Results 11 to 20 of about 2,244,879 (350)
Elliptic curve cryptosystems [PDF]
We discuss analogs based on elliptic curves over finite fields of public key cryptosystems which use the multiplicative group of a finite field. These elliptic curve cryptosystems may be more secure, because the analog of the discrete logarithm problem ...
N. Koblitz
semanticscholar +3 more sources
Elliptic nets and elliptic curves [PDF]
An elliptic divisibility sequence is an integer recurrence sequence associated to an elliptic curve over the rationals together with a rational point on that curve.
Ayad+5 more
core +5 more sources
On Pythagorean elliptic curves [PDF]
For a primitive Pythagorean triple \((a,b,c)\) with \(a\) even, let \(E= E(a,b,c)\) be the elliptic curve \(y^ 2= x(x- a^ 2)(x- c^ 2)\). The author gives necessary and sufficient conditions for \(E/\mathbb{Q}\) to have non-zero rank. Said conditions are expressed in terms of the existence of non-zero solutions to a system of two diophantine equations ...
Norio Adachi
openalex +4 more sources
A detailed study is made of super elliptic curves, namely super Riemann surfaces of genus one considered as algebraic varieties, particularly their relation with their Picard groups. This is the simplest setting in which to study the geometric consequences of the fact that certain cohomology groups of super Riemann surfaces are not freely generated ...
Jeffrey M. Rabin
openalex +6 more sources
Regulators of Elliptic Curves [PDF]
Abstract We study the regulator of the Mordell–Weil group of elliptic curves over number fields, functions fields of characteristic 0 or function fields of characteristic $p>0$. We prove a new Northcott property for the regulator of elliptic curves of rank at least 4 defined over a number field.
Autissier, Pascal+2 more
openaire +6 more sources
Twists of Elliptic Curves [PDF]
In this note we extend the theory of twists of elliptic curves as presented in various standard texts for characteristic not equal to two or three to the remaining characteristics. For this, we make explicit use of the correspondence between the twists and the Galois cohomology set $H^1\big(\operatorname{G}_{\overline{K}/K}, \operatorname{Aut}_ ...
Kronberg, M., Soomro, M.A., Top, J.
openaire +4 more sources
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
Kleptography is the study of pilfering secure data secretly and subliminally. The concept of inserting backdoors was introduced two decades ago by Young and Yung. However, still it is a serious threat for modern cryptography.
Anum Sajjad+5 more
doaj +1 more source
On the algebra of elliptic curves [PDF]
AbstractIt is argued that a nonsingular elliptic curve admits a natural or fundamental abelian heap structure uniquely determined by the curve itself. It is shown that the set of complex analytic or rational functions from a nonsingular elliptic curve to itself is a truss arising from endomorphisms of this heap.
openaire +3 more sources
Combined small subgroups and side-channel attack on elliptic curves with cofactor divisible by 2m [PDF]
Nowadays, alternative models of elliptic curves like Montgomery, Edwards, twisted Edwards, Hessian, twisted Hessian, Huff’s curves and many others are very popular and many people use them in cryptosystems which are based on elliptic curve cryptography ...
Michał Wrońska
doaj +1 more source
Twisted Edwards Elliptic Curves for Zero-Knowledge Circuits
Circuit-based zero-knowledge proofs have arose as a solution to the implementation of privacy in blockchain applications, and to current scalability problems that blockchains suffer from.
Marta Bellés-Muñoz+4 more
doaj +1 more source