Results 51 to 60 of about 10,757 (241)
On elliptic curves with an isogeny of degree 7
We show that if $E$ is an elliptic curve over $\mathbf{Q}$ with a $\mathbf{Q}$-rational isogeny of degree 7, then the image of the 7-adic Galois representation attached to $E$ is as large as allowed by the isogeny, except for the curves with complex ...
Greenberg, R. +3 more
core +3 more sources
Let us walk on the 3-isogeny graph: efficient, fast, and simple
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez +2 more
doaj +1 more source
The effective Shafarevich conjecture for abelian varieties of ${\text {GL}_{2}}$-type
In this article we establish the effective Shafarevich conjecture for abelian varieties over ${\mathbb Q}$ of ${\text {GL}_2}$-type. The proof combines Faltings’ method with Serre’s modularity conjecture, isogeny estimates and results from Arakelov ...
Rafael von Känel
doaj +1 more source
Abstract In this paper, we study traces of Hecke operators on Drinfeld modular forms of level 1 in the case A=Fq[T]$A = \mathbb {F}_q[T]$. We deduce closed‐form expressions for traces of Hecke operators corresponding to primes of degree at most 2 and provide algorithms for primes of higher degree.
Sjoerd de Vries
wiley +1 more source
Ordinary primes for GL2$\operatorname{GL}_2$‐type abelian varieties and weight 2 modular forms
Abstract Let A$A$ be a g$g$‐dimensional abelian variety defined over a number field F$F$. It is conjectured that the set of ordinary primes of A$A$ over F$F$ has positive density, and this is known to be true when g=1,2$g=1, 2$, or for certain abelian varieties with extra endomorphisms.
Tian Wang, Pengcheng Zhang
wiley +1 more source
Horizontal Racewalking Using Radical Isogenies
sponsorship: This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement ISOCRYPT -No. 101020788) and by CyberSecurity Research Flanders with reference number VR20192203.
Castryck, Wouter +3 more
openaire +2 more sources
Efficient Constant-Time Implementation of terSIDH
Since supersingular isogeny Diffie-Hellman (SIDH) was broken by a polynomial-time attack, several countermeasures were proposed as it was regarded as the most efficient algorithm among isogeny-based cryptosystems. Among them, terSIDH has been highlighted
Taehun Kang +4 more
doaj +1 more source
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure.
Luca De Feo +6 more
doaj +1 more source
On isogeny classes of Edwards curves over finite fields [PDF]
We count the number of isogeny classes of Edwards curves over finite fields, answering a question recently posed by Rezaeian and Shparlinski. We also show that each isogeny class contains a {\em complete} Edwards curve, and that an Edwards curve is ...
Ahmadi, Omran, Granger, Robert
core +1 more source
Graph potentials and topological quantum field theories
Abstract We introduce a new functional equation in birational geometry, whose solutions can be used to construct two‐dimensional topological quantum field theories (2d TQFTs), infinite‐dimensional in many interesting examples. The solutions of the equation give rise to a hierarchy of graph potentials, which, in the simplest setup, are Laurent ...
Pieter Belmans +2 more
wiley +1 more source

