Results 11 to 20 of about 2,333,652 (389)
Murmurations of Elliptic Curves [PDF]
27 pages, 16 figures, 2 ...
He, Yang-Hui+3 more
openaire +3 more sources
Elliptic Curves over Totally Real Cubic Fields are Modular [PDF]
We prove that all elliptic curves defined over totally real cubic fields are modular. This builds on previous work of Freitas, Le Hung and Siksek, who proved modularity of elliptic curves over real quadratic fields, as well as recent breakthroughs due to
Derickx, Maarten+2 more
core +4 more sources
A heuristic for boundedness of ranks of elliptic curves [PDF]
We present a heuristic that suggests that ranks of elliptic curves over the rationals are bounded. In fact, it suggests that there are only finitely many elliptic curves of rank greater than 21.
Park, Jennifer+3 more
core +2 more sources
COMPUTING IMAGES OF GALOIS REPRESENTATIONS ATTACHED TO ELLIPTIC CURVES [PDF]
Let $E$ be an elliptic curve without complex multiplication (CM) over a number field $K$
ANDREW V. SUTHERLAND
doaj +2 more sources
The review on elliptic curves as cryptographic pairing groups [PDF]
Elliptic curve is a set of two variable points on polynomials of degree 3 over a field acted by an addition operation that forms a group structure. The motivation of this study is the mathematics behind that elliptic curve to the applicability within a ...
E Khamseh
doaj +1 more source
THEORETICAL ASSUMPTIONS FOR AN INTRODUCTION TO ELLIPTIC CURVE CRYPTOGRAPHY
Understanding elliptic curves contributed to solving mathematical problems in number theory that had been unsolved for centuries. Elliptic curves were also used in solving one of the millennial problems, which is Fermat's last theorem.
Ognjen Milivojević, Boris Damjanović
doaj +1 more source
How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj +1 more source
Local and global densities for Weierstrass models of elliptic curves [PDF]
We prove local results on the $p$-adic density of elliptic curves over $\mathbb{Q}_p$ with different reduction types, together with global results on densities of elliptic curves over $\mathbb{Q}$ with specified reduction types at one or more (including ...
John Cremona, Mohammad Sadek
semanticscholar +1 more source
On the algebra of elliptic curves [PDF]
AbstractIt is argued that a nonsingular elliptic curve admits a natural or fundamental abelian heap structure uniquely determined by the curve itself. It is shown that the set of complex analytic or rational functions from a nonsingular elliptic curve to itself is a truss arising from endomorphisms of this heap.
openaire +3 more sources
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Short Weierstrass elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problem (ECDLP) are widely used in cryptographic applications. A notion of security called Elliptic Curve Cryptography (ECC) security is also suggested in literature
Abhishek Kunal+1 more
doaj +1 more source