نتایج جستجو برای: elliptic hole

تعداد نتایج: 93290  

2013
S. Rajarajeswari S. Baghavathi Priya

Mobile ad hoc networks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Due to the nature of MANETs to design and maintaining security is challenging task for researcher in an open and distributed communication environment. This paper we proposed security architecture f...

2005
Marcus Ansorg

In this paper a new double-domain spectral method to compute binary black hole excision initial data is presented. The method solves a system of elliptic partial differential equations in the exterior of two excised spheres. At the surface of these spheres, boundary conditions need to be imposed. As such, the method can be used to construct arbitrary initial data corresponding to binary black h...

2003
Erik Schnetter

Apparent horizons are structures of spacelike hypersurfaces that can be determined locally in time. Closed surfaces of constant expansion (CE surfaces) are a generalisation of apparent horizons. I present an efficient method for locating CE surfaces. This method uses an explicit representation of the surface, allowing for arbitrary resolutions and, in principle, shapes. The CE surface equation ...

2009
Stephen R. Lau Harald P. Pfeiffer Jan S. Hesthaven

Inspiral of binary black holes occurs over a time-scale of many orbits, far longer than the dynamical time-scale of the individual black holes. Explicit evolutions of a binary system therefore require excessively many time-steps to capture interesting dynamics. We present a strategy to overcome the Courant-Friedrichs-Lewy condition in such evolutions, one relying on modern implicit-explicit ODE...

2008
Yujun Chen

In this paper I give an explicit conformal field theory description of (2+1)dimensional BTZ black hole entropy. In the boundary Liouville field theory I investigate the reducible Verma modules in the elliptic sector, which correspond to certain irreducible representations of the quantum algebra Uq(sl2)⊙Uq̂(sl2). I show that there are states that decouple from these reducible Verma modules in a s...

2002
Ken-ichi Maruno

Using Painlevé analysis, the Hirota multi-linear method and a direct ansatz technique, we study analytic solutions of the (1+1)-dimensional complex cubic and quintic Swift-Hohenberg equations. We consider both standard and generalized versions of these equations. We have found that a number of exact solutions exist to each of these equations, provided that the coefficients are constrained by ce...

Journal: :IACR Cryptology ePrint Archive 2004
Michael Scott Paulo S. L. M. Barreto

Pairing-based cryptosystems rely on bilinear non-degenerate maps called pairings, such as the Tate and Weil pairings defined over certain elliptic curve groups. In this paper we show how to compress pairing values, how to couple this technique with that of point compression, and how to benefit from the compressed representation to speed up exponentiations involving pairing values, as required i...

2003
Eric Brier Marc Joye

Elliptic curve cryptosystems are usually implemented over fields of characteristic two or over (large) prime fields. For large prime fields, projective coordinates are more suitable as they reduce the computational workload in a point multiplication. In this case, choosing for parameter a the value −3 further reduces the workload. Over Fp, not all elliptic curves can be rescaled through isomorp...

Journal: :IEICE Transactions 2004
Toru Akishita Tsuyoshi Takagi

The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny for resisting the refined differential power analysis by Goubin (Goubin’s attack). In this paper, we examine the countermeasure using isogeny against zero-value point (ZVP) attack that is generalization of Goubin’s att...

2009
M. Saniga R. M. Green P. Lévay P. Pracna P. Vrana

It is shown that the Veldkamp space of the unique generalized quadrangle GQ(2,4) is isomorphic to PG(5,2). Since the GQ(2,4) features only two kinds of geometric hyperplanes, namely point’s perp-sets and GQ(2,2)s, the 63 points of PG(5,2) split into two families; 27 being represented by perp-sets and 36 by GQ(2,2)s. The 651 lines of PG(5,2) are found to fall into four distinct classes: in parti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید