Примеры использования Elliptic curves на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
On Application of Elliptic Curves in Some Electronic Voting Protocols.
Atiyah(1957) gave the classification of vector bundles on elliptic curves.
The only known way to solve this problem on elliptic curves is via computing discrete-logs.
Annotation: The article describes secret sharing schemes based on polynomials on elliptic curves.
For elliptic curves over the rational numbers, the Hasse-Weil conjecture follows from the modularity theorem.
Schoof's algorithm is an efficient algorithm to count points on elliptic curves over finite fields.
The use of elliptic curves in cryptography was suggested independently by Neal Koblitz and Victor S. Miller in 1985.
The famous modularity theorem tells us that all elliptic curves over Q are modular.
Elliptic curves over finite fields are notably applied in cryptography and for the factorization of large integers.
Hence there must be an equation relating those a andb which describe isomorphic elliptic curves.
The level N modular curve X(N) is the moduli space for elliptic curves with a basis for the N-torsion.
A number of methods and algorithms were developed for the synthesis of asymmetric cryptographic systems in elliptic curves;
Restriction of scalars on abelian varieties(e.g. elliptic curves) yields abelian varieties, if L is separable over k.
Following this route, Alexander Polishchuk andEric Zaslow provided a proof of a version of the conjecture for elliptic curves.
An important aspect in the study of elliptic curves is devising effective ways of counting points on the curve. .
The security of SIDH is closely related to the problem of finding the isogeny mapping between two supersingular elliptic curves with the same number of points.
Some rely upon mathematical problems connected to elliptic curves, whereas others are connected to exotic concepts using lattices.
The connection here is similar, in that much of string theory is set in the language of Riemann surfaces,resulting in connections to elliptic curves, which in turn relate to q-series.
Cryptographic methods andalgorithms based on the elliptic curves over finite fields were developed for the creation of e-signature infrastructure.
The algorithm was published by René Schoof in 1985 and it was a theoretical breakthrough,as it was the first deterministic polynomial time algorithm for counting points on elliptic curves.
To complete the key exchange, A andB compute the coefficients of two new elliptic curves under these two new isogenies.
For abelian varieties, such as elliptic curves, this notion can also be formulated as follows: Let E1 and E2 be abelian varieties of the same dimension over a field k.
MuHASH ECOH- Elliptic Curve Only hash function- based on the concept of Elliptic curves, Subset Sum Problem and summation of polynomials.
In finite characteristic 2 and 3 one can also get quasi-elliptic surfaces, whose fibers may almost all be rational curves with a single node, which are"degenerate elliptic curves.
Unlike the method of De Feo, Jao, and Plut, the method of Rostovtsev andStolbunov used ordinary elliptic curves and was found to have a subexponential quantum attack.
The concept of using elliptic curves in factorization had been developed by H. W. Lenstra in 1985, and the implications for its use in primality testing(and proving) followed quickly.
The initial release of LibreSSL added a number of features: the ChaCha andPoly1305 algorithm, the Brainpool and ANSSI elliptic curves, and the AES-GCM and ChaCha20-Poly1305 AEAD modes.
An isogeny ϕ: E→ E′{\displaystyle\ phi:E\to E'} between elliptic curves, E{\displaystyle E} and E′{\displaystyle E'}, is a rational map which is also a group homomorphism.
In this period, we did interesting jobs over various cryptosystems, for instance,projecting of a system based on elliptic curves but the development of SAFER was the most significant one.