Elliptic function

Results: 206



#Item
41,  ` MICHELE AUDIN Institut de Recherche Math´

, ` MICHELE AUDIN Institut de Recherche Math´

Add to Reading List

Source URL: www-irma.u-strasbg.fr

Language: English - Date: 2013-04-28 09:35:52
42Note on the Landweber-Stong  elliptic genus by Don Zagier University

Note on the Landweber-Stong elliptic genus by Don Zagier University

Add to Reading List

Source URL: people.mpim-bonn.mpg.de

Language: English - Date: 2011-05-20 11:50:09
43THEOREM OF THE DAY  The Lutz-Nagell Theorem For the elliptic curve y2 = x3 + ax2 + bx + c, with a, b, and c integers and having (non-zero) discriminant function D = −4a3c + a2b2 + 18abc − 4b3 − 27c2, let P = (X, Y)

THEOREM OF THE DAY The Lutz-Nagell Theorem For the elliptic curve y2 = x3 + ax2 + bx + c, with a, b, and c integers and having (non-zero) discriminant function D = −4a3c + a2b2 + 18abc − 4b3 − 27c2, let P = (X, Y)

Add to Reading List

Source URL: www.theoremoftheday.org

Language: English - Date: 2014-02-07 05:07:17
    44A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

    A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:35:53
    45Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research  ECC 2008, Utrecht, Sep

    Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    46Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:32:41
    47The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

    The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

    Add to Reading List

    Source URL: www.cs.umd.edu

    Language: English - Date: 2014-06-30 10:38:30
    48Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

    Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

    Add to Reading List

    Source URL: www5.rz.rub.de

    Language: English - Date: 2012-07-23 07:34:30
      49The Lp Dirichlet problem for second order elliptic operators and a p-adapted square function Martin Dindos∗, Stefanie Petermichl†, Jill Pipher‡ October 26, 2006  Abstract

      The Lp Dirichlet problem for second order elliptic operators and a p-adapted square function Martin Dindos∗, Stefanie Petermichl†, Jill Pipher‡ October 26, 2006 Abstract

      Add to Reading List

      Source URL: www.math.brown.edu

      Language: English - Date: 2006-10-31 13:20:17
        50RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

        RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

        Add to Reading List

        Source URL: www.ietf.org

        Language: English - Date: 2015-07-23 10:29:05