Elliptic curve

Results: 1220



#Item
51Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´

Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay–ˆIle-de-France ´

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

- Date: 2013-09-19 10:39:36
    5247  Doc. Math. J. DMV Selmer Groups and Torsion Zero Cycles on the Selfproduct of a Semistable Elliptic Curve

    47 Doc. Math. J. DMV Selmer Groups and Torsion Zero Cycles on the Selfproduct of a Semistable Elliptic Curve

    Add to Reading List

    Source URL: documenta.sagemath.org

    - Date: 2014-07-15 07:15:56
      53On polynomials attached to curves F. Morain Laboratoire d’Informatique de l’École polytechnique logoUW ECOL E

      On polynomials attached to curves F. Morain Laboratoire d’Informatique de l’École polytechnique logoUW ECOL E

      Add to Reading List

      Source URL: www.lix.polytechnique.fr

      Language: English - Date: 2009-02-22 19:27:27
      54Introduction The present work grew out of an entirely unsuccessful attempt to answer some basic questions about elliptic curves over $. Start with an elliptic curve E over $, say given by a Weierstrass equation E: y2 = 4

      Introduction The present work grew out of an entirely unsuccessful attempt to answer some basic questions about elliptic curves over $. Start with an elliptic curve E over $, say given by a Weierstrass equation E: y2 = 4

      Add to Reading List

      Source URL: web.math.princeton.edu

      Language: English - Date: 2001-03-31 11:30:21
      55ON A PROPERNESS OF THE HILBERT EIGENVARIETY AT INTEGRAL WEIGHTS: THE CASE OF QUADRATIC RESIDUE FIELDS SHIN HATTORI Abstract. Let p be a rational prime. Let F be a totally real number field such that F is unramified over

      ON A PROPERNESS OF THE HILBERT EIGENVARIETY AT INTEGRAL WEIGHTS: THE CASE OF QUADRATIC RESIDUE FIELDS SHIN HATTORI Abstract. Let p be a rational prime. Let F be a totally real number field such that F is unramified over

      Add to Reading List

      Source URL: www2.math.kyushu-u.ac.jp

      Language: English - Date: 2016-06-23 04:10:37
      561. Introduction 1.1. Background. L-functions and modular forms underlie much of twentieth century number theory and are connected to the practical applications of number theory in cryptography. The fundamental importance

      1. Introduction 1.1. Background. L-functions and modular forms underlie much of twentieth century number theory and are connected to the practical applications of number theory in cryptography. The fundamental importance

      Add to Reading List

      Source URL: www.williamstein.org

      Language: English - Date: 2009-02-03 20:12:03
      57EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

      EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

      Add to Reading List

      Source URL: fellows.acm.org

      Language: English - Date: 2015-03-30 17:41:07
      58447  Documenta Math. p-Adic Fourier Theory P. Schneider, J. Teitelbaum

      447 Documenta Math. p-Adic Fourier Theory P. Schneider, J. Teitelbaum

      Add to Reading List

      Source URL: www.math.uiuc.edu

      Language: English - Date: 2001-12-09 18:31:39
      59A generalisation of Miller’s algorithm and applications to pairing computations on abelian varieties David Lubicz1,2 , Damien Robert3 1

      A generalisation of Miller’s algorithm and applications to pairing computations on abelian varieties David Lubicz1,2 , Damien Robert3 1

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2014-06-09 16:46:59
      602015-ohp-english+pictures.pdf

      2015-ohp-english+pictures.pdf

      Add to Reading List

      Source URL: www.kurims.kyoto-u.ac.jp

      Language: English - Date: 2015-04-25 11:54:36