1
by Washington
Published 2003
2
by Hida, Haruzo., Hida, Haruzo.
Published 2013
Table of Contents: '; ...1 Non-triviality of Arithmetic Invariants -- 2 Elliptic Curves and Modular Forms -- 3 Invariants...
Get full text
3
Table of Contents: '; ... -- Explicit Methods for Hilbert Modular Forms -- Part III: Elliptic Curves -- Notes on the Parity Conjecture....
Get full text
4
Published 2016
Table of Contents: '; ...-CM elliptic curves -- 9. M.Kim: Diophantine geometry and non-abelian reciprocity laws I -- 10. G...
Get full text
5
Published 2008
Table of Contents: '; ... Equation -- Elliptic Curves Cryptology and Generalizations -- Abelian Varieties with Prescribed Embedding...
Get full text
6
by Omondi, Amos R., Omondi, Amos R.
Published 2020
Table of Contents: '; ..., Inversion, and Division -- 7 Mathematical Fundamentals II: Abstract Algebra -- 8 Elliptic-Curve Basics -- 9...
Get full text
7
Published 2016
Table of Contents: '; ...Elliptic curves -- Applications -- Irreducible polynomials.-Applications to cryptography -- Boolean...
Get full text
8
Published 2020
Table of Contents: '; ...Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy...
Get full text
9
Published 2017
Table of Contents: '; ...Pairing-based Protocols -- Quantum Algorithms -- Elliptic Curves -- Block Chains -- Multi-Party...
Get full text
10
Published 2016
Table of Contents: '; ...Digital signatures -- Public-key cryptography -- Block cipher cryptanalysis.-Elliptic curve...
Get full text
11
Published 2020
Table of Contents: '; ... -- Privacy -- Security -- IoT architectures -- Elliptic curves -- Mobil critical communications. ....
Get full text
12
Published 2017
Table of Contents: '; ... encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves...
Get full text
13
by Buell, Duncan., Buell, Duncan.
Published 2021
Table of Contents: '; ... -- 7. Elliptic Curves -- 8. Mathematics, Computing, and Arithmetic -- 9. Modern Symmetric Ciphers — DES...
Get full text
14
Published 2015
Table of Contents: '; ...System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve...
Get full text
15
Published 2013
Table of Contents: '; ... implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography...
Get full text
16
Table of Contents: '; ... and RSA -- Combinatorics, Probability and Information Theory -- Elliptic Curves and Cryptography...
Get full text
17
Published 2014
Table of Contents: '; ...Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography...
Get full text
18
Published 2017
Table of Contents: '; ... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....
Get full text
19
Published 2017
Table of Contents: '; ... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....
Get full text
20
Published 2016
Table of Contents: '; ...Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic...
Get full text