Results 11 to 20 of about 105 (36)

On coverings of simple abelian varieties [PDF]

open access: yes, 2006
We show that the vector bundle associated to a smooth projective connected finite covering of a simple complex abelian variety is ample (under a simple necessary condition). This result is obtained by showing that this bundle is M-regular in the sense of
Debarre, Olivier
core   +3 more sources

New Techniques for SIDH-based NIKE

open access: yesJournal of Mathematical Cryptology, 2020
We consider the problem of producing an efficient, practical, quantum-resistant non-interactive key exchange (NIKE) protocol based on Supersingular Isogeny Diffie-Hellman (SIDH).
Urbanik David, Jao David
doaj   +1 more source

Modular invariants and isogenies [PDF]

open access: yes, 2019
We provide explicit bounds on the difference of heights of the $j$-invariants of isogenous elliptic curves defined over $\overline{\mathbb{Q}}$. The first one is reminiscent of a classical estimate for the Faltings height of isogenous abelian varieties ...
Pazuki, Fabien
core   +2 more sources

A flat projective variety with $D_8$-holonomy

open access: yesTohoku mathematical journal, 2019
We show explicitly that the compact flat Kähler manifold of complex dimension three with D8 holonomy studied by Dekimpe, Halenda and Szczepanski ([5] p. 367) possesses the structure of a nonsingular projective variety.
F. Johnson
semanticscholar   +1 more source

A decomposition of the Jacobian of a Humbert-Edge curve

open access: yes, 2020
A \textit{Humbert-Edge curve of type} $n$ is a non-degenerate smooth complete intersection of $n-1$ diagonal quadrics. Such a curve has an interesting geometry since it has a natural action of the group $(\mathbb{Z}/2\mathbb{Z})^n$.
Arteche, Giancarlo Lucchini   +2 more
core   +1 more source

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies

open access: yesJournal of Mathematical Cryptology, 2014
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
De Feo Luca, Jao David, Plût Jérôme
doaj   +1 more source

Families of abelian varieties with many isogenous fibres [PDF]

open access: yes, 2015
Let Z be a subvariety of the moduli space of principally polarised abelian varieties of dimension g over the complex numbers. Suppose that Z contains a Zariski dense set of points which correspond to abelian varieties from a single isogeny class.
Orr, Martin
core   +1 more source

Isolated elliptic curves and the MOV attack

open access: yesJournal of Mathematical Cryptology, 2017
We present a variation on the CM method that produces elliptic curves over prime fields with nearly prime order that do not admit many efficiently computable isogenies. Assuming the Bateman–Horn conjecture, we prove that elliptic curves produced this way
Scholl Travis
doaj   +1 more source

Counting superspecial Richelot isogenies by reduced automorphism groups (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties) [PDF]

open access: yes, 2022
The recent cryptanalysis by Costello and Smith [10] employed the subgraphs whose vertices consist of decomposed principally polarized abelian varieties, hence it is important to study the subgraphs in isogeny-based cryptography. Katsura and Takashima [22]
TAKASHIMA, Katsuyuki
core  

Constructing Permutation Rational Functions From Isogenies

open access: yes, 2017
A permutation rational function $f\in \mathbb{F}_q(x)$ is a rational function that induces a bijection on $\mathbb{F}_q$, that is, for all $y\in\mathbb{F}_q$ there exists exactly one $x\in\mathbb{F}_q$ such that $f(x)=y$.
Bisson, Gaetan, Tibouchi, Mehdi
core   +2 more sources

Home - About - Disclaimer - Privacy