Results 71 to 80 of about 2,168 (195)
Computing Hilbert class polynomials with the Chinese Remainder Theorem [PDF]
We present a space-efficient algorithm to compute the Hilbert class polynomial H_D(X) modulo a positive integer P, based on an explicit form of the Chinese Remainder Theorem.
Sutherland, Andrew V.
core +5 more sources
Graph potentials and topological quantum field theories
Abstract We introduce a new functional equation in birational geometry, whose solutions can be used to construct two‐dimensional topological quantum field theories (2d TQFTs), infinite‐dimensional in many interesting examples. The solutions of the equation give rise to a hierarchy of graph potentials, which, in the simplest setup, are Laurent ...
Pieter Belmans +2 more
wiley +1 more source
Isogenies of Elliptic Curves: A Computational Approach [PDF]
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core +2 more sources
Computing endomorphism rings of elliptic curves under the GRH [PDF]
We design a probabilistic algorithm for computing endomorphism rings of ordinary elliptic curves defined over finite fields that we prove has a subexponential runtime in the size of the base field, assuming solely the generalized Riemann hypothesis ...
Bisson, Gaetan
core +6 more sources
ATIs in cereal seeds link to celiac disease, asthma, and immune response. Here, we report the first study exploring genetic factors affecting ATI levels in barley. GWAS identified multiple QTNs influencing ATI accumulation with notable variation. Eight QTNs are associated with lower ATI levels; a key gene was identified.
Dalia Z. Alomari +8 more
wiley +1 more source
dCTIDH: Fast & Deterministic CTIDH
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos +3 more
doaj +1 more source
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
The aim of this paper is to justify the common cryptographic practice of selecting elliptic curves using their order as the primary criterion. We can formalize this issue by asking whether the discrete log problem (DLOG) has the same difficulty for all ...
Jao, David +2 more
core +2 more sources
Isogeny graphs with maximal real multiplication [PDF]
An isogeny graph is a graph whose vertices are principally polarized abelian varieties and whose edges are isogenies between these varieties. In his thesis, Kohel described the structure of isogeny graphs for elliptic curves and showed that one may ...
Ionica, Sorina, Thomé, Emmanuel
core +5 more sources
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
Towards Isogeny-Based Password-Authenticated Key Establishment
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure.
Taraskin Oleg +3 more
doaj +1 more source

