An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Edwards curves are a new model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of F_q-isomorphism classes of Edwards curves and twisted Edwards curves. This answers a question recently asked by R
Mehra N. Borazjany, Linbin Yu, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
In this paper we present a case study of applying combinatorial testing to test a combinatorial test generation tool called ACTS. The purpose of this study is two-fold. First, we want to gain experience and insights about how to apply combinatorial testing
Kiran Shakya, Tao Xie, Nuo Li, Yu Lei, Raghu N. Kacker, D. Richard Kuhn
Combinatorial Testing (CT) is a systematic way of sampling input parameters of the software under test (SUT). A t-way combinatorial test set can exercise all behaviors of the SUT caused by interactions between t input parameters or less. Although
In the last few years, the need to design new cryptographic hash functions has led to the intense study of when desired hash multi-properties are preserved or assured under compositions and domain extensions. In this area, it is important to identify the
Dustin Moody, Souradyuti Paul, Daniel C. Smith-Tone
The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably low, only
As the usage of 3D models increases, so does the importance of developing accurate 3D shape retrieval algorithms. Most prominently, shape descriptors are used to describe the geometric and topological properties of objects and compared to determine two
At peak luminosity, Type Ia supernovae can be even brighter than their parent galaxies, and their light curves display a very uniform and regular behavior. This makes them excellent candidates for a role as standard candles in measuring the distances to
A TABLE ERRATA is submitted concerning a formula in terms of a sum of two Gauss hypergeometric functions for Ferrers function of the second kind. This error occurs on p. 167 of Magnus, Oberhettinger & Soni (1966) Formulas and Theorems for the Special
In this paper, we propose a quantification of the vulnerability of a communication network when links are subject to failures due to the actions of a strategic adversary. We model the adversarial nature of the problem as a 2-player game between a network
In this paper we look at three families of elliptic curves with rational 3-torsion over a finite field. These families include Hessian curves, twisted Hessian curves, and a new family we call generalized DIK curves. We find the number of Fq-isogeny classes
We show how the Fourier transform of a shape in any number of dimensions can be simplified using Gauss' law and evaluated explicitly for polygons in two dimensions, polyhedra three dimensions, etc. We also show how this combination of Fourier and Gauss can
Adam Z. Higgins, James Benson, Anthony J. Kearsley
Cryopreservation nearly universally depends on the equilibration of cells and tissues with high concentrations of permeating chemicals known as cryoprotective agents, or CPAs. Despite their protective properties, CPAs can cause damage as a result of
Seismic risk has social and physical aspects: although very different in nature, they are intertwined and share striking similarities. Seismic risk assessment involves models and data, and judgments of the potential impact of earthquakes, which must be
A number of important combinatorial counting problems can be reformulated into the problem of counting the number of leaf nodes on a tree. Since the basic leaf-counting problem is #P-complete, there is strong evidence that no polynomial time algorithm
David G. Harris, Francis Sullivan, Isabel M. Beichl
The reliability polynomial of a graph gives the probability that a graph is connected as a function of the probability that each edge is connected. The coefficients of the reliability polynomial count the number of connected subgraphs of various sizes
According to the Guide to the Expression of Uncertainty in Measurement (GUM), a result of measurement consists of a measured value together with its associated standard uncertainty. The measured value and the standard uncertainty are interpreted as the
Elizabeth R. Moseman, Isabel M. Beichl, Francis Sullivan
When a network is modeled by a graph and edges of the graph remain reliable with a given probability p, the probability of the graph remaining connected is called the reliability of the network. One form of the reliability polynomial has as coefficients
We consider the approximate pointwise control of a linear parabolic system with multiple targets. Assuming a hierarchy among the objectives, we derive optimality conditions for a particular test problem and provide numerical results.
R. Feng and H.Wu recently established a certain mean-value formula for the coordinates of the n-division points on an elliptic curve given inWeierstrass form (A mean value formula for elliptic curves, 2010, available at http://eprint.iacr.org/2009/586.pdf)
Ronald F. Boisvert, Charles W. Clark, Daniel W. Lozier, Frank W. Olver
The NIST Digital Library of Mathematical Functions (DLMF) is a reference work providing information on the properties of the special functions of applied mathematics. It is a successor to the highly successful NBS Handbook of Mathematical Functions
The Guide to the Expression of Uncertainty in Measurement (GUM) is self-consistent when Bayesian statistics is used for the Type A evaluations and the standard deviation of the posterior state-of-knowledge distribution is used as the Bayesian standard
Processors with multiple CPU cores have become widely available. Therefore it is useful to parallelize the Monte Carlo simulation process in the context of metrology. Different approaches for parallel computing including Monte Carlo simulations are
In this paper we fi nd division polynomials for Jacobi quartics. These curves are an alternate model for elliptic curves to the more common Weierstrass equation. Division polynomials for Weierstrass curves are well known, and the division polynomials we fi
For integral representations of associated Legendre functions in terms of modified Bessel functions, we establish justification for differentiation under the integral sign with respect to parameters. With this justification, derivatives for associated