Frey curve

Results: 8



#Item
1This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

This is Chapter 7 by Gerhard Frey and Tanja Lange of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the foll

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2014-03-13 14:22:38
    2This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

    This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

    Add to Reading List

    Source URL: hyperelliptic.org

    Language: English - Date: 2006-09-06 22:21:24
      3ON THE DIOPHANTINE EQUATION x2 + 7 = y m SAMIR SIKSEK AND JOHN E. CREMONA Abstract. In this paper we study the equation x2 +7 = y m , in integers x, y, m with m ≥ 3, using a Frey curve and Ribet’s level lowering theo

      ON THE DIOPHANTINE EQUATION x2 + 7 = y m SAMIR SIKSEK AND JOHN E. CREMONA Abstract. In this paper we study the equation x2 +7 = y m , in integers x, y, m with m ≥ 3, using a Frey curve and Ribet’s level lowering theo

      Add to Reading List

      Source URL: homepages.warwick.ac.uk

      Language: English - Date: 2006-06-26 05:45:45
      4FIELDSNOTES JANUARY 2007 I  VOLUME 7:1

      FIELDSNOTES JANUARY 2007 I VOLUME 7:1

      Add to Reading List

      Source URL: www.fields.utoronto.ca

      Language: English - Date: 2007-03-13 13:31:41
      5Institute for Pure and Applied Mathematics, UCLA presents  Securing Cyberspace: Application and Foundations of Cryptography and Computer Security  Workshop I: Number Theory and

      Institute for Pure and Applied Mathematics, UCLA presents Securing Cyberspace: Application and Foundations of Cryptography and Computer Security Workshop I: Number Theory and

      Add to Reading List

      Source URL: www.ipam.ucla.edu

      Language: English - Date: 2006-10-05 20:10:14
      6Projective p-adic Representations of the K-rational Geometric Fundamental Group G. Frey and E. Kani

      Projective p-adic Representations of the K-rational Geometric Fundamental Group G. Frey and E. Kani

      Add to Reading List

      Source URL: www.mast.queensu.ca

      Language: English - Date: 2001-08-25 20:47:38
      7Curves of genus 2 with elliptic differentials and associated Hurwitz spaces Gerhard Frey & Ernst Kani

      Curves of genus 2 with elliptic differentials and associated Hurwitz spaces Gerhard Frey & Ernst Kani

      Add to Reading List

      Source URL: www.mast.queensu.ca

      Language: English - Date: 2008-08-30 09:58:25
      8

      PDF Document

      Add to Reading List

      Source URL: www.ams.org

      Language: English - Date: 1999-11-04 16:14:17