Results 41 to 50 of about 4,819,653 (62)

The 3D Crustal Structure of the Wilkes Subglacial Basin, East Antarctica, Using Variation of Information Joint Inversion of Gravity and Magnetic Data

open access: yesJournal of Geophysical Research: Solid Earth, Volume 129, Issue 10, October 2024.
Abstract Direct geological information in Antarctica is limited to ice free regions along the coast, high mountain ranges, or isolated nunataks. Therefore, indirect methods are required to reveal subglacial geology and heterogeneities in crustal properties, which are critical steps toward interpreting geological history.
Maximilian Lowe   +7 more
wiley   +1 more source

UEG Week 2024 Poster Presentations

open access: yes
United European Gastroenterology Journal, Volume 12, Issue S8, Page 665-1360, October 2024.
wiley   +1 more source

Elliptic Gau{\ss} sums and Schoof's algorithm

open access: yes, 2016
We present a new approach to handling the case of Atkin primes in Schoof's algorithm for counting points on elliptic curves over finite fields. Our approach is based on the theory of polynomially cyclic algebras, which we recall as far as necessary. We then proceed to describe our method, which essentially relies on transferring costly computations in ...
openaire   +1 more source

The order elliptic curves over finite fields of characteristic two using the Schoof algorithm

open access: yesThe order elliptic curves over finite fields of characteristic two using the Schoof algorithm
The elliptic curve cryptosystem is a popular cryptosystem. Its safety depends on the difficulty of the elliptic curve discrete logarithm problem (ECDLP). From the viewpoint of ECDLP, it is very interesting to determine the order of elliptic curves.
openaire  

Finding Good Random Elliptic Curves for Cryptosystems Defined over F2n

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 1997
R. Lercier
semanticscholar   +1 more source

Schoof's Algorithm and Extensions

open access: closed, 1999
Ian F. Blake   +2 more
semanticscholar   +3 more sources
Some of the next articles are maybe not open access.

Related searches:

Design and Implementation of Lightweight Dynamic Elliptic Curve Cryptography Using Schoof’s Algorithm

COMS2, 2021
Security and efficiency for resource constrained devices using lightweight cryptography techniques is still a problem. It is important to make these devices secure from the intruders and communicate with them securely. Elliptic Curve Cryptography (ECC) comes out to be a major contender to solve this problem as it provides the security using smaller key
Ansh Tyagi   +2 more
openaire   +3 more sources

Parameters for secure elliptic curve cryptosystem -improvements on Schoof s algorithm

International Conference on Theory and Practice of Public Key Cryptography, 1998
The security of elliptic curve cryptosystem depends on the choice of an elliptic curve on which cryptographic operations are performed. Schoof's algorithm is used to define a secure elliptic curve, as it can compute the number of rational points on a randomly selected elliptic curve defined over a finite field.
Jun Kogure   +3 more
openaire   +3 more sources

Elliptic Curves: Number Theory and Cryptography

, 2003
INTRODUCTION THE BASIC THEORY Weierstrass Equations The Group Law Projective Space and the Point at Infinity Proof of Associativity Other Equations for Elliptic Curves Other Coordinate Systems The j-Invariant Elliptic Curves in Characteristic 2 ...
L. Washington
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy