Results 11 to 20 of about 2,144,780 (355)
Murmurations of Elliptic Curves [PDF]
We investigate the average value of the Frobenius trace at p over elliptic curves in a fixed conductor range with given rank. Plotting this average as p varies over the primes yields a striking oscillating pattern, the details of which vary with the rank.
Yang-Hui He +3 more
semanticscholar +3 more sources
Security analysis of elliptic curves with embedding degree 1 proposed in PLOS ONE 2016. [PDF]
Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders.
Tadanori Teruya
doaj +2 more sources
On Pythagorean elliptic curves [PDF]
For a primitive Pythagorean triple \((a,b,c)\) with \(a\) even, let \(E= E(a,b,c)\) be the elliptic curve \(y^ 2= x(x- a^ 2)(x- c^ 2)\). The author gives necessary and sufficient conditions for \(E/\mathbb{Q}\) to have non-zero rank. Said conditions are expressed in terms of the existence of non-zero solutions to a system of two diophantine equations ...
Norio Adachi
openalex +4 more sources
A detailed study is made of super elliptic curves, namely super Riemann surfaces of genus one considered as algebraic varieties, particularly their relation with their Picard groups. This is the simplest setting in which to study the geometric consequences of the fact that certain cohomology groups of super Riemann surfaces are not freely generated ...
Jeffrey M. Rabin
openalex +6 more sources
COMPUTING IMAGES OF GALOIS REPRESENTATIONS ATTACHED TO ELLIPTIC CURVES [PDF]
Let $E$ be an elliptic curve without complex multiplication (CM) over a number field $K$
ANDREW V. SUTHERLAND
doaj +2 more sources
On hashing into elliptic curves [PDF]
We study the hash function from a finite field 𝔽q into an elliptic curve over 𝔽q which has recently been introduced by T. Icart. In particular we slightly adjust and prove the asymptotic formula conjectured by T. Icart for the image size of this function.
Farashahi Reza R. +2 more
doaj +2 more sources
Cryptographically Strong Elliptic Curves of Prime Order [PDF]
The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers.
Marcin Barański +2 more
doaj +1 more source
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source
THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY
Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat's last theorem.
Ognjen Milivojević, Boris Damjanović
doaj +1 more source
How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj +1 more source

