Results 71 to 80 of about 2,272,026 (278)

Holomorphic anomaly equations and the Igusa cusp form conjecture

open access: yes, 2018
Let $S$ be a K3 surface and let $E$ be an elliptic curve. We solve the reduced Gromov-Witten theory of the Calabi-Yau threefold $S \times E$ for all curve classes which are primitive in the K3 factor.
A Beauville   +28 more
core   +1 more source

An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies

open access: yesIEEE Access, 2019
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic.
Yan Huang   +3 more
doaj   +1 more source

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies

open access: yesJournal of Mathematical Cryptology, 2011
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
L. D. Feo, David Jao, Jérôme Plût
semanticscholar   +1 more source

Triangles and elliptic curves

open access: yesProceedings of the Japan Academy, Series A, Mathematical Sciences, 1994
The author obtains an infinite family of elliptic curves defined over an algebraic number field \(k\), such that every curve of it has positive Mordell-Weil rank with respect to \(k\): At first, take \(P = (a^ 2 + b^ 2 - c^ 2)/2\), \(Q = (a + b + c) (a + b - c) (a - b + c) (a - b - c)/16\), \(a,b,c \in k\), \(k\) a field of characteristic \(\neq 2 ...
openaire   +2 more sources

Murmurations of Elliptic Curves

open access: yesExperimental Mathematics
27 pages, 16 figures, 2 ...
He, Yang-Hui   +3 more
openaire   +2 more sources

Hardware Accelerators for Elliptic Curve Cryptography [PDF]

open access: yesAdvances in Radio Science, 2008
In this paper we explore different hardware accelerators for cryptography based on elliptic curves. Furthermore, we present a hierarchical multiprocessor system-on-chip (MPSoC) platform that can be used for fast integration and evaluation of novel ...
C. Puttmann   +3 more
doaj  

Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited

open access: yesJournal of Mathematical Cryptology, 2020
Due to its shorter key size, elliptic curve cryptography (ECC) is gaining more and more popularity. However, if not properly implemented, the resulting cryptosystems may be susceptible to fault attacks.
Joye Marc
doaj   +1 more source

Modular forms and elliptic curves over the field of fifth roots of unity [PDF]

open access: yes, 2010
Let F be the cyclotomic field of fifth roots of unity. We computationally investigate modularity of elliptic curves over F.Comment: Added appendix by Mark Watkins, who found an elliptic curve missing from our ...
Gunnells, Paul E.   +2 more
core   +2 more sources

Elliptic curves from sextics [PDF]

open access: yesJournal of the Mathematical Society of Japan, 2002
A remark is added. (after replace mistake).
openaire   +3 more sources

On Heegner points of large conductors

open access: yes, 2000
Given a parametrisation of an elliptic curve over Q by a Shimura curve, we show that the images of almost all Heegner points are of infinite order.
Khare, Chandrashekhar, Rajan, C. S.
core  

Home - About - Disclaimer - Privacy