HFEM. Breaking the HFEM public key scheme

Size: px
Start display at page:

Download "HFEM. Breaking the HFEM public key scheme"

Transcription

1 4 Vol.4 No. 0 Joural o Commuicatios March 0 doi:0.969/j.iss x HFEM ( ,, MQ HFEM MQ MQ P09. A X(0) reaig the HFEM pulic ey scheme GU Chu-sheg,, (. chool of Computer Egieerig, Jiagsu Uiversity of hology, Chagzhou 00, Chia;. chool of Computer ciece ad echology, Uiversity of ciece ad echology of Chia, Hefei 007, Chia;. Key Laoratory of Cloud Computig & Itelliget Iformatio Processig of Chagzhou City, Chagzhou 00, Chia) Astract: o desig post-uatum pulic ey cryptography, Zhao, et al preseted a ovel pulic ey scheme ased o the MQ prolem. A euivalet secret ey could directly e solved from the pulic ey of their scheme y applyig the property of the ergodic matrix over fiite field. hus, the HFEM pulic ey scheme was roe. Key words: post-uatum cryptography; MQ-ased PKC; MQ prolem; cryptaalysis [,] [] [4~9] [4~6,8] GF( ) hamir [0~] [] [4] MQ (isectio multivariate uadratic euatio prolem) [4] MQ NP [4] HFEM(hidde field ergodic matrices) [4] (64007); (CJ000); (KYY07, KYY055) Foudatio Items: he Natioal Natural ciece Foudatio of Chia (64 07); he Applicatio Research Foudatio of Chagzhou (CJ000); he Research Foudatio of Jiagsu Uiversity of echology (KYY07, KYY055)

2 86 4 [4] W W W, E = E = E = ( W ) W = = E E [4] HFEM [4] m F F m GL ( F ) F I M M M M F E F [ E] = { E Z} m m A F F = { A A A } F x, y F x y = ( x y, L, x y, L, x y, L, x y ) F MQ- F m F i = j = ( x, L, x, y, L, y ) = {, L, } F V ( ) = { x x F } [4] HFEM ) ( A, ) A = { A, L, F = {, L, } F A E [ E] ) R GL ( F ) 0 ( ) ( ) i, j i j i, j 0 0 HFEM HFEM a x y =, ( a, F, =,, L, m) A } R = R[ ] F i j i j i = i i i F m ) R MQ [ r ( x, y), L, r ( x, y)] = RA ( x y) p = ( F, r = [ r ( x, y), L, r ( x, y)]) 4) s = ( A,, R) ) P = a ( a, F \ {0}) ) p P C = [ r ( a, ), L, r ( a, )] F \ {0} ) s C = ( R C) ( V ( A) V ( )) \ {0} ) s E( A,, ) ( x, y) ( F \{0}) ) ( x, y) ( a, ) P = x y = a [4] E ( A,, ).( x y) = Ra( ) = A,, A,, A,, A = L L L [4] A, ( A, ) E( A,, ) HFEM [4] MQ NP ( ) [4] HFEM MQ HFEM V ( ) f ( l ) E F [ E ] = f ( l ) f ( l ) = l I E f ( l ) f ( l ) f ( l ) ) f ( l ) f ( l ) = g ( l ) g ( l ) deg( g ( l )) = < deg( g ( l )) = gcd( g ( l ),

3 HFEM 87 g ( l )) = E f (0) = E 0 g (0) 0, g (0) 0 F deg( g ( l )) = g (0) 0 [ l ] /( g ) i r s { l i = 0, L, } l, l r s l l mod g( l ) 0 < e l l e e mod g ( l ) 0 < e mod g ( l ) ee gcd( g ( l ), g ( l )) = l mod f ( l ) 0 < e e < F [ E ] = f ( l ) E e l mod f ( l ) e = ( ) ( e e ) r ) f ( l ) f ( l ) = g( l ), r g( l ) g(0) 0 / r e e = l mod g( l ) f / r r r ( l ) = g( l ) ( l ) F F p F F p F F v v p ) r r ( l ) ( l v p v / r v / r p ( ) ( ) p = l l mod f ( l ) e e = l mod f ( l ) v / r ( ) ( p ( )) l F f ( l ) F [ l ] E F [ E ] = 0 f ( l ) E = { E, E, L, E } F [ E] p f ( l ) F [ l ] /( f ) r ( l ) F [ l ] /( f ) = E F r( l ) = l mod f ( l ) E r( E) F r( E) E F [ E] / / r r [ E] U{0} F f ( l ) E f ( E) E g( E ) = 0 [ E] = { E, E, L, E } F [ E] {,,, = I E L E } F [ E] V ( ) = V ( ) = F [ E] U{0} 0 F ( i =, L, ) I + E + L+ E = 0 E 0 ( E I + E + L+ E ) = E 0 E + E + + E = 0 = {, L, } F A = { A, L, } F R GL ( F ) R = R [ ] A F F [ E] = { I,, L, } R F [ E] HFEM R = R[ ] A A M A = R = = W W L W R R Q R = A = R R Q W R Q R Q + RA = = W R Q R Q + R GL ( F ) A [5] i ( L ) R R Q = L R R Q R Q R Q + R Q + R Q W W L W L ( L ) F ( )

4 88 4 ra( R) + ra( A) ra( RA) mi(ra( R), ra( A)) ra( RA) = W GL ( F ) F W GL ( F ) W = ( W ) W = Q = W W = { I,, L, } A = W [ E], A O( ) 4 i i =,, ( - ) O( ) = O( ) A O( ) = O( ) F C F R = R[ ] F \ {0}, A [ E] ) [4]HFEM ) ) E ( x, z) ( x, z) 4) (, z) = z j = j j ( i = i i)( j = j j) ( y j j j) = = j = z j j E( x, z) ( x A z ( C ) i i i) = = ( j = j j ) ( \ {0}) F F C a x A y = = F 5) = y j = j j y F \ {0} ( x, y) E( A,, C ) 6) ( x, y) E( A,, C ) ( ) {( d x, d y) d F \ {0}) 7) HFEM P = x y 4 HFEM ( = =5) HFEM HFEM A HFEM 4. HFEM E = 0 = { I, E, E } = ,, A 0 A = A = 0 A R = [ E] A A A R R = = R = R A A A A A A = A R F [ E] A ) R F W W W W W W = =

5 HFEM W ) ( W ) ) 0 = E( x, z) = W W = = 4 = W = 4 4 = = ) W = 4 4 W = ), A = A =, 4 4 A = R P = a = ( 4 ) ( ) C L R P = [ r ( a, ),, r ( a, )] = 4 0 = ( ) = a = i j Ai = i j j 4.4 ) [4] A E( A,, C ) ) i = i i j = j j C a ( x A )( y ) = = z j j j = = ( ( ) ) = x A = ( z C i i i j = j j ) ) E( x, z) x 4, z = ( 0 ) =( ) 4 4 4) (, z) = z = j= j j 4 4 = y 5) = = y j j j 4 ( x, y) E( A,, C ) = ( ) ( x, y) E( A,, C ) ( ) {( d x, d y) d F \ {0}) 5 6) P = x y P = P HFEM [4] HFEM HFEM [] HOR P W. Polyomial-time algorithms for prime factorizatio ad discrete logarithms o a uatum computer[j]. IAM Joural o Computig, 997, 6(5): [] PROO J, ZALKA C. hors discrete logarithm uatum algorithm for elliptic curves[j]. Quatum Iformatio ad Computatio, 00, (4):7-44. [] UCHMANN J, DING J. Post-uatum cryptography[a]. he ecod Iteratioal Worshop, PQCrypto 008[C]. Ciciati, UA, 7-9. [4],,. GF( ) [J]., 005, 6 ():5-9. ZHAO Y Z, HUANG L, JIANG Z H. Ergodic matrix over GF ( ) ad its properties[j]. Mii- micro ystems, 005, 6 ():5-9. [5] ZHAO Y Z, WANG L O, ZHANG W. Iformatio-exchage usig the ergodic matrices i GF()[A]. d Iteratioal Coferece, ACN 004[C]. Amsterdam: Icisa Press, [6],,. [J]., 007, 8 (): ZHAO Y Z, PEI H, WANG H J, et al. Usig the ergodic matrices over fiite field to costruct the dyamic ecryptor[j]. Mii-Micro ystems, 007, 8 (): [7] PEI H, ZHAO H W, ZHAO Y Z. Pulic ey cryptography ased o ergodic matrices over fiite field[j]. Wuha Uiversity Joural of Natural cieces, 006, (6): [8]. F hamir [J]., 006, 7(6): ZHAO Y Z, JIANG Z H, HUANG L. Implemetatio of hamir s three pass protocol ased o ergodic matrix over fiite field[j]. Mii- Micro ystems, 006, 7(6):

6 98 4 [] G Americas, MIMO ad smart ateas for G ad 4G wireless systems: practical aspects ad deploymet cosideratios[e/ol] [4] EDELMAN A. Eigevalues ad Coditio Numer of Radom Matrices[D]. Dept Mathematics, MI, Camridge, MA, 989. [5] OEGE C, CLERCKX. MIMO Wireless Commuicatios: From Real-World Propagatio to pace-ime Code Desig[M]. urligto: Academic Press, 007. [6] E D, VIWANAH P. Fudametals of Wireless Commuicatio[M]. Camridge, UK : Camridge Uiversity Press, 005. [7] ULINO A M, VERDU. Radom Matrix heory ad Wireless Commuicatios[M]. osto: Now Pulishers Ic, 004. [8] KYOI P, MEINILA J, HEUKA L. WINNER II chael mode : part II radio chael measuremet ad aalysis results[e/ol] [9],. ( ) [J]. :, 006, 4(5): UN Y X, ZHAO Y Z, YANG Y J, et al. cheme to costruct oe-way (trapdoor) fuctios ased o ergodic matrices[j]. Joural of Jili Uiversity: Iformatio ciece Editio, 006, 4(5): [0] MONICO C. emirigs ad emigroup Actios i Pulic-Key Cryptography[D]. Notre Dame: Uiversity of Notre Dame, 00. [] MAZE G. Algeraic Methods for Costructig Oe-Way rapdoor Fuctios[D]. Notre Dame: Uiversity of Notre Dame, 00. []. [D]. :, 008. HUANG H W. Cryptographic Applicatios of emigroup Actio Prolem[D]. Xi a: Xidia Uiversity, 008. [],,. [J]., 00, 8(8): PEI H, ZHAO Y Z, ZHAO H W. Pulic ey ecryptio scheme ased o the ergodic matrices[j]. Chiese Joural of Electroics, 00, 8(8): [4],,. HFEM [J].,0,(6):4-. ZHAO Y Z, ZHAO, PEI H, et al. Desig ad implemet o the HFEM pulic ey scheme[j]. Joural o Commuicatios, 0,(6): 4-. [5] HORN R A, JOHNON C R. Matrix Aalysis[M]. Camridge Uiversity Press, MIMO

Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication

Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication Joural of Iformatio Hidig ad Multimedia Sigal Processig c 26 ISSN 273-422 Ubiquitous Iteratioal Volume 7, Number 4, July 26 Excellet Performaces of The Third-level Disturbed Chaos i The Cryptography Algorithm

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

Identity-Based Cryptography on Hidden-Order Groups

Identity-Based Cryptography on Hidden-Order Groups vailable olie at www.sciecedirect.com Procedia Egieerig 9 (0) 067 07 0 Iteratioal Worshop o Iformatio ad Electroics Egieerig (IWIEE) Idetity-Based Cryptography o Hidde-Order Groups Chalgu Li a a Key Laboratory

More information

SPANNING SIMPLICIAL COMPLEXES OF n-cyclic GRAPHS WITH A COMMON EDGE. Guangjun Zhu, Feng Shi and Yuxian Geng

SPANNING SIMPLICIAL COMPLEXES OF n-cyclic GRAPHS WITH A COMMON EDGE. Guangjun Zhu, Feng Shi and Yuxian Geng Iteratioal Electroic Joural of Algera Volume 15 2014 132-144 SPANNING SIMPLICIAL COMPLEXES OF -CYCLIC GRAPHS WITH A COMMON EDGE Guagju Zhu, Feg Shi ad Yuxia Geg Received: 1 August 2013; Revised: 5 Novemer

More information

A New Simulation Model of Rician Fading Channel Xinxin Jin 1,2,a, Yu Zhang 1,3,b, Changyong Pan 4,c

A New Simulation Model of Rician Fading Channel Xinxin Jin 1,2,a, Yu Zhang 1,3,b, Changyong Pan 4,c 6 Iteratioal Coferece o Iformatio Egieerig ad Commuicatios Techology (IECT 6 ISB: 978--6595-375-5 A ew Simulatio Model of Ricia Fadig Chael Xixi Ji,,a, Yu Zhag,3,b, Chagyog Pa 4,c Tsighua atioal Laboratory

More information

FLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University

FLUID LIMIT FOR CUMULATIVE IDLE TIME IN MULTIPHASE QUEUES. Akademijos 4, LT-08663, Vilnius, LITHUANIA 1,2 Vilnius University Iteratioal Joural of Pure ad Applied Mathematics Volume 95 No. 2 2014, 123-129 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v95i2.1

More information

POWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS

POWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS Joural of Applied Mathematics ad Computatioal Mechaics 4 3(3) 3-8 POWER SERIES SOLUION OF FIRS ORDER MARIX DIFFERENIAL EQUAIONS Staisław Kukla Izabela Zamorska Istitute of Mathematics Czestochowa Uiversity

More information

NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS

NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS Joural of Applied Aalysis ad Computatio Volume 5, Number 2, May 25, 22 23 Website:http://jaac-olie.com/ doi:.948/252 NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS Jie Su,2, Wei Qiao

More information

A Note on the Kolmogorov-Feller Weak Law of Large Numbers

A Note on the Kolmogorov-Feller Weak Law of Large Numbers Joural of Mathematical Research with Applicatios Mar., 015, Vol. 35, No., pp. 3 8 DOI:10.3770/j.iss:095-651.015.0.013 Http://jmre.dlut.edu.c A Note o the Kolmogorov-Feller Weak Law of Large Numbers Yachu

More information

Nettree for maximum disjoint paths with length constraint in DAG

Nettree for maximum disjoint paths with length constraint in DAG 36 8 Vol.36 No.8 205 8 Joural o Commuicatios August 205 doi:0.959/j.iss.000-436x.20545 2. 30040 2. 30040 k (GP, greedy path) k+ k+ GP O(wk(p+q)) O(k(p+q)+ 2 ) GP GP TP30 A Nettree for maximum disjoit paths

More information

Solution of Differential Equation from the Transform Technique

Solution of Differential Equation from the Transform Technique Iteratioal Joural of Computatioal Sciece ad Mathematics ISSN 0974-3189 Volume 3, Number 1 (2011), pp 121-125 Iteratioal Research Publicatio House http://wwwirphousecom Solutio of Differetial Equatio from

More information

Linear Algebra Issues in Wireless Communications

Linear Algebra Issues in Wireless Communications Rome-Moscow school of Matrix Methods ad Applied Liear Algebra August 0 September 18, 016 Liear Algebra Issues i Wireless Commuicatios Russia Research Ceter [vladimir.lyashev@huawei.com] About me ead of

More information

Internal Information Representation and Processing

Internal Information Representation and Processing Iteral Iformatio Represetatio ad Processig CSCE 16 - Fudametals of Computer Sciece Dr. Awad Khalil Computer Sciece & Egieerig Departmet The America Uiversity i Cairo Decimal Number System We are used to

More information

On the Connectivity of One-dimensional Vehicular Ad Hoc Networks

On the Connectivity of One-dimensional Vehicular Ad Hoc Networks RESEARCH PAPER 论文集锦 O the Coectivity of Oe-dimesioal Vehicular Ad Hoc Networs Liao Jiaxi 1,2, Li Yuazhe 1,2, Li Toghog 3, Zhu Xiaomi 1,2, Zhag Lei 1,2 1 State Key Laboratory of Networig ad Switchig Techology,

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 11, November 2012 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com A Digital Sigature Algorim

More information

Energy of a Hypercube and its Complement

Energy of a Hypercube and its Complement Iteratioal Joural of Algebra, Vol. 6, 01, o. 16, 799-805 Eergy of a Hypercube ad its Complemet Xiaoge Che School of Iformatio Sciece ad Techology, Zhajiag Normal Uiversity Zhajiag Guagdog, 54048 P.R. Chia

More information

Non-negative Matrix Factorization for Filtering Chinese Document *

Non-negative Matrix Factorization for Filtering Chinese Document * No-egative Matrix Factorizatio for Filterig Chiese Documet * Jiaiag Lu,,3, Baowe Xu,, Jixiag Jiag, ad Dazhou Kag Departmet of Computer Sciece ad Egieerig, Southeast Uiversity, Naig, 0096, Chia Jiagsu Istitute

More information

ANTI-SYNCHRONIZING SLIDING CONTROLLER DESIGN FOR IDENTICAL PAN SYSTEMS

ANTI-SYNCHRONIZING SLIDING CONTROLLER DESIGN FOR IDENTICAL PAN SYSTEMS ANTI-SYNCHRONIZING SLIDING CONTROLLER DESIGN FOR IDENTICAL PAN SYSTEMS Sudarapadia Vaidyaatha Research ad Developmet Cetre, Vel Tech Dr. RR & Dr. SR Techical Uiversity Avadi, Cheai-600 062, Tamil Nadu,

More information

The DOA Estimation of Multiple Signals based on Weighting MUSIC Algorithm

The DOA Estimation of Multiple Signals based on Weighting MUSIC Algorithm , pp.10-106 http://dx.doi.org/10.1457/astl.016.137.19 The DOA Estimatio of ultiple Sigals based o Weightig USIC Algorithm Chagga Shu a, Yumi Liu State Key Laboratory of IPOC, Beijig Uiversity of Posts

More information

Research Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences

Research Article A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences Discrete Dyamics i Nature ad Society Article ID 210761 4 pages http://dxdoiorg/101155/2014/210761 Research Article A Uified Weight Formula for Calculatig the Sample Variace from Weighted Successive Differeces

More information

Unsaturated Solutions of A Nonlinear Delay Partial Difference. Equation with Variable Coefficients

Unsaturated Solutions of A Nonlinear Delay Partial Difference. Equation with Variable Coefficients Europea Joural of Mathematics ad Computer Sciece Vol. 5 No. 1 18 ISSN 59-9951 Usaturated Solutios of A Noliear Delay Partial Differece Euatio with Variable Coefficiets Xiagyu Zhu Yuahog Tao* Departmet

More information

Complexity Analysis of Highly Improved Hybrid Turbo Codes

Complexity Analysis of Highly Improved Hybrid Turbo Codes I J C T A, 8(5, 015, pp. 433-439 Iteratioal Sciece Press Complexity Aalysis of Highly Improved Hybrid Turbo Codes M. Jose Ra* ad Sharmii Eoch** Abstract: Moder digital commuicatio systems eed efficiet

More information

Quantum Simulation: Solving Schrödinger Equation on a Quantum Computer

Quantum Simulation: Solving Schrödinger Equation on a Quantum Computer Purdue Uiversity Purdue e-pubs Birc Poster Sessios Birc Naotechology Ceter 4-14-008 Quatum Simulatio: Solvig Schrödiger Equatio o a Quatum Computer Hefeg Wag Purdue Uiversity, wag10@purdue.edu Sabre Kais

More information

Generating Functions for Laguerre Type Polynomials. Group Theoretic method

Generating Functions for Laguerre Type Polynomials. Group Theoretic method It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet

More information

Some Results on Certain Symmetric Circulant Matrices

Some Results on Certain Symmetric Circulant Matrices Joural of Iformatics ad Mathematical Scieces Vol 7, No, pp 81 86, 015 ISSN 0975-5748 olie; 0974-875X prit Pulished y RGN Pulicatios http://wwwrgpulicatioscom Some Results o Certai Symmetric Circulat Matrices

More information

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

On Some Inverse Singular Value Problems with Toeplitz-Related Structure

On Some Inverse Singular Value Problems with Toeplitz-Related Structure O Some Iverse Sigular Value Problems with Toeplitz-Related Structure Zheg-Jia Bai Xiao-Qig Ji Seak-Weg Vog Abstract I this paper, we cosider some iverse sigular value problems for Toeplitz-related matrices

More information

Modified Logistic Maps for Cryptographic Application

Modified Logistic Maps for Cryptographic Application Applied Mathematics, 25, 6, 773-782 Published Olie May 25 i SciRes. http://www.scirp.org/joural/am http://dx.doi.org/.4236/am.25.6573 Modified Logistic Maps for Cryptographic Applicatio Shahram Etemadi

More information

Information Hiding Problems: Hiding Capacity and Key Design

Information Hiding Problems: Hiding Capacity and Key Design Iformatio Hidig Problems: Hidig Capacity ad Key Desig Joseph. O Sulliva Electroic Systems ad Sigals Research Laboratory Departmet of Electrical Egieerig Washigto Uiversity i St. Louis Iformatio Hidig Problems

More information

Efficient Reverse Converter Design for Five Moduli

Efficient Reverse Converter Design for Five Moduli Joural of Computatios & Modellig, vol., o., 0, 93-08 ISSN: 79-765 (prit), 79-8850 (olie) Iteratioal Scietific ress, 0 Efficiet Reverse Coverter Desig for Five Moduli Set,,,, MohammadReza Taheri, Elham

More information

DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS. Park Road, Islamabad, Pakistan

DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS. Park Road, Islamabad, Pakistan Mathematical ad Computatioal Applicatios, Vol. 9, No. 3, pp. 30-40, 04 DECOMPOSITION METHOD FOR SOLVING A SYSTEM OF THIRD-ORDER BOUNDARY VALUE PROBLEMS Muhammad Aslam Noor, Khalida Iayat Noor ad Asif Waheed

More information

gcd(n, k) = 1 Kwang Ho Kim 1 and Sihem Mesnager 2 Pyongyang, Democratic People s Republic of Korea

gcd(n, k) = 1 Kwang Ho Kim 1 and Sihem Mesnager 2 Pyongyang, Democratic People s Republic of Korea Solvig x 2k + + x + a = 0 i F 2 gcd, k = with Kwag Ho Kim ad Sihem Mesager 2 Istitute of Mathematics, State Academy of Scieces ad PGItech Corp., Pyogyag, Democratic People s Republic of Korea khk.cryptech@gmail.com

More information

Chandrasekhar Type Algorithms. for the Riccati Equation of Lainiotis Filter

Chandrasekhar Type Algorithms. for the Riccati Equation of Lainiotis Filter Cotemporary Egieerig Scieces, Vol. 3, 00, o. 4, 9-00 Chadrasekhar ype Algorithms for the Riccati Equatio of Laiiotis Filter Nicholas Assimakis Departmet of Electroics echological Educatioal Istitute of

More information

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314

More information

AN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC MAPS

AN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC MAPS http://www.paper.edu.c Iteratioal Joural of Bifurcatio ad Chaos, Vol. 1, No. 5 () 119 15 c World Scietific Publishig Compay AN OPEN-PLUS-CLOSED-LOOP APPROACH TO SYNCHRONIZATION OF CHAOTIC AND HYPERCHAOTIC

More information

A q-analogue of some binomial coefficient identities of Y. Sun

A q-analogue of some binomial coefficient identities of Y. Sun A -aalogue of some biomial coefficiet idetities of Y. Su arxiv:008.469v2 [math.co] 5 Apr 20 Victor J. W. Guo ad Da-Mei Yag 2 Departmet of Mathematics, East Chia Normal Uiversity Shaghai 200062, People

More information

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 0, Issue 3, Ver. I (May - Ju.205), PP 08-3 www.iosrjourals.org A New Class of Terary Zero Correlatio

More information

The fundamental mappings over group E a,b

The fundamental mappings over group E a,b 157 The fudametal mappigs over group E Abdelhakim Chillali M hammed Boulgouaz ICM 2012, 11-14 March, Al Ai Abstract I this work we study the fudametal mappigs of group E [5], group of a elliptic curve

More information

International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn:

International Journal of Engineering Science Invention Research & Development; Vol. II Issue VIII February e-issn: Iteratioal Joural of Egieerig Sciece Ivetio Research & Developmet; Vol. II Issue VIII February 216 www.ijesird.com eissn: 236 MULTIPLE ENCRYPTIONS OF VARIOUS CIPHERS A. ChadraSekhar*,1, B.Ravi Kumar 2,

More information

Estimating the φ(n) of Upper/Lower Bound in its RSA Cryptosystem

Estimating the φ(n) of Upper/Lower Bound in its RSA Cryptosystem Estimatig the φ() of Upper/Lower Boud i its RSA Cryptosystem Cheglia Liu 1 ad Ziwei Ye 2 1 Departmet of Electrical Egieerig, Natioal Tsig-Hua Uiversity, Taiwa cheglia.liu@gmail.com 2 Departmet of Computer

More information

Estimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable

Estimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable Iteratioal Joural of Probability ad Statistics 01, 1(4: 111-118 DOI: 10.593/j.ijps.010104.04 Estimatio of Populatio Mea Usig Co-Efficiet of Variatio ad Media of a Auxiliary Variable J. Subramai *, G. Kumarapadiya

More information

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online):

Volume 3, Number 2, 2017 Pages Jordan Journal of Electrical Engineering ISSN (Print): , ISSN (Online): JJEE Volume 3, Number, 07 Pages 50-58 Jorda Joural of Electrical Egieerig ISSN (Prit: 409-9600, ISSN (Olie: 409-969 Liftig Based S-Box for Scalable Bloc Cipher Desig Based o Filter Bas Saleh S. Saraireh

More information

ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction

ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS. 1. Introduction t m Mathematical Publicatios DOI: 10.1515/tmmp-2016-0033 Tatra Mt. Math. Publ. 67 (2016, 93 98 ROTATION-EQUIVALENCE CLASSES OF BINARY VECTORS Otokar Grošek Viliam Hromada ABSTRACT. I this paper we study

More information

Four-dimensional Vector Matrix Determinant and Inverse

Four-dimensional Vector Matrix Determinant and Inverse I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat

More information

MANEUVERING TARGET TRACK PREDICTION MODEL

MANEUVERING TARGET TRACK PREDICTION MODEL Iteratioal Joural o Cyberetics & Iformatics (IJCI) Vol. 4 No. February 05 MANEUVERING ARGE RACK PREDICION MODEL igpig Yu Xiaomig You ad Sheg Liu 3 College of Electroic ad Electrical Egieerig Shaghai Uiversity

More information

Modified Ratio Estimators Using Known Median and Co-Efficent of Kurtosis

Modified Ratio Estimators Using Known Median and Co-Efficent of Kurtosis America Joural of Mathematics ad Statistics 01, (4): 95-100 DOI: 10.593/j.ajms.01004.05 Modified Ratio s Usig Kow Media ad Co-Efficet of Kurtosis J.Subramai *, G.Kumarapadiya Departmet of Statistics, Podicherry

More information

SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS. Levent Kargin and Veli Kurt

SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS. Levent Kargin and Veli Kurt Mathematical ad Computatioal Applicatios, Vol. 18, No. 3, pp. 33-39, 013 SOME RELATIONS ON HERMITE MATRIX POLYNOMIALS Levet Kargi ad Veli Kurt Departmet of Mathematics, Faculty Sciece, Uiversity of Adeiz

More information

A NOISY COMMUNICATION CHANNEL APPROACH FOR QUANTUM COMPUTING

A NOISY COMMUNICATION CHANNEL APPROACH FOR QUANTUM COMPUTING SDPS-3 Prited i the Uited States of America, October, 3 3 Society for Desig ad Process Sciece A OISY COMMUICATIO CHAEL APPROACH FOR QUATUM COMPUTIG Fa Xiog, Murat M. Taik Departmet of Electrical ad Computer

More information

Calderbank-Shor-Steane

Calderbank-Shor-Steane ISSN -985, CODEN RUXUEW E-mail: os@iscas.ac.c Joural of Software, Vol.7, No.3, March 6, pp.59 55 http://www.os.org.c DOI:.36/os759 Tel/Fax: +86--656563 6 by Joural of Software. All rights reserved. Calderbak-Shor-Steae,+,

More information

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers

Seed and Sieve of Odd Composite Numbers with Applications in Factorization of Integers IOSR Joural of Mathematics (IOSR-JM) e-issn: 78-578, p-issn: 319-75X. Volume 1, Issue 5 Ver. VIII (Sep. - Oct.01), PP 01-07 www.iosrjourals.org Seed ad Sieve of Odd Composite Numbers with Applicatios i

More information

Lainiotis filter implementation. via Chandrasekhar type algorithm

Lainiotis filter implementation. via Chandrasekhar type algorithm Joural of Computatios & Modellig, vol.1, o.1, 2011, 115-130 ISSN: 1792-7625 prit, 1792-8850 olie Iteratioal Scietific Press, 2011 Laiiotis filter implemetatio via Chadrasehar type algorithm Nicholas Assimais

More information

Design of Finite-Time Synchronization Controller and Its Application to Security Communication System

Design of Finite-Time Synchronization Controller and Its Application to Security Communication System Appl. Math. If. Sci. 8, No., 87-9 (4) 87 Applied Mathematics & Iformatio Scieces A Iteratioal Joural http://dx.doi.org/.785/amis/848 Desig of Fiite-Time Sychroizatio Cotroller ad Its Applicatio to Security

More information

Improving Middle Square Method RNG Using Chaotic Map

Improving Middle Square Method RNG Using Chaotic Map Applied Mathematics, 20, 2, 482-486 doi:0.4236/am.20.24062 Published Olie April 20 (http://www.scirp.org/joural/am) Improvig Middle Square Method RNG Usig Chaotic Map Abstract Hamed Rahimov, Majid Babaie,

More information

A meta-converse for private communication over quantum channels

A meta-converse for private communication over quantum channels A meta-coverse for private commuicatio over quatum chaels Mario Berta with Mark M. Wilde ad Marco Tomamichel IEEE Trasactios o Iformatio Theory, 63(3), 1792 1817 (2017) Beyod IID Sigapore - July 17, 2017

More information

DistOpt and Distributed Optimization Cassino, Italy

DistOpt and Distributed Optimization Cassino, Italy DistOpt: A Ptolemy-based Tool to Model ad Evaluate the Solutios of Optimizatio Problems i Distributed Eviromets Arturo Losi Uiversità degli Studi di Cassio, Italy losi@uicas.it UC Berkeley Ptolemy Miicoferece

More information

On Lower Bounds for the Communication Complexity of Private Information Retrieval

On Lower Bounds for the Communication Complexity of Private Information Retrieval IEICE TRANS FUNDAMENTALS, VOLE84 A, NO JANUARY 200 57 PAPER Special Sectio o Cryptography ad Iformatio Security O Lower Bouds for the Commuicatio Complexity of Private Iformatio Retrieval Toshiya ITOH,

More information

A New Sifting function J ( ) n+ 1. prime distribution. Chun-Xuan Jiang P. O. Box 3924, Beijing , P. R. China

A New Sifting function J ( ) n+ 1. prime distribution. Chun-Xuan Jiang P. O. Box 3924, Beijing , P. R. China A New Siftig fuctio J ( ) + ω i prime distributio Chu-Xua Jiag. O. Box 94, Beijig 00854,. R. Chia jiagchuxua@vip.sohu.com Abstract We defie that prime equatios f (, L, ), L, f (, L ) (5) are polyomials

More information

Lecture 7: MIMO Architectures Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 7: MIMO Architectures Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Theoretical Foudatios of Wireless Commuicatios 1 Thursday, May 19, 2016 12:30-15:30, Coferece Room SIP 1 Textbook: D. Tse ad P. Viswaath, Fudametals of Wireless Commuicatio 1 / 1 Overview Lecture 6:

More information

ON THE HADAMARD PRODUCT OF BALANCING Q n B AND BALANCING Q n

ON THE HADAMARD PRODUCT OF BALANCING Q n B AND BALANCING Q n TWMS J App Eg Math V5, N, 015, pp 01-07 ON THE HADAMARD PRODUCT OF ALANCING Q AND ALANCING Q MATRIX MATRIX PRASANTA KUMAR RAY 1, SUJATA SWAIN, Abstract I this paper, the matrix Q Q which is the Hadamard

More information

Quantum Computing Lecture 7. Quantum Factoring

Quantum Computing Lecture 7. Quantum Factoring Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates

More information

Intermittent demand forecasting by using Neural Network with simulated data

Intermittent demand forecasting by using Neural Network with simulated data Proceedigs of the 011 Iteratioal Coferece o Idustrial Egieerig ad Operatios Maagemet Kuala Lumpur, Malaysia, Jauary 4, 011 Itermittet demad forecastig by usig Neural Network with simulated data Nguye Khoa

More information

Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map

Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map America Joural of Sigal Processig 26, 6(): -3 DOI:.5923/j.ajsp.266. Chaos-Based Image Ecryptio Usig a Improved Quadratic Chaotic Map Noha Ramada,*, Hossam Eldi H. Ahmed, Said E. Elkhamy 2, Fathi E. Abd

More information

Complex Algorithms for Lattice Adaptive IIR Notch Filter

Complex Algorithms for Lattice Adaptive IIR Notch Filter 4th Iteratioal Coferece o Sigal Processig Systems (ICSPS ) IPCSIT vol. 58 () () IACSIT Press, Sigapore DOI:.7763/IPCSIT..V58. Complex Algorithms for Lattice Adaptive IIR Notch Filter Hog Liag +, Nig Jia

More information

Merkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum

Merkle-Hellman Knapsack Cryptosystem in Undergraduate Computer Science Curriculum Merkle-Hellma Kapsack Cryptosystem i Udergraduate Computer Sciece Curriculum Y. Kortsarts, Y. Kemper 2 Computer Sciece Departmet, Wideer Uiversity, Chester, PA, USA 2 Computer Sciece Departmet, Holo Istitute

More information

Weak Laws of Large Numbers for Sequences or Arrays of Correlated Random Variables

Weak Laws of Large Numbers for Sequences or Arrays of Correlated Random Variables Iteratioal Mathematical Forum, Vol., 5, o. 4, 65-73 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/.988/imf.5.5 Weak Laws of Large Numers for Sequeces or Arrays of Correlated Radom Variales Yutig Lu School

More information

The Adomian Polynomials and the New Modified Decomposition Method for BVPs of nonlinear ODEs

The Adomian Polynomials and the New Modified Decomposition Method for BVPs of nonlinear ODEs Mathematical Computatio March 015, Volume, Issue 1, PP.1 6 The Adomia Polyomials ad the New Modified Decompositio Method for BVPs of oliear ODEs Jusheg Dua # School of Scieces, Shaghai Istitute of Techology,

More information

TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction

TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES. 1. Introduction Math Appl 6 2017, 143 150 DOI: 1013164/ma201709 TRACES OF HADAMARD AND KRONECKER PRODUCTS OF MATRICES PANKAJ KUMAR DAS ad LALIT K VASHISHT Abstract We preset some iequality/equality for traces of Hadamard

More information

Research Article Approximate Riesz Algebra-Valued Derivations

Research Article Approximate Riesz Algebra-Valued Derivations Abstract ad Applied Aalysis Volume 2012, Article ID 240258, 5 pages doi:10.1155/2012/240258 Research Article Approximate Riesz Algebra-Valued Derivatios Faruk Polat Departmet of Mathematics, Faculty of

More information

Fuzzy Shortest Path with α- Cuts

Fuzzy Shortest Path with α- Cuts Iteratioal Joural of Mathematics Treds ad Techology (IJMTT) Volume 58 Issue 3 Jue 2018 Fuzzy Shortest Path with α- Cuts P. Sadhya Assistat Professor, Deptt. Of Mathematics, AIMAN College of Arts ad Sciece

More information

Proc. Amer. Math. Soc. 139(2011), no. 5, BINOMIAL COEFFICIENTS AND THE RING OF p-adic INTEGERS

Proc. Amer. Math. Soc. 139(2011), no. 5, BINOMIAL COEFFICIENTS AND THE RING OF p-adic INTEGERS Proc. Amer. Math. Soc. 139(2011, o. 5, 1569 1577. BINOMIAL COEFFICIENTS AND THE RING OF p-adic INTEGERS Zhi-Wei Su* ad Wei Zhag Departmet of Mathematics, Naig Uiversity Naig 210093, People s Republic of

More information

Particle Swarm Optimization Algorithm for the Shortest Confidence Interval Problem

Particle Swarm Optimization Algorithm for the Shortest Confidence Interval Problem JOURNAL OF COMPUTER, VOL. 7, NO. 8, AUGUT 0 809 Particle warm Optimizatio Algorithm for the hortest Cofece Iterval Problem hag Gao ad Zaiyue Zhag chool of Computer ciece ad Egieerig, Jiagsu Uiversity of

More information

A VERHULST MODEL ON TIME SERIES ERROR CORRECTED FOR PORT THROUGHPUT FORECASTING

A VERHULST MODEL ON TIME SERIES ERROR CORRECTED FOR PORT THROUGHPUT FORECASTING Joural of the Easter Asia Society for rasportatio Studies, Vol. 6, pp. 88-89, 005 A VERHUS MODE ON IME SERIES ERROR CORRECED FOR POR HROUGHPU FORECASING Zijia GUO Associate Professor School of Civil ad

More information

Control chart for number of customers in the system of M [X] / M / 1 Queueing system

Control chart for number of customers in the system of M [X] / M / 1 Queueing system Iteratioal Joural of Iovative Research i Sciece, Egieerig ad Techology (A ISO 3297: 07 Certified Orgaiatio) Cotrol chart for umber of customers i the system of M [X] / M / Queueig system T.Poogodi, Dr.

More information

A new iterative algorithm for reconstructing a signal from its dyadic wavelet transform modulus maxima

A new iterative algorithm for reconstructing a signal from its dyadic wavelet transform modulus maxima ol 46 No 6 SCIENCE IN CHINA (Series F) December 3 A ew iterative algorithm for recostructig a sigal from its dyadic wavelet trasform modulus maxima ZHANG Zhuosheg ( u ), LIU Guizhog ( q) & LIU Feg ( )

More information

Reliability model of organization management chain of South-to-North Water Diversion Project during construction period

Reliability model of organization management chain of South-to-North Water Diversion Project during construction period Water Sciece ad Egieerig, Dec. 2008, Vol. 1, No. 4, 107-113 ISSN 1674-2370, http://kkb.hhu.edu.c, e-mail: wse@hhu.edu.c Reliability model of orgaizatio maagemet chai of South-to-North Water Diversio Project

More information

Diophantine Equation. Has Infinitely Many Prime Solutions

Diophantine Equation. Has Infinitely Many Prime Solutions Diophatie Equatio + L+ λ + λ λ + L+ Has Ifiitely May rime Solutios Chu-Xua iag. O. Box 9, Beijig 0085,. R. Chia liukxi @ public. bta. et. c Abstract By usig the arithmetic fuctio we prove that Diophatie

More information

Cryptographic Secrecy Analysis of Matrix Embedding

Cryptographic Secrecy Analysis of Matrix Embedding 010 Iteratioal Coferece o Multimedia Iformatio etworkig ad Security Cryptographic Secrecy Aalysis of Matrix Embeddig Jiufe Liu Jiayog Che Weimig Zhag Tao Ha Departmet of Iformatio Research Zhegzhou Iformatio

More information

Analysis of Deutsch-Jozsa Quantum Algorithm

Analysis of Deutsch-Jozsa Quantum Algorithm Aalysis of Deutsch-Jozsa Quatum Algorithm Zhegju Cao Jeffrey Uhlma Lihua Liu 3 Abstract. Deutsch-Jozsa quatum algorithm is of great importace to quatum computatio. It directly ispired Shor s factorig algorithm.

More information

Comprehensive Bridge Health Evaluation Method Based on Information Fusion

Comprehensive Bridge Health Evaluation Method Based on Information Fusion MATEC Web of Cofereces 82, 03003 (2016) DOI: 10.1051/ mateccof/20168203003 Comprehesive Bridge Health Evaluatio Method Based o Iformatio Fusio Li-pig Li 1,a, We-xia Dig 2 ad Xiao-li Lu 3 1 Faculty of Egieerig,

More information

A new error bound for linear complementarity problems for B-matrices

A new error bound for linear complementarity problems for B-matrices Electroic Joural of Liear Algebra Volume 3 Volume 3: (206) Article 33 206 A ew error boud for liear complemetarity problems for B-matrices Chaoqia Li Yua Uiversity, lichaoqia@yueduc Megtig Ga Shaorog Yag

More information

Study on Coal Consumption Curve Fitting of the Thermal Power Based on Genetic Algorithm

Study on Coal Consumption Curve Fitting of the Thermal Power Based on Genetic Algorithm Joural of ad Eergy Egieerig, 05, 3, 43-437 Published Olie April 05 i SciRes. http://www.scirp.org/joural/jpee http://dx.doi.org/0.436/jpee.05.34058 Study o Coal Cosumptio Curve Fittig of the Thermal Based

More information

NUMERICAL METHOD FOR SINGULARLY PERTURBED DELAY PARABOLIC PARTIAL DIFFERENTIAL EQUATIONS

NUMERICAL METHOD FOR SINGULARLY PERTURBED DELAY PARABOLIC PARTIAL DIFFERENTIAL EQUATIONS THERMAL SCIENCE, Year 07, Vol., No. 4, pp. 595-599 595 NUMERICAL METHOD FOR SINGULARLY PERTURBED DELAY PARABOLIC PARTIAL DIFFERENTIAL EQUATIONS by Yula WANG *, Da TIAN, ad Zhiyua LI Departmet of Mathematics,

More information

Research Article Global Exponential Stability of Discrete-Time Multidirectional Associative Memory Neural Network with Variable Delays

Research Article Global Exponential Stability of Discrete-Time Multidirectional Associative Memory Neural Network with Variable Delays Iteratioal Scholarly Research Network ISRN Discrete Mathematics Volume 202, Article ID 8375, 0 pages doi:0.5402/202/8375 Research Article Global Expoetial Stability of Discrete-Time Multidirectioal Associative

More information

Computation of lower derivatives of rational triangular Bézier surfaces and their bounds estimation *

Computation of lower derivatives of rational triangular Bézier surfaces and their bounds estimation * 8 Zhag et al. / J Zheiag Uiv SCI 5 6A(Suppl. I):8-5 Joural of Zheiag Uiversity SCIENCE ISSN 9-95 http://www.zu.edu.c/zus E-mail: zus@zu.edu.c Computatio of lower derivatives of ratioal triagular ézier

More information

An Account of Congruences Mod p k Using Halley s Method

An Account of Congruences Mod p k Using Halley s Method World Applied Scieces Joural 16 (11): 166-160, 01 ISSN 1818-49 IDOSI Pulicatios, 01 A Accout of Cogrueces Mod p Usig Halley s Method M. Khalid Mahmood ad M. Aslam Mali Departmet of Mathematics, Uiversity

More information

Large Deviations Performance Analysis for Biometrics Recognition

Large Deviations Performance Analysis for Biometrics Recognition J.A. O Sulliva, 2002 Allerto Coferece Large Deviatios erformace Aalysis for Biometrics Recogitio Joseph A. O Sulliva ad Natalia Schmid Electroic Systems ad Sigals Research Laboratory Departmet of Electrical

More information

A Simple Secure Quantum Authorization Scheme

A Simple Secure Quantum Authorization Scheme A Simple Secure Quatum Authorizatio Scheme Xiaowe Zhag *, Xiaowei Xu, Ke Tag, Adis C. Kwa, Pig Ji 2, Li Leug 3, Xiagdog Li 4, Michael Ashel 5* CS Dept., Graduate Ceter, CUNY, 365 5 th Ave, NY, NY 6 2 Math

More information

Warped, Chirp Z-Transform: Radar Signal Processing

Warped, Chirp Z-Transform: Radar Signal Processing arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z

More information

Matrix inversion algorithm: applications in high speed MIMO LTE receiver

Matrix inversion algorithm: applications in high speed MIMO LTE receiver merica Joural of Networks ad Commuicatios 0; () : -6 Published olie December 30, 0 (http://www.sciecepublishiggroup.com/j/ajc) doi: 0.648/j.ajc.000. Matrix iversio algorithm: applicatios i high speed MIMO

More information

Research on real time compensation of thermal errors of CNC lathe based on linear regression theory Qiu Yongliang

Research on real time compensation of thermal errors of CNC lathe based on linear regression theory Qiu Yongliang d Iteratioal Coferece o Machiery, Materials Egieerig, Chemical Egieerig ad Biotechology (MMECEB 015) Research o real time compesatio of thermal errors of CNC lathe based o liear regressio theory Qiu Yogliag

More information

Bounds for the Extreme Eigenvalues Using the Trace and Determinant

Bounds for the Extreme Eigenvalues Using the Trace and Determinant ISSN 746-7659, Eglad, UK Joural of Iformatio ad Computig Sciece Vol 4, No, 9, pp 49-55 Bouds for the Etreme Eigevalues Usig the Trace ad Determiat Qi Zhog, +, Tig-Zhu Huag School of pplied Mathematics,

More information

Proof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients

Proof of a conjecture of Amdeberhan and Moll on a divisibility property of binomial coefficients Proof of a cojecture of Amdeberha ad Moll o a divisibility property of biomial coefficiets Qua-Hui Yag School of Mathematics ad Statistics Najig Uiversity of Iformatio Sciece ad Techology Najig, PR Chia

More information

Simon Blackburn. Sean Murphy. Jacques Stern. Laboratoire d'informatique, Ecole Normale Superieure, Abstract

Simon Blackburn. Sean Murphy. Jacques Stern. Laboratoire d'informatique, Ecole Normale Superieure, Abstract The Cryptaalysis of a Public Key Implemetatio of Fiite Group Mappigs Simo Blackbur Sea Murphy Iformatio Security Group, Royal Holloway ad Bedford New College, Uiversity of Lodo, Egham, Surrey TW20 0EX,

More information

Eigenvalues of Ikeda Lifts

Eigenvalues of Ikeda Lifts Eigevalues of Ikeda Lifts Rodey Keato Abstract I this paper we compute explicit formulas for the Hecke eigevalues of Ikeda lifts These formulas, though complicated, are obtaied by purely elemetary techiques

More information

A Numerical Method for Delayed Fractional-Order Differential Equations: Based on G-L Definition

A Numerical Method for Delayed Fractional-Order Differential Equations: Based on G-L Definition Appl. Math. If. Sci. 7, No. 2L, 525-529 (213) 525 Applied Mathematics & Iformatio Scieces A Iteratioal Joural http://dx.doi.org/1.12785/amis/72l22 A Numerical Method for Delayed Fractioal-Order Differetial

More information

elliptic curve cryptosystems using efficient exponentiation

elliptic curve cryptosystems using efficient exponentiation See discussios, stats, ad author profiles for this publicatio at: https://www.researchgate.et/publicatio/665870 elliptic curve cryptosystems usig efficiet expoetiatio Article Jauary 007 CITATIONS 0 READS

More information

Information Theory and Statistics Lecture 4: Lempel-Ziv code

Information Theory and Statistics Lecture 4: Lempel-Ziv code Iformatio Theory ad Statistics Lecture 4: Lempel-Ziv code Łukasz Dębowski ldebowsk@ipipa.waw.pl Ph. D. Programme 203/204 Etropy rate is the limitig compressio rate Theorem For a statioary process (X i)

More information

The Perturbation Bound for the Perron Vector of a Transition Probability Tensor

The Perturbation Bound for the Perron Vector of a Transition Probability Tensor NUMERICAL LINEAR ALGEBRA WITH APPLICATIONS Numer. Liear Algebra Appl. ; : 6 Published olie i Wiley IterSciece www.itersciece.wiley.com. DOI:./la The Perturbatio Boud for the Perro Vector of a Trasitio

More information

Factoring Algorithms and Other Attacks on the RSA 1/12

Factoring Algorithms and Other Attacks on the RSA 1/12 Factorig Algorithms ad Other Attacks o the RSA T-79550 Cryptology Lecture 8 April 8, 008 Kaisa Nyberg Factorig Algorithms ad Other Attacks o the RSA / The Pollard p Algorithm Let B be a positive iteger

More information

The average-shadowing property and topological ergodicity

The average-shadowing property and topological ergodicity Joural of Computatioal ad Applied Mathematics 206 (2007) 796 800 www.elsevier.com/locate/cam The average-shadowig property ad topological ergodicity Rogbao Gu School of Fiace, Najig Uiversity of Fiace

More information