526 research outputs found

    The geometry of efficient arithmetic on elliptic curves

    Full text link
    The arithmetic of elliptic curves, namely polynomial addition and scalar multiplication, can be described in terms of global sections of line bundles on E×EE\times E and EE, respectively, with respect to a given projective embedding of EE in Pr\mathbb{P}^r. By means of a study of the finite dimensional vector spaces of global sections, we reduce the problem of constructing and finding efficiently computable polynomial maps defining the addition morphism or isogenies to linear algebra. We demonstrate the effectiveness of the method by improving the best known complexity for doubling and tripling, by considering families of elliptic curves admiting a 22-torsion or 33-torsion point

    The Weierstrass subgroup of a curve has maximal rank

    Full text link
    We show that the Weierstrass points of the generic curve of genus gg over an algebraically closed field of characteristic 0 generate a group of maximal rank in the Jacobian

    Complete addition laws on abelian varieties

    Full text link
    We prove that under any projective embedding of an abelian variety A of dimension g, a complete system of addition laws has cardinality at least g+1, generalizing of a result of Bosma and Lenstra for the Weierstrass model of an elliptic curve in P^2. In contrast with this geometric constraint, we moreover prove that if k is any field with infinite absolute Galois group, then there exists, for every abelian variety A/k, a projective embedding and an addition law defined for every pair of k-rational points. For an abelian variety of dimension 1 or 2, we show that this embedding can be the classical Weierstrass model or embedding in P^15, respectively, up to a finite number of counterexamples for |k| less or equal to 5.Comment: 9 pages. Finale version, accepted for publication in LMS Journal of Computation and Mathematic

    Character sums with division polynomials

    Full text link
    We obtain nontrivial estimates of quadratic character sums of division polynomials Ψn(P)\Psi_n(P), n=1,2,...n=1,2, ..., evaluated at a given point PP on an elliptic curve over a finite field of qq elements. Our bounds are nontrivial if the order of PP is at least q1/2+ϵq^{1/2 + \epsilon} for some fixed ϵ>0\epsilon > 0. This work is motivated by an open question about statistical indistinguishability of some cryptographically relevant sequences which has recently been brought up by K. Lauter and the second author

    Théorie des nombres et cryptographie

    No full text
    Modern cryptographic constructions are based on constructions from number theory, but many of the links go deeper than typically realized. The development of modern cryptography runs in parallel to developments and central questions in number theory. After recalling some of the constructions used in modern public key cryptography, based on modular arithmetic, finite fields, lattices and elliptic curves, we describe some of their number theoretic origins. The first concerns the Riemann hypothesis and associated questions of distributions of prime numbers and smooth numbers, and of distributions of divisors of integers. Next we consider the origins of elliptic curve cryptography, beginning from Hasse's theorem, the conjectures of Weil, and Schoof's algorithm. Finally we mention the context of Mordell's theorem and the conjectures of Birch and Swinnerton-Dyer. In conclusion we consider the future prospects of these cryptosystems.Des constructions en cryptographie moderne sont basées sur la théorie des nombres. Toutefois, les liens entre ces deux domaines sont plus profonds qu'il n'y paraît. Le développement de la cryptographie moderne a eu lieu en parallele avec des developpements et des questions centrales en théorie des nombres. Après des rappels de constructions en cryptographie à clef publique, à base de l'arithmétique modulaire, des corps finis, des réseaux et des courbes elliptiques, nous décrivons quelques unes de ces racines en théorie des nombres. La première concerne l'hypothèse de Riemann et les questions associées sur la distribution des nombres premiers et des nombres friables, et des distributions des diviseurs d'entiers. Puis on considère les origines de la cryptographie à base de courbes elliptiques, en commençant par le théorème de Hasse, les conjectures de Weil, et l'algorithme de Schoof. Finalement on se place dans le contexte du théorème de Mordell et de la conjecture de Birch et Swinnerton-Dyer. En conclusion on considère les perspectives d'avenir pour ces cryptosystèmes

    On the quaternion \ell-isogeny path problem

    Full text link
    Let \cO be a maximal order in a definite quaternion algebra over Q\mathbb{Q} of prime discriminant pp, and \ell a small prime. We describe a probabilistic algorithm, which for a given left OO-ideal, computes a representative in its left ideal class of \ell-power norm. In practice the algorithm is efficient, and subject to heuristics on expected distributions of primes, runs in expected polynomial time. This breaks the underlying problem for a quaternion analog of the Charles-Goren-Lauter hash function, and has security implications for the original CGL construction in terms of supersingular elliptic curves.Comment: To appear in the LMS Journal of Computation and Mathematics, as a special issue for ANTS (Algorithmic Number Theory Symposium) conferenc

    On anticyclotomic mu-invariants of modular forms

    Full text link
    Let f be a modular form of weight 2 and trivial character. Fix also an imaginary quadratic field K. We use work of Bertolini-Darmon and Vatsal to study the mu-invariant of the p-adic Selmer group of f over the anticyclotomic Zp-extension of K. In particular, we verify the mu-part of the main conjecture in this context. The proof of this result is based on an analysis of congruences of modular forms, leading to a conjectural quantitative version of level-lowering (which we verify in the case that Mazur's principle applies)
    corecore