Results 71 to 80 of about 2,272,026 (278)
Holomorphic anomaly equations and the Igusa cusp form conjecture
Let $S$ be a K3 surface and let $E$ be an elliptic curve. We solve the reduced Gromov-Witten theory of the Calabi-Yau threefold $S \times E$ for all curve classes which are primitive in the K3 factor.
A Beauville +28 more
core +1 more source
An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic.
Yan Huang +3 more
doaj +1 more source
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
L. D. Feo, David Jao, Jérôme Plût
semanticscholar +1 more source
The author obtains an infinite family of elliptic curves defined over an algebraic number field \(k\), such that every curve of it has positive Mordell-Weil rank with respect to \(k\): At first, take \(P = (a^ 2 + b^ 2 - c^ 2)/2\), \(Q = (a + b + c) (a + b - c) (a - b + c) (a - b - c)/16\), \(a,b,c \in k\), \(k\) a field of characteristic \(\neq 2 ...
openaire +2 more sources
Murmurations of Elliptic Curves
27 pages, 16 figures, 2 ...
He, Yang-Hui +3 more
openaire +2 more sources
Hardware Accelerators for Elliptic Curve Cryptography [PDF]
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann +3 more
doaj
Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj +1 more source
Modular forms and elliptic curves over the field of fifth roots of unity [PDF]
Let F be the cyclotomic field of fifth roots of unity. We computationally investigate modularity of elliptic curves over F.Comment: Added appendix by Mark Watkins, who found an elliptic curve missing from our ...
Gunnells, Paul E. +2 more
core +2 more sources
Elliptic curves from sextics [PDF]
A remark is added. (after replace mistake).
openaire +3 more sources
On Heegner points of large conductors
Given a parametrisation of an elliptic curve over Q by a Shimura curve, we show that the images of almost all Heegner points are of infinite order.
Khare, Chandrashekhar, Rajan, C. S.
core

