搜索结果: 1-15 共查到“S-N curves”相关记录639条 . 查询时间(0.109 秒)
School Colloquium——Stable reduction of algebraic curves and abelian varieties
北大 algebraic curves abelian varieties
2023/6/16
The stable reduction theorem was proved by Grothendieck for Abelian varieties and subsequently by Deligne and Mumford for projective curves.
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:On the Riemann-Hilbert problem of confluent hypergeometric systems and Seiberg-Witten curves
超几何系统 塞伯格-维滕曲线 黎曼-希尔伯特问题
2023/4/21
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Rational points and homogeneous spaces over function fields of curves
曲线函数场 有理点 齐次空间
2023/4/17
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Pseudorandomness of Sato-Tate Distributions for Elliptic Curves
椭圆曲线 佐藤-泰特分布 伪随机性
2023/4/13
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Vanishing of some algebraic cycles on powers of Shimura curves
志村曲线 幂 代数 循环消失
2023/4/27
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Strong approximation and integral quadratic forms over affine curves
仿射曲线 强近似 积分二次形式
2023/5/9
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Birkhoff genericity for points on curves in expanding horospheres and Diophantine applications
星座图 曲线 Birkhoff泛型 丢番图应用
2023/5/16
A New Public Key Cryptosystem Based on Edwards Curves
Elliptic curves Twisted Edwards curves RSA cryptosystem
2019/9/19
The elliptic curve cryptography plays a central role in various cryptographic schemes and protocols. For efficiency reasons, Edwards curves and twisted Edwards curves have been introduced. In this pap...
How to Construct CSIDH on Edwards Curves
Isogeny-based cryptography Montgomery curves Edwards curves
2019/7/22
CSIDH is an isogeny-based key exchange protocol proposed by Castryck, Lange, Martindale, Panny, and Renes in 2018. CSIDH is based on the ideal class group action on FpFp-isomorphic classes of Montgome...
Optimal TNFS-secure pairings on elliptic curves with composite embedding degree
Optimal ate pairing twists of elliptic curves jacobian coordinates
2019/5/27
In this paper we present a comprehensive comparison between pairing-friendly elliptic curves, considering different curve forms and twists where possible. We define a measure of the efficiency of a pa...
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
NFS optimal ate pairing computation
2019/4/28
Recent algorithmic improvements of discrete logarithm computation in special extension fields threaten the security of pairing-friendly curves used in practice. A possible answer to this delicate situ...
Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves
elliptic curve cryptosystem pairing inversion Tate pairing
2019/4/16
We present a simple algorithm for Miller inversion for the reduced Tate pairing on supersingular elliptic curve of trace zero defined over the finite fields with q elements. Our algorithm runs with O(...
Horizontal Collision Correlation Attack on Elliptic Curves
side-channel analysis elliptic curves implementations ECDSA
2019/4/1
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certicates and of being rel...
A SAT-based approach for index calculus on binary elliptic curves
discrete logarithm index calculus elliptic curves
2019/3/22
Logical cryptanalysis, first introduced by Massacci in 2000, is a viable alternative to common algebraic cryptanalysis techniques over boolean fields. With XOR operations being at the core of many cry...
Hash functions from superspecial genus-2 curves using Richelot isogenies
isogeny-based cryptography genus 2 hyperelliptic curve CGL hash function
2019/3/21
Last year Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed ov...