Supersingular elliptic curve

Results: 91



#Item
51Constructing cryptographic curves with complex multiplication Reinier Br¨ oker Ξ

Constructing cryptographic curves with complex multiplication Reinier Br¨ oker Ξ

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2009-05-14 13:40:44
52FAMILIES OF RAMANUJAN GRAPHS AND QUATERNION ALGEBRAS DENIS X. CHARLES, EYAL Z. GOREN AND KRISTIN E. LAUTER Contents 1. Introduction 2. Quaternion algebras and superspecial points

FAMILIES OF RAMANUJAN GRAPHS AND QUATERNION ALGEBRAS DENIS X. CHARLES, EYAL Z. GOREN AND KRISTIN E. LAUTER Contents 1. Introduction 2. Quaternion algebras and superspecial points

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2007-11-14 22:19:22
53A majority of elliptic curves over Q satisfy the Birch and Swinnerton-Dyer conjecture arXiv:1407.1826v2 [math.NT] 17 Jul[removed]Manjul Bhargava, Christopher Skinner, and Wei Zhang

A majority of elliptic curves over Q satisfy the Birch and Swinnerton-Dyer conjecture arXiv:1407.1826v2 [math.NT] 17 Jul[removed]Manjul Bhargava, Christopher Skinner, and Wei Zhang

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-07-17 20:38:44
54FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

FAULT ATTACKS ON PAIRING-BASED PROTOCOLS REVISITED SANJIT CHATTERJEE, KORAY KARABINA, AND ALFRED MENEZES Abstract. Several papers have studied fault attacks on computing a pairing value e(P, Q), where P is a public point

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-06-20 19:35:34
55SUBMITTED TO JOURNAL OF  1 Software implementation of an Attribute-Based Encryption scheme

SUBMITTED TO JOURNAL OF 1 Software implementation of an Attribute-Based Encryption scheme

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-05-30 22:32:03
56Isogeny-based quantum-resistant undeniable signatures David Jao1 and Vladimir Soukharev2 1  Department of Combinatorics and Optimization

Isogeny-based quantum-resistant undeniable signatures David Jao1 and Vladimir Soukharev2 1 Department of Combinatorics and Optimization

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-07-22 11:45:39
57Cryptographic hash Functions from Expander Graphs

Cryptographic hash Functions from Expander Graphs

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:47:28
58A majority of elliptic curves over Q satisfy the Birch and Swinnerton-Dyer conjecture arXiv:1407.1826v2 [math.NT] 17 Jul[removed]Manjul Bhargava, Christopher Skinner, and Wei Zhang

A majority of elliptic curves over Q satisfy the Birch and Swinnerton-Dyer conjecture arXiv:1407.1826v2 [math.NT] 17 Jul[removed]Manjul Bhargava, Christopher Skinner, and Wei Zhang

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-07-17 20:38:44
59How explicit is the Explicit Formula? Barry Mazur and William Stein March 21, 2013 (Notes for our 20+20 minute talk at the AMS Special Session on Arithmetic Statistics in San Diego, January 2013)

How explicit is the Explicit Formula? Barry Mazur and William Stein March 21, 2013 (Notes for our 20+20 minute talk at the AMS Special Session on Arithmetic Statistics in San Diego, January 2013)

Add to Reading List

Source URL: abel.math.harvard.edu

Language: English - Date: 2013-03-21 16:40:51
60ALGANT Erasmus Mundus Joint Doctorate programme[removed]Research project DR

ALGANT Erasmus Mundus Joint Doctorate programme[removed]Research project DR

Add to Reading List

Source URL: www.algant.eu

Language: English - Date: 2013-11-13 10:29:52