【摘 要】
:
In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the fo
【机 构】
:
Institute of Systems Science
【基金项目】
:
国家自然科学基金;国家重点基础研究发展规划(973计划)
论文部分内容阅读
In this paper we study the computation of the number of isomorphism classes of hyperelliptic curves of genus 2 over finite fields Fq with q even. We show the formula of the number of isomorphism classes, that is, for q = 2m, if 4 (|) m, then the formula is 2q3 + q2 - q;if 4 | m, then the formula is 2q3 + q2 - q + 8. These results can be used in the classification problems and the hyperelliptic curve cryptosystems.
其他文献
To reveal how the decoherence modifies the time evolution of the entanglement of quantum system,the intrinsic decoherence approach and the entanglement of forma
介绍了HLS(合肥光源)储存环注入系统建造与调试情况.重点讨论了各种公差、公差判断及抑制措施,经过改进与及仔细调整,得到了平均累积速率2-6mA/s的日常运行水平,最高累积流强
Reverse micelles create unique environment in organic media. They are capable of solubilizing hydrophilic biomolecules (e.g., proteins, peptides, amino acids, a
We report experimental evidence of in-situ Mg77Cu12Zn5Y6 bulk metallic glass (BMG) matrix composite with extraordinary plastic strain of 18.5% and specific stre
在中国原子能科学研究院的HI-13串列静电加速器上完成了114MeV和118.75MeV的19F+27Al耗散反应产物B,C,N,O,F,Ne,Na和Mg的微分截面测量.条形27Al同位素靶的大小尺寸为10mm×50
The effect of black plate on corrosion resistance of T5 tinplate was studied by glow discharge spectrograph,X-ray diffractometer (XRD), stress tester, roughness
Based on Reynolds average Navier-Storkes equations of viscous incompressible fluid and k-ε two equations turbulent model, the aerodynamic forces of high-speed
Lath-shaped and highly crystalline trioctahedral smectites were synthesized under hydrothermal conditions. The quenched glasses with stoichiometrically dehydrat
Support vector machines (SVMs) are not as favored for large-scale data mining as for pattern recognition and machine learning because the training complexity of
A new encryption/decryption system for optical information security is proposed in this paper. We used an iterative Fourier transform algorithm to optimize the