{"id":"https://openalex.org/W4417292895","doi":"https://doi.org/10.48550/arxiv.2508.04340","title":"Riemann-Roch bases for arbitrary elliptic curve divisors and their application in cryptography","display_name":"Riemann-Roch bases for arbitrary elliptic curve divisors and their application in cryptography","publication_year":2025,"publication_date":"2025-08-06","ids":{"openalex":"https://openalex.org/W4417292895","doi":"https://doi.org/10.48550/arxiv.2508.04340"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2508.04340","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.04340","pdf_url":"https://arxiv.org/pdf/2508.04340","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2508.04340","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5120790970","display_name":"Artyom Kuninets","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Kuninets, Artyom","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5010039513","display_name":"E. S. Malygina","orcid":"https://orcid.org/0000-0003-0977-5999"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Malygina, Ekaterina","raw_affiliation_strings":[],"raw_orcid":null,"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5120790970"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.862500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.862500011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.1054999977350235,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.009200000204145908,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mceliece-cryptosystem","display_name":"McEliece cryptosystem","score":0.6837000250816345},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5037000179290771},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.48730000853538513},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.4812000095844269},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.44839999079704285},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.40470001101493835},{"id":"https://openalex.org/keywords/algebraic-geometry","display_name":"Algebraic geometry","score":0.3984000086784363},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.3982999920845032},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.38580000400543213}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.7491999864578247},{"id":"https://openalex.org/C16935551","wikidata":"https://www.wikidata.org/wiki/Q1042583","display_name":"McEliece cryptosystem","level":4,"score":0.6837000250816345},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5037000179290771},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.48730000853538513},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.4812000095844269},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.44839999079704285},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.40470001101493835},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.4025999903678894},{"id":"https://openalex.org/C68363185","wikidata":"https://www.wikidata.org/wiki/Q180969","display_name":"Algebraic geometry","level":2,"score":0.3984000086784363},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3982999920845032},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.38580000400543213},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.384799987077713},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.3817000091075897},{"id":"https://openalex.org/C77926391","wikidata":"https://www.wikidata.org/wiki/Q603880","display_name":"Finite field","level":2,"score":0.37290000915527344},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.3677000105381012},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.36399999260902405},{"id":"https://openalex.org/C198082693","wikidata":"https://www.wikidata.org/wiki/Q1551631","display_name":"Gr\u00f6bner basis","level":3,"score":0.35199999809265137},{"id":"https://openalex.org/C47750902","wikidata":"https://www.wikidata.org/wiki/Q1557574","display_name":"Key size","level":4,"score":0.3456000089645386},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.3068999946117401},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.30379998683929443},{"id":"https://openalex.org/C68782407","wikidata":"https://www.wikidata.org/wiki/Q5177153","display_name":"Counting points on elliptic curves","level":5,"score":0.302700012922287},{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.2793000042438507},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C203492994","wikidata":"https://www.wikidata.org/wiki/Q909669","display_name":"Divisor (algebraic geometry)","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.27489998936653137},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.2644999921321869},{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.25949999690055847}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2508.04340","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.04340","pdf_url":"https://arxiv.org/pdf/2508.04340","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2508.04340","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2508.04340","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2508.04340","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2508.04340","pdf_url":"https://arxiv.org/pdf/2508.04340","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"explicit":[3,28],"constructions":[4],"of":[5,20,26,46,87],"bases":[6],"for":[7,30,64,100,109],"Riemann-Roch":[8],"spaces":[9],"associated":[10,49],"with":[11,50,53],"arbitrary":[12,31,51],"divisors":[13,32,52],"on":[14],"elliptic":[15,88],"curves.":[16],"In":[17],"the":[18,24,67,71,101],"context":[19],"algebraic":[21],"geometry":[22],"codes,":[23,60],"knowledge":[25],"an":[27],"basis":[29],"is":[33,78],"especially":[34],"valuable,":[35],"as":[36],"it":[37,77],"enables":[38],"efficient":[39],"code":[40],"construction.":[41],"From":[42],"a":[43,93],"cryptographic":[44],"point":[45],"view,":[47],"codes":[48,91],"many":[54],"points":[55],"are":[56],"closer":[57],"to":[58,81],"Goppa":[59],"making":[61],"them":[62],"attractive":[63],"embedding":[65],"in":[66,74,96],"McEliece":[68,102],"cryptosystem.":[69],"Using":[70],"results":[72],"obtained":[73],"this":[75],"work,":[76],"also":[79],"possible":[80],"efficiently":[82],"construct":[83],"quasi-cyclic":[84],"subfield":[85],"subcodes":[86],"codes.":[89],"These":[90],"enable":[92],"significant":[94],"reduction":[95],"public":[97],"key":[98],"size":[99],"cryptosystem":[103],"and,":[104],"consequently,":[105],"represent":[106],"promising":[107],"candidates":[108],"integration":[110],"into":[111],"post-quantum":[112],"code-based":[113],"schemes.":[114]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
