نتایج جستجو برای: elliptic curve

تعداد نتایج: 155090  

Journal: :IJAC 2012
John L. Rhodes Pedro V. Silva

This paper further develops the theory of arbitrary semigroups acting on trees via elliptic mappings. A key tool is the Lyndon-Chiswell length function L for the semigroup S which allows one to construct a tree T and an action of S on T via elliptic maps. Improving on previous results, the length function of the action will also be L.

1999
Maurizio Parton

In this paper we describe a family of locally conformal Kähler metrics on class 1 Hopf surfaces Hα,β containing some recent metrics constructed in [GO98]. We study some canonical foliations associated to these metrics, in particular a 2-dimensional foliation Eα,β that is shown to be independent of the metric. We elementary prove that Eα,β has compact leaves if and only if α = β for some integer...

2002
Neil S. Trudinger Xu-Jia Wang

An open problem in affine geometry is whether an affine complete locally uniformly convex hypersurface in Euclidean (n + 1)-space is Euclidean complete for n ≥ 2. In this paper we give the affirmative answer. As an application, it follows that an affine complete, affine maximal surface in R3 must be an elliptic paraboloid.

2012
Reza Rezaeian Farashahi Hongfeng Wu Changan Zhao

This paper presents new explicit formulae for the point doubling, tripling and addition for ordinary Weierstraß elliptic curves with a point of order 3 and their equivalent Hessian curves over finite fields of characteristic three. The cost of basic point operations is lower than that of all previously proposed ones. The new doubling, mixed addition and tripling formulae in projective coordinat...

Journal: :IACR Cryptology ePrint Archive 2006
Steven D. Galbraith

Frey proposed the idea of ‘disguising’ an elliptic curve. This is a method to obtain a ‘black box’ representation of a group. We adapt this notion to finite fields and tori and study the question of whether such systems are secure. Our main result is an algebraic attack which shows that it is not secure to disguise the torus T2. We also show that some methods for disguising an elliptic curve ar...

2009
Igor Nikolaev

A covariant functor on the elliptic curves with complex multiplication is constructed. The functor takes values in the noncommutative tori with real multiplication. A conjecture on the rank of an elliptic curve is formulated.

2012
Dohyeong Kim DOHYEONG KIM

Let E be an elliptic curve over Q. Using Iwasawa theory, we give what seems to be the first general upper bound for the order of vanishing of the p-adic L-function at s = 0, and the Zp-corank of the Tate-Shafarevich group for all sufficiently large good ordinary primes p.

1998
Noboru Kunihiro Kenji Koyama

1 I n t r o d u c t i o n Elliptic curves can be applied to public-key cryptosystems, and as such several schemes have been proposed [3, 4, 5, 6, 9, 11]. There are two typical elliptic curve cryptosystems: E1Gamal-type scheme [4, 11] and RSA-type schemes [3, 5, 6]. The security of the EIGamal-type elliptic curve cryptosystem is based on the difficulty of solving a discrete logarithm over ellipt...

1998
Tetsuya Izu Jun Kogure Masayuki Noro Kazuhiro Yokoyama

The security of elliptic curve cryptosystem depends on the choice of an elliptic curve on which cryptographic operations are performed. Schoof’s algorithm is used to define a secure elliptic curve, as it can compute the number of rational points on a randomly selected elliptic curve defined over a finite field. By realizing efficient combination of several improvements, such as Atkin-Elkies’s m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید