Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • {{Short description|Type of elliptic curve}} ...some operations (see the last sections), it is close in speed to [[Edwards curve]]s. Twisted Hessian curves were introduced by [[Daniel J. Bernstein|Bernste ...
    7 KB (1,032 words) - 20:45, 23 December 2024
  • ...up addition and certain related operations that are used in elliptic curve cryptography algorithms. ...omputational operations. The rows of the table are for different models of elliptic curves. These are the operations considered: ...
    6 KB (855 words) - 10:50, 29 September 2024
  • ...sion points. They play a central role in the study of [[counting points on elliptic curves]] in [[Schoof's algorithm]]. * The division polynomials form a generic [[elliptic divisibility sequence]] over the ring <math>\mathbb{Q}[x,y,A,B]/(y^2-x^3-Ax ...
    5 KB (844 words) - 14:19, 28 December 2023
  • {{Short description|Type of elliptic curve}} ...bling oriented.svg|300px|right|thumb|A Doubling-oriented Doche-Icart-Kohel curve of equation <math>y^2=x^3-x^2-16x</math>]] ...
    7 KB (1,133 words) - 04:43, 30 November 2024
  • ...have higher order twists such as '''cubic''' and '''quartic twists'''. The curve and its twists have the same [[j-invariant]]. ...id=2326034 |issn=0012-7094}}</ref> and when generalized to [[hyperelliptic curve]]s, the study of the [[Sato–Tate conjecture]].<ref name="LLG2019">{{Cite jo ...
    8 KB (1,250 words) - 04:50, 30 November 2024
  • | genre = [[elliptic-curve cryptography|Elliptic-curve]] cryptographic library ...Longa |first2=Patrick |title=FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime |year=2015 |url=https://eprint.iacr.org/2015/565 |a ...
    7 KB (1,002 words) - 03:52, 7 July 2023
  • {{Short description|Type of elliptic curve}} ...date=March 2022}}; it is a particular type of [[elliptic curve|Weierstrass curve]]. At certain conditions some [[operation (mathematics)|operations]], as ad ...
    12 KB (1,809 words) - 22:06, 9 October 2024
  • ...ic-curve cryptography]]. Their vertices represent [[supersingular elliptic curve]]s over [[finite field]]s and their edges represent [[Isogeny|isogenies]] b ...ath>\ell</math>, and considering the class of all [[supersingular elliptic curve]]s defined over the [[finite field]] <math>\mathbb{F}_{p^2}</math>. There a ...
    6 KB (809 words) - 04:48, 30 November 2024
  • [[Image:Twisted Edwards curve.svg|300px|right|thumb|A twisted Edwards curve of equation <math>10x^2+y^2=1+6x^2y^2</math>]] ...tician)|Harold M. Edwards]]. Elliptic curves are important in [[public key cryptography]] and twisted Edwards curves are at the heart of an electronic signature sc ...
    10 KB (1,557 words) - 07:15, 7 February 2025
  • | name = Elliptic curve only hash (ECOH) '''The elliptic curve only hash (ECOH)''' algorithm was submitted as a candidate for SHA-3 in the ...
    11 KB (1,708 words) - 18:39, 7 January 2025
  • ...]] of the cryptosystem. This article covers algorithms to count points on elliptic curves over fields of large characteristic, in particular ''p''&nbsp;>&nbs ==Approaches to counting points on elliptic curves== ...
    14 KB (2,262 words) - 21:37, 30 December 2023
  • ...perties studied, by [[Morgan Ward]]<ref name="Ward">Morgan Ward, Memoir on elliptic divisibility sequences, ''Amer. J. Math.'' '''70''' (1948), 31&ndash;74.</r ...have applications to other areas of mathematics including [[logic]] and [[cryptography]]. ...
    11 KB (1,866 words) - 02:29, 5 March 2024
  • {{Short description|Family of elliptic curves used in cryptography}} ...leted image removed: [[Image:Edwards curve.jpg|300px|right|thumb|An Edward curve of equation <math>x^2+y^2=1-300x^2y^2</math>]] --> ...
    18 KB (2,963 words) - 11:45, 10 January 2025
  • {{Short description|Type of elliptic curve}} In [[mathematics]], the '''Montgomery curve''' is a form of [[elliptic curve]] introduced by [[Peter Montgomery (mathematician)|Peter L. Montgomery]] in ...
    15 KB (2,393 words) - 02:45, 16 February 2025
  • ...The Jacobi curve also offers faster arithmetic compared to the Weierstrass curve. The Jacobi curve can be of two types: the '''Jacobi intersection''', that is given by an int ...
    18 KB (2,905 words) - 13:54, 10 March 2024
  • ...|Lenstra]] heuristics, and [[elliptic curve]]s and their applications to [[cryptography]].{{cn|date=January 2023}} ...Elliptic_Curves.html?id=vPL19KNdm2wC ''Elliptic Curves: Number theory and cryptography''], CRC Press, 2003, 2nd edn. 2008 ...
    5 KB (589 words) - 07:48, 6 May 2024
  • ...arious [[cryptographic primitive]]s in private key as well as [[public-key cryptography]]. Their result is the construction of an efficient [[pseudorandom function The '''Naor–Reingold''' function can be used as the basis of many [[cryptography|cryptographic]] schemes including [[Symmetric-key algorithm|symmetric encr ...
    11 KB (1,605 words) - 19:53, 25 January 2024
  • ...n as '''Boneh&ndash;Lynn&ndash;Shacham'''<ref name=BLS2004/> (BLS), is a [[cryptography|cryptographic]] [[signature scheme]] which allows a user to verify that a s ...secret key is an integer in <math>[0,q-1]</math>. Working in an elliptic curve group provides some defense against [[index calculus]] attacks (with the ca ...
    9 KB (1,210 words) - 19:00, 27 February 2025
  • ...ecurity proof of Sakai-Kasahara's identity-based encryption scheme|journal=Cryptography ePrint Archive|volume=2005/226|url=http://eprint.iacr.org/2005/226.pdf}}</r * There is a bilinear map, a Tate-Lichtenbaum [[Pairing#Pairings in cryptography|pairing]], <math>\textstyle e(,)</math> from E to G. This means that for <m ...
    10 KB (1,576 words) - 07:26, 31 July 2024
  • ...ess of the [[discrete logarithm]] problem and the computational [[Elliptic curve Diffie–Hellman]]. ===Elliptic curves cryptography over a finite field=== ...
    16 KB (2,792 words) - 10:58, 19 August 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)