Results 111 to 120 of about 24,660 (205)

Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions

open access: yesIEEE Access
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo   +4 more
doaj   +1 more source

Bounded Modules

open access: yesIbn Al-Haitham Journal for Pure and Applied Sciences, 2017
Let R be a commutative ring with identity, and let M be a unitary (left) R- modul e. The ideal annRM  = {r E R;rm  = 0 V  mE M} plays a central   role  in  our  work.
L. S. Mahmood, A.S. Al-Ani
doaj  

Describing Ideals of Endomorphism Rings

open access: bronze, 1997
Brendan Goldsmith, Simone Pabst
openalex   +1 more source

Geometric sieve over number fields for higher moments. [PDF]

open access: yesRes Number Theory, 2023
Micheli G   +3 more
europepmc   +1 more source

Lagrangian Fibrations. [PDF]

open access: yesMilan J Math, 2022
Huybrechts D, Mauri M.
europepmc   +1 more source

Polynomial ring representations of endomorphisms of exterior powers [PDF]

open access: hybrid, 2021
Ommolbanin Behzad   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy