Skip to main content
Log in

Hashing to Elliptic Curves of \(j=0\) and Mordell–Weil Groups

  • Short Communications
  • Published:
Mathematical Notes Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. N. El Mrabet and M. Joye, Guide to Pairing-Based Cryptography, in Cryptography and Network Security Series (Chapman and Hall/CRC, New York, 2016).

    MATH  Google Scholar 

  2. D. Koshelev, Hashing to Elliptic Curves of \(j\)-Invariant \(1728\) , in IACR Cryptology, https:// eprint. iacr.org/2019/1294 (2019).

    Google Scholar 

  3. H. Inose, in Proceedings of the International Symposium on Algebraic Geometry (Books Kinokuniya, Kyoto, 1977), pp. 495–502.

    Google Scholar 

  4. M. Kuwata, Rikkyo Daigaku Sugaku Zasshi 49 (1), 91 (2000).

    Google Scholar 

  5. R. Kloosterman, Commentarii Mathematici Universitatis Sancti Pauli 54 (1), 69 (2005).

    MathSciNet  Google Scholar 

  6. A. Kumar and M. Kuwata, Nagoya Mathematical Journal 228, 124 (2017).

    Article  MathSciNet  Google Scholar 

  7. T. Shioda, in Proceedings of the Japan Academy, Series A, Mathematical Sciences 76 (5), 68 (2000).

    Article  Google Scholar 

  8. T. Shioda, Journal of the Mathematical Society of Japan 60 (4), 1083 (2008).

    Article  MathSciNet  Google Scholar 

  9. T. Shioda and M. Sch+-tt, in Mordell–Weil Lattices, A Series of Modern Surveys in Mathematics (Springer-Verlag, Singapore, 2019), Vol. 70, pp. 79–114.

    Google Scholar 

  10. T. Shioda and H. Inose, in Complex Analysis and Algebraic Geometry (Cambridge University Press, Cambridge, 1977), pp. 119–136.

    Article  Google Scholar 

  11. M. Kuwata and L. Wang, International Mathematics Research Notices 1993 (4), 113 (1993).

    Article  Google Scholar 

  12. J.-F. Mestre, in Comptes Rendus de l’Académie des Sciences, Series I - Mathematics 314 (12), 919 (1992).

    Google Scholar 

  13. D. Ulmer, in Arithmetic of \(L\)-functions, IAS / Park City Mathematics 18, 211 (2011).

    Article  Google Scholar 

  14. D. Koshelev, Magma Code, github: https://github.com/dishport/Hashing-to-elliptic-curves-of-j-0-and- Mordell-Weil-groups (2020).

    Google Scholar 

  15. J. Chahal, M. Meijer, and J. Top, Commentarii Mathematici Universitatis Sancti 49 (1), 79 (1999).

    Google Scholar 

  16. K. Oguiso and T. Shioda, Rikkyo Daigaku Sugaku Zasshi 40 (1), 83 (1991).

  17. I. Shimada and D. Zhang, Nagoya Mathematical Journal 161, 23 (2001).

    Article  MathSciNet  Google Scholar 

  18. T. Shioda, Rikkyo Daigaku Sugaku Zasshi 39 (2), 211 (1990).

    Google Scholar 

  19. K. Nishiyama, Japanese Journal of Mathematics 22 (2), 293 (1996).

    Article  MathSciNet  Google Scholar 

  20. S. Ma, in Proceedings of the American Mathematical Society 141 (1), 131 (2013).

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

The author expresses his deep gratitude to his scientific advisor M. Tsfasman and thanks A. Trepalin for help and useful comments.

Funding

This work was supported in part by the Russian Foundation for Basic Research under grant no. 19-31-90029\(\backslash\)19.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. Koshelev.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Koshelev, D. Hashing to Elliptic Curves of \(j=0\) and Mordell–Weil Groups. Math Notes 108, 748–751 (2020). https://doi.org/10.1134/S0001434620110140

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0001434620110140

Keywords

Navigation