| 1. | Elliptic curve cryptography algorithms entered wide use in 2004 to 2005.
|
| 2. | The leathery leaves have an oblanceolate, elliptic or obovate shape.
|
| 3. | The equations for an individual slice are elliptic partial differential equations.
|
| 4. | The leaf blades are elliptic, lanceolate, ovate or circular.
|
| 5. | Each of the Hilda objects moves along its own elliptic orbit.
|
| 6. | Steady-state solutions to parabolic equations generally solve elliptic equations.
|
| 7. | The leaves are dark green and elliptic, long and wide.
|
| 8. | The bi-elliptic transfer consists of two half elliptic orbits.
|
| 9. | The bi-elliptic transfer consists of two half elliptic orbits.
|
| 10. | For example-\ Delta u = 0 is degenerate elliptic.
|