Connections and Related Integral Structures on the Universal Extension of an Elliptic Curve
نویسنده
چکیده
§0. Introduction §1. The Étale Integral Structure on the Universal Extension §2. The Étale Integral Structure for an Ordinary Elliptic Curve §2.1. Some p-adic Function Theory §2.2. The Verschiebung Morphism §3. Compactified Hodge Torsors §4. The Étale Integral Structure on the Hodge Torsors §4.1. Notation and Set-Up §4.2. Degenerating Elliptic Curves §4.3. Ordinary Elliptic Curves §4.4. The General Case §5. Construction of the Connection §5.1. Complex Analogue §5.2. The Schematic Case §6. The Schottky-Theoretic Hodge-Arakelov Comparison Isomorphism §7. Crystalline Theta Expansions §7.1. Generalities on Higher p-Curvatures §7.2. Application to Theta Expansions §8. “Griffiths Semi-Transversality” §8.1. The Kodaira-Spencer Morphism of the Crystalline Theta Object §8.2. Calculation of the Higher p-Curvatures §8.3. Hasse-type Invariants of the Crystalline Theta Object §9. Relation to the Theory of [Mzk1]
منابع مشابه
Evaluation of Nonlinear Dynamic Response of Rigid and Semi-Rigid Steel Frames under Far-Field Earthquake Records
The purpose of this research was to evaluate the nonlinear dynamic response of rigid and semi-rigid steel frames under Far-Fault Earthquake Records. Accordingly, the fragility curve of the moment frames with rigid and semi-rigid connections was determined. Considering the analytical knowledge of structures in the past, the analysis and design of steel frames based on the assumptions of rigid or...
متن کاملAn Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
In a (t,n)-threshold secret sharing scheme, a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together, but no group of fewer than t participants can do. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao, and the intractability of the elliptic curve discrete logar...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملAn efficient blind signature scheme based on the elliptic curve discrete logarithm problem
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...
متن کاملDiffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000