Results 31 to 40 of about 145,858 (328)

Efficient Unified Arithmetic for Hardware Cryptography [PDF]

open access: yes, 2008
The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF(q), where q = pk and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1 ...
Koc, Cetin Kaya   +3 more
core   +2 more sources

Triangles and elliptic curves, V

open access: yesProceedings of the Japan Academy, Series A, Mathematical Sciences, 1994
The author continues his work on elliptic curves associated to triangles as described in part I, ibid. 70, No. 4, 106-108; part II, ibid., No. 7, 223-225; and part III, ibid., No. 10, 311-314 (1994); see respectively Zbl 0824.14028 and 14029 and Zbl 0832.14021).
openaire   +11 more sources

Methods for using elliptic curves in cryptography [PDF]

open access: yesE3S Web of Conferences
Elliptic Curve Cryptography (ECC), a significant modern cryptography, is more secure and robust than most others due to its construction using an elliptic curve and the application of mathematical operations for encryption and key generation. Furthermore,
Obukhov Vadim   +4 more
doaj   +1 more source

On families of 9-congruent elliptic curves [PDF]

open access: yes, 2015
We compute equations for the families of elliptic curves 9-congruent to a given elliptic curve. We use these to find infinitely many non-trivial pairs of 9-congruent elliptic curves over Q, i.e.
Fisher, Tom
core   +1 more source

Lam\'e polynomials, hyperelliptic reductions and Lam\'e band structure

open access: yes, 2004
The band structure of the Lam\'e equation, viewed as a one-dimensional Schr\"odinger equation with a periodic potential, is studied. At integer values of the degree parameter l, the dispersion relation is reduced to the l=1 dispersion relation, and a ...
Arscott F.M   +11 more
core   +1 more source

Visualising Sha[2] in Abelian Surfaces [PDF]

open access: yes, 2002
Given an elliptic curve E1 over a number field and an element s in its 2-Selmer group, we give two different ways to construct infinitely many Abelian surfaces A such that the homogeneous space representing s occurs as a fibre of A over another elliptic ...
Bruin, Nils
core   +2 more sources

Murmurations of Elliptic Curves

open access: yesExperimental Mathematics
27 pages, 16 figures, 2 ...
He, Yang-Hui   +3 more
openaire   +2 more sources

FPGA Based High Speed SPA Resistant Elliptic Curve Scalar Multiplier Architecture

open access: yesInternational Journal of Reconfigurable Computing, 2016
The higher computational complexity of an elliptic curve scalar point multiplication operation limits its implementation on general purpose processors.
Khalid Javeed, Xiaojun Wang
doaj   +1 more source

Upper bound for the height of S-integral points on elliptic curves [PDF]

open access: yes, 2012
We establish new upper bounds for the height of the S-integral points of an elliptic curve. This bound is explicitly given in terms of the set S of places of the number field K involved, but also in terms of the degree of K, as well as the rank, the ...
Bosser, Vincent, Surroca, Andrea
core   +3 more sources

A classification of isogeny‐torsion graphs of Q‐isogeny classes of elliptic curves

open access: yesTransactions of the London Mathematical Society, 2021
Let E be a Q‐isogeny class of elliptic curves defined over Q. The isogeny graph associated to E is a graph which has a vertex for each elliptic curve in the Q‐isogeny class E, and an edge for each cyclic Q‐isogeny of prime degree between elliptic curves ...
Garen Chiloyan, Álvaro Lozano‐Robledo
doaj   +1 more source

Home - About - Disclaimer - Privacy