Results 41 to 50 of about 2,144,780 (355)

Metrics on the Sets of Nonsupersingular Elliptic Curves in Simplified Weierstrass Form over Finite Fields of Characteristic Two

open access: yesInternational Journal of Mathematics and Mathematical Sciences, 2015
Elliptic curves have a wide variety of applications in computational number theory such as elliptic curve cryptography, pairing based cryptography, primality tests, and integer factorization.
Keisuke Hakuta
doaj   +1 more source

On the Generalizations of Universality Theorem for L-Functions of Elliptic Curves

open access: yesJaunųjų Mokslininkų Darbai, 2017
In the paper, the continuous type’s universality theorem for L-functions of elliptic curves is discussed and its generalizations in three directions – for positive integer powers and derivatives of L-functions of elliptic curves as well as the weighted ...
Virginija Garbaliauskienė
doaj   +1 more source

Classification of Elliptic Cubic Curves Over The Finite Field of Order Nineteen

open access: yesمجلة بغداد للعلوم, 2016
Plane cubics curves may be classified up to isomorphism or projective equivalence. In this paper, the inequivalent elliptic cubic curves which are non-singular plane cubic curves have been classified projectively over the finite field of order nineteen,
Baghdad Science Journal
doaj   +1 more source

Triangles and elliptic curves, V [PDF]

open access: yesProceedings of the Japan Academy, Series A, Mathematical Sciences, 1994
The author continues his work on elliptic curves associated to triangles as described in part I, ibid. 70, No. 4, 106-108; part II, ibid., No. 7, 223-225; and part III, ibid., No. 10, 311-314 (1994); see respectively Zbl 0824.14028 and 14029 and Zbl 0832.14021).
openaire   +11 more sources

Ranks of elliptic curves [PDF]

open access: yesBulletin of the American Mathematical Society, 2002
This paper gives a general survey of ranks of elliptic curves over the field of rational numbers. The rank is a measure of the size of the set of rational points. The paper includes discussions of the Birch and Swinnerton-Dyer Conjecture, the Parity Conjecture, ranks in families of quadratic twists, and ways to search for elliptic curves of large rank.
Alice Silverberg, Karl Rubin
openaire   +1 more source

A heuristic for boundedness of ranks of elliptic curves [PDF]

open access: yesJournal of the European Mathematical Society (Print), 2016
We present a heuristic that suggests that ranks of elliptic curves over the rationals are bounded. In fact, it suggests that there are only finitely many elliptic curves of rank greater than 21.
Jennifer Park   +3 more
semanticscholar   +1 more source

On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages

open access: yesCauchy: Jurnal Matematika Murni dan Aplikasi, 2022
Elliptic curve cryptography includes symmetric key cryptography systems that base their security on mathematical problems of elliptic curves. There are several ways that can be used to define the elliptic curve equation that depends on the infinite field
Juhari Juhari, Mohamad Febry Andrean
doaj   +1 more source

Families of elliptic curves with rational 3-torsion

open access: yesJournal of Mathematical Cryptology, 2012
In this paper we look at three families of elliptic curves with rational 3-torsion over a finite field. These families include Hessian curves, twisted Hessian curves, and a new family we call generalized DIK curves. We find the number of -isogeny classes
Moody Dustin, Wu Hongfeng
doaj   +1 more source

Growth of torsion groups of elliptic curves upon base change [PDF]

open access: yesMathematics of Computation, 2016
We study how the torsion of elliptic curves over number fields grows upon base change, and in particular prove various necessary conditions for torsion growth.
Enrique Gonz'alez-Jim'enez, Filip Najman
semanticscholar   +1 more source

An ECDLP-Based Verifiable Multi-Secret Sharing Scheme [PDF]

open access: yesMathematics Interdisciplinary Research, 2020
‎‎Secret sharing is an important issue in cryptography which has many applications‎. ‎In a secret sharing scheme‎, ‎a secret is shared by a dealer among several participants in such a way that any authorized subset of participants can recover the secret ...
Khadijeh Eslami, Mojtaba Bahramian
doaj   +1 more source

Home - About - Disclaimer - Privacy