Theta Functions and Adiabatic Curvature on an Elliptic Curve

2022 ◽  
Vol 32 (3) ◽  
Author(s):  
Ching-Hao Chang ◽  
Jih-Hsin Cheng ◽  
I-Hsun Tsai
Mathematics ◽  
2020 ◽  
Vol 8 (12) ◽  
pp. 2119
Author(s):  
Mao-Ting Chien ◽  
Hiroshi Nakazato

A hyperbolic ternary form, according to the Helton–Vinnikov theorem, admits a determinantal representation of a linear symmetric matrix pencil. A kernel vector function of the linear symmetric matrix pencil is a solution to the inverse numerical range problem of a matrix. We show that the kernel vector function associated to an irreducible hyperbolic elliptic curve is related to the elliptic group structure of the theta functions used in the Helton–Vinnikov theorem.


2019 ◽  
Vol 7 ◽  
Author(s):  
JOHANNES SPRANG

A classical construction of Katz gives a purely algebraic construction of Eisenstein–Kronecker series using the Gauß–Manin connection on the universal elliptic curve. This approach gives a systematic way to study algebraic and $p$ -adic properties of real-analytic Eisenstein series. In the first part of this paper we provide an alternative algebraic construction of Eisenstein–Kronecker series via the Poincaré bundle. Building on this, we give in the second part a new conceptional construction of Katz’ two-variable $p$ -adic Eisenstein measure through $p$ -adic theta functions of the Poincaré bundle.


Author(s):  
Kazuki NAGANUMA ◽  
Takashi SUZUKI ◽  
Hiroyuki TSUJI ◽  
Tomoaki KIMURA

Author(s):  
Mohd Javed ◽  
Khaleel Ahmad ◽  
Ahmad Talha Siddiqui

WiMAX is the innovation and upgradation of 802.16 benchmarks given by IEEE. It has numerous remarkable qualities, for example, high information rate, the nature of the service, versatility, security and portability putting it heads and shoulder over the current advancements like broadband link, DSL and remote systems. Though like its competitors the concern for security remains mandatory. Since the remote medium is accessible to call, the assailants can undoubtedly get into the system, making the powerless against the client. Many modern confirmations and encryption methods have been installed into WiMAX; however, regardless it opens with up different dangers. In this paper, we proposed Elliptic curve Cryptography based on Cellular Automata (EC3A) for encryption and decryption the message for improving the WiMAX security


Author(s):  
Anna ILYENKO ◽  
Sergii ILYENKO ◽  
Yana MASUR

In this article, the main problems underlying the current asymmetric crypto algorithms for the formation and verification of electronic-digital signature are considered: problems of factorization of large integers and problems of discrete logarithm. It is noted that for the second problem, it is possible to use algebraic groups of points other than finite fields. The group of points of the elliptical curve, which satisfies all set requirements, looked attractive on this side. Aspects of the application of elliptic curves in cryptography and the possibilities offered by these algebraic groups in terms of computational efficiency and crypto-stability of algorithms were also considered. Information systems using elliptic curves, the keys have a shorter length than the algorithms above the finite fields. Theoretical directions of improvement of procedure of formation and verification of electronic-digital signature with the possibility of ensuring the integrity and confidentiality of information were considered. The proposed method is based on the Schnorr signature algorithm, which allows data to be recovered directly from the signature itself, similarly to RSA-like signature systems, and the amount of recoverable information is variable depending on the information message. As a result, the length of the signature itself, which is equal to the sum of the length of the end field over which the elliptic curve is determined, and the artificial excess redundancy provided to the hidden message was achieved.


Sign in / Sign up

Export Citation Format

Share Document