Sage and/or the Sage cluster. This list is also available in BibTeX format. The publications listed in each section are sorted in chronological order. Where two or more items are published in the same year, these items are sorted alphabetically by the authors' last names. See the section Citing Sage for information on how to cite Sage and/or the Sage cluster in your publications.

## Articles

1. William Stein and David Joyner. SAGE: System for Algebra and Geometry Experimentation. ACM SIGSAM Bulletin, volume 39, number 2, pages 61--64, 2005.
2. Timothy Brock. Linear Feedback Shift Registers and Cyclic Codes in SAGE. Rose-Hulman Undergraduate Mathematics Journal, volume 7, number 2, 2006.
3. John Cremona. The Elliptic Curve Database for Conductors to 130000. In Florian Hess, Sebastian Pauli, and Michael Pohst (ed.). ANTS VII: Proceedings of the 7th International Symposium on Algorithmic Number Theory. Springer, Lecture Notes in Computer Science, volume 4076, pages 11--29, 2006.
4. David Joyner and Amy Ksir. Automorphism Groups of Some AG codes. IEEE Transactions on Information Theory, volume 52, pages 3325--3329, 2006.
5. Barry Mazur. Controlling Our Errors. Nature, volume 443, number 7, pages 38--40, 2006.
6. Jaap Spies. Dancing School Problems. Nieuw Archief voor Wiskunde, volume 5/7, number 4, pages 283--285, 2006.
7. Baur Bektemirov, Barry Mazur, William Stein, and Mark Watkins. Average Ranks of Elliptic Curves: Tension Between Data and Conjecture. Bulletin of the AMS, volume 44, number 2, pages 233--254, 2007.
8. Dan Boneh, Craig Gentry, and Michael Hamburg. Space-Efficient Identity Based Encryption Without Pairings. FOCS 2007: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science. IEEE Computer Society, pages 647--657, 2007.
9. Dragos Cvetkovic and Jason Grout. Graphs with Extremal Energy Should Have a Small Number of Distinct Eigenvalues. Bull. Acad. Serbe Sci. Arts, Cl. Sci. Math. Natur., Sci. Math., volume 134, number 32, pages 43--57, 2007.
10. David Harvey. Kedlaya's Algorithm in Larger Characteristic. International Mathematics Research Notices, volume 2007, number rnm095, pages rnm095--29, 2007.
11. David Joyner and William Stein. Open Source Mathematical Software. Notices of the AMS, volume 54, number 10, pages 1279, 2007.
12. Chris A. Kurth and Ling Long. Computations with Finite Index Subgroups of PSL_2(Z) Using Farey Symbols. In K. P. Shum, E. Zelmanov, Jiping Zhang, and Li Shangzhi (ed.). Proceedings of the Second International Congress in Algebra and Combinatorics. World Scientific, pages 225--242, 2007.
13. Martin Albrecht. Algebraic Attacks on the Courtois Toy Cipher. Cryptologia, volume 32, number 3, pages 220--276, 2008.
14. Daniel J. Bernstein, Tanja Lange, and Reza Rezaeian Farashahi. Binary Edwards Curves. In Elisabeth Oswald and Pankaj Rohatgi (ed.). CHES 2008: Proceedings of the 10th International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Lecture Notes in Computer Science, volume 5154, pages 244--265, 2008.
15. Daniel J. Bernstein, Peter Birkner, Marc Joye, Tanja Lange, and Christiane Peters. Twisted Edwards Curves. In Serge Vaudenay (ed.). AFRICACRYPT 2008: First International Conference on Cryptology in Africa. Springer, Lecture Notes in Computer Science, volume 5023, pages 389--405, 2008.
16. Michael Gray. Sage: A New Mathematics Software System. Computing in Science & Engineering, volume 10, number 6, pages 72--75, 2008.
17. Carlo Hämäläinen. Partitioning 3-homogeneous latin bitrades. Geometriae Dedicata, volume 133, number 1, pages 181--193, 2008.
18. David Harvey. Efficient Computation of p-adic Heights. LMS Journal of Computation and Mathematics, volume 11, pages 40--59, 2008.
19. David Joyner. On Quadratic Residue Codes and Hyperelliptic Curves. Discrete Mathematics & Theoretical Computer Science, volume 10, number 1, pages 129--146, 2008.
20. David Joyner and David Kohel. Group Theory in SAGE. In Luise-Charlotte Kappe, Arturo Magidin, and Robert Morse (ed.). Computational Group Theory and the Theory of Groups. American Mathematical Society, pages 115--140, 2008.
21. David Joyner. A Primer on Computational Group Homology and Cohomology Using GAP and SAGE. In Benjamin Fine, Gerhard Rosenberger, and Dennis Spellman (ed.). Proceedings of the Gaglione Conference on Aspects of Infinite Groups. World Scientific, pages 159--191, 2008.
22. Daniel Kane and Steven Sivek. On the S_n-modules Generated by Partitions of a Given Shape. Electronic Journal of Combinatorics, volume 15, number 1, 2008.
23. Kiran S. Kedlaya. Search Techniques for Root-Unitary Polynomials. In Kristin E. Lauter and Kenneth A. Ribet (ed.). Computational Arithmetic Geometry. American Mathematical Society, pages 71--81, 2008.
24. Kiran S. Kedlaya and Andrew V. Sutherland. Computing L-Series of Hyperelliptic Curves. In Alfred J. van der Poorten and Andreas Stein (ed.). Proceedings of the 8th International Symposium on Algorithmic Number Theory. Springer, Lecture Notes in Computer Science, volume 5011, pages 312--326, 2008.
25. Koopa Koo, William Stein, and Gabor Wiese. On the Generation of the Coefficient Field of a Newform by a Single Hecke Eigenvalue. Journal de Théorie des Nombres de Bordeaux, volume 20, number 2, pages 373--384, 2008.
26. David Loeffler. Explicit Calculations of Automorphic Forms for Definite Unitary Groups. LMS Journal of Computation and Mathematics, volume 11, pages 326--342, 2008.
27. Subhamoy Maitra and Santanu Sarkar. Revisiting Wiener's Attack -- New Weak Keys in RSA. In Tzong-ChenWu, Chin-Laung Lei, Vincent Rijmen, and Der-Tsai Lee (ed.). Proceedings of the 11th International Conference on Information Security. Springer, Lecture Notes in Computer Science, volume 5222, pages 228--243, 2008.
28. Subhamoy Maitra and Santanu Sarkar. A New Class of Weak Encryption Exponents in RSA. In Dipanwita Roy Chowdhury, Vincent Rijmen, and Abhijit Das (ed.). Proceedings of the 9th International Conference on Cryptology in India Kharagpur. Springer, Lecture Notes in Computer Science, volume 5365, pages 337--349, 2008.
29. Barry Mazur. Finding Meaning in Error Terms. Bulletin of the American Mathematical Society, volume 45, number 2, pages 185--228, 2008.
30. Jonathan Sondow and Kyle Schalm. Which Partial Sums of the Taylor Series for e are convergents to e? (and a Link to the Primes 2, 5, 13, 37, 463). In T. Amdeberhan and V. Moll (ed.). Tapas in Experimental Mathematics. American Mathematical Society, pages 273--284, 2008.
31. William Stein. Can We Create A Viable Free Open Source Alternative to Magma, Maple, Mathematica and Matlab?. In J. Rafael Sendra and Laureano González-Vega (ed.). ISSAC 2008: Proceedings of the International Symposium on Symbolic and Algebraic Computation. Association for Computing Machinery, pages 5--6, 2008.
32. John Voight. Enumeration of Totally Real Number Fields of Bounded Root Discriminant. In Alfred J. van der Poorten and Andreas Stein (ed.). Proceedings of the 8th International Symposium on Algorithmic Number Theory. Springer, Lecture Notes in Computer Science, volume 5011, pages 268--281, 2008.
33. Martin Albrecht and Carlos Cid. Algebraic Techniques in Differential Cryptanalysis. In Orr Dunkelman (ed.). FSE 2009: Proceedings of the 16th International Workshop on Fast Software Encryption. Springer, Lecture Notes in Computer Science, volume 5665, pages 193--208, 2009.
34. Martin Albrecht, Craig Gentry, Shai Halevi, and Jonathan Katz. Attacking Cryptographic Schemes Based on "Perturbation Polynomials". In Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis (ed.). CCS 2009: Proceedings of the 2009 ACM Conference on Computer and Communications Security. Association for Computing Machinery, pages 1--10, 2009.
35. Jason Bandlow, Anne Schilling, and Nicolas M. Thiéry. On the uniqueness of promotion operators on tensor products of type A crystals. Journal of Algebraic Combinatorics, volume 31, number 2, pages 217--251, 2009.
36. Wayne Barrett, Jason Grout, and Raphael Loewy. The Minimum Rank Problem Over the Finite Field of Order 2: Minimum Rank 3. Linear Algebra and its Applications, volume 430, number 4, pages 890--923, 2009.
37. Robert A. Beezer. Sage (Version 3.4). SIAM Review, volume 51, number 4, pages 785--807, 2009.
38. Stefan Behnel, Robert W. Bradshaw, and Dag Sverre Seljebotn. Cython Tutorial. In Gaël Varoquaux, Stéfan van der Walt, and K. Jarrod Millman (ed.). SciPy 2009: Proceedings of the 8th Python in Science Conference. Pages 4--14, 2009.
39. Simon R. Blackburn, Carlos Cid, and Ciaran Mullan. Cryptanalysis of the MST_3 Public Key Cryptosystem. Journal of Mathematical Cryptology, volume 3, number 4, pages 321--338, 2009.
40. Jens-Matthias Bohli, Alban Hessler, Osman Ugus, and Dirk Westhoff. Security Enhanced Multi-Hop over the Air Reprogramming with Fountain Codes. LCN 2009: Proceedings of the 34th Annual IEEE Conference on Local Computer Networks. IEEE, pages 850--857, 2009.
41. Nicholas J. Cavenagh, Carlo Hämäläinen, and Adrian M. Nelson. On Completing Three Cyclically Generated Transversals to a Latin Square. Finite Fields and Their Applications, volume 15, number 3, pages 294--303, 2009.
42. Jean-Sebastien Coron, David Naccache, Mehdi Tibouchi, and Ralf-Philipp Weinmann. Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures. In Shai Halevi (ed.). Advanced in Cryptology -- CRYPTO 2009. Springer, Lecture Notes in Computer Science, volume 5677, pages 428--444, 2009.
43. Jean-Sébastien Coron, Antoine Joux, Ilya Kizhvatov, David Naccache, and Pascal Paillier. Fault Attacks on RSA Signatures with Partially Unknown Messages. In Christophe Clavier and Kris Gaj (ed.). CHES. Springer, Lecture Notes in Computer Science, volume 5747, pages 444--456, 2009.
44. Brian D'Urso. Multiprocess System for Virtual Instruments in Python. In Gaël Varoquaux, Stéfan van der Walt, and K. Jarrod Millman (ed.). SciPy 2009: Proceedings of the 8th Python in Science Conference. Pages 76--80, 2009.
45. Luz M. DeAlba, Jason Grout, Leslie Hogben, Rana Mikkelson, and Kaela Rasmussen. Universally optimal matrices and field independence of the minimum rank of a graph. The Electronic Journal of Linear Algebra, volume 18, number 7, pages 403--419, 2009.
46. Dan Drake and Jang Soo Kim. k-distant Crossings and Nestings of Matchings and Partitions. Proceedings of the 21st International Conference on Formal Power Series and Algebraic Combinatorics. Discrete Mathematics & Theoretical Computer Science, volume AK, pages 351--362, 2009.
47. Ghislain Fourier, Masato Okado, and Anne Schilling. Kirillov-Reshetikhin crystals for nonexceptional types. Advances in Mathematics, volume 222, number 3, pages 1080--1116, 2009.
48. César A. García-Vázquez and Carlos A. Lopez-Andrade. D-Heaps as Hash Tables for Vectors over a Finite Ring. WRI World Congress on Computer Science and Information Engineering, volume 3, pages 162--166, 2009.
49. Grigor Grigorov, Andrei Jorza, Stefan Patrikis, William A. Stein, and Corina Tarnita. Computational Verification of the Birch and Swinnerton-Dyer Conjecture for Individual Elliptic Curves. Mathematics of Computation, volume 78, pages 2397--2425, 2009.
50. David Harvey. A cache-friendly truncated FFT. Theoretical Computer Science, volume 410, number 27-29, pages 2649--2658, 2009.
51. Patrick Ingram. Multiples of Integral Points on Elliptic Curves. Journal of Number Theory, volume 129, number 1, pages 182--208, 2009.
52. Benjamin F. Jones. Singular Chern Classes of Schubert Varieties via Small Resolution. International Mathematics Research Notices, volume 2010, number 8, pages 1371--1416, 2009.
53. Dag Sverre Seljebotn. Fast Numerical Computations with Cython. In Gaël Varoquaux, Stéfan van der Walt, and K. Jarrod Millman (ed.). SciPy 2009: Proceedings of the 8th Python in Science Conference. Pages 15--22, 2009.
54. Pavel Solin, Ondrej Certik, and Sameer Regmi. The FEMhub Project and Classroom Teaching of Numerical Methods. In Gaël Varoquaux, Stéfan van der Walt, and K. Jarrod Millman (ed.). SciPy 2009: Proceedings of the 8th Python in Science Conference. Pages 58--61, 2009.
55. Vesselin Velichkov, Vincent Rijmen, and Bart Preneel. Algebraic Cryptanalysis of a Small-Scale Version of Stream Cipher LEX. Proceedings of the 30th Symposium on Information Theory in the Benelux. Werkgemeenschap voor Informatieen Communicatietheorie, 2009.
56. Martin Albrecht, Gregory Bard, and William Hart. Algorithm 898: Efficient Multiplication of Dense Matrices over GF(2). ACM Transactions on Mathematical Software, volume 37, number 1, pages 1--14, 2010.
57. Martin Albrecht, Carlos Cid, Thomas Dullien, Jean-Charles Faugère, and Ludovic Perret. Algebraic Precomputations in Differential and Integral Cryptanalysis. In Xuejia Lai, Moti Yung, and Dongdai Lin (ed.). Inscrypt. Springer, pages 387--403, 2010.
58. C. Bernard and E. D. Freeland. Electromagnetic Corrections in Staggered Chiral Perturbation Theory. The XXVIII International Symposium on Lattice Field Theory, June 14--19, Villasimius, Sardinia, Italy. 2010.
59. Eric Brier, Jean-Sébastien Coron, Thomas Icart, David Madore, Hugues Randriam, and Mehdi Tibouchi. Efficient Indifferentiable Hashing into Ordinary Elliptic Curves. In Tal Rabin (ed.). CRYPTO. Springer, Lecture Notes in Computer Science, volume 6223, pages 237--254, 2010.
60. Oscar Castillo-Felisola and Ivan Schmidt. Localization of fermions in double thick D-branes. Physical Review D, volume 82, number 12, pages 124062, 2010.
61. Craig Citro and Alexandru Ghitza. Enumerating Galois representations in Sage. In Komei Fukuda, Joris Hoeven, Michael Joswig, and Nobuki Takayama (ed.). Mathematical Software -- ICMS 2010. Springer, pages 256--259, 2010.
62. Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi. Fault Attacks Against emv Signatures. In Josef Pieprzyk (ed.). CT-RSA. Springer, Lecture Notes in Computer Science, volume 5985, pages 208--220, 2010.
63. Laura DeLoss, Jason Grout, Leslie Hogben, Tracy McKay, and Jason Smith. Techniques for determining the minimum rank of a small graph. Linear Algebra and its Applications, volume 432, number 11, pages 2995--3001, 2010.
64. Tom Denton. A combinatorial formula for orthogonal idempotents in the 0-Hecke algebra of S_N. Proceedings of the 22nd International Conference on Formal Power Series and Algebraic Combinatorics. Discrete Mathematics & Theoretical Computer Science, volume AN, pages 701--712, 2010.
65. Dan Drake. Bijections from Weighted Dyck Paths to Schröder Paths. Journal of Integer Sequences, volume 13, number 9, pages 10.9.2, 2010.
66. Nathan M. Dunfield and Dinakar Ramakrishnan. Increasing the number of fibered faces of arithmetic hyperbolic 3-manifolds. American Journal of Mathematics, volume 132, number 1, pages 53--97, 2010.
67. Christian Eder and John Perry. F5C: a variant of Faugère's F5 algorithm with reduced Gröbner bases. Journal of Symbolic Computation, volume 45, number 12, pages 1442--1458, 2010.
68. Graham Ellis and Simon A. King. Persistent homology of groups. Journal of Group Theory, volume 14, number 4, pages 575--587, 2010.
69. Ioannis Z. Emiris, Elias P. Tsigaridas, and Antonios Varvitsiotis. Algebraic Methods for Counting Euclidean Embeddings of Rigid Graphs. In David Eppstein and Emden R. Gansner (ed.). GD 2009: Proceedings of the 17th International Symposium on Graph Drawing. Springer, Lecture Notes in Computer Science, volume 5849, pages 195--200, 2010.
70. Burçin Eröcal and William Stein. The Sage Project: Unifying Free Mathematical Software to Create a Viable Alternative to Magma, Maple, Mathematica and Matlab. In Komei Fukuda, Joris van der Hoeven, Michael Joswig, and Nobuki Takayama (ed.). ICMS 2010: Proceedings of the Third International Congress on Mathematical Software. Springer, Lecture Notes in Computer Science, volume 6327, pages 12--27, 2010.
71. Ron Evans. Hypergeometric _3F_2(1/4) Evaluations over Finite Fields and Hecke Eigenforms. Proceedings of the American Mathematical Society, volume 138, pages 517--531, 2010.
72. Ghislain Fourier, Masato Okado, and Anne Schilling. Perfectness of Kirillov-Reshetikhin Crystals for Nonexceptional Types. Contemporary Mathematics, volume 506, pages 127--143, 2010.
73. Irene Garcia-Selfa, Enrique Gonzalez-Jimenez, and Jose M. Tornero. Galois theory, discriminants and torsion subgroup of elliptic curves. Journal of Pure and Applied Algebra, volume 214, number 8, pages 1340--1346, 2010.
74. Samuele Giraudo. Balanced binary trees in the Tamari lattice. FPSAC 2010: 22nd International Conference on Formal Power Series and Algebraic Combinatorics. DMTCS Proceedings, pages 725--736, 2010.
75. Enrique González-Jiménez and Jörn Steuding. Arithmetic progressions of four squares over quadratic fields. Publicationes Mathematicae Debrecen, volume 77, number 1-2, pages 125--138, 2010.
76. Suresh Govindarajan and K. Gopala Krishna. BKM Lie Superalgebras from Dyon Spectra in Z_N CHL Orbifolds for Composite N. Journal of High Energy Physics, volume 2010, number 5, pages 1--40, 2010.
77. Jason Grout. The Minimum Rank Problem Over Finite Fields. Electronic Journal of Linear Algebra, volume 20, number 11, pages 691--716, 2010.
78. Pierre Guillot. The Computation of Stiefel-Whitney Classes. Annales de l'institut Fourier, volume 60, number 2, pages 565--606, 2010.
79. David Harvey. A multimodular algorithm for computing Bernoulli numbers. Mathematics of Computation, volume 79, pages 2361--2370, 2010.
80. Christopher Hillar, Luis Garcia-Puente, Abraham Martin del Campo, James Ruffo, Zach Teitler, Stephen L. Johnson, and Frank Sottile. Experimentation at the Frontiers of Reality in Schubert Calculus. In Tewodros Amdeberhan, Luis A. Medina, and Victor H. Moll (ed.). Gems in Experimental Mathematics. American Mathematical Society, pages 364--380, 2010.
81. Florent Hivert, Anne Schilling, and Nicolas M. Thiéry. The biHecke Monoid of A Finite Coxeter Group. Proceedings of the 22nd International Conference on Formal Power Series and Algebraic Combinatorics. Discrete Mathematics & Theoretical Computer Science, volume AN, pages 307--318, 2010.
82. Kenneth L. Ho and Heather A. Harrington. Bistability in Apoptosis by Receptor Clustering. PLoS Computational Biology, volume 6, number 10, pages e1000956, 2010.
83. Kimberly Hopkins. Higher-Weight Heegner Points. Experimental Mathematics, volume 19, number 3, pages 257--266, 2010.
84. Niles Johnson and Justin Noel. For Complex Orientations Preserving Power Operations, p-typicality is Atypical. Topology and its Applications, volume 157, number 14, pages 2271--2288, 2010.
85. Brant Jones and Anne Schilling. Affine Structures and a Tableau Model for E_6 Crystals. Journal of Algebra, volume 324, number 9, pages 2512--2542, 2010.
86. Thomas Lam, Anne Schilling, and Mark Shimozono. K-theory Schubert Calculus of the Affine Grassmannian. Compositio Mathematica, volume 146, number 4, pages 811--852, 2010.
87. Jean-Christophe Novelli, Franco Saliola, and Jean-Yves Thibon. Representation theory of the higher-order peak algebras. Journal of Algebraic Combinatorics, volume 32, number 4, pages 465--495, 2010.
88. Clément Pernet and William Stein. Fast Computation of Hermite Normal Forms of Random Integer Matrices. Journal of Number Theory, volume 130, number 7, pages 1675--1683, 2010.
89. José Alejandro Lara Rodríguez. Some conjectures and results about multizeta values for F_q[t]. Journal of Number Theory, volume 130, number 4, pages 1013--1023, 2010.
90. Anne Schilling and Qiang Wang. Promotion Operator on Rigged Configurations of Type A. The Electronic Journal of Combinatorics, volume 17, number 1, pages R24, 2010.
91. Stanislaus J. Schymanski, Axel Kleidon, Marc Stieglitz, and Jatin Narula. Maximum entropy production allows a simple representation of heterogeneity in semiarid ecosystems. Philosophical Transactions of the Royal Society B, volume 365, pages 1449--1455, 2010.
92. William Stein. Toward a Generalization of the Gross-Zagier Conjecture. International Mathematics Research Notices, volume 2010, number 24, pages rnq075v1--rnq075, 2010.
93. Martin Albrecht and Carlos Cid. Cold Boot Key Recovery by Solving Polynomial Systems with Noise. In Javier Lopez and Gene Tsudik (ed.). ACNS. Springer, pages 57--72, 2011.
94. Christophe Arène, Tanja Lange, Michael Naehrig, and Christophe Ritzenthaler. Faster computation of the Tate pairing. Journal of Number Theory, volume 131, number 5, pages 842--857, 2011.
95. Jason Bandlow, Anne Schilling, and Mike Zabrocki. The Murnaghan-Nakayama rule for k-Schur functions. Journal of Combinatorial Theory, Series A, volume 118, number 5, pages 1588--1607, 2011.
96. Jason Bandlow, Anne Schilling, and Mike Zabrocki. The Murnaghan-Nakayama rule for k-Schur functions. Proceedings of the 23rd International Conference on Formal Power Series and Algebraic Combinatorics. Discrete Mathematics & Theoretical Computer Science, volume AO, pages 99--110, 2011.
97. Sarah Berube and Karl-Dieter Crisman. Decomposition behavior in aggregated data sets. Mathematical Social Sciences, volume 61, number 1, pages 12--19, 2011.
98. Daniel Bump and Maki Nakasuji. Casselman's Basis of Iwahori Vectors and the Bruhat Order. Canadian Journal of Mathematics, volume 63, pages 1238--1253, 2011.
99. P. Butera and M. Pernici. Free energy in a magnetic field and the universal scaling equation of state for the three-dimensional Ising model. Physical Review B, volume 83, number 5, pages 054433, 2011.
100. Steve Butler and Jason Grout. A Construction of Cospectral Graphs for the Normalized Laplacian. The Electronic Journal of Combinatorics, volume 18, number 1, pages P231, 2011.
101. Jean-Sébastien Coron, Avradip Mandal, David Naccache, and Mehdi Tibouchi. Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In Phillip Rogaway (ed.). CRYPTO. Springer, Lecture Notes in Computer Science, volume 6841, pages 487--504, 2011.
102. Jean-Sébastien Coron, Antoine Joux, Avradip Mandal, David Naccache, and Mehdi Tibouchi. Cryptanalysis of the RSA Subgroup Assumption from TCC 2005. In Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi (ed.). Public Key Cryptography. Springer, Lecture Notes in Computer Science, volume 6571, pages 147--155, 2011.
103. Tom Denton, Florent Hivert, Anne Schilling, and Nicolas M. Thiéry. The representation theory of J-trivial monoids. Séminaire Lotharingien de Combinatoire, volume 64, pages B64d, 2011.
104. Christian Eder and John Edward Perry. Signature-based algorithms to compute Gröbner bases. In Éric Schost and Ioannis Z. Emiris (ed.). ISSAC. ACM, pages 99--106, 2011.
105. Torsten Enßlin, Christoph Pfrommer, Francesco Miniati, and Kandaswamy Subramanian. Cosmic ray transport in galaxy clusters: implications for radio halos, gamma-ray signatures, and cool core heating. Astronomy & Astrophysics, volume 527, number March, pages A99, 2011.
106. Alexandru Ghitza. Distinguishing Hecke eigenforms. International Journal of Number Theory, volume 7, number 5, pages 1247--1253, 2011.
107. Chris Godsil. Periodic Graphs. The Electronic Journal of Combinatorics, volume 18, number 1, pages P23, 2011.
108. David J. Green and Simon A. King. The computation of the cohomology rings of all groups of order 128. Journal of Algebra, volume 325, number 1, pages 352--363, 2011.
109. B. B. Kheyfets and S. I. Mukhin. Entropic Part of the Boundary Energy in a Lipid Membrane. Biochemistry (Moscow) Supplement Series A: Membrane and Cell Biology, volume 5, number 4, pages 392--399, 2011.
110. Simon A. King, David Green, and Graham Ellis. The mod-2 cohomology ring of the third Conway group is Cohen-Macaulay. Algebraic & Geometric Topology, volume 11, number 2, pages 719--734, 2011.
111. David Kohel. Addition law structure of elliptic curves. Journal of Number Theory, volume 131, number 5, pages 894--919, 2011.
112. Gregg Musiker and Christian Stump. A Compendium on the Cluster Algebra and Quiver Package in Sage. Séminaire Lotharingien de Combinatoire, volume 65, number , pages B65d, 2011.
113. Niels Oppermann, Georg Robbers, and Torsten A. Enßlin. Reconstructing signals from noisy data with unknown signal and noise covariance. Physical Review E, volume 84, number 4, pages 041118, 2011.
114. N. Oppermann, H. Junklewitz, G. Robbers, and T. A. Enßlin. Probing magnetic helicity with synchrotron radiation and Faraday rotation. Astronomy & Astrophysics, volume 530, number June, pages A89, 2011.
115. Robert W. Peck. A GAP Tutorial for Transformational Music Theory. Music Theory Online, volume 17, number 1, pages , 2011.
116. Chao Peng, Haoxiang Zhang, Michael Stavola, W. Beall Fowler, Benjamin Esham, Stefan K. Estreicher, Andris Docaj, Lode Carnel, and Mike Seacrist. Microscopic structure of a VH4 center trapped by C in Si. Physical Review B, volume 84, number 19, pages 195205, 2011.
117. Viviane Pons. Multivariate Polynomials in Sage. Séminaire Lotharingien de Combinatoire, volume 66, number 7, pages B66z, 2011.
118. José Alejandro Lara Rodríguez. Relations between multizeta values in characteristic p. Journal of Number Theory, volume 131, number 11, pages 2081--2099, 2011.
119. Anne Schilling and Peter Tingley. Demazure crystals and the energy function. Proceedings of the 23rd International Conference on Formal Power Series and Algebraic Combinatorics. Discrete Mathematics & Theoretical Computer Science, volume AO, pages 861--872, 2011.
120. J. Le Sommer, F. d'Ovidio, and G. Madec. Parameterization of subgrid stirring in eddy resolving ocean models. Part 1: Theory and diagnostics. Ocean Modelling, volume 39, number 1-2, pages 154--169, 2011.
121. Amod Agashe, Kenneth A. Ribet, and William A. Stein. The modular degree, congruence primes, and multiplicity one. In Dorian Goldfeld, Jay Jorgenson, Peter Jones, Dinakar Ramakrishnan, Kenneth Ribet, and John Tate (ed.). Number Theory, Analysis and Geometry: In Memory of Serge Lang. Springer, pages 19--49, 2012.
122. Alejandro Aguilar-Zavoznik and Mario Pineda-Ruelas. A relation between ideals, Diophantine equations and factorization in quadratic fields F with h_F=2. International Journal of Algebra, volume 6, number 13-16, pages 729--745, 2012.
123. Jennifer S. Balakrishnan and Amnon Besser. Computing Local p-adic Height Pairings on Hyperelliptic Curves. International Mathematics Research Notices, volume 2012, number 11, pages 2405--2444, 2012.
124. Chris Berg, Nantel Bergeron, Steven Pon, and Mike Zabrocki. Expansions of k-Schur Functions in the Affine nilCoxeter Algebra. Electronic Journal of Combinatorics, volume 19, number 2, pages P55, 2012.
125. Corentin Boissy and Erwan Lanneau. Pseudo-Anosov Homeomorphisms on Translation Surfaces in Hyperelliptic Components Have Large Entropy. Geometric and Functional Analysis, volume 22, number 1, pages 74--106, 2012.
126. Reinier Bröker, Kristin Lauter, and Andrew V. Sutherland. Modular polynomials via isogeny volcanoes. Mathematics of Computation, volume 81, number 278, pages 1201--1231, 2012.
127. Felix Breuer, Aaron Dall, and Martina Kubitzke. Hypergraph coloring complexes. Discrete Mathematics, volume 312, number 16, pages 2407--2420, 2012.
128. Kathrin Bringmann, Martin Raum, and Olav Richter. Kohnen's limit process for real-analytic Siegel modular forms. Advances in Mathematics, volume 231, number 2, pages 1100--1118, 2012.
129. John D. Condon. Asymptotic expansion of the difference of two Mahler measures. Journal of Number Theory, volume 132, number 9, pages 1962--1983, 2012.
130. Jean-Sébastien Coron, David Naccache, and Mehdi Tibouchi. Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. In David Pointcheval and Thomas Johansson (ed.). Advances in Cryptology -- EUROCRYPT 2012. Springer, Lecture Notes in Computer Science, volume 7237, pages 446--464, 2012.
131. S. Czirbusz. Comparing the computation of Chebyshev polynomials in computer algebra systems. Annales Universitatis Scientiarum Budapestinensis de Rolando Eötvös Nominatae Sectio Computatorica, volume 36, pages 23--39, 2012.
132. Michael J. Dinneen, Yun-Bum Kim, and Radu Nicolescu. An Adaptive Algorithm for P System Synchronization. In Marian Gheorghe, Gheorghe P\uaun, Grzegorz Rozenberg, Arto Salomaa, and Sergey Verlan (ed.). Membrane Computing. Springer, Lecture Notes in Computer Science, volume 7184, pages 139--164, 2012.
133. Valentin Féray and Pierre-Loïc Méliot. Asymptotics of q-plancherel measures. Probability Theory and Related Fields, volume 152, pages 589--624, 2012.
134. Francesc Fité, Kiran S. Kedlaya, Víctor Rotger, and Andrew V. Sutherland. Sato-Tate distributions and Galois endomorphism modules in genus 2. Compositio Mathematica, volume 148, pages 1390--1442, 2012.
135. Andrew R. Francis and Mark M. Tanaka. Evolution of variation in presence and absence of genes in bacterial pathways. BMC Evolutionary Biology, volume 12, pages 55, 2012.
136. Andrew Gainer-Dewar. Γ-Species and the Enumeration of k-Trees. Electronic Journal of Combinatorics, volume 19, number 4, pages P45, 2012.
137. A. Gasull, Víctor Mañosa, and Xavier Xarles. Rational periodic sequences for the Lyness recurrence. Discrete and Continuous Dynamical Systems -- Series A, volume 32, pages 587--604, 2012.
138. Samuele Giraudo. Intervals of balanced binary trees in the Tamari lattice. Theoretical Computer Science, volume 420, pages 1--27, 2012.
139. Heather A. Harrington, Kenneth L. Ho, Thomas Thorne, and Michael P.H. Stumpf. Parameter-free model discrimination criterion based on steady-state coplanarity. Proceedings of the National Academy of Sciences USA, volume 109, number 39, pages 15746--15751, 2012.
140. Torsten Hoge. A presentation of the trace algebra of three 3x3 matrices. Journal of Algebra, volume 358, pages 257--268, 2012.
141. L. J. P. Kilford and Ken McMurdy. Slopes of the U_7 operator acting on a space of overconvergent modular forms. LMS Journal of Computation and Mathematics, volume 15, number May, pages 113--139, 2012.
142. Miguel A. Marco-Buzunáriz. A polynomial generalization of the Euler characteristic for algebraic sets. Journal of Singularities, volume 4, pages 114--130, 2012.
143. Jennifer Morse and Anne Schilling. A combinatorial formula for fusion coefficients. Proceedings of the 24th International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2012). Discrete Mathematics & Theoretical Computer Science, volume AR, pages 735--744, 2012.
144. Minh Van Nguyen, Michael Kirley, and Rodolfo García-Flores. Community Evolution in A Scientific Collaboration Network. IEEE Congress on Evolutionary Computation. IEEE, pages 1--8, 2012.
145. Juan I. Perotti and Orlando V. Billoni. Smart random walkers: The cost of knowing the path. Physical Review E, volume 86, number 1, pages 011120, 2012.
146. José Alejandro Lara Rodríguez. On von Staudt for Bernoulli-Carlitz numbers. Journal of Number Theory, volume 132, number 4, pages 495--501, 2012.
147. Anne Schilling and Peter Tingley. Demazure Crystals, Kirillov-Reshetikhin Crystals, and the Energy Function. The Electronic Journal of Combinatorics, volume 19, number 2, pages P4, 2012.
148. J. K. Denny. Software Review: SAGE Open Source Mathematics Software System. College Mathematics Journal, volume 44, number 2, pages 149--155, 2013.
149. Torsten Enßlin. Information field dynamics for simulation scheme construction. Physical Review E, volume 87, number 1, pages 013308, 2013.
150. Thomas Gerber, Yuzhu Liu, Gregor Knopp, Patrick Hemberger, Andras Bodi, Peter Radi, and Yaroslav Sych. Charged particle velocity map image reconstruction with one-dimensional projections of spherical functions. Review of Scientific Instruments, volume 84, number 3, pages 033101, 2013.
151. Simon A. King. Comparing completeness criteria for modular cohomology rings of finite groups. Journal of Algebra, volume 374, number 1, pages 247--256, 2013.
152. Cristian Lenart and Anne Schilling. Crystal energy functions via the charge in types A and C. Mathematische Zeitschrift, volume 273, number 1-2, pages 401--426, 2013.
153. Masato Okado, Reiho Sakamoto, and Anne Schilling. Affine crystal structure on rigged configurations of type D_n^(1). Journal of Algebraic Combinatorics, volume 37, number 3, pages 571--599, 2013.

## Theses

1. Martin Albrecht. Algebraic Attacks on the Courtois Toy Cipher. Masters thesis, Department of Computer Science, Universität Bremen, Germany, 2006.
2. Gregory V. Bard. Algorithms for Solving Linear and Polynomial Systems of Equations over Finite Fields with Applications to Cryptanalysis. PhD thesis, Department of Mathematics, University of Maryland, USA, 2007.
3. Iftikhar A. Burhanuddin. Some Computational Problems Motivated by the Birch and Swinnerton-Dyer Conjecture. PhD thesis, Faculty of the Graduate School, University of Southern California, USA, 2007.
4. Jason Nicholas Grout. The Minimum Rank Problem Over Finite Fields. PhD thesis, Department of Mathematics, Brigham Young University, USA, 2007.
5. Christopher J. Augeri. On Graph Isomorphism and the PageRank Algorithm. PhD thesis, Graduate School of Engineering and Management, Air Force Institute of Technology, USA, 2008.
6. David Harvey. Algorithms for p-adic cohomology and p-adic heights. PhD thesis, Department of Mathematics, Harvard University, USA, 2008.
7. Yoav Aner. Securing the Sage Notebook. Masters thesis, Royal Holloway, University of London, UK, 2009.
8. César A. García-Vázquez. Un acercamiento a Magma a través de Sage por medio de hashing. Benemérita Universidad Autónoma de Puebla, Mexico, BSc (Computer Science) thesis, 2009.
9. David Møller Hansen. Pairing-Based Cryptography: A Short Signature Scheme Using the Weil Pairing. Masters thesis, Department of Mathematics, Danmarks Tekniske Universitet, Denmark, 2009.
10. Avra Laarakker. Topological Properties of Tiles and Digit Sets. Masters thesis, Acadia University, Canada, 2009.
11. Minh Van Nguyen. Exploring Cryptography Using the Sage Computer Algebra System. School of Engineering and Science, Victoria University, Australia, BSc (Computer Science) Honours thesis, 2009.
12. José Alejandro Lara Rodríguez. Some conjectures and results about multizeta values for F_q[t]. Masters thesis, Universidad Autónoma de Yucatán, Mexico, 2009.
13. Daniel Shumow. Isogenies of Elliptic Curves: A Computational Approach. Masters thesis, Department of Mathematics, University of Washington, USA, 2009.
14. Ralf-Philipp Weinmann. Algebraic Methods in Block Cipher Cryptanalysis. PhD thesis, Department of Computer Science, Technischen Universität Darmstadt, Germany, 2009.
15. Martin Albrecht. Algorithmic Algebraic Techniques and their Application to Block Cipher Cryptanalysis. PhD thesis, Royal Holloway, University of London, UK, 2010.
16. Robert W. Bradshaw. Provable Computation of Motivic L-functions. PhD thesis, Department of Mathematics, University of Washington, USA, 2010.
17. Robert L. Miller. Empirical Evidence for the Birch and Swinnerton-Dyer Conjecture. PhD thesis, Department of Mathematics, University of Washington, USA, 2010.
18. Elisabeth Palchak. A Criterion for Identifying Stressors in Non-Linear Equations Using Gröbner Bases. Department of Mathematics, University of Southern Mississippi, USA, Honors thesis, 2010.
19. Marco Streng. Complex multiplication of abelian surfaces. PhD thesis, Thomas Stieltjes Institute for Mathematics, Universiteit Leiden, The Netherlands, 2010.
20. Graeme Taylor. Cyclotomic Matrices and Graphs. PhD thesis, School of Mathematics, University of Edinburgh, UK, 2010.
21. Miao Yu. An F4-Style Involutive Basis Algorithm. Masters thesis, Department of Mathematics, University of Southern Mississippi, USA, 2010.
22. Nicolas Borie. Calculate invariants of permutation groups by Fourier Transform. PhD thesis, Laboratoire de mathématiques d'Orsay, University of Paris-Sud 11, Orsay, France, 2011.
23. Tom Denton. Excursions into Algebra and Combinatorics at q=0. PhD thesis, Department of Mathematics, University of California, Davis, USA, 2011.
24. Richard Moloney. Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves. PhD thesis, School of Mathematical Sciences, University College Dublin, Ireland, 2011.
25. Andrey Yurievich Novoseltsev. Calabi-Yau Hypersurfaces and Complete Intersections in Toric Varieties. PhD thesis, Department of Mathematical and Statistical Sciences, University of Alberta, Canada, 2011.
26. Lauri Ruotsalainen. Sage-Ohjelmisto Lukion Matematiikan Opetuksessa. Masters thesis, Department of Mathematics, University of Turku, Finland, 2011.
27. Andrew Gainer. Γ-species, Quotients, and Graph Enumeration. PhD thesis, Department of Mathematics, Brandeis University, USA, 2012.
28. Mikko Moilanen. Sageko Matlabin korvaaja?. Mikkelin University of Applied Sciences, Finland, Bachelor thesis, 2012.
29. Thomas Burger. Algorithmische Umsetzung der Idealarithmetik in nicht-maximalen Ordnungen von Zahlkörpern. Masters thesis, Mathematisches Institut, Ludwig-Maximilians-Universität München, Germany, 2013.

## Books

1. William Stein. Modular Forms: A Computational Approach. American Mathematical Society, 2007.
2. David Joyner. Adventures with Group Theory: Rubik's Cube, Merlin's Machine, and Other Mathematical Toys. 2nd edition, The Johns Hopkins University Press, 2008.
3. L. J. P. Kilford. Modular Forms: A Classical and Computational Introduction. Imperial College Press, 2008.
4. David R. Kohel. Cryptography. 11th July, 2008.
5. Ted Kosan. SAGE For Newbies. February, 2008.
6. William Stein. Elementary Number Theory: Primes, Congruences, and Secrets. Springer, 2008.
7. Lawrence C. Washington. Elliptic Curves: Number Theory and Cryptography. 2nd edition, Chapman & Hall/CRC, 2008.
8. Robert A. Beezer. A First Course in Linear Algebra. Robert A. Beezer, 2009.
9. William Granville and David Joyner. Differential Calculus and Sage. CreateSpace, 2009.
10. William Stein and others. Sage Tutorial. CreateSpace, 2009.
11. Alexandre Casamayou, Guillaume Connan, Thierry Dumont, Laurent Fousse, François Maltey, Matthias Meulien, Marc Mezzarobba, Clément Pernet, Nicolas M. Thiéry, and Paul Zimmermann. Calcul mathématique avec Sage. July, 2010.
12. Bernhard Esslinger and CrypTool Development Team. The CrypTool Script: Cryptography, Mathematics and More. 19th January, 2010.
13. Craig Finch. Sage Beginner's Guide. Packt Publishing, 2011.
14. José M. Gallardo. Ecuaciones Diferenciales Ordinarias Una introducción con SAGE. José M. Gallardo, 2011.
15. David Joyner and Jon-Lark Kim. Selected Unsolved Problems in Coding Theory. Birkhäuser, 2011.
16. Álvaro Lozano-Robledo. Elliptic Curves, Modular Forms, and Their L-functions. American Mathematical Society, 2011.
17. Alasdair McAndrew. Introduction to Cryptography with Open-Source Software. CRC Press, 2011.
18. Alan Doerr and Kenneth Levasseur. Applied Discrete Structures. Version 1.0, Alan Doerr and Kenneth Levasseur, 2012.
19. Éric Gourgoulhon. 3+1 Formalism in General Relativity. Springer, 2012.
20. David Joyner and Marshall Hampton. Introduction to Differential Equations Using Sage. Johns Hopkins University Press, 2012.
21. Thomas Lam, Luc Lapointe, Jennifer Morse, Anne Schilling, Mark Shimozono, and Mike Zabrocki. k-Schur functions and affine Schubert calculus. arxiv, 2013.
22. Jakob Stix. Rational Points and Arithmetic of Fundamental Groups: Evidence for the Section Conjecture. Springer, 2013.
23. William Stallings. Cryptography and Network Security: Principles and Practice. 6th edition, Prentice Hall, 2014.

## Preprints

1. Laura DeLoss, Jason Grout, Leslie Hogben, Tracy McKay, Jason Smith, and Geoff Tims. Table of minimum ranks of graphs of order at most 7 and selected optimal matrices. arXiv:0812.0870, 2008.
2. Laura DeLoss, Jason Grout, Tracy McKay, Jason Smith, and Geoff Tims. Program for calculating bounds on the minimum rank of a graph using Sage. arXiv:0812.1616, 2008.
3. C. F. Doran, M. G. Faux, S. J. Gates Jr., T. Hubsch, K. M. Iga, G. D. Landweber, and R. L. Miller. Topology Types of Adinkras and the Corresponding Representations of N-Extended Supersymmetry. arXiv:0806.0050, 2008.
4. C. F. Doran, M. G. Faux, S. J. Gates Jr., T. Hubsch, K. M. Iga, G. D. Landweber, and R. L. Miller. Adinkras for Clifford Algebras and Worldline Supermultiplets. arXiv:0811.3410, 2008.
5. Tomas J. Boothby and Robert W. Bradshaw. Bitslicing and the Method of Four Russians Over Larger Finite Fields. arXiv:0901.1413, 2009.
6. César A. García-Vázquez and Lidia A. Hernandez-Rebollar. An Adaptation of the Relaxation Method to Obtain a Set of Solutions. Workshop on Innovation, Electronics, Robotics and Automotive Mechanics Conference (CERMA 2009), 2009.
7. Carlo Hämäläinen. Latin trades and simplicial complexes. arXiv:0907.1481, 2009.
8. Richard Moloney, Gary McGuire, and Michael Markowitz. Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion. Cryptology ePrint Archive: Report 2009/213, 2009.
9. Piotr Mroczkowski and Janusz Szmidt. Cube Attack on Courtois Toy Cipher. Cryptology ePrint Archive, Report 2009/497, 2009.
10. William Stein and Christian Wuthrich. Computations About Tate-Shafarevich Groups Using Iwasawa Theory. Home page of William Stein, 2009.
11. Nicolas M. Thiéry. Sage-Combinat, Free and Practical Software for Algebraic Combinatorics. Software demonstration, FPSAC'09, Hagenberg, Austria, 2009.
12. Kenneth Koon-Ho Wong, Gregory V. Bard, and Robert H. Lewis. Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications. Cryptology ePrint Archive: Report 2009/343, 2009.
13. Martin R. Albrecht and Kenneth G. Paterson. Breaking An Identity-Based Encryption Scheme based on DHIES. Cryptology ePrint Archive, Report 2010/637, 2010.
14. Martin R. Albrecht and Clément Pernet. Efficient Decomposition of Dense Matrices over GF(2). arXiv:1006.1744, 2010.
15. Martin Albrecht and John Perry. F4/5. arXiv:1006.4933, 2010.
16. Daniel J. Bernstein, Tanja Lange, and Christiane Peters. Wild McEliece. Cryptology ePrint Archive: Report 2010/410, 2010.
17. Daniel J. Bernstein, Peter Birkner, Tanja Lange, and Christiane Peters. ECM using Edwards curves. Cryptology ePrint Archive: Report 2008/016, 2010.
18. Guido Bertoni, Joan Daemen, Michaël Peeters, and Gilles Van Assche. Keccak Sponge Function Family: Main Document. Home page of the Keccak sponge function family, 2010.
19. Sunil Chetty and Lung Li. Computing local constants for CM elliptic curves. arXiv:1011.0464, 2010.
20. John E. Cremona and Thotsaphon Thongjunthug. The complex AGM, periods of elliptic curves over C and complex elliptic logarithms. arXiv:1011.0914, 2010.
21. Samuele Giraudo. Algebraic and combinatorial structures on Baxter permutations. arXiv:1011.4288, 2010.
22. Kevin J. McGown. Norm-Euclidean Galois fields. arXiv:1011.4501, 2010.
23. Cam McLeman and Christopher Rasmussen. Class number formulas via 2-isogenies of elliptic curves. arXiv:1008.4766, 2010.
24. Robert L. Miller. Empirical evidence for the Birch and Swinnerton-Dyer formula over Q. arXiv:1010.2431, 2010.
25. Steffen Oppermann and Hugh Thomas. Higher Dimensional Cluster Combinatorics and Representation Theory. arXiv:1001.5437, 2010.
26. Alexander Raichev and Mark C. Wilson. Asymptotics of coefficients of multivariate generating functions: improvements for multiple points. arXiv:1009.5715, 2010.
27. Martin Raum. Efficiently Generated Spaces of Classical Siegel Modular Forms and the Boecherer Conjecture. arXiv:1002.3883, 2010.
28. Danko Adrovic and Jan Verschelde. Polyhedral Methods for Space Curves Exploiting Symmetry. arXiv:1109.0241, 2011.
29. Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, and Ludovic Perret. Polly Cracker, Revisited. Cryptology ePrint Archive: Report 2011/289, 2011.
30. Drew Armstrong, Christian Stump, and Hugh Thomas. A uniform bijection between nonnesting and noncrossing partitions. arXiv:1101.1277, 2011.
31. Alberto Arri and John Perry. The F5 Criterion revised. arXiv:1012.3664, 2011.
32. Johan Bosman. Modular forms applied to the computational inverse Galois problem. arXiv:1109.6879, 2011.
33. Charles Bouillaguet, Pierre-Alain Fouque, and Gilles Macario-Rat. Practical Key-recovery For All Possible Parameters of SFLASH. Cryptology ePrint Archive: Report 2011/271, 2011.
34. Eric Brier, David Naccache, Phong Q. Nguyen, and Mehdi Tibouchi. Modulus Fault Attacks Against RSA-CRT Signatures. Cryptology ePrint Archive: Report 2011/388, 2011.
35. Stanislav Bulygin. Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48. Cryptology ePrint Archive: Report 2011/287, 2011.
36. James A. Carlson and Domingo Toledo. Cubic Surfaces with Special Periods. arXiv:1104.1782, 2011.
37. Gérard Cohen and Jean-Pierre Flori. On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$. Cryptology ePrint Archive: Report 2011/400, 2011.
38. Henry Cohn and Nadia Heninger. Approximate common divisors via lattices. Cryptology ePrint Archive: Report 2011/437, 2011.
39. Jean-Sebastien Coron, David Naccache, and Mehdi Tibouchi. Optimization of Fully Homomorphic Encryption. Cryptology ePrint Archive: Report 2011/440, 2011.
40. Jean-Pierre Flori and Hugues Randriam. On the Number of Carries Occuring in an Addition $\mod 2^k-1$. Cryptology ePrint Archive: Report 2011/245, 2011.
41. Jean-Pierre Flori, Sihem Mesnager, and Gérard Cohen. The Value 4 of Binary Kloosterman Sums. Cryptology ePrint Archive: Report 2011/364, 2011.
42. Jonathan Hanke. Explicit formulas for Masses of Ternary Quadratic Lattices of varying determinant over Number Fields. arXiv:1109.1054, 2011.
43. Timo Kluck. On the Calogero-Moser solution by root-type Lax pair. arXiv:1111.7163, 2011.
45. David Perkinson, Jacob Perlman, and John Wilmes. Primer for the algebraic geometry of sandpiles. arXiv:1112.6163, 2011.
46. Steven Pon. Affine Stanley symmetric functions for classical types. arXiv:1111.3312, 2011.
47. Thomas Risse. How SAGE helps to implement Goppa Codes and McEliece PKCSs. Home page of Thomas Risse, 2011.
48. José Alejandro Lara Rodríguez. Special relations between multizeta values and parity results. arXiv:1108.4726, 2011.
49. Michael Schneider. Sieving for Shortest Vectors in Ideal Lattices. Cryptology ePrint Archive: Report 2011/458, 2011.
50. Enrico Thomae and Christopher Wolf. Roots of Square: Cryptanalysis of DoubleLayer Square and Square+. Cryptology ePrint Archive: Report 2011/431, 2011.
51. Arvind Ayyer, Steven Klee, and Anne Schilling. Combinatorial Markov chains on linear extensions. arXiv:1205.7074, 2012.
52. Chris Berg, Nantel Bergeron, Hugh Thomas, and Mike Zabrocki. Expansion of k-Schur functions for maximal k-rectangles within the affine nilCoxeter algebra. arXiv:1107.3610, 2012.
53. Chris Berg, Nantel Bergeron, Franco Saliola, Luis Serrano, and Mike Zabrocki. A lift of the Schur and Hall-Littlewood bases to non-commutative symmetric functions. arXiv:1208.5191, 2012.
54. Tom Denton. Canonical Decompositions of Affine Permutations, Affine Codes, and Split k-Schur Functions. arXiv:1204.2591, 2012.
55. Alexandru Ghitza and Angus McAndrew. Experimental evidence for Maeda's conjecture on modular forms. arXiv:1207.3480, 2012.
56. Alexandru Ghitza, Nathan C. Ryan, and David Sulon. Computations of vector-valued Siegel modular forms. arXiv:1203.5611, 2012.
57. Andre de Gouvea and Shashank Shalgar. Effect of Transition Magnetic Moments on Collective Supernova Neutrino Oscillations. arXiv:1207.0516, 2012.
58. Florent Hivert, Anne Schilling, and Nicolas M. Thiéry. The biHecke monoid of a finite Coxeter group and its representations. arXiv:1012.1361, 2012.
59. Cristian Lenart, Satoshi Naito, Daisuke Sagaki, Anne Schilling, and Mark Shimozono. A uniform model for Kirillov-Reshetikhin crystals. Extended abstract. arXiv:1211.6019, 2012.
60. Cristian Lenart, Satoshi Naito, Daisuke Sagaki, Anne Schilling, and Mark Shimozono. A uniform model for Kirillov-Reshetikhin crystals I: Lifting the parabolic quantum Bruhat graph. arXiv:1211.2042, 2012.
61. Yuri Matiyasevich. New Conjectures about Zeroes of Riemann's Zeta Function. Technical Report MA12-03, Department of Mathematics, University of Leicester, 2012.
62. Tomoki Nakanishi and Salvatore Stella. Diagrammatic description of c-vectors and d-vectors of cluster algebras of finite type. arXiv:1210.6299, 2012.
63. Javier López Peña and Hugo Touchette. A network theory analysis of football strategies. arXiv:1206.6904, 2012.
64. Arvind Ayyer, Anne Schilling, Benjamin Steinberg, and Nicolas M. Thiery. Directed nonabelian sandpile models on trees. arXiv:1305.1697, 2013.
65. Przemysław Koprowski and Alfred Czogała. Computing with quadratic forms over number fields. arXiv:1304.0708, 2013.