Journal: SIGACT News

Volume 43, Issue 1

7 -- 9William I. Gasarch. The book review column
9 -- 14Abu Mohammad Omar Shehab Uddin Ayub. Review of the Cryptoclub: using mathematics to make and break secret codes by Janet Beissinger and Vera Pless
14 -- 16Leo Irakliotis. Review of cryptanalytic attacks on RSA by Song Y. Yan
16 -- 18Antoine Rojat. Review of cryptanalysis of RSA and its variants by Jason Hinek
18 -- 21Jérémy Barbay. Review of understanding and applying cryptography and data security by Adam J. Elbirt
21 -- 23Jonathan Katz. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell
23 -- 27Daniel Apon. Review of theory of computation by Dexter C. Kozen
27 -- 29Robert J. Low. Review of codes: an introduction to information communication and cryptography by Norman L Biggs
30 -- 31Jeffrey Shallit. Review of finite fields and applications by Gary L. Mullen and Carl Mummert
32 -- 33Miklós Bóna. Review of the life and times of the central limit theorem by William J. Adams
33 -- 34Robert Szarka. Review of pearls of discrete mathematics by Martin Erickson
35 -- 37Dimitris Papamichail. Review of design theory by C. C. Lindner and C. A. Rodger
39 -- 0William I. Gasarch. Review of an introduction to the history of algebra solving equations from Mesopotamian Times to the Renaissance by Jacques Sesiano
40 -- 43Dean Kelley. Technical report column
43 -- 60Oded Goldreich. On struggle and competition in scientic fields
61 -- 0Lane A. Hemaspaandra. SIGACT news complexity theory column 73
62 -- 81Dana Moshkovitz. Guest column: algebraic construction of projection PCPs
82 -- 85Joseph O'Rourke. Computational geometry column 52
86 -- 0Idit Keidar. Distributed computing column 45: what theory for transactional memory?
87 -- 92Petr Kuznetsov, Srivatsan Ravi. WTTM 2011: the third workshop on the theory of transactional memory