On Ribet’s isogeny for $J_0(65)$

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Isogeny volcanoes

The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper recounts the theory behind these graphs and examines several recently developed algorithms that realize substantial (often dramatic) performan...

متن کامل

On elementary equivalence, isomorphism and isogeny

Motivated by recent work of Florian Pop, we study the connections between three notions of equivalence of function fields: isomorphism, elementary equivalence, and the condition that each of a pair of fields can be embedded in the other, which we call isogeny. Some of our results are purely geometric: we give an isogeny classification of Severi-Brauer varieties and quadric surfaces. These resul...

متن کامل

On Jacquet–Langlands isogeny over function fields

Article history: Received 15 August 2010 Revised 31 December 2010 Accepted 3 January 2011 Available online xxxx Communicated by David Goss MSC: primary 11G18, 11G09 secondary 14H40

متن کامل

On Avoiding ZVP-Attacks Using Isogeny Volcanoes

The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one should take care about their vulnerability against the Zero-Value Point Attacks (ZVP). In this paper, we present a new procedure to find elliptic curves which are resistant against these attacks. This algorithm finds, in an efficient way, a secure curve by means of volca...

متن کامل

On the Security of Supersingular Isogeny Cryptosystems

We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our first contribution is to give a very powerful active attack on the supersingular isogeny encryption scheme. This attack can only be prevented by using a (relatively expensive) countermeasure. Our second contribution is to show that the security of all schemes of this typ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of the American Mathematical Society

سال: 2018

ISSN: 0002-9939,1088-6826

DOI: 10.1090/proc/14019