Search

Your search keyword '"Elliptic curves"' showing total 8,472 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic curves" Remove constraint Descriptor: "Elliptic curves"
8,472 results on '"Elliptic curves"'

Search Results

4. Elliptic Curves

5. Extending Class Group Action Attacks via Sesquilinear Pairings

7. Intelligent two-phase dual authentication framework for Internet of Medical Things.

8. Lower bounds for the number of number fields with Galois group GL2(픽ℓ).

9. CM points, class numbers, and the Mahler measures of x^3+y^3+1-kxy.

10. Towards a classification of isolated j-invariants.

11. The probability of non-isomorphic group structures of isogenous elliptic curves in finite field extensions, II.

12. Non-zero central values of Dirichlet twists of elliptic L-functions.

13. Descent for projective twists of modular curves.

14. FPGA design and implementation for montgomery multiplication algorithm using MATLAB HDL coder.

15. Transcendental Brauer–Manin obstructions on singular K3 surfaces.

16. Finding integral points on elliptic curves over imaginary quadratic fields.

17. Blockchain-based cross-domain authentication in a multi-domain Internet of drones environment.

18. On towers of isogeny graphs with full level structures.

19. Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks.

20. L-function of CM elliptic curves and generalized hypergeometric functions.

21. Climbing and descending tall isogeny volcanos.

22. Interpolation of Polynomials and Singular Curves: Segre and Veronese Varieties.

23. Appell–Lerch sums and N=2 moduli: Appell–Lerch sums and N=2 moduli: E. Bouaziz.

25. Elliptic curves with complex multiplication and abelian division fields.

26. Input–Output Scheduling and Control for Efficient FPGA Realization of Digit-Serial Multiplication Over Generic Binary Extension Fields.

27. An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption.

28. Nonvanishing of L-function of some Hecke characters on cyclotomic fields.

29. The Implementations and Optimizations of Elliptic Curve Cryptography based Applications.

30. X25519와 Ed25519를 지원하는 특수 타원곡선 암호 프로세서.

31. Minimal subfields of elliptic curves.

32. Families of Prime-Order Endomorphism-Equipped Embedded Curves on Pairing-Friendly Curves.

33. Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field.

34. A deep learning-based surveillance system for enhancing public safety through internet of things and digital technology using Raspberry Pi.

35. Conjunctive Hierarchical Multi-Secret Sharing Scheme using Elliptic Curves.

36. Grade restriction and D-brane transport for a nonabelian GLSM of an elliptic curve.

37. PQ-LEACH: A novel post-quantum protocol for securing WSNs communication.

38. Password based authentication for web based graphics computing services retrieval in cloud.

39. Stability Conditions on Degenerated Elliptic Curves.

40. Effective Sato–Tate distributions for surfaces arising from products of elliptic curves.

41. Perfect powers in elliptic divisibility sequences.

42. p-Adic hypergeometric functions and the trace of Frobenius of elliptic curves.

44. Absolute zeta functions arising from ceiling and floor Puiseux polynomials.

45. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things.

46. Spectral Networks and Stability Conditions for Fukaya Categories with Coefficients.

47. Ideal class groups of division fields of elliptic curves and everywhere unramified rational points.

48. Secure Healthcare Monitoring and Attack Detection Framework using ELUS-BILSTM and STECAES.

49. CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist.

50. Finding orientations of supersingular elliptic curves and quaternion orders.

Catalog

Books, media, physical & digital resources