scientific article; zbMATH DE number 1882020
From MaRDI portal
Publication:4797388
zbMATH Open1021.94522MaRDI QIDQ4797388FDOQ4797388
Authors: N. P. Smart
Publication date: 8 October 2003
Title of this publication is not available (Why is that?)
Recommendations
Cited In (25)
- Exploiting the Power of GPUs for Asymmetric Cryptography
- Arithmetic of the level four theta model of elliptic curves
- Addition law structure of elliptic curves
- Toric forms of elliptic curves and their arithmetic
- Krichever formal groups
- Twisted Hessian curves
- Protecting ECC against fault attacks: the ring extension method revisited
- A theta model for elliptic curves
- On the semantic security of functional encryption schemes
- The binary operations calculus in H
- Kummer and Hessian meet in the field of characteristic 2
- A note on the inverse problem for finite differential Galois groups
- Point multiplication on elliptic curves over finite fields using many-base number systems and new types of coordinates
- A simple point counting algorithm for Hessian elliptic curves in characteristic three
- Title not available (Why is that?)
- Isogenies on twisted Hessian curves
- Division polynomials on the Hessian model of elliptic curves
- Differential addition on binary elliptic curves
- Differential addition on binary elliptic curves
- Schwarz maps of algebraic linear ordinary differential equations
- Hashing into Hessian curves
- Parallelizing pairings on Hessian elliptic curves
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)
- The Brauer group of the moduli stack of elliptic curves over algebraically closed fields of characteristic 2
- Cryptography from the tropical Hessian pencil
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4797388)