نتایج جستجو برای: elliptic curve

تعداد نتایج: 155090  

2009
Henri Darmon

This is a summary of a three-part lecture series given at the meeting on “Explicit methods in number theory” that was held in Oberwolfach from July 12 to 18, 2009. The theme of this lecture series was the explicit construction of algebraic points on elliptic curves from cycles on modular varieties. Given a fixed elliptic curve E over Q, the goal is to better understand the group E(Q̄) of algebra...

Journal: :The American Mathematical Monthly 2013
Will Traves

We prove a generalization of both Pascal’s Theorem and its converse, the Braikenridge–Maclaurin Theorem: If two sets of k lines meet in k2 distinct points, and if dk of those points lie on an irreducible curve C of degree d , then the remaining k(k − d) points lie on a unique curve S of degree k − d. If S is a curve of degree k − d produced in this manner using a curve C of degree d , we say th...

Journal: :J. Mathematical Cryptology 2011
Mathieu Ciet Jean-Jacques Quisquater Francesco Sica

Let y D x C ax C b be an elliptic curve over Fp , p being a prime number greater than 3, and consider a; b 2 Œ1; p. In this paper, we study elliptic curve isomorphisms, with a view towards reduction in the size of elliptic curves coefficients. We first consider reducing the ratio a=b. We then apply these considerations to determine the number of elliptic curve isomorphism classes. Later we wor...

Journal: :RFC 2011
David A. McGrew Kevin M. Igoe Margaret Salter

This note describes the fundamental algorithms of Elliptic Curve Cryptography (ECC) as they were defined in some seminal references from 1994 and earlier. These descriptions may be useful for implementing the fundamental algorithms without using any of the specialized methods that were developed in following years. Only elliptic curves defined over fields of characteristic greater than three ar...

2014
Yuichiro HOSHI Yuichiro Hoshi

— In the present paper, we prove the finiteness of the set of moderate rational points of a once-punctured elliptic curve over a number field. This finitenessmay be regarded as an analogue for a once-punctured elliptic curve of the well-known finiteness of the set of torsion rational points of an abelian variety over a number field. In order to obtain the finiteness, we discuss the center of th...

2015
Joost Renes Craig Costello Lejla Batina

An elliptic curve addition law is said to be complete if it correctly computes the sum of any two points in the elliptic curve group. One of the main reasons for the increased popularity of Edwards curves in the ECC community is that they can allow a complete group law that is also relatively efficient (e.g., when compared to all known addition laws on Edwards curves). Such complete addition fo...

2009
JOSÉ FELIPE VOLOCH

We discuss the problem of constructing elements of multiplicative high order in finite fields of large degree over their prime field. We prove that the values on points of order small with respect to their degree of rational functions on an elliptic curve have high order. We discuss several special cases, including an old construction of Wiedemann, giving the first non-trivial estimate for the ...

2002
Shigeki Matsutani Yoshihiro Ônishi

Although this formula can be obtained by a limiting process from (0.1), it was found before [FS] by the paper of Kiepert [K]. If we set y(u) = 12℘ ′(u) and x(u) = ℘(u), then we have an equation y(u) = x(u)+ · · · , that is a defining equation of the elliptic curve to which the functions ℘(u) and σ(u) are attached. Here the complex number u and the coordinate (x(u), y(u)) correspond by the equality

2014
S. P. Arya

As computing and communication devices are equipped with increasingly versatile wireless connection capabilities, the demand for security increases. Cryptography provides a method for securing and authenticating the transmission of information over the insecure channels. Elliptic Curve [EC] Cryptography is a public key cryptography which replaces RSA because of its increased security with lesse...

Journal: :IACR Cryptology ePrint Archive 2003
Huafei Zhu

We study elliptic curve cryptosystems by first investigating the schemes defined over Zp and show that the scheme is provably secure against adaptive chosen cipher-text attack under the decisional DiffieHellman assumption. Then we derive a practical elliptic curve cryptosystem by making use of some nice elliptic curve where the decisional DiffieHellman assumption is reserved.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید