2007
DOI: 10.1090/gsm/079
|View full text |Cite
|
Sign up to set email alerts
|

Modular Forms, a Computational Approach

Abstract: Abstract. This is a textbook about algorithms for computing with modular forms. It is nontraditional in that the primary focus is not on underlying theory; instead, it answers the question "how do you explicitly compute spaces of modular forms?" v To my grandmother, Annette Maurer.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
291
0
7

Year Published

2008
2008
2019
2019

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 264 publications
(299 citation statements)
references
References 144 publications
1
291
0
7
Order By: Relevance
“…The kernel routines run over small finite fields and are usually lifted over Z, Q or Z[X]. They are used in algebraic cryptanalysis [15,3], computational number theory [27], or integer linear programming [18] and they benefit from the experience in numerical linear algebra. In particular, a key point there is to embed the finite field elements in integers stored as floating point numbers, and then rely on the efficiency of the floating point matrix multiplication dgemm of the BLAS.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The kernel routines run over small finite fields and are usually lifted over Z, Q or Z[X]. They are used in algebraic cryptanalysis [15,3], computational number theory [27], or integer linear programming [18] and they benefit from the experience in numerical linear algebra. In particular, a key point there is to embed the finite field elements in integers stored as floating point numbers, and then rely on the efficiency of the floating point matrix multiplication dgemm of the BLAS.…”
Section: Introductionmentioning
confidence: 99%
“…The latter is a key invariant used in many applications such as Gröbner basis computations [15] and computational number theory [27].…”
Section: Introductionmentioning
confidence: 99%
“…we used the computational method of modular symbols outlined in [15], Chapter 8. The details are standard, and we omit them.…”
Section: Computing Special Valuesmentioning
confidence: 99%
“…By Lemma 9.1, the Galois representation on the p-torsion of G m , and of H m respectively arise from newforms at levels 100q and 128q. MAGMA allows us to list all the newforms at these levels (the MAGMA program for doing this is based on algorithms explained in [31]). Suppose the Galois representation on the p-torsion of G m and of H m arise from a particular given pair of newforms g and h, respectively.…”
Section: The Newforms Have Fourier Expansions Around the Cusp At Infimentioning
confidence: 99%