<--- Back to Details
First PageDocument Content
Mathematics / Abstract algebra / Algebra / Elliptic curves / Analytic number theory / Diophantine geometry / Number theory / Elliptic curve cryptography / Elliptic curve / Birch and Swinnerton-Dyer conjecture / Rank of an elliptic curve / Twists of curves
Date: 2001-11-05 12:32:04
Mathematics
Abstract algebra
Algebra
Elliptic curves
Analytic number theory
Diophantine geometry
Number theory
Elliptic curve cryptography
Elliptic curve
Birch and Swinnerton-Dyer conjecture
Rank of an elliptic curve
Twists of curves

Twisted L-Functions and Monodromy Nicholas M. Katz Contents Introduction

Add to Reading List

Source URL: web.math.princeton.edu

Download Document from Source Website

File Size: 922,42 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Finite fields / Integer factorization algorithms / Elliptic curves / Group theory / Lenstra elliptic-curve factorization / Elliptic curve / Elliptic curve primality / Factorization of polynomials over finite fields

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Public-key cryptography / Group theory / Elliptic-curve cryptography / Elliptic curve / XTR / Elliptic curve only hash / Supersingular isogeny key exchange

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Finite fields / Algebraic number theory / Frobenius endomorphism / Galois theory / Meurice / Jean-Jacques Quisquater / Mathematics

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

DocID: 1xUdt - View Document