41![, ` MICHELE AUDIN Institut de Recherche Math´ , ` MICHELE AUDIN Institut de Recherche Math´](https://www.pdfsearch.io/img/a19bd08906b316f9cfd5c0346a9b2072.jpg) | Add to Reading ListSource URL: www-irma.u-strasbg.frLanguage: English - Date: 2013-04-28 09:35:52
|
---|
42![Note on the Landweber-Stong elliptic genus by Don Zagier University Note on the Landweber-Stong elliptic genus by Don Zagier University](https://www.pdfsearch.io/img/fb281d6cd50d2997a215b11df809b0d1.jpg) | Add to Reading ListSource URL: people.mpim-bonn.mpg.deLanguage: English - Date: 2011-05-20 11:50:09
|
---|
43![THEOREM OF THE DAY The Lutz-Nagell Theorem For the elliptic curve y2 = x3 + ax2 + bx + c, with a, b, and c integers and having (non-zero) discriminant function D = −4a3c + a2b2 + 18abc − 4b3 − 27c2, let P = (X, Y) THEOREM OF THE DAY The Lutz-Nagell Theorem For the elliptic curve y2 = x3 + ax2 + bx + c, with a, b, and c integers and having (non-zero) discriminant function D = −4a3c + a2b2 + 18abc − 4b3 − 27c2, let P = (X, Y)](https://www.pdfsearch.io/img/2deb30bae50e9700b1fdc8e06a357793.jpg) | Add to Reading ListSource URL: www.theoremoftheday.orgLanguage: English - Date: 2014-02-07 05:07:17
|
---|
44![A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1 A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1](https://www.pdfsearch.io/img/1aa5452329374254ab80d7da29855b40.jpg) | Add to Reading ListSource URL: www.dgalindo.esLanguage: English - Date: 2007-11-26 10:35:53
|
---|
45![Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep](https://www.pdfsearch.io/img/24f2e8a015c864fc31222559e0cd2132.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2008-09-27 14:59:29
|
---|
46![Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1 Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1](https://www.pdfsearch.io/img/5821d0b31aed33afdf91d7a27bb182ce.jpg) | Add to Reading ListSource URL: fc15.ifca.aiLanguage: English - Date: 2015-01-11 00:32:41
|
---|
47![The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email: The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:](https://www.pdfsearch.io/img/dff6c88ac52705d7d2b9a80616f8fa04.jpg) | Add to Reading ListSource URL: www.cs.umd.eduLanguage: English - Date: 2014-06-30 10:38:30
|
---|
48![Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion](https://www.pdfsearch.io/img/78c50496f8107cff4dbf9de972ab8160.jpg) | Add to Reading ListSource URL: www5.rz.rub.deLanguage: English - Date: 2012-07-23 07:34:30
|
---|
49![The Lp Dirichlet problem for second order elliptic operators and a p-adapted square function Martin Dindos∗, Stefanie Petermichl†, Jill Pipher‡ October 26, 2006 Abstract The Lp Dirichlet problem for second order elliptic operators and a p-adapted square function Martin Dindos∗, Stefanie Petermichl†, Jill Pipher‡ October 26, 2006 Abstract](https://www.pdfsearch.io/img/7481218bbe964a537bbb9d3b4a7881e3.jpg) | Add to Reading ListSource URL: www.math.brown.eduLanguage: English - Date: 2006-10-31 13:20:17
|
---|
50![RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation. RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.](https://www.pdfsearch.io/img/34946cae62516df3eb23d1fd401265fb.jpg) | Add to Reading ListSource URL: www.ietf.orgLanguage: English - Date: 2015-07-23 10:29:05
|
---|