Showing 1 - 20 results of 41 for search '"elliptic curve"', query time: 0.06s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Average Analytic Ranks of Elliptic Curves over Number Fields by Tristan Phillips

    Published 2025-01-01
    “…We give a conditional bound for the average analytic rank of elliptic curves over an arbitrary number field. In particular, under the assumptions that all elliptic curves over a number field K are modular and have L-functions which satisfy the Generalized Riemann Hypothesis, we show that the average analytic rank of isomorphism classes of elliptic curves over K is bounded above by $(9\deg (K)+1)/2$ , when ordered by naive height. …”
    Get full text
    Article
  5. 5

    An Elliptic Curve Based Schnorr Cloud Security Model in Distributed Environment by Vinothkumar Muthurajan, Balaji Narayanasamy

    Published 2016-01-01
    “…This paper investigates how the integrity and secure data transfer are improved based on the Elliptic Curve based Schnorr scheme. This paper proposes a virtual machine based cloud model with Hybrid Cloud Security Algorithm (HCSA) to remove the expired content. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9

    Elliptic-Curve Cryptography Implementation on RISC-V Processors for Internet of Things Applications by Preethi Preethi, Mohammed Mujeer Ulla, G. Praveen Kumar Yadav, Kumar Sekhar Roy, Ruhul Amin Hazarika, Kuldeep Saxena K.

    Published 2024-01-01
    “…Elliptic-curve cryptography (ECC) is a popular technique of public-key cryptography used for secure communications in Internet of Things (IoT) applications. …”
    Get full text
    Article
  10. 10
  11. 11

    Geometric design of two novel rotor profiles for Roots vacuum pumps with elliptical curve by Zhengqing Li, Xiaojun Wang, Xianhu Han, Yuhong Cai

    Published 2025-03-01
    “…This study proposes two novel elliptical rotor profiles: one designed with an elliptical curve at the top and the other with an elliptical curve at the waist. …”
    Get full text
    Article
  12. 12

    A high speed processor for elliptic curve cryptography over NIST prime field by Xianghong Hu, Xueming Li, Xin Zheng, Yuan Liu, Xiaoming Xiong

    Published 2022-07-01
    “…Abstract Elliptic curve cryptography (ECC), as one of the public key cryptography systems, has been widely applied to many security applications. …”
    Get full text
    Article
  13. 13
  14. 14

    An interesting family of curves of genus 1 by Andrew Bremner

    Published 2000-01-01
    Subjects: “…Elliptic curve…”
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Analysis of the Fault Attack ECDLP over Prime Field by Mingqiang Wang, Tao Zhan

    Published 2011-01-01
    “…An elliptic curve E is defined over prime field 𝔽p with base point P∈E(𝔽p). …”
    Get full text
    Article
  19. 19

    Private feasible solution determination by Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang

    Published 2021-01-01
    “…In this study, the authors propose a protocol based on elliptic curve cryptosystem for this problem and prove that the protocol is secure in the semi‐honest model. …”
    Get full text
    Article
  20. 20

    Kaplansky's ternary quadratic form by James Kelley

    Published 2001-01-01
    “…The proof is modelled on that of a similar theorem by Ono and Soundararajan, in which relations between the number of representations of an integer np2 by two quadratic forms in the same genus, the pth coefficient of an L-function of a suitable elliptic curve, and the class number formula prove the theorem for large primes, leaving 3 cases which are easily numerically verified.…”
    Get full text
    Article