搜索结果: 1-6 共查到“数学 pairing”相关记录6条 . 查询时间(0.093 秒)
Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring
Pairing-based algorithms jacobians of genus 2 curves maximal endomorphism ring Number Theory
2012/4/17
Using Galois cohomology, Schmoyer characterizes cryptographic non-trivial self-pairings of the $\ell$-Tate pairing in terms of the action of the Frobenius on the $\ell$-torsion of the Jacobian of a ge...
Heuristics on pairing-friendly elliptic curves
Elliptic curves finite fields pairing-based cryptography
2011/8/23
Abstract: We present a heuristic asymptotic formula as $x\to \infty$ for the number of pairing-friendly elliptic curves with fixed embedding degree $k\geq 3$, with fixed discriminant, with rho-value b...
Hochster's Theta Pairing and Algebraic Equivalence
Hochster's Theta Pairing Algebraic Equivalence
2010/11/24
We define a variant of Hochster's theta pairing and prove that it is constant in flat families of modules over hypersurfaces with isolated singularities. As a consequence, we show that the theta pair...
Brauer-Manin pairing, class field theory and motivic homology
Brauer group abelian fundamental group Wiesend’s ideal class group
2010/12/9
For a smooth proper variety over a p-adic field, the Brauer group and abelian fundamental group are related to the higher Chow groups by the Brauer-Manin pairing and the class field theory. We general...
A stochastic death pairing process
death process nonhomogeneous birth-death process bacteria harboring plasmids mean approximation
2009/1/5
In this article a stochastic death process in which particles of
two types combine and are removed from the system at a rate proportional
to the product of their numbers is considered. A simpler app...
Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing
Bilinear Pairing Collision Resistance Cryptographic Accumulators Identity Escrow Group Signature
2012/12/3
An accumulator based on bilinear pairings was proposed at CT-RSA’05. In this paper, we first demonstrate that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator which i...