Results 111 to 120 of about 24,660 (205)
Computing the endomorphism ring of an ordinary abelian surface over a finite field [PDF]
Caleb Springer
openalex +1 more source
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo +4 more
doaj +1 more source
Computing endomorphism rings of Jacobians of genus 2 curves over finite fields [PDF]
David Freeman, Kristin Lauter
openalex +1 more source
Let R be a commutative ring with identity, and let M be a unitary (left) R- modul e. The ideal annRM = {r E R;rm = 0 V mE M} plays a central role in our work.
L. S. Mahmood, A.S. Al-Ani
doaj
Describing Ideals of Endomorphism Rings
Brendan Goldsmith, Simone Pabst
openalex +1 more source
Geometric sieve over number fields for higher moments. [PDF]
Micheli G +3 more
europepmc +1 more source
Curves Arising from Endomorphism Rings of Kronecker Modules [PDF]
David McKinnon, Mike Roth
openalex +1 more source
Polynomial ring representations of endomorphisms of exterior powers [PDF]
Ommolbanin Behzad +3 more
openalex +1 more source

