Special case of Bloch-Kato conjecture.
We prove that the BSD conjecture follows from the Bloch-Kato conjecture.
| Main Author: | Shchedrina, Daria |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/71814/ |
Similar Items
Conjectural variations in aggregative games: an evolutionary perspective
by: Possajennikov, Alex
Published: (2015)
by: Possajennikov, Alex
Published: (2015)
Baker's conjecture for functions with real zeros
by: Nicks, Daniel A., et al.
Published: (2018)
by: Nicks, Daniel A., et al.
Published: (2018)
Higher adelic programme, adelic Riemann-Roch theorems and the BSD conjecture
by: Czerniawska, Weronika
Published: (2018)
by: Czerniawska, Weronika
Published: (2018)
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022)
by: Muslim, Norliana
Published: (2022)
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)
by: Mohamed, Mohamad Afendee
Published: (2011)
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
by: Bafandehkar, Mohsen
Published: (2015)
by: Bafandehkar, Mohsen
Published: (2015)
Anabelian geometry of punctured elliptic curves
by: Porowski, Wojciech
Published: (2020)
by: Porowski, Wojciech
Published: (2020)
An improved public key cryptography based on the elliptic curve
by: Al-Daoud, Essam Faleh
Published: (2002)
by: Al-Daoud, Essam Faleh
Published: (2002)
Encrypting text data using elliptic curve cryptography
by: Ali, Abas Abdullahi
Published: (2018)
by: Ali, Abas Abdullahi
Published: (2018)
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
by: Abdulraheem, Waleed Khalid Amin
Published: (2019)
Kolyvagin Derivatives of Modular Points on Elliptic Curves
by: Hatton, Richard
Published: (2020)
by: Hatton, Richard
Published: (2020)
Galois theory of Mordell-Weil groups
by: Vavasour, Thomas
Published: (2019)
by: Vavasour, Thomas
Published: (2019)
Improving the security and encryption performance of cloud storage by using elliptic curve cryptography
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
by: Ismaeel, Nooruldeen Qutaiba
Published: (2016)
Properties of pseudo τ- adic non-adjacent form and the expansion of τ-adic non-adjacent form
by: Mohd Suberi, Syahirah
Published: (2017)
by: Mohd Suberi, Syahirah
Published: (2017)
Kembangan pseudotnaf untuk pendaraban skalar di atas lenkuk koblitz
by: Yunos, Faridah
Published: (2014)
by: Yunos, Faridah
Published: (2014)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Higher dimensional adeles, mean-periodicity and zeta functions of arithmetic surfaces
by: Oliver, Thomas David
Published: (2014)
by: Oliver, Thomas David
Published: (2014)
Multi-base number representation in application to scalar multiplication and pairing computation
by: Mohammed Ismail, Abdelwahed
Published: (2011)
by: Mohammed Ismail, Abdelwahed
Published: (2011)
Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
by: Hussein Fayiz, Mohammad Al-Khatib
Published: (2012)
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
by: Md Yasin, Sharifah
Published: (2011)
by: Md Yasin, Sharifah
Published: (2011)
Saturation of Mordell-Weil Groups of Elliptic Curves over Number Fields
by: Prickett, Martin
Published: (2004)
by: Prickett, Martin
Published: (2004)
Securing the image through the combination of elliptic curve cryptosystem and hill cipher encryption
by: Sulaiman, Saniah
Published: (2019)
by: Sulaiman, Saniah
Published: (2019)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
On The Diophantine Equation:Jesmanowicz Conjecture And Selected Special Cases
by: Ahmed Balfaqih, Abdulrahman Hamed
Published: (2020)
by: Ahmed Balfaqih, Abdulrahman Hamed
Published: (2020)
Analysis of Secondary Flow Instability and Forced Convection in Fluid Flow through Rectangular and Elliptical Curved Ducts
by: Chandratilleke, Tilak, et al.
Published: (2013)
by: Chandratilleke, Tilak, et al.
Published: (2013)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Development of Elliptic and Hyperbolic Grid Generation
by: Asmuin, Norzelawati
Published: (2000)
by: Asmuin, Norzelawati
Published: (2000)
Flyping conjectur
by: Azram, Mohammad
Published: (2013)
by: Azram, Mohammad
Published: (2013)
The Duchet conjecture
by: Prakash, V., et al.
Published: (1998)
by: Prakash, V., et al.
Published: (1998)
The rearguard of freedom: the John Birch Society and the development of modern conservatism in the United States, 1958-1968
by: Verhoeven, Bart L.
Published: (2015)
by: Verhoeven, Bart L.
Published: (2015)
On the origin of carbon dioxide released from rewetted soils
by: Fraser, F.C., et al.
Published: (2016)
by: Fraser, F.C., et al.
Published: (2016)
The almost everywhere convergence of eigenfunction expansions of elliptic differential operators in the Torus
by: Matarneh, Ehab Salem
Published: (2018)
by: Matarneh, Ehab Salem
Published: (2018)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The education of radical democracy
by: Amsler, Sarah
Published: (2015)
by: Amsler, Sarah
Published: (2015)
Learning hope: an epistemology of possibility for advanced capitalist society
by: Amsler, Sarah
Published: (2016)
by: Amsler, Sarah
Published: (2016)
Kato dalam pemikiran minang: asas pembinaan teori sastera multikultural peribumi
by: Fadlillah Pencuri Sutan,
Published: (2011)
by: Fadlillah Pencuri Sutan,
Published: (2011)
Review of Megumi Kato, Narrating the Other: Australian Literary Perceptions of Japan (2009)
by: Morris, Narrelle
Published: (2009)
by: Morris, Narrelle
Published: (2009)
On the reduction theory of binary forms
by: Cremona, John E, et al.
Published: (2001)
by: Cremona, John E, et al.
Published: (2001)
Gravitational redshifts and the mass distributions of galaxies and clusters
by: Coggins, Simon John
Published: (2003)
by: Coggins, Simon John
Published: (2003)
Formation Control of Multiple Elliptic Agents with Limited Sensing Ranges
by: Do, Khac
Published: (2012)
by: Do, Khac
Published: (2012)
Similar Items
-
Conjectural variations in aggregative games: an evolutionary perspective
by: Possajennikov, Alex
Published: (2015) -
Baker's conjecture for functions with real zeros
by: Nicks, Daniel A., et al.
Published: (2018) -
Higher adelic programme, adelic Riemann-Roch theorems and the BSD conjecture
by: Czerniawska, Weronika
Published: (2018) -
Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net
by: Muslim, Norliana
Published: (2022) -
On the Improvement of Addition Chain in Applications to Elliptic Curve Cryptosystem
Status: Submitted
by: Mohamed, Mohamad Afendee
Published: (2011)