Results 81 to 90 of about 3,965 (252)
Explicit classification of isogeny graphs of rational elliptic curves [PDF]
Alexander J. Barrios
openalex +1 more source
Strong subgroup recurrence and the Nevo–Stuck–Zimmer theorem
Abstract Let Γ$\Gamma$ be a countable group and Sub(Γ)$\mathrm{Sub}(\Gamma)$ its Chabauty space, namely, the compact Γ$\Gamma$‐space consisting of all subgroups of Γ$\Gamma$. We call a subgroup Δ∈Sub(Γ)$\Delta \in \mathrm{Sub}(\Gamma)$ a boomerang subgroup if for every γ∈Γ$\gamma \in \Gamma$, γniΔγ−ni→Δ$\gamma ^{n_i} \Delta \gamma ^{-n_i} \rightarrow ...
Yair Glasner, Waltraud Lederle
wiley +1 more source
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
SQIsign is a well-known post-quantum signature scheme due to its small combined signature and public-key size. However, SQIsign suffers from notably long signing times, and verification times are not short either.
Marius A. Aardal +8 more
doaj +1 more source
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
De Feo Luca, Jao David, Plût Jérôme
doaj +1 more source
Arithmetic Satake compactifications and algebraic Drinfeld modular forms
Abstract In this article, we construct the arithmetic Satake compactification of the Drinfeld moduli schemes of arbitrary rank over the ring of integers of any global function field away from the level structure, and show that the universal family extends uniquely to a generalized Drinfeld module over the compactification.
Urs Hartl, Chia‐Fu Yu
wiley +1 more source
Heuristics on pairing-friendly elliptic curves
We present a heuristic asymptotic formula as for the number of isogeny classes of pairing-friendly elliptic curves over prime fields with fixed embedding degree , with fixed discriminant, with rho-value bounded by a fixed such that , and with prime ...
Boxall John
doaj +1 more source
A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges +2 more
doaj +1 more source
Abstract S. Gukov and C. Vafa proposed a characterization of rational N=(1,1)$N=(1,1)$ superconformal field theories (SCFTs) in 1+1$1+1$ dimensions with Ricci‐flat Kähler target spaces in terms of the Hodge structure of the target space, extending an earlier observation by G. Moore.
Abhiram Kidambi +2 more
wiley +1 more source
Jordan correspondence and block distribution of characters
Abstract We complete the determination of the ℓ$\ell$‐block distribution of characters for quasi‐simple exceptional groups of Lie type up to some minor ambiguities relating to non‐uniqueness of Jordan decomposition. For this, we first determine the ℓ$\ell$‐block distribution for finite reductive groups whose ambient algebraic group defined in ...
Radha Kessar, Gunter Malle
wiley +1 more source
Mazur's isogeny theorem states that if $p$ is a prime for which there exists an elliptic curve $E / \mathbb{Q}$ that admits a rational isogeny of degree $p$, then $p \in \{2,3,5,7,11,13,17,19,37,43,67,163 \}$. This result is one of the cornerstones of the theory of elliptic curves and plays a crucial role in the proof of Fermat's Last Theorem.
openaire +2 more sources

