Papers and Preprints

  1. C. Hall, A. Perucca, Characterizing abelian varieties by the reductions of the Mordell-Weil group, under review

  2. C. Hall, A. Perucca, Radical characterizations of elliptic curves, under review

  3. S. Baig, C. Hall, Experimental data for Goldfeld's conjecture over function fields, to appear in Experimental Mathematics, Vol. 161, No. 7 (2012), 1233--1275.

  4. J. Ellenberg, C. Hall, E. Kowalski, Expander graphs, gonality and variation of Galois representations, Duke Mathematical Journal, Vol. 161, No. 7 (2012), 1233--1275.

  5. C. Hall, An open-image theorem for a general class of abelian varieties, with an appendix by E. Kowalski, Bull. Lond. Math. Soc., Vol. 43, No. 4 (2011), 703--711.

  6. D. Allcock, C. Hall, Monodromy groups of Hurwitz-type problems, Advances in Mathematics, Vol. 225, No. 1 (2010), 69--80.

  7. J. Ellenberg, C. Elsholtz, C. Hall, E. Kowalski, Non-simple abelian varieties in a family: algebraic and analytic approaches, J. London Math. Soc., Vol. 80, No. 1 (2009), 135--154.

  8. C. Hall, Big symplectic or orthogonal monodromy modulo ell, Duke Mathematical Journal, Vol. 141, No. 1 (2008), 179--203.

  9. C. Hall, J.F. Voloch, Towards Lang-Trotter for elliptic curves over function fields, Pure and Applied Mathematics Quarterly, Vol. 2, No. 1, 2006, 163--178.

  10. A. Cojocaru, C. Hall, Uniform results for Serre's theorem for elliptic curves, International Mathematics Research Notices, Vol. 2005, No. 50, 2005, 3065--3080.

  11. C. Hall, L-functions of twisted Legendre curves, Journal of Number Theory, Vol. 119, No. 1, 2006, 128--147.

  12. C. Hall, Fundamental domains of some Drinfeld modular curves, unpublished manuscript.

  13. C. Hall, L-functions of twisted Legendre curves, PhD thesis, Princeton University, 2003.

The following papers date from the time before I entered grad school to study mathematics.
  1. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, ''Performance Comparison of the AES Submissions,'' Second AES Conference, April 1999.

  2. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, ''New Results on the Twofish Encryption Algorithm,'' Second AES Conference, April 1999.

  3. C. Ellison, C. Hall, R. Milbert, B. Schneier, ``Protecting Secret Keys with Personal Entropy,'' Future Generation Computer Systems.

  4. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, The Twofish Encryption Algorithm, Wiley, 1999.

  5. C. Hall, J. Kelsey, V. Rijmen, B. Schneier, D. Wagner, ''Cryptanalysis of SPEED,'' Fifth Annual Workshop on Selected Areas in Cryptography, Springer-Verlag, August 1998.

  6. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, and C. Hall, ''On the Twofish Key Schedule,'' Fifth Annual Workshop on Selected Areas in Cryptography, Springer-Verlag, August 1998.

  7. J. Kelsey, B. Schneier, D. Wagner, C. Hall, ''Side Channel Cryptanalysis of Product Ciphers,'' Proceedings of ESORICS '98 Proceedings, September 1998.

  8. C. Hall, D. Wagner, J. Kelsey, B. Schneier, ''Building Pseudo-Random Functions from Pseudo-Random Permutations,'' Advances in Cryptology --- Proceedings of CRYPTO '98, August 1998.

  9. J. Kelsey, B. Schneier, D. Wagner, C. Hall, ''Cryptanalytic Attacks on Pseudorandom Number Generators,'' Fast Software Encryption, Fifth International Workshop Proceedings, March 1998.

  10. C. Hall, J. Kelsey, B. Schneier, D. Wagner, ''Cryptanalysis of SPEED (Extended Abstract),'' Proceedings of Financial Cryptography '98, February 1998.

  11. C. Hall, B. Schneier, ``Remote Electronic Gambling,'' Proceedings of the 13th Annual Computer Security Applications Conference, December 1997.

  12. B. Schneier, C. Hall, ''An Improved E-mail Security Protocol,'' Proceedings of the 13th Annual Computer Security Applications Conference, December 1997.

  13. J. Kelsey, B. Schneier, C. Hall, D. Wagner, ''Secure Applications of Low-~Entropy Keys,'' 1997 Information Security Workshop (ISW '97), September 1997.

  14. J. Kelsey, B. Schneier, C. Hall, ''An Authenticated Camera,'' Proceedings of the 12th Annual Computer Security Applications Conference.

  15. C. Hall, P. Juola, A. Boggs, ''MORPHEUS, A Tool for the Lexical Analysis of corpora for Morpheme Segmentation,'' Proceedings of the 1994 Mid-America Linguistics Conference.