Results 71 to 80 of about 2,168 (195)

Computing Hilbert class polynomials with the Chinese Remainder Theorem [PDF]

open access: yes, 2009
We present a space-efficient algorithm to compute the Hilbert class polynomial H_D(X) modulo a positive integer P, based on an explicit form of the Chinese Remainder Theorem.
Sutherland, Andrew V.
core   +5 more sources

Graph potentials and topological quantum field theories

open access: yesProceedings of the London Mathematical Society, Volume 132, Issue 4, April 2026.
Abstract We introduce a new functional equation in birational geometry, whose solutions can be used to construct two‐dimensional topological quantum field theories (2d TQFTs), infinite‐dimensional in many interesting examples. The solutions of the equation give rise to a hierarchy of graph potentials, which, in the simplest setup, are Laurent ...
Pieter Belmans   +2 more
wiley   +1 more source

Isogenies of Elliptic Curves: A Computational Approach [PDF]

open access: yes, 2009
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathematical objects have been proposed for use in computing pairings, constructing hash functions and random number generators, and analyzing the reducibility of ...
Shumow, Daniel
core   +2 more sources

Computing endomorphism rings of elliptic curves under the GRH [PDF]

open access: yes, 2011
We design a probabilistic algorithm for computing endomorphism rings of ordinary elliptic curves defined over finite fields that we prove has a subexponential runtime in the size of the base field, assuming solely the generalized Riemann hypothesis ...
Bisson, Gaetan
core   +6 more sources

The Genetic Factors Controlling the Accumulation of Amylase/Trypsin Inhibitors (ATIs) in Barley for Enhancing Human Nutrition and Health

open access: yesFood Science &Nutrition, Volume 14, Issue 1, January 2026.
ATIs in cereal seeds link to celiac disease, asthma, and immune response. Here, we report the first study exploring genetic factors affecting ATI levels in barley. GWAS identified multiple QTNs influencing ATI accumulation with notable variation. Eight QTNs are associated with lower ATI levels; a key gene was identified.
Dalia Z. Alomari   +8 more
wiley   +1 more source

dCTIDH: Fast & Deterministic CTIDH

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos   +3 more
doaj   +1 more source

Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?

open access: yes, 2005
The aim of this paper is to justify the common cryptographic practice of selecting elliptic curves using their order as the primary criterion. We can formalize this issue by asking whether the discrete log problem (DLOG) has the same difficulty for all ...
Jao, David   +2 more
core   +2 more sources

Isogeny graphs with maximal real multiplication [PDF]

open access: yes, 2019
An isogeny graph is a graph whose vertices are principally polarized abelian varieties and whose edges are isogenies between these varieties. In his thesis, Kohel described the structure of isogeny graphs for elliptic curves and showed that one may ...
Ionica, Sorina, Thomé, Emmanuel
core   +5 more sources

Quantum‐Resistant Security in Digital Twin Healthcare Systems

open access: yesIET Wireless Sensor Systems, Volume 16, Issue 1, January/December 2026.
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley   +1 more source

Towards Isogeny-Based Password-Authenticated Key Establishment

open access: yesJournal of Mathematical Cryptology, 2020
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure.
Taraskin Oleg   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy