>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到Curves相关记录637条 . 查询时间(0.106 秒)
The stable reduction theorem was proved by Grothendieck for Abelian varieties and subsequently by Deligne and Mumford for projective curves.
This talk first solves explicitly a Riemann-Hilbert problem of confluent hypergeometric systems. It then conjectures and proves a special case that the WKB approximation of the monodromy data of confl...
In the last decade, there has been a growing interest in the study of rational points on homogeneous spaces of linear algebraic groups defined over fields having good arithmetical properties other tha...
Equidistribution is an important theme in number theory. The Sato-Tate conjecture, which was established by Richard Taylor et.al. in 2008, asserts that given an elliptic curve over Q without complex m...
For a smooth projective variety over a number field, the Beilinson—Bloch conjecture predicts that Chow groups of algebraic cycles modulo rational equivalence can be determined using cohomological data...
Let $k$ be a field of characteristic 0 and let $C$ be the a smooth affine curve over $k$. We will first discuss applications of strong approximation to the theory of integral quadratic forms over $C$....
Let $\{a(t):t \in \mathbb{R}\}$ be a diagonalizable subgroup of $SL(d,\mathbb{R})$ for which the expanded horosphere $U$ is abelian. By the Birkhoff ergodic theorem, for any point $x \in SL(d,\mathbb{...
A New Public Key Cryptosystem Based on Edwards Curves     Elliptic curves  Twisted Edwards curves  RSA cryptosystem       font style='font-size:12px;'> 2019/9/19
The elliptic curve cryptography plays a central role in various cryptographic schemes and protocols. For efficiency reasons, Edwards curves and twisted Edwards curves have been introduced. In this pap...
How to Construct CSIDH on Edwards Curves     Isogeny-based cryptography  Montgomery curves  Edwards curves       font style='font-size:12px;'> 2019/7/22
CSIDH is an isogeny-based key exchange protocol proposed by Castryck, Lange, Martindale, Panny, and Renes in 2018. CSIDH is based on the ideal class group action on FpFp-isomorphic classes of Montgome...
In this paper we present a comprehensive comparison between pairing-friendly elliptic curves, considering different curve forms and twists where possible. We define a measure of the efficiency of a pa...
Recent algorithmic improvements of discrete logarithm computation in special extension fields threaten the security of pairing-friendly curves used in practice. A possible answer to this delicate situ...
We present a simple algorithm for Miller inversion for the reduced Tate pairing on supersingular elliptic curve of trace zero defined over the finite fields with q elements. Our algorithm runs with O(...
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certi cates and of being rel...
Logical cryptanalysis, first introduced by Massacci in 2000, is a viable alternative to common algebraic cryptanalysis techniques over boolean fields. With XOR operations being at the core of many cry...
Last year Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed ov...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...