Results 1 to 10 of about 35 (34)

Groups of generalized G‐type and applications to torsion subgroups of rational elliptic curves over infinite extensions of Q

open access: yesTransactions of the London Mathematical Society, 2019
Recently, there has been much interest in studying the torsion subgroups of elliptic curves base‐extended to infinite extensions of Q. In this paper, given a finite group G, we study what happens with the torsion of an elliptic curve E over Q when ...
Harris B. Daniels   +2 more
doaj   +2 more sources

On Types of Elliptic Pseudoprimes [PDF]

open access: yesGroups, Complexity, Cryptology, 2021
We generalize the notions of elliptic pseudoprimes and elliptic Carmichael numbers introduced by Silverman to analogues of Euler-Jacobi and strong pseudoprimes.
L. Babinkostova   +2 more
doaj   +1 more source

Isogenies on twisted Hessian curves

open access: yesJournal of Mathematical Cryptology, 2021
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Perez Broon Fouazou Lontouo   +3 more
doaj   +1 more source

Classification of Elements in Elliptic Curve Over the Ring 𝔽q[ɛ]

open access: yesDiscussiones Mathematicae - General Algebra and Applications, 2021
Let 𝔽q[ɛ] := 𝔽q [X]/(X4 − X3) be a finite quotient ring where ɛ4 = ɛ3, with 𝔽q is a finite field of order q such that q is a power of a prime number p greater than or equal to 5.
Selikh Bilel   +2 more
doaj   +1 more source

The most efficient indifferentiable hashing to elliptic curves of j-invariant 1728

open access: yesJournal of Mathematical Cryptology, 2022
This article makes an important contribution to solving the long-standing problem of whether all elliptic curves can be equipped with a hash function (indifferentiable from a random oracle) whose running time amounts to one exponentiation in the basic ...
Koshelev Dmitrii
doaj   +1 more source

Non‐vanishing theorems for central L‐values of some elliptic curves with complex multiplication

open access: yesProceedings of the London Mathematical Society, Volume 121, Issue 6, Page 1531-1578, December 2020., 2020
Abstract The paper uses Iwasawa theory at the prime p=2 to prove non‐vanishing theorems for the value at s=1 of the complex L‐series of certain quadratic twists of the Gross family of elliptic curves with complex multiplication by the field K=Q(−q), where q is any prime ≡7mod8.
John Coates, Yongxiong Li
wiley   +1 more source

Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves

open access: yesJournal of Mathematical Cryptology, 2021
Loops and cycles play an important role in computing endomorphism rings of supersingular elliptic curves and related cryptosystems. For a supersingular elliptic curve E defined over 𝔽p2, if an imaginary quadratic order O can be embedded in End(E) and a ...
Xiao Guanju, Luo Lixia, Deng Yingpu
doaj   +1 more source

Models of hyperelliptic curves with tame potentially semistable reduction

open access: yesTransactions of the London Mathematical Society, Volume 7, Issue 1, Page 49-95, December 2020., 2020
Abstract Let C be a hyperelliptic curve y2=f(x) over a discretely valued field K. The p‐adic distances between the roots of f(x) can be described by a completely combinatorial object known as the cluster picture. We show that the cluster picture of C, along with the leading coefficient of f and the action of Gal(K¯/K) on the roots of f, completely ...
Omri Faraggi, Sarah Nowell
wiley   +1 more source

Equidistribution Among Cosets of Elliptic Curve Points in Intervals

open access: yesJournal of Mathematical Cryptology, 2020
In a recent paper devoted to fault analysis of elliptic curve-based signature schemes, Takahashi et al. (TCHES 2018) described several attacks, one of which assumed an equidistribution property that can be informally stated as follows: given an elliptic ...
Kim Taechan, Tibouchi Mehdi
doaj   +1 more source

On the supersingular GPST attack

open access: yesJournal of Mathematical Cryptology, 2021
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj   +1 more source

Home - About - Disclaimer - Privacy