نتایج جستجو برای: elliptic curve cryptography

تعداد نتایج: 190018  

2012
Raluca Ada Popa Nickolai Zeldovich

In this document, we provide a cryptographic treatment of the adjustable join protocol from CryptDB [5]. We also discuss how our scheme could be used outside of CryptDB because it provides a simple functionality that may be needed in other settings. Intuitively, it is a pseudorandom permutation where an external party not knowing the secret key can nonetheless adjust a ciphertext under one key ...

2015
Rajaram Ramasamy M. Amutha Prabakar M. Indra Devi S. Pallam Setty

In this paper, we proposed a model for text encryption using elliptic curve cryptography (ECC) for secure transmission of text and by incorporating the Arithmetic/Huffman data compression technique for effective utilization of channel bandwidth and enhancing the security. In this model, every character of text message is transformed into the elliptic curve points 1 / 4

Journal: :Australasian J. Combinatorics 2000
Fernanda Pambianco Emanuela Ughi

The main problem on caps, posed originally by Segre in the fifties, is to determine the values of k for which there exists a complete k-cap. In the present paper, we construct in PG(3, q), for odd prime q, a family of ~ (q2 + 7)-caps which have 2 points on a line external to an elliptic quadric E and the remaining points on E. We conjecture that they are complete.

2005
MARTIN C. OLSSON

We describe an equivalence between the notion of balanced twisted curve introduced by Abramovich and Vistoli, and a new notion of log twisted curve, which is a nodal curve equipped with some logarithmic data in the sense of Fontaine and Illusie. As applications of this equivalence, we construct a universal balanced twisted curve, prove that a balanced twisted curve over a general base scheme ad...

Journal: :Periodica Mathematica Hungarica 2014
Julián Aguirre Andrej Dujella Mirela Jukic Bokun Juan Carlos Peral

There are 26 possibilities for the torsion group of elliptic curves de ned over quadratic number elds. We present examples of high rank elliptic curves with given torsion group which give the current records for most of the torsion groups. In particular, we show that for each possible torsion group, except maybe for Z/15Z, there exist an elliptic curve over some quadratic eld with this torsion ...

2008
Kwang Ho Kim Christophe Nègre

Elliptic curve cryptosystem protocols use two main operations, the scalar multiplication and the pairing computation. Both of them are done through a chain of basic operation on the curve. In this paper we present new formulas for supersingular elliptic curve in characteristic 2 and 3. We improve best known formulas by at least one multiplication in the field.

Journal: :IACR Cryptology ePrint Archive 2014
Daniel J. Bernstein Tung Chou Chitchanok Chuengsatiansup Andreas Hülsing Tanja Lange Ruben Niederhagen Christine van Vredendaal

This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a vulnerability in some curves that are not publicly known to be vulnerable. This cost includes the cost of exploiting the vulnerability, but also the initial cost of computing a curve suitable for sabo...

2009
Henri Darmon

This is a summary of a three-part lecture series given at the meeting on “Explicit methods in number theory” that was held in Oberwolfach from July 12 to 18, 2009. The theme of this lecture series was the explicit construction of algebraic points on elliptic curves from cycles on modular varieties. Given a fixed elliptic curve E over Q, the goal is to better understand the group E(Q̄) of algebra...

Journal: :The American Mathematical Monthly 2013
Will Traves

We prove a generalization of both Pascal’s Theorem and its converse, the Braikenridge–Maclaurin Theorem: If two sets of k lines meet in k2 distinct points, and if dk of those points lie on an irreducible curve C of degree d , then the remaining k(k − d) points lie on a unique curve S of degree k − d. If S is a curve of degree k − d produced in this manner using a curve C of degree d , we say th...

2014
Yuichiro HOSHI Yuichiro Hoshi

— In the present paper, we prove the finiteness of the set of moderate rational points of a once-punctured elliptic curve over a number field. This finitenessmay be regarded as an analogue for a once-punctured elliptic curve of the well-known finiteness of the set of torsion rational points of an abelian variety over a number field. In order to obtain the finiteness, we discuss the center of th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید