Showing 201 - 220 results of 293 for search '"elliptic curves"', query time: 0.06s Refine Results
  1. 201

    Goldfeld's conjecture and congruences between heegner points by Kriz, D, Li, C

    Published 2021
    “…© The Author(s) 2019. Given an elliptic curve E over Q, a celebrated conjecture of Goldfeld asserts that a positive proportion of its quadratic twists should have analytic rank 0 (respectively 1). …”
    Get full text
    Article
  2. 202

    Self-intersection of Manin-Drinfeld Cycles and Taylor expansion of L-functions by Chen, Yongyi

    Published 2022
    “…A classic early result along this philosophy was achieved by Gross and Zagier, who proved that the derivative of the L-function of an elliptic curve is equal, up to a constant, to the Néron-Tate height pairing of a special point called a Heegner point on the elliptic curve. …”
    Get full text
    Thesis
  3. 203

    On the worst-case side-channel security of ECC point randomization in embedded devices by Azouaoui, Melissa, Durvaux, François, Poussier, Romain, Standaert, François-Xavier, Papagiannopoulos, Kostas, Verneuil, Vincent

    Published 2021
    “…Point randomization is an important countermeasure to protect Elliptic Curve Cryptography (ECC) implementations against sidechannel attacks. …”
    Get full text
    Conference Paper
  4. 204
  5. 205

    Simple High-Level Code For Cryptographic Arithmetic With Proofs, Without Compromises by Erbsen, Andres, Philipoom, Jade D., Gross, Jason S., Sloan, Robert Hal, Chlipala, Adam

    Published 2021
    “…These techniques were used to build an elliptic-curve library that achieves competitive performance for a wide range of prime fields and multiple CPU architectures, showing that implementation and proof effort scales with the number and complexity of conceptually different algorithms, not their use cases. …”
    Get full text
    Article
  6. 206

    A reduced τ-adic Naf (RTNAF) representation for an efficient scalar multiplication on Anomalous Binary Curves (ABC) by Yunos, Faridah, Mohd Atan, Kamel Ariffin, Kamel Ariffin, Muhammad Rezal, Md. Said, Mohamad Rushdan

    Published 2014
    “…Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to the RSA cryptosystem. …”
    Get full text
    Article
  7. 207

    Elliptic net scalar multiplication using generalized equivalent elliptic divisibility sequence by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2018
    “…Combining the new generalization with a few restrictions on the initial value, the paper further proposes and discusses an elliptic net scalar multiplication of rank one for Weistrass equation and non-singular elliptic curve.…”
    Get full text
    Conference or Workshop Item
  8. 208

    Generalizing equivalent elliptic divisibility sequence for elliptic net scalar multiplication by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2018
    “…Combining the new generalization with a few restrictions on the initial value, the paper further proposes and discusses an elliptic net scalar multiplication of rank one for Weistrass equation and non-singular elliptic curve.…”
    Get full text
    Article
  9. 209

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…One method called elliptic curve will be implemented in IBE. Elliptic curve method has shorter key size, smaller signature length, fast operations and high security working. …”
    Get full text
    Conference or Workshop Item
  10. 210

    Development of a power-efficient low-cost cryptosystem for secured embedded systems by Pua, Yi Cheng.

    Published 2009
    “…By using a suitable elliptic curve over this field, a cryptosystem that is similar in cryptographic strength to 112-bit Triple-DES can be built. …”
    Get full text
    Final Year Project (FYP)
  11. 211

    Improved scalar multiplication algorithm in affine coordinate system using elliptic net by Razali, Zuren, Muslim, Norliana, Kahar, Saliyah, Yunos, Faridah, Mohamed, Kamsiah

    Published 2022
    “…In elliptic curve encryption, scalar multiplication (SM) is the most expensive and time-consuming operation. …”
    Get full text
    Article
  12. 212

    Stark points and p-adic iterated integrals attached to modular forms of weight one by Lauder, A, Darmon, H, Rotger, V

    Published 2015
    “…Let E be an elliptic curve over Q, and let ϱ♭ and ϱ♯ be odd two-dimensional Artin representations for which ϱ♭⊗ϱ♯ is self-dual. …”
    Journal article
  13. 213

    The meta-abelian elliptic KZB associator and periods of Eisenstein series by Matthes, N

    Published 2017
    “…We compute the image of Enriquez’ elliptic KZB associator in the (maximal) meta-abelian quotient of the fundamental Lie algebra of a once-punctured elliptic curve.Our main result is an explicit formula for this image in terms of Eichler integrals of Eisenstein series, and is analogous to Deligne’s computation of the depth one quotient of the Drinfeld associator.We also show how to retrieve Zagier’s extended period polynomials of Eisenstein series, as well as the values at zero of Beilinson–Levin’s elliptic polylogarithms from the meta-abelian elliptic KZB associator.…”
    Journal article
  14. 214

    On reduced stable pair invariants by Oberdieck, Georg B

    Published 2018
    “…Let X = S × E be the product of a K3 surface S and an elliptic curve E. Reduced stable pair invariants of X can be defined via (1) cutting down the reduced virtual class with incidence conditions or (2) the Behrend function weighted Euler characteristic of the quotient of the moduli space by the translation action of E. …”
    Get full text
    Article
  15. 215

    Sato–Tate distributions of twists of the Fermat and the Klein quartics by Fité, Francesc, Lorenzo García, Elisa, Sutherland II, Andrew Victor

    Published 2018
    “…We determine the limiting distribution of the normalized Euler factors of an abelian threefold A defined over a number field k when A is [bar over Q]-isogenous to the cube of a CM elliptic curve defined over k. As an application, we classify the Sato–Tate distributions of the Jacobians of twists of the Fermat and Klein quartics, obtaining 54 and 23, respectively, and 60 in total. …”
    Get full text
    Get full text
    Article
  16. 216

    Overview on elliptic multiple zeta values by Matthes, N

    Published 2020
    “…Common to both approaches to elliptic multiple zeta values is their representation as iterated integrals on a once-punctured elliptic curve. Having compared the two approaches, we survey various recent results about the algebraic structure of elliptic multiple zeta values, as well as indicating their relation to iterated integrals of Eisenstein series, and to a special algebra of derivations.…”
    Conference item
  17. 217

    Enhancement of Security Architecture for Smartcard Based Authentication Protocols by Mohammed, Lawan Ahmed

    Published 2004
    “…The findings discovered that the proposed Elliptic Curve Cryptograpluc (ECC) method provides greater efficiency than similar method in terms of computational speed. …”
    Get full text
    Thesis
  18. 218

    Twisted elliptic multiple zeta values and non-planar one-loop open-string amplitudes by Broedel, J, Matthes, N, Richter, G, Schlotterer, O

    Published 2018
    “…These arise as iterated integrals on an elliptic curve from which a rational lattice has been removed. …”
    Journal article
  19. 219

    Elliptic double zeta values by Matthes, N

    Published 2016
    “…Originally defined by iterated integrals on a once-punctured complex elliptic curve, it turns out that they can also be expressed as certain linear combinations of indefinite iterated integrals of Eisenstein series and multiple zeta values. …”
    Journal article
  20. 220

    Standardized signature algorithms on ultra-constrained 4-bit MCU by Chen, Chien-Ning, Jacob, Nisha, Kutzner, Sebastian, Ling, San, Poschmann, Axel, Saetang, Sirote

    Published 2013
    “…In this work, we implement all three digital signature schemes specified in Digital Signature Standard (FIPS 186-3), including DSA and RSA (based on modular exponentiation) as well as ECDSA (based on elliptic curve point multiplication), on an ultra-constrained 4-bit MCU of the EPSON S1C63 family. …”
    Get full text
    Get full text
    Conference Paper