Results 121 to 130 of about 8,681 (237)
Verifiable Delay Function and Its Blockchain-Related Application: A Survey. [PDF]
Wu Q, Xi L, Wang S, Ji S, Wang S, Ren Y.
europepmc +1 more source
Isogenies of Degree $p$ of Elliptic Curves over Local Fields and Kummer Theory [PDF]
Mayumi Kawachi
openalex +1 more source
Mazur's isogeny theorem states that if $p$ is a prime for which there exists an elliptic curve $E / \mathbb{Q}$ that admits a rational isogeny of degree $p$, then $p \in \{2,3,5,7,11,13,17,19,37,43,67,163 \}$. This result is one of the cornerstones of the theory of elliptic curves and plays a crucial role in the proof of Fermat's Last Theorem.
openaire +2 more sources
Sarcopenia: Molecular regulatory network for loss of muscle mass and function. [PDF]
Wu J +7 more
europepmc +1 more source
Relative continuous K-theory and cyclic homology
We show that for an associative algebra A and its ideal I such that the I-adic topology on A coincides with the p-adic topology, the relative continuous K-theory pro-spectrum "lim"K(A_i, IA_i), where A_i :=A/p^i A, is naturally isogenous to the cyclic ...
Beilinson, Alexander
core
The dihedral hidden subgroup problem
The hidden subgroup problem (HSP) is a cornerstone problem in quantum computing, which captures many problems of interest and provides a standard framework algorithm for their study based on Fourier sampling, one class of techniques known to provide ...
Chen Imin, Sun David
doaj +1 more source
Horizontal racewalking using radical isogenies
W. Castryck +3 more
semanticscholar +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source
A table of elliptic curves over the cubic field of discriminant -23
Let F be the cubic field of discriminant -23 and O its ring of integers. Let Gamma be the arithmetic group GL_2 (O), and for any ideal n subset O let Gamma_0 (n) be the congruence subgroup of level n.
Donnelly, Steve +3 more
core
Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center. [PDF]
Villegas-Ch W, GarcĂa-Ortiz J.
europepmc +1 more source

