Results 211 to 220 of about 2,272,026 (278)
Some of the next articles are maybe not open access.
American Journal of Mathematics, 1931
Zwei ebene Kurven heißen perspektiv, wenn zwischen den Punkten der ersten und den Tangenten der zweiten eine \((1,1)\)-Korrespondenz derart hergestellt werden kann, daß jede Tangente der zweiten durch den entsprechenden Punkt der ersten läuft. So sind z. B.
openaire +3 more sources
Zwei ebene Kurven heißen perspektiv, wenn zwischen den Punkten der ersten und den Tangenten der zweiten eine \((1,1)\)-Korrespondenz derart hergestellt werden kann, daß jede Tangente der zweiten durch den entsprechenden Punkt der ersten läuft. So sind z. B.
openaire +3 more sources
Computers & Graphics, 1994
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter +2 more
openaire +2 more sources
Abstract The escape time behavior of a function associated with elliptic curves is studied via Julia sets and composite Mandelbrot sets. The Mandelbrot sets are composite in the sense that two critical points are followed.
Clifford A. Reiter +2 more
openaire +2 more sources
2005
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire +2 more sources
Elliptic curves constitute one of the main topics of this book. They have been proposed for applications in cryptography due to their fast group law and because so far no subexponential attack on their discrete logarithm problem (cf. Section 1.5) is known. We deal with security issues in later chapters and concentrate on the group arithmetic here.
Tanja Lange, Christophe Doche
openaire +2 more sources
Supersymmetric elliptic curves
Functional Analysis and Its Applications, 1987The note in question follows the line of Yu. Manin's book on supergeometry [\textit{Yu. I. Manin}, ``Gauge fields and complex geometry'' (Moskva 1984; Zbl 0576.53002)]. The supersymmetric (SUSY) structure is considered to be a reasonable supergeometric analog of the complex structure. A curve is a supermanifold of the dimension (1\(| 1)\).
openaire +3 more sources
Elliptic Curve Cryptography Engineering
Proceedings of the IEEE, 2006In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering.
CILARDO, Alessandro +3 more
openaire +4 more sources
On the density of elliptic curves
Compositio Mathematica, 2001zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire +3 more sources
2002
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire +2 more sources
Describes in two pages the history of ECM, how it works at high level, improvements to the method, and some applications.
openaire +2 more sources
The State of Elliptic Curve Cryptography
Des. Codes Cryptogr., 2000N. Koblitz, A. Menezes, S. Vanstone
semanticscholar +1 more source
The Elliptic Curve Digital Signature Algorithm (ECDSA)
International Journal of Information Security, 2001D. Johnson, A. Menezes, S. Vanstone
semanticscholar +1 more source
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Future generations computer systems, 2018Khalid Mahmood +5 more
semanticscholar +1 more source

