In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which have an advantage in performing point multiplication while keeping the security of ECC over finite fields. We give a method to select generators of the cryptographic groups, and give a way to represent the elements of the quotient groups with finitely bounded storage by establishing a bijection between these elements and their approximate coordinates. The addition formula under this representation is also presented.
We determine the set of degrees between some classes of oriented closed (n - 1)-connected 2n-manifolds by using the arithmetic theory of quadratic forms.
Let λsym2f(n) be the n-th coefficient in the Dirichlet series of the symmetric square L-function associated with a holomorphic primitive cusp form f.We prove Ω± results for λsym2f(n) and evaluate the number of positive(resp.,negative) λsym2f(n) in some intervals.
The ring of global differential operators of a variety is in closed and deep relation with its automorphism scheme.This relation can be applied to the study of homogeneous schemes,giving some criteria of homogeneity,a generalization of Serre-Lang theorem,and some consequences about abelian varieties.
LI KeZheng Department of Mathematics,Capital Normal University,Beijing 100048,China
In this paper we give an alternative computation of integral spinor norms over dyadic local fields by using the Jordan decomposition of W-type.In particular,we emphasize the striking similarity between the theory over dyadic local fields and that over the local fields of characteristic 2.
L JianRui1 & XU Fei2,1Department of Mathematics,Jinan University,Guangzhou 510632,China