<--- Back to Details
First PageDocument Content
Algebraic number theory / Analytic number theory / Elliptic curve / Quadratic form / Algebraic number field / Transcendental number / Algebraic integer / Ideal class group / Prime number / Abstract algebra / Mathematics / Algebra
Date: 2004-10-19 06:36:06
Algebraic number theory
Analytic number theory
Elliptic curve
Quadratic form
Algebraic number field
Transcendental number
Algebraic integer
Ideal class group
Prime number
Abstract algebra
Mathematics
Algebra

Contributions to Algebraic Number Theory from India Dipendra Prasad October 19, 2004 There was a conference organised at the Institite of Mathematical Sciences, Madras in 1997 on the occasion of the 50th anniversary of I

Add to Reading List

Source URL: www.math.tifr.res.in

Download Document from Source Website

File Size: 186,04 KB

Share Document on Facebook

Similar Documents

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

DocID: 1xUdt - View Document