Elliptic curve

Results: 1220



#Item
281

Speaker: Andrew Sutherland Title: Sato-Tate distributions Abstract: The Sato-Tate conjecture predicts the asymptotic distribution of normalized Frobenius traces of the reductions modulo primes p of a fixed elliptic curve

Add to Reading List

Source URL: www.math.columbia.edu

Language: English - Date: 2016-01-10 16:26:33
    282

    THEOREM OF THE DAY The Lutz-Nagell Theorem For the elliptic curve y2 = x3 + ax2 + bx + c, with a, b, and c integers and having (non-zero) discriminant function D = −4a3c + a2b2 + 18abc − 4b3 − 27c2, let P = (X, Y)

    Add to Reading List

    Source URL: www.theoremoftheday.org

    Language: English - Date: 2014-02-07 05:07:17
      283Algebra / Abstract algebra / Analytic number theory / Invariant theory / Algebraic surfaces / Algebraic curves / Moduli space / Moduli theory / Modular form / Abelian variety / Elliptic curve / Complex multiplication

      Computing genus 2 curves from invariants on the Hilbert moduli space Journal of Number Theory, Special Issue on Elliptic Curve Cryptography http://eprint.iacr.org

      Add to Reading List

      Source URL: 2010.eccworkshop.org

      Language: English - Date: 2010-10-26 20:15:50
      284Mathematics / Algebra / Group theory / Geometry / Analytic number theory / Elliptic curve / Divisor / Differential forms / Imaginary hyperelliptic curve / Banach fixed-point theorem

      Ren´e Schoof, Elliptic curves over finite fields. VU, OctoberIntroduction. Let E be an elliptic curve over a finite field Fq . Then E is a smooth cubic in P2 . It can

      Add to Reading List

      Source URL: www.cosic.esat.kuleuven.be

      Language: English
      285Mass surveillance / National Security Agency / United States government secrecy / Bullrun / RSA Security / Global surveillance disclosures / RSA BSAFE / IPsec / Elliptic curve cryptography / Cryptography / Dual EC DRBG / Crypto Wars

      Mathematicians Discuss the Snowden Revelations This is the latest installment in the Notices discussion of the National Security Agency (NSA). The previous installment, “The Mathematics Community and the NSA,” by Mic

      Add to Reading List

      Source URL: www.ams.org

      Language: English - Date: 2015-03-10 15:36:10
      286

      Efficient ephemeral elliptic curve cryptographic keys

      Add to Reading List

      Source URL: csrc.nist.gov

      Language: English - Date: 2015-06-11 11:22:46
        287

        To appear in Designs, Codes and Cryptography. Trading Inversions for Multiplications in Elliptic Curve Cryptography Mathieu Ciet∗ () Gemplus S.A., Card Security Group, La Vigie,

        Add to Reading List

        Source URL: joye.site88.net

        Language: English - Date: 2015-09-04 19:43:29
          288

          Published in Designs, Codes and Cryptography 36(1):33–43, Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults Mathieu Ciet∗ () Universit´e catholique de Louvain,

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-09-04 19:43:27
            289

            Elliptic Curves a Hardware Perspective Joppe W. Bos NIST Workshop on Elliptic Curve Cryptography Standards June 11- June, Gaithersburg, MD, USA

            Add to Reading List

            Source URL: csrc.nist.gov

            Language: English - Date: 2015-06-08 08:37:26
              290Key management / Public-key cryptography / Cryptography / Elliptic curve cryptography / Key size / Key / Symmetric-key algorithm / RSA / Cipher / Elliptic curve DiffieHellman / DiffieHellman key exchange / Cryptographic key types

              CERTICOM WHITEPAPER SERIES ECC and SCADA Key Management Rob Lambert, Certicom August 2010

              Add to Reading List

              Source URL: www.certicom.com

              Language: English - Date: 2010-11-08 15:42:56
              UPDATE