Примеры использования Elliptic curve на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
They are a particular case of Enoki surfaces which have a cycle of rational curves with zero self-intersection but without elliptic curve.
These include: Suite B- a set of public key algorithm standards based on elliptic curve cryptography.
the Albanese mapping maps to an elliptic curve, and all its fibers are rational with a cusp.
Take a non-trivial line bundle over an elliptic curve, remove the zero section,
If a given set of nine points in the complex plane is the set of inflections of an elliptic curve C, it is also the set of inflections of every curve in a pencil of curves generated by C
B is straightforward for those familiar with a Diffie-Hellman key exchange or its elliptic curve variant.
Critical point(mathematics) Ecological threshold Hesse configuration formed by the nine inflection points of an elliptic curve Ogee, an architectural form with an inflection point Vertex(curve), a local minimum or maximum of curvature Problems in mathematical analysis.
the difficulty of computing discrete logarithms in a carefully chosen elliptic curve group.
the Miller-Rabin test), the elliptic curve test proves primality(or compositeness)
Hasse's theorem is equivalent to the determination of the absolute value of the roots of the local zeta-function of E. In this form it can be seen to be the analogue of the Riemann hypothesis for the function field associated with the elliptic curve.
A curve which attains the maximum number of real components is called an M-curve(from"maximum")- for example, an elliptic curve with two components, such as y 2 x 3- x,{\displaystyle y^{ 2}= x^{ 3}- x,} or the Trott curve, a quartic with four components, are examples of M-curves.
F is an elliptic curve, and G is a finite subgroup scheme of F acting on F by translations.
On the other hand, RLWE keys are larger than the keys sizes for currently used public key algorithms like RSA and Elliptic Curve Diffie-Hellman which require public key sizes of 3072 bits and 256 bits, respectively, to achieve a 128-bit level of security.
The algorithm has applications in elliptic curve cryptography where it is important to know the number of points to judge the difficulty of solving the discrete logarithm problem in the group of points on an elliptic curve.
provides an estimate of the number of points on an elliptic curve over a finite field,
The Bouncy Castle Java library before 1.51 does not validate that a point is within the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman(ECDH) key exchanges, aka an"invalid curve attack.
hence the existence of a rational point with y nonzero is equivalent to saying the elliptic curve has positive rank.
X a flat torus, or an elliptic curve, a Riemann surface of genus one with K 0; and X a hyperbolic surface,
Now, Lenstra elliptic curve factorization has the same asymptotic running time as QS(in the case where n has exactly two prime factors of equal size),
as the elliptic curve defined by the same equation as E but evaluated modulo p rather than modulo N. Define m p{\displaystyle m_{p}}