<--- Back to Details
First PageDocument Content
Mathematics / Number theory / Elliptic curves / Discrete mathematics / Analytic number theory / Conjectures / Rank of an elliptic curve / TateShafarevich group / Elliptic curve cryptography / Elliptic curve / Birch and Swinnerton-Dyer conjecture / Rational point
Date: 2018-07-25 13:17:43
Mathematics
Number theory
Elliptic curves
Discrete mathematics
Analytic number theory
Conjectures
Rank of an elliptic curve
TateShafarevich group
Elliptic curve cryptography
Elliptic curve
Birch and Swinnerton-Dyer conjecture
Rational point

Proc. Int. Cong. of Math. – 2018 Rio de Janeiro, Vol–412) HEURISTICS FOR THE ARITHMETIC OF ELLIPTIC CURVES Bjorn Poonen

Add to Reading List

Source URL: eta.impa.br

Download Document from Source Website

File Size: 405,16 KB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Finite fields / Integer factorization algorithms / Elliptic curves / Group theory / Lenstra elliptic-curve factorization / Elliptic curve / Elliptic curve primality / Factorization of polynomials over finite fields

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Public-key cryptography / Group theory / Elliptic-curve cryptography / Elliptic curve / XTR / Elliptic curve only hash / Supersingular isogeny key exchange

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Finite fields / Algebraic number theory / Frobenius endomorphism / Galois theory / Meurice / Jean-Jacques Quisquater / Mathematics

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

DocID: 1xUdt - View Document