Sign of Permutation Induced by Nagata Automorphism over Finite Fields
|
|
- Osborn Hill
- 5 years ago
- Views:
Transcription
1 Journal of Mathematics Research; Vol. 9, No. 5; October 217 ISSN E-ISSN Published by Canadian Center of Science and Education Sign of Permutation Induced by Nagata Automorphism over Finite Fields Keisuke Hakuta 1 & Tsuyoshi Takagi 2,3 1 Interdisciplinary Graduate School of Science and Engineering, Shimane University, Shimane, Japan 2 Department of Mathematical Informatics, Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan 3 Japan Science and Technology Agency, CREST, Japan Correspondence: Keisuke Hakuta, Interdisciplinary Graduate School of Science and Engineering, Shimane University, 16 Nishikawatsu-cho, Matsue, Shimane, Japan. hakuta@cis.shimane-u.ac.jp Received: July 2, 217 Accepted: August 4, 217 Online Published: September 8, 217 doi:1.5539/jmr.v9n5p54 Abstract URL: This paper proves that the Nagata automorphism over a finite field can be mimicked by a tame automorphism which is a composition of four elementary automorphisms. By investigating the sign of the permutations induced by the above elementary automorphisms, one can see that if the Nagata automorphism is defined over a prime field of characteristic two, the Nagata automorphism induces an odd permutation, and otherwise, the Nagata automorphism induces an even permutation. Keywords: polynomial automorphism, finite field, permutation, nagata automorphism, multivariate polynomial cryptography 1. Introduction Throughout the paper K denotes a field and char(k) denotes the characteristic of the field K. Let K[X 1,..., X n ] be the polynomial ring in n indeterminates X 1,..., X n over K. For polynomials f 1,..., f n K[X 1,..., X n ], the n-tuple of polynomials F = ( f 1,..., f n ) is called a polynomial map. The set of polynomial maps over K and the set of maps from K n to itself are denoted by ME n (K) and Maps(K n, K n ), respectively. We can identify each polynomial map with a map from K n to itself via the following natural map π : ME n (K) Maps(K n, K n ). We denote the set of polynomial automorphisms (resp. affine automorphisms, elementary automorphisms) of K n by GA n (K) (resp. Aff n (K), EA n (K)). Recall that Aff n (K) K n GL n (K). We use the symbol TA n (K) to represent the subgroup of GA n (K) generated by two subgroups Aff n (K) and EA n (K). For F GA n (K), F is called tame automorphism if F TA n (K), and otherwise (F GA n (K) \ TA n (K)) F is called wild automorphism. The Tame Generators Problem asks whether GA n (K) = TA n (K), and is related to the Jacobian conjecture. The equality is trivially true for n = 1 and the equality still holds for n = 2 (Jung-van der Kulk theorem (Jung, 1942), (Kulk, 1953)). For n = 3, Nagata proved that σ GA 2 (K[X 3 ]) \ TA 2 (K[X 3 ]) (Nagata, 1972, Part 2, Theorem 1.4), and he conjectured that σ GA 3 (K) \ TA 3 (K) (Nagata, 1972, Part 2, Conjecture 3.1). The map σ is called the Nagata automorphism (See Equation (1) for the definition of σ). Shestakov and Umirbaev in (Shestakov & Umirbaev, 24, Corollary 9) finally gives an affirmative answer in the case where char(k) =. An algebro-geometric proof of this fact is given by Kishimoto (Kishimoto, 28). Smith (Smith, 1989) shows that the Nagata automorphism is stably tame, and Spodzieja (Spodzieja, 27) gives a direct proof of this fact. We refer to (Essen, 2) for more details. For any finite set T, we denote by Sym(T) (resp. Alt(T)) the symmetric group on T (resp. the alternating group on T). Let us denote by sgn : Sym(T) {±1} the sign function. When K is a finite field F q with q elements (p = char(f q ), q = p m, and m 1), we use the symbol π q instead of π: π q : ME n (F q ) Maps(F n q, F n q). If we restrict the map π q to GA n (F q ), π q (G) is a subgroup of Sym(F n q) for any subgroup G GA n (F q ). Maubach has investigated the subgroup π q (G) in the case G = TA n (F q ) (Maubach, 21, Theorem 2.3). 54
2 Theorem 1. If n 2, then π q (TA n (F q )) = Sym(F n q) if q is odd or q = 2. If q = 2 m where m 2 then π q (TA n (F q )) = Alt(F n q). If there exists F GA n (F 2 m) such that sgn (π 2 m(f)) = 1, then we must have F GA n (F 2 m) \ TA n (F 2 m). This indicates that the polynomial automorphism F is wild. Thus, the following question is very important (Maubach, 28, page 3, Problem). Question 1. For q = 2 m and m 2, do there exist polynomial automorphisms such that the permutations induced by the polynomial automorphisms belong to Sym(F n q) \ Alt(F n q)? It is a natural question to ask the sign of the famous polynomial automorphisms such as the Nagata automorphism (Nagata, 1972, Section 2.1, Equation (1.1)), the Anick automorphism (Cohn, 26, Section 6.1, page 398), and the Nagata- Anick automorphism (Cohn, 26, Section 6.1, page 398). This question is partially solved in the case of the Anick automorphism and the Nagata-Anick automorphism by Hakuta (Hakuta, 217b, Main Theorem 1 and Main Theorem 2). Hakuta also derives the sign of the permutations induced by the affine automorphisms and the elementary automorphisms (Hakuta, 217a, Main Theorem 1 and Main Theorem 2). Moreover, for a given tame automorphism over F q, we can compute the sign of the permutation induced by the tame automorphism over F q under the knowledge of a decomposition of the tame automorphism into a finite number of affine automorphisms and elementary automorphisms (Hakuta, 217a, Corollary 5). However, we emphasize that, at least in our knowledge, the answer of the above problem for the case of the Nagata automorphism over F q is unknown yet. Another motivation for considering the above question comes from multivariate polynomial cryptography (Ding, Gower, & Schmidt, 26). Multivariate polynomial cryptography is a potential candidate for post-quantum cryptography. One such example is the Tame Transformation Method (See, for example, (Chen & Moh, 21), (Ding & Hodges, 24), (Ding & Schmidt, 24), (Goubin & Courtois, 2), (Hakuta, Sato, & Takagi, 216), (Hrdina, Kureš, & Vašík, 21), (Moh, 1999), (Moh, 23), (Moh, Chen, & Yang, 24)). One of the building blocks for multivariate polynomial cryptography is a bijective polynomial map over F q. Thus, it is important to investigate mathematical properties of bijective polynomial maps over F q such as the sign of the permutations induced by bijective polynomial maps over F q, the classification of bijective polynomial maps over F q by individual computation (Maubach & Willems, 214), and so on. This paper proves that the Nagata automorphism over a finite field can be mimicked by a tame automorphism which is a composition of four elementary automorphisms. By investigating the sign of the permutations induced by the above elementary automorphisms, one can see that if the Nagata automorphism is defined over a prime field of characteristic two, the Nagata automorphism induces an odd permutation, and otherwise, the Nagata automorphism induces an even permutation. 2. Sign of Permutation Induced by Nagata Automorphism The Nagata automorphism is defined by The inverse of the Nagata automorphism σ is given by σ := (x 2(xz + y 2 )y (xz + y 2 ) 2 z, y + (xz + y 2 )z, z) GA 3 (K). (1) σ 1 = (x + 2(xz + y 2 )y (xz + y 2 ) 2 z, y (xz + y 2 )z, z). (2) We call π q (σ) the permutation induced by the Nagata automorphism. This section investigates the sign of the permutation π q (σ). Let t be a new variable. We first show that there exists a polynomial h(t) F q [t] such that h(α) = for α F q and h() = 1 for α =. In order to prove this claim, we define the polynomial f (t) F q [t] as follows: f (t) := (t c) F q [t]. c F q We put c := f (). By (Hakuta, 217b, page 26), we have c F q and h(t) := c 1 f (t) F q [t] satisfies the condition (α F h(α) = q), (3) 1 (α = ). We say that F GA n (F q ) can be mimicked by an element of a certain group G if there exists G G such that π q (F) = π q (G) (See (Maubach & Willems, 211, page 35) for more details). We prove the following lemma (Lemma 1) which states that the Nagata automorphism over F q can be mimicked by a composition of four elementary automorphisms. 55
3 Lemma 1. Let ϕ, λ, and ˆλ be elementary automorphisms defined by Then we have ϕ := (x + z q 2 y 2, y, z), λ := (x, y + z 2 x, z), ˆλ := (x 2h(z)y 3, y, z) EA 3 (F q ). π q (σ) = π q (ˆλ ϕ 1 λ ϕ). (4) In other words, the Nagata automorphism σ can be mimicked by ˆλ ϕ 1 λ ϕ TA 3 (F q ) which is a composition of four elementary automorphisms. Proof. It is easy to see that Since ϕ 1 = (x z q 2 y 2, y, z) EA 3 (F q ), we obtain π q (λ ϕ) = π q ((x, y + z 2 x, z) (x + z q 2 y 2, y, z)) π q (ϕ 1 λ ϕ) = π q ((x + z q 2 y 2, y + z 2 (x + z q 2 y 2 ), z)) = π q ((x + z q 2 y 2, y + (xz 2 + z q y 2 ), z)) = π q ((x + z q 2 y 2, y + (xz 2 + zy 2 ), z)) = π q ((x + z q 2 y 2, y + z(xz + y 2 ), z)). = π q ((x z q 2 y 2, y, z) (x + z q 2 y 2, y + z(xz + y 2 ), z)) = π q (((x + z q 2 y 2 ) z q 2 (y + z(xz + y 2 )) 2, y + z(xz + y 2 ), z)) = π q ((x 2(xz + y 2 )yz q 1 (xz + y 2 ) 2 z, y + (xz + y 2 )z, z)). Then we can see that (ϕ 1 σ(x, y, z) (z F λ ϕ)(x, y, z) = q), (x, y, ) σ(x, y, z) = (x 2y 3, y, ) (z = ). From Equation (3), we have (ˆλ ϕ 1 λ ϕ)(x, y, z) = σ(x, y, z) for all (x, y, z) F 3 q. Therefore, π q (σ) = π q (ˆλ ϕ 1 λ ϕ). From Lemma 1, it is sufficient to derive the sign of π q (λ) and π q (ˆλ). We compute sgn(π q (λ)) (resp. sgn(π q (ˆλ))) in Lemma 2 (resp. Lemma 3). We will use these lemmas to prove the main result of this paper (Main Theorem 1). Lemma 2. (Sign of π q (λ)) Let λ be as in Lemma 1. Then we have sgn(π q (λ)) = ( 1) pm 1 (p 1)(q 1) 2. (5) Namely, if q is odd or q = 2 m, m 2 then we have π q (λ) Alt(F 3 q). If q = 2 then we have π q (λ) Sym(F 3 q) \ Alt(F 3 q). Proof. Let us take two elements, z F q. We consider the following map λ (x,z ) : F 3 q F 3 q, One can see that the map λ (x,z ) is bijective. We take Since B ( λ (x,z )) B ( λ(x,z )) = for any ( x, z λ (x,z ) : F 3 q F 3 q (x, y, z) (x, y + z 2 x, z), if x = and z = z, (x, y, z) (x, y, z), otherwise. B ( λ (x,z )) := { (x, y, z) F 3 q λ(x,z )(x, y, z) (x, y, z) }. ) F q F q \ {(, z )}, we have λ =,z F q λ (x,z ), 56
4 which is a composition of disjoint permutations on F 3 q. We decompose the permutation λ (x,z ) as a composition of disjoint cycles on F 3 q for each (, z ) F q F q. In order to find such a decomposition, we define an equivalence relation (λ) on F q : y F q and y F q are equivalent if and only if there exists l {, 1,..., p 1} such that y = y lz 2. We set C (λ) y := {y F q y (λ) y }. We fix a complete system of representatives R λ for the equivalence relation (λ) on F q. Remark that R λ = q/p = p m /p = p m 1. For arbitrary R λ, we define the bijective map λ y,(,z ) : F 3 q F 3 q by λ y,(,z ) : F 3 q F 3 q (x, y, z) ( x, y + z 2 x, z ), if y C y (λ), x =, and z = z, (x, y, z) (x, y, z), otherwise. It is obvious from the definition of the map λ y,(,z ) that λ y,(,z ) is a cycle of length p. Namely, Let us take y R λ. If y C(λ) y then from C (λ) y sgn ( π q ( λy,(,z ))) = ( 1) p 1. C (λ) y λ (x,z ) = =, we have y R λ λ y,(,z ), which is a composition of disjoint cycles on F 3 q. Since π q and sgn are homomorphisms of groups, we obtain sgn ( π q (λ) ) ( ( = sgn πq λy,(,z ))),z F q,y R λ =.,z F q,y R λ ( 1) p 1 = ( 1) pm 1(p 1)(q 1)2 Thus, Equation (5) holds. Lemma 3. (Sign of π q (ˆλ)) Let ˆλ be as in Lemma 1. Then we have sgn(π q (ˆλ)) = 1. (6) Namely, we have π q (ˆλ) Alt(F 3 q). Proof. Since sgn(π q (ˆλ)) = 1 when char(f q ) = 2, it is sufficient to show the assertion for char(f q ) 2. We suppose that char(f q ) 2. By the definition of ˆλ and by Equation (3), we can easily see that (x, y, z) (z F ˆλ(x, y, z) = q), (x 2y 3, y, ) (z = ). Let us take an element y F q and we put z :=. We consider the following map ˆλ (y,z ) : F 3 q F 3 q, One can see that the map ˆλ (y,z ) is bijective. We take ˆλ (y,z ) : F 3 q F 3 q (x, y, z) (x 2y 3, y, z), if y F q and z =, (x, y, z) (x, y, z), otherwise. B (ˆλ (y,z )) := { (x, y, z) F 3 q ˆλ (y,z )(x, y, z) (x, y, z) }. Since B (ˆλ ) (y,z )) B (ˆλ (y,z ) = for any y F q \ {y }, we have ˆλ = ˆλ (y,z ), y F q 57
5 which is a composition of disjoint permutations on F 3 q. We decompose the permutation ˆλ (y,z ) as a composition of disjoint cycles on F 3 q for each y F q. In order to find such a decomposition, we define an equivalence relation (ˆλ) on F q : x F q and x F q are equivalent if and only if there exists l {, 1,..., p 1} such that x = x 2ly 3. We set C (ˆλ) x := {x F q x (ˆλ) x }. (ˆλ) We fix a complete system of representatives Rˆλ for the equivalence relation on F q. Remark that Rˆλ = q/p = pm /p = p m 1. For arbitrary Rˆλ, we define the bijective map ˆλ x,(y,z ) : F 3 q F 3 q by ˆλ x,(y,z ) : F 3 q F 3 q (x, y, z) ( x, y + z 2 x, z ), if x C (ˆλ), y = y, and z = z, (x, y, z) (x, y, z), otherwise. It is obvious from the definition of the map ˆλ x,(y,z ) that ˆλ x,(y,z ) is a cycle of length p. Namely, Let us take x Rˆλ. If x C(ˆλ) then from C (λ) sgn ( π q (ˆλ x,(y,z ))) = ( 1) p 1. C (ˆλ) =, we have ˆλ (y,z ) = ˆλ x,(y,z ), which is a composition of disjoint cycles on F 3 q. Since π q and sgn are homomorphisms of groups, we obtain sgn ( π q (ˆλ )) = sgn ( )) π q (ˆλ x,(y,z ) = Rˆλ,y F q Rˆλ,y F q Rˆλ ( 1) p 1 = ( 1) pm 1 (p 1)(q 1) = 1. Thus we always have sgn(π q (ˆλ)) = 1. Hence, Equation (6) holds. From Lemma 2 and Lemma 3, we have the following main result of this paper (Main Theorem 1). Main Theorem 1. (Sign of Nagata automorphism) If q is odd or q = 2 m, m 2 then we have π q (σ)) Alt(F 3 q). If q = 2 then we have π q (σ) Sym(F 3 q) \ Alt(F 3 q). Namely, 1 (q is odd or q = 2 m and m 2), sgn(π q (σ)) = (7) 1 (q = 2). Proof. From Lemma 1, we have Since π q and sgn are group homomorphisms, we can derive sgn(π q (σ)) = sgn(π q (ˆλ ϕ 1 λ ϕ)). sgn(π q (ˆλ ϕ 1 λ ϕ)) = sgn(π q (ˆλ)π q (ϕ 1 )π q (λ)π q (ϕ)) Thus, it follows immediately from Lemma 2 and Lemma 3. = sgn(π q (ˆλ)) sgn(π q (ϕ 1 )) sgn(π q (λ)) sgn(π q (ϕ)) = sgn(π q (ˆλ)) sgn(π q (ϕ)) 1 sgn(π q (λ)) sgn(π q (ϕ)) = sgn(π q (ˆλ)) sgn(π q (λ)). Remark 1. One can also prove Lemma 2 and Lemma 3 by avoiding the cycle decomposition of permutations. Here, we give a more simple proof of Lemma 2 and Lemma 3. It follows immediately from (Hakuta, 217a, Main Theorem 1) that sgn(π q (ˆλ)) = 1. Again from (Hakuta, 217a, Main Theorem 1), we have 1 (q is odd or q = 2 m and m 2), sgn(π q (λ)) = 1 (q = 2). Thus, Lemma 2 and Lemma 3 hold. 58
6 References Chen, J.-M., & Moh, T. T. (21). On the Goubin-Courtois attack on TTM. Cryptology eprint Archive, Report 21/72. Cohn, P. M. (26). Free Ideal Rings and Localization in General Rings. Cambridge University Press. van den Essen, A. (2). Polynomial Automorphisms and the Jacobian Conjecture. Birkhäuser. Ding, J., Gower, J. E., & Schmidt, D. S. (26). Multivariate Public Key Cryptosystems. Springer. Ding, J., & Hodges, T. (24). Cryptanalysis of an implementation scheme of TTM. J. Algebra Appl., 3(3), Ding, J., & Schmidt, D. (24). The new implementation schemes of the TTM cryptosystem are not secure. In Feng, K., Niederreiter, H., & Xing, C. (Eds.), Coding, Cryptography and Combinatorics, Birkhäuser Verlag. 6 Goubin, L., & Courtois, N., (2). Cryptanalysis of the TTM cryptosystem. In Okamoto, T. (Eds.), Advances in Cryptology ASIACRYPT 2, Springer. 4 Hakuta, K. (217a). On permutations induced by tame automorphisms over finite fields. Acta Math. Vietnam., to appear. Hakuta, K. (217b). Sign of permutations induced by Anick and Nagata-Anick automorphisms over finite fields. Journal of Mathematics Research, 9(4), Hakuta, K., Sato, H., & Takagi, T. (216). On tameness of Matsumoto-Imai central maps in three variables over the finite field F 2. Adv. Math. Commun., 1(2), Hrdina, J., Kureš, M., & Vašík, P. (21). A note on tame polynomial automorphisms and the security of TTM cryptosystem. Appl. Comput. Math., 9(2), Jung, H. W. E. (1942). Über ganze birationale Transformationen der Ebene. J. Reine Angew. Math., 184, Kishimoto, T. (28). A new proof of the non-tameness of the Nagata automorphism from the point of view of the Sarkisov program. Compositio Math., 144, van der Kulk, W. (1953). On polynomial rings in two variables. Nieuw Archief voor Wiskunde, 3(1), Maubach, S. (21). Polynomial automorphisms over finite fields. Serdica Math. J., 27(4), Maubach, S. (28). A problem on polynomial maps over finite fields. arxiv preprint, arxiv: Maubach, S., & Willems, R. (211). Polynomial automorphisms over finite fields: Mimicking tame maps by the Derksen group. Serdica Math. J., 37(4), Maubach, S., & Willems, R. (214). Keller maps of low degree over finite fields. In Cheltsov, I., Ciliberto, C., Flenner, H., McKernan, J., Prokhorov, Y., & Zaidenberg, M. (Eds.), Automorphisms in Birational and Affine Geometry, Springer Moh, T. T. (1999). A Fast Public Key System with Signature and Master Key Functions. Comm. Algebra, 27(5), Moh, T. T. (23). An application of algebraic geometry to encryption: tame transformation method. Rev. Mat. Iberoamericana, 19(2), Moh, T. T., Chen, J.-M., & Yang, B.-Y. (24). Building instances of TTM immune to the Goubin-Courtois attack and the Ding-Schmidt attack. Cryptology eprint Archive, Report 24/168. Nagata, M. (1972). On automorphism group of k[x, y]. Kinokuniya Book Store Co. Ltd. Smith, M. K. (1989). Stably tame automorphisms. J. Pure Appl. Algebra, 58(2), Spodzieja, S. (27). On the Nagata automorphism. Univ. Iagell. Acta Math., 1298(45), Shestakov, I. P., & Umirbaev, U. U. (24). The tame and the wild automorphisms of polynomial rings in three variables. J. Amer. Math. Soc., 17,
7 Copyrights Copyright for this article is retained by the author(s), with first publication rights granted to the journal. This is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license ( 6
A Simple Proof of Jung Theorem on Polynomial Automorphisms of C 2
arxiv:math/0408077v [math.ag] 5 Aug 2004 A Simple Proof of Jung Theorem on Polynomial Automorphisms of C 2 Nguyen Van Chau Abstract. The Automorphism Theorem, discovered first by Jung in 942, asserts that
More informationThe automorphism theorem and additive group actions on the affine plane
The automorphism theorem and additive group actions on the affine plane arxiv:1604.04070v1 [math.ac] 14 Apr 2016 Shigeru Kuroda Abstract Due to Rentschler, Miyanishi and Kojima, the invariant ring for
More informationOn the lifting of the Nagata automorphism
Sel. Math. New Ser. DOI 10.1007/s00029-011-0061-3 Selecta Mathematica New Series Alexei Belov-Kanel Jie-Tai Yu Springer Basel AG 2011 Abstract It is proved that all wild z-automorphisms including the well-known
More informationSurvey on Polynomial Automorphism Groups
David Washington University St. Louis, MO, USA November 3, 2012 Conference on Groups of Automorphisms in Birational and Affine Geometry, Levico Terme, Italy Group of polynomial automorphisms Notation We
More informationNew Directions in Multivariate Public Key Cryptography
New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in
More informationTHE AUTOMORPHISM GROUP OF THE FREE ALGEBRA OF RANK TWO. P. M. Cohn
Serdica Math. J. 28 (2002), 255-266 THE AUTOMORPHISM GROUP OF THE FREE ALGEBRA OF RANK TWO P. M. Cohn Communicated by V. Drensky Abstract. The theorem of Czerniakiewicz and Makar-Limanov, that all the
More informationTHE DEGREE OF THE INVERSE OF A POLYNOMIAL AUTOMORPHISM
UNIVERSITATIS IAGELLONICAE ACTA MATHEMATICA, FASCICULUS XLIV 2006 THE DEGREE OF THE INVERSE OF A POLYNOMIAL AUTOMORPHISM by Sabrina Brusadin and Gianluca Gorni Abstract. Let F : C n C n be an invertible
More informationarxiv: v2 [math.ra] 29 May 2018
arxiv:1708.04361v2 [math.ra] 29 May 2018 A SHORT PROOF THAT THE FREE ASSOCIATIVE ALGEBRA IS HOPFIAN ALEXEI BELOV-KANEL, LOUIS ROWEN AND JIE-TAI YU Abstract. A short proof is given of the fact that for
More informationOn a Diophantine Equation 1
International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 2, 73-81 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.728 On a Diophantine Equation 1 Xin Zhang Department
More informationKey Recovery on Hidden Monomial Multivariate Schemes
Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,
More informationGröbner Bases in Public-Key Cryptography
Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis
More informationMathematical Research Letters 3, (1996) EQUIVARIANT AFFINE LINE BUNDLES AND LINEARIZATION. Hanspeter Kraft and Frank Kutzschebauch
Mathematical Research Letters 3, 619 627 (1996) EQUIVARIANT AFFINE LINE BUNDLES AND LINEARIZATION Hanspeter Kraft and Frank Kutzschebauch Abstract. We show that every algebraic action of a linearly reductive
More informationVirtual isomorphisms of ciphers: is AES secure against differential / linear attack?
Alexander Rostovtsev alexander. rostovtsev@ibks.ftk.spbstu.ru St. Petersburg State Polytechnic University Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? In [eprint.iacr.org/2009/117]
More informationA short proof of Klyachko s theorem about rational algebraic tori
A short proof of Klyachko s theorem about rational algebraic tori Mathieu Florence Abstract In this paper, we give another proof of a theorem by Klyachko ([?]), which asserts that Zariski s conjecture
More informationHILBERT S FOURTEENTH PROBLEM AND LOCALLY NILPOTENT DERIVATIONS
HILBERT S FOURTEENTH PROBLEM AND LOCALLY NILPOTENT DERIVATIONS DANIEL DAIGLE The first section of this text is a survey of Hilbert s Fourteenth Problem. However the reader will quickly realize that the
More informationA POLAR, THE CLASS AND PLANE JACOBIAN CONJECTURE
Bull. Korean Math. Soc. 47 (2010), No. 1, pp. 211 219 DOI 10.4134/BKMS.2010.47.1.211 A POLAR, THE CLASS AND PLANE JACOBIAN CONJECTURE Dosang Joe Abstract. Let P be a Jacobian polynomial such as deg P =
More informationMutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis
MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Johannes Buchmann 1, Jintai Ding 2, Mohamed Saied Emam Mohamed 1, and Wael Said Abd Elmageed Mohamed 1 1 TU Darmstadt, FB Informatik
More informationCryptanalysis of the TTM Cryptosystem
Cryptanalysis of the TTM Cryptosystem Louis Goubin and Nicolas T Courtois SchlumbergerSema - CP8 36-38 rue de la Princesse BP45 78430 Louveciennes Cedex France LouisGoubin@bullnet,courtois@minrankorg Abstract
More informationCryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)
Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R) Eli Biham Computer Science Department Technion Israel Institute of Technology Haifa 32000, Israel biham@cs.technion.ac.il http://www.cs.technion.ac.il/~biham/
More informationarxiv: v1 [math.ac] 3 Jan 2016
A new characterization of the invertibility of polynomial maps arxiv:1601.00332v1 [math.ac] 3 Jan 2016 ELŻBIETA ADAMUS Faculty of Applied Mathematics, AGH University of Science and Technology al. Mickiewicza
More informationAlgebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,
More informationz-classes in finite groups of conjugate type (n, 1)
Proc. Indian Acad. Sci. (Math. Sci.) (2018) 128:31 https://doi.org/10.1007/s12044-018-0412-5 z-classes in finite groups of conjugate type (n, 1) SHIVAM ARORA 1 and KRISHNENDU GONGOPADHYAY 2, 1 Department
More informationHidden Field Equations
Security of Hidden Field Equations (HFE) 1 The security of Hidden Field Equations ( H F E ) Nicolas T. Courtois INRIA, Paris 6 and Toulon University courtois@minrank.org Permanent HFE web page : hfe.minrank.org
More informationFORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS
Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ
More informationEfficient variant of Rainbow using sparse secret keys
Takanori Yasuda 1, Tsuyoshi Takagi 2, and Kouichi Sakurai 1,3 1 Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan 2 Institute of Mathematics for Industry, Kyushu University,
More informationBENT POLYNOMIALS OVER FINITE FIELDS
BENT POLYNOMIALS OVER FINITE FIELDS ROBERT S COULTER AND REX W MATTHEWS Abstract. The definition of bent is redefined for any finite field. Our main result is a complete description of the relationship
More informationOn a connectedness principle of Shokurov-Kollár type
. ARTICLES. SCIENCE CHINA Mathematics March 2019 Vol. 62 No. 3: 411 416 https://doi.org/10.1007/s11425-018-9360-5 On a connectedness principle of Shokurov-Kollár type Christopher D. Hacon 1 & Jingjun Han
More informationCHARACTERIZATION OF GORENSTEIN STRONGLY KOSZUL HIBI RINGS BY F-INVARIANTS
CHARACTERIZATION OF GORENSTEIN STRONGLY KOSZUL HIBI RINGS BY F-INVARIANTS KAZUNORI MATSUDA Abstract. Hibi rings are a kind of graded toric ring on a finite distributive lattice D = J(P ), where P is a
More informationOn Permutation Polynomials over Local Finite Commutative Rings
International Journal of Algebra, Vol. 12, 2018, no. 7, 285-295 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ija.2018.8935 On Permutation Polynomials over Local Finite Commutative Rings Javier
More informationSimple Matrix Scheme for Encryption (ABC)
Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 dama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC) April 26, 2013 1 / 31
More informationarxiv: v1 [math.qa] 5 Feb 2015
Automorphism groups of Witt algebras Jianzhi Han, Yucai Su Department of Mathematics, Tongji University, Shanghai 200092, China arxiv:1502.01441v1 [math.qa] 5 Feb 2015 Abstract: The automorphism groups
More informationA FINITE SEPARATING SET FOR DAIGLE AND FREUDENBURG S COUNTEREXAMPLE TO HILBERT S FOURTEENTH PROBLEM
A FINITE SEPARATING SET FOR DAIGLE AND FREUDENBURG S COUNTEREXAMPLE TO HILBERT S FOURTEENTH PROBLEM EMILIE DUFRESNE AND MARTIN KOHLS Abstract. This paper gives the first eplicit eample of a finite separating
More informationDISCRIMINANTS, SYMMETRIZED GRAPH MONOMIALS, AND SUMS OF SQUARES
DISCRIMINANTS, SYMMETRIZED GRAPH MONOMIALS, AND SUMS OF SQUARES PER ALEXANDERSSON AND BORIS SHAPIRO Abstract. Motivated by the necessities of the invariant theory of binary forms J. J. Sylvester constructed
More informationSkew-Frobenius maps on hyperelliptic curves
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript h been published without reviewing and editing received from the authors: posting the manuscript to SCIS
More informationCANONICAL BUNDLE FORMULA AND VANISHING THEOREM
CANONICAL BUNDLE FORMULA AND VANISHING THEOREM OSAMU FUJINO Abstract. In this paper, we treat two different topics. We give sample computations of our canonical bundle formula. They help us understand
More informationA Weak Cipher that Generates the Symmetric Group
A Weak Cipher that Generates the Symmetric Group Sean Murphy Kenneth Paterson Peter Wild Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, Surrey TW20 0EX,
More informationLongest element of a finite Coxeter group
Longest element of a finite Coxeter group September 10, 2015 Here we draw together some well-known properties of the (unique) longest element w in a finite Coxeter group W, with reference to theorems and
More informationRESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES RIMS A Note on an Anabelian Open Basis for a Smooth Variety. Yuichiro HOSHI.
RIMS-1898 A Note on an Anabelian Open Basis for a Smooth Variety By Yuichiro HOSHI January 2019 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES KYOTO UNIVERSITY, Kyoto, Japan A Note on an Anabelian Open Basis
More informationLandau s Theorem for π-blocks of π-separable groups
Landau s Theorem for π-blocks of π-separable groups Benjamin Sambale October 13, 2018 Abstract Slattery has generalized Brauer s theory of p-blocks of finite groups to π-blocks of π-separable groups where
More informationNotes on D 4 May 7, 2009
Notes on D 4 May 7, 2009 Consider the simple Lie algebra g of type D 4 over an algebraically closed field K of characteristic p > h = 6 (the Coxeter number). In particular, p is a good prime. We have dim
More informationA Version of the Grothendieck Conjecture for p-adic Local Fields
A Version of the Grothendieck Conjecture for p-adic Local Fields by Shinichi MOCHIZUKI* Section 0: Introduction The purpose of this paper is to prove an absolute version of the Grothendieck Conjecture
More informationFULLY COMMUTATIVE ELEMENTS AND KAZHDAN LUSZTIG CELLS IN THE FINITE AND AFFINE COXETER GROUPS. Jian-yi Shi
FULLY COMMUTATIVE ELEMENTS AND KAZHDAN LUSZTIG CELLS IN THE FINITE AND AFFINE COXETER GROUPS Jian-yi Shi Abstract. The main goal of the paper is to show that the fully commutative elements in the affine
More information1-Resilient Boolean Function with Optimal Algebraic Immunity
1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn
More informationOn the Complexity of the Hybrid Approach on HFEv-
On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature
More informationComputers and Electrical Engineering
Computers and Electrical Engineering 36 (2010) 56 60 Contents lists available at ScienceDirect Computers and Electrical Engineering journal homepage: wwwelseviercom/locate/compeleceng Cryptanalysis of
More informationOn some properties of elementary derivations in dimension six
Journal of Pure and Applied Algebra 56 (200) 69 79 www.elsevier.com/locate/jpaa On some properties of elementary derivations in dimension six Joseph Khoury Department of Mathematics, University of Ottawa,
More informationarxiv: v8 [math.ra] 13 Apr 2015
SPECIAL CASES OF THE JACOBIAN CONJECTURE VERED MOSKOWICZ arxiv:1501.06905v8 [math.ra] 13 Apr 2015 Abstract. The famous Jacobian conjecture asks if a morphism f : K[x,y] K[x,y] that satisfies Jac(f(x),f(y))
More informationQuantum-resistant cryptography
Quantum-resistant cryptography Background: In quantum computers, states are represented as vectors in a Hilbert space. Quantum gates act on the space and allow us to manipulate quantum states with combination
More informationAnalysis of Some Quasigroup Transformations as Boolean Functions
M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference
More informationPublic key cryptography using Permutation P-Polynomials over Finite Fields
Public key cryptography using Permutation P-Polynomials over Finite Fields Rajesh P Singh 1 B. K. Sarma 2 A. Saikia 3 Department of Mathematics Indian Institute of Technology Guwahati Guwahati 781039,
More informationMINIMAL NUMBER OF GENERATORS AND MINIMUM ORDER OF A NON-ABELIAN GROUP WHOSE ELEMENTS COMMUTE WITH THEIR ENDOMORPHIC IMAGES
Communications in Algebra, 36: 1976 1987, 2008 Copyright Taylor & Francis roup, LLC ISSN: 0092-7872 print/1532-4125 online DOI: 10.1080/00927870801941903 MINIMAL NUMBER OF ENERATORS AND MINIMUM ORDER OF
More informationHow to sharpen a tridiagonal pair
How to sharpen a tridiagonal pair Tatsuro Ito and Paul Terwilliger arxiv:0807.3990v1 [math.ra] 25 Jul 2008 Abstract Let F denote a field and let V denote a vector space over F with finite positive dimension.
More informationIntroduction to Elliptic Curves
IAS/Park City Mathematics Series Volume XX, XXXX Introduction to Elliptic Curves Alice Silverberg Introduction Why study elliptic curves? Solving equations is a classical problem with a long history. Starting
More informationarxiv: v1 [cs.it] 12 Jun 2016
New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials
More information#A34 INTEGERS 13 (2013) A NOTE ON THE MULTIPLICATIVE STRUCTURE OF AN ADDITIVELY SHIFTED PRODUCT SET AA + 1
#A34 INTEGERS 13 (2013) A NOTE ON THE MULTIPLICATIVE STRUCTURE OF AN ADDITIVELY SHIFTED PRODUCT SET AA + 1 Steven Senger Department of Mathematics, University of Delaware, Newark, Deleware senger@math.udel.edu
More informationOn the existence of unramified p-extensions with prescribed Galois group. Osaka Journal of Mathematics. 47(4) P P.1165
Title Author(s) Citation On the existence of unramified p-extensions with prescribed Galois group Nomura, Akito Osaka Journal of Mathematics. 47(4) P.1159- P.1165 Issue Date 2010-12 Text Version publisher
More informationON GRADED MORITA EQUIVALENCES FOR AS-REGULAR ALGEBRAS KENTA UEYAMA
ON GRADED MORITA EQUIVALENCES FOR AS-REGULAR ALGEBRAS KENTA UEYAMA Abstract. One of the most active projects in noncommutative algebraic geometry is to classify AS-regular algebras. The motivation of this
More informationEven Star Decomposition of Complete Bipartite Graphs
Journal of Mathematics Research; Vol. 8, No. 5; October 2016 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Even Star Decomposition of Complete Bipartite Graphs E.
More informationPermutation groups/1. 1 Automorphism groups, permutation groups, abstract
Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.
More informationNormal cyclotomic schemes over a Galois ring
St.Petersburg Department of Steklov Mathematical Institute Russia (mostly joint work with Ilia Ponomarenko) The 11th International Conference on Finite Fields Friday, July 26, Magdeburg Outline Cyclotomic
More informationTOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor
TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen and Shaohua Tang School of Computer Science & Engineering, South China University of Technology, Guangzhou 510006,
More informationGordans Finiteness Theorem (Hilberts proof slightly modernized)
Gordans Finiteness Theorem Hilberts proof slightly modernized Klaus Pommerening April 1975 Let k be an infinite entire ring, V = k 2, the free k-module of rank 2, G, the group SLV. Then G acts in a canocical
More informationDiophantine equations via weighted LLL algorithm
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory
More informationK. Tabakov, K. Tchakerian. Communicated by V. Drensky
Serdica Math. J. 37 (2011), 365 370 (2, 3)-GENERATION OF THE GROUPS PSL 6 (q) K. Tabakov, K. Tchakerian Communicated by V. Drensky Abstract. We prove that the group PSL 6 (q) is (2, 3)-generated for any
More informationInoculating Multivariate Schemes Against Differential Attacks
Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower Department of Mathematical Sciences University of Cincinnati Cincinnati, OH 45221-0025 USA Email: ding@math.uc.edu,
More informationANNIHILATING POLYNOMIALS, TRACE FORMS AND THE GALOIS NUMBER. Seán McGarraghy
ANNIHILATING POLYNOMIALS, TRACE FORMS AND THE GALOIS NUMBER Seán McGarraghy Abstract. We construct examples where an annihilating polynomial produced by considering étale algebras improves on the annihilating
More informationNEW CLASSES OF SET-THEORETIC COMPLETE INTERSECTION MONOMIAL IDEALS
NEW CLASSES OF SET-THEORETIC COMPLETE INTERSECTION MONOMIAL IDEALS M. R. POURNAKI, S. A. SEYED FAKHARI, AND S. YASSEMI Abstract. Let be a simplicial complex and χ be an s-coloring of. Biermann and Van
More informationarxiv: v1 [math.dg] 29 Dec 2018
KOSNIOWSKI S CONJECTURE AND WEIGHTS arxiv:1121121v1 [mathdg] 29 Dec 201 DONGHOON JANG Abstract The conjecture of Kosniowski asserts that if the circle acts on a compact unitary manifold M with a non-empty
More informationComparison between XL and Gröbner Basis Algorithms
Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042
More informationBUI XUAN HAI, VU MAI TRANG, AND MAI HOANG BIEN
A NOTE ON SUBGROUPS IN A DIVISION RING THAT ARE LEFT ALGEBRAIC OVER A DIVISION SUBRING arxiv:1808.08452v2 [math.ra] 22 Feb 2019 BUI XUAN HAI, VU MAI TRANG, AND MAI HOANG BIEN Abstract. Let D be a division
More informationGeneric section of a hyperplane arrangement and twisted Hurewicz maps
arxiv:math/0605643v2 [math.gt] 26 Oct 2007 Generic section of a hyperplane arrangement and twisted Hurewicz maps Masahiko Yoshinaga Department of Mathematice, Graduate School of Science, Kobe University,
More informationOn components of vectorial permutations of F n q
On components of vectorial permutations of F n q Nurdagül Anbar 1, Canan Kaşıkcı 2, Alev Topuzoğlu 2 1 Johannes Kepler University, Altenbergerstrasse 69, 4040-Linz, Austria Email: nurdagulanbar2@gmail.com
More informationGalois Correspondence Theorem for Picard-Vessiot Extensions
Arnold Math J. (2016) 2:21 27 DOI 10.1007/s40598-015-0029-z RESEARCH CONTRIBUTION Galois Correspondence Theorem for Picard-Vessiot Extensions Teresa Crespo 1 Zbigniew Hajto 2 Elżbieta Sowa-Adamus 3 Received:
More informationThe Shortest Signatures Ever
The Shortest Signatures Ever Mohamed Saied Emam Mohamed 1, Albrecht Petzoldt 2 1 Technische Universität Darmstadt, Germany 2 Kyushu University, Fukuoka, Japan mohamed@cdc.informatik.tu-darmstadt.de, petzoldt@imi.kyushu-u.ac.jp
More informationA Note on Scalar Multiplication Using Division Polynomials
1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve
More informationLittle Dragon Two: An efficient Multivariate Public Key Cryptosystem
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India October
More informationA NOTE ON RETRACTS AND LATTICES (AFTER D. J. SALTMAN)
A NOTE ON RETRACTS AND LATTICES (AFTER D. J. SALTMAN) Z. REICHSTEIN Abstract. This is an expository note based on the work of D. J. Saltman. We discuss the notions of retract rationality and retract equivalence
More informationPrimary Decompositions of Powers of Ideals. Irena Swanson
Primary Decompositions of Powers of Ideals Irena Swanson 2 Department of Mathematics, University of Michigan Ann Arbor, Michigan 48109-1003, USA iswanson@math.lsa.umich.edu 1 Abstract Let R be a Noetherian
More informationCREMONA MAPS AND INVOLUTIONS
CREMONA MAPS AND INVOLUTIONS JULIE DÉSERTI ABSTRACT. We deal with the following question of Dolgachev : is the Cremona group generated by involutions? Answer is yes in dimension see [6]. We give an upper
More informationOn the cycle index and the weight enumerator
On the cycle index and the weight enumerator Tsuyoshi Miezaki and Manabu Oura Abstract In this paper, we introduce the concept of the complete cycle index and discuss a relation with the complete weight
More informationON THE ALGEBRAIC INDEPENDENCE OF GENERIC PAINLEVÉ TRANSCENDENTS.
ON THE ALGEBRAIC INDEPENDENCE OF GENERIC PAINLEVÉ TRANSCENDENTS. JOEL NAGLOO 1, ANAND PILLAY 2 Abstract. We prove that if y = f(y, y, t, α, β,...) is a generic Painlevé equation from among the classes
More informationTHE JACOBIAN CONJECTURE: SURVEY OF SOME RESULTS
TOPICS IN COMPLEX ANALYSIS BANACH CENTER PUBLICATIONS, VOLUME 31 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1995 THE JACOBIAN CONJECTURE: SURVEY OF SOME RESULTS LUDWIK M. DRUŻKOWSKI Institute
More informationK-loop Structures Raised by the Direct Limits of Pseudo Unitary U(p, a n ) and Pseudo Orthogonal O(p, a n ) Groups
Journal of Mathematics Research; Vol. 9, No. 5; October 2017 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education K-loop Structures Raised by the Direct Limits of Pseudo
More informationFinding a derangement
Finding a derangement Peter J. Cameron, CSG, January 203 Derangements A derangement, or fixed-point-free permutation, is a permutation on a set Ω which leaves no point fixed. Dante Alighieri, in the Inferno
More informationarxiv: v4 [math.ac] 4 Mar 2008
Stable Tameness of Two-Dimensional Polynomial Automorphisms Over a Regular Ring arxiv:0707.3151v4 [math.ac] 4 Mar 2008 Joost Berson, Arno van den Essen, and David Wright January 1, 2009 Abstract In this
More informationSplitting sets and weakly Matlis domains
Commutative Algebra and Applications, 1 8 de Gruyter 2009 Splitting sets and weakly Matlis domains D. D. Anderson and Muhammad Zafrullah Abstract. An integral domain D is weakly Matlis if the intersection
More informationAvailable online at J. Math. Comput. Sci. 4 (2014), No. 3, ISSN: ORDERINGS AND PREORDERINGS ON MODULES
Available online at http://scik.org J. Math. Comput. Sci. 4 (2014), No. 3, 574-586 ISSN: 1927-5307 ORDERINGS AND PREORDERINGS ON MODULES DONGMING HUANG Department of Applied Mathematics, Hainan University,
More informationComputer Mathematics: Proceedings of the Fifth Asian Symposium. Series on Computing, vol. 9, World Scientific, 2001, pp
GIESBRECHT S ALGORITHM, THE HFE CRYPTOSYSTEM AND ORE S p s -POLYNOMIALS ROBERT S. COULTER, GEORGE HAVAS AND MARIE HENDERSON Centre for Discrete Mathematics and Computing School of Computer Science and
More informationFinite groups determined by an inequality of the orders of their elements
Publ. Math. Debrecen 80/3-4 (2012), 457 463 DOI: 10.5486/PMD.2012.5168 Finite groups determined by an inequality of the orders of their elements By MARIUS TĂRNĂUCEANU (Iaşi) Abstract. In this note we introduce
More informationOn Annihilator Small Intersection Graph
International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 283-289 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7931 On Annihilator Small Intersection Graph Mehdi
More informationCHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998
CHAPTER 0 PRELIMINARY MATERIAL Paul Vojta University of California, Berkeley 18 February 1998 This chapter gives some preliminary material on number theory and algebraic geometry. Section 1 gives basic
More informationFLIPS VS FLOPS (PRIVATE NOTE) Contents 1. Introduction 1 2. Flips vs Flops 2 3. Questions 8 References 9
FLIPS VS FLOPS (PRIVATE NOTE) OSAMU FUJINO Abstract. In this note, we count the numbers of flipping and flopping contractions in the category of non-singular toric varieties. Contents 1. Introduction 1
More informationPoly Dragon: An efficient Multivariate Public Key Cryptosystem
Poly Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India May 19, 2010
More informationSOME VARIANTS OF LAGRANGE S FOUR SQUARES THEOREM
Acta Arith. 183(018), no. 4, 339 36. SOME VARIANTS OF LAGRANGE S FOUR SQUARES THEOREM YU-CHEN SUN AND ZHI-WEI SUN Abstract. Lagrange s four squares theorem is a classical theorem in number theory. Recently,
More informationAffine-evasive Sets Modulo a Prime
Affine-evasive Sets Modulo a Prime Divesh Aggarwal October 6, 204 Abstract In this work, we describe a simple and efficient construction of a large subset S of F p, where p is a prime, such that the set
More informationA NOTE ABOUT THE NOWICKI CONJECTURE ON WEITZENBÖCK DERIVATIONS. Leonid Bedratyuk
Serdica Math. J. 35 (2009), 311 316 A NOTE ABOUT THE NOWICKI CONJECTURE ON WEITZENBÖCK DERIVATIONS Leonid Bedratyuk Communicated by V. Drensky Abstract. We reduce the Nowicki conjecture on Weitzenböck
More informationOn the number of diamonds in the subgroup lattice of a finite abelian group
DOI: 10.1515/auom-2016-0037 An. Şt. Univ. Ovidius Constanţa Vol. 24(2),2016, 205 215 On the number of diamonds in the subgroup lattice of a finite abelian group Dan Gregorian Fodor and Marius Tărnăuceanu
More informationMeans of unitaries, conjugations, and the Friedrichs operator
J. Math. Anal. Appl. 335 (2007) 941 947 www.elsevier.com/locate/jmaa Means of unitaries, conjugations, and the Friedrichs operator Stephan Ramon Garcia Department of Mathematics, Pomona College, Claremont,
More informationSUPPLEMENT ON THE SYMMETRIC GROUP
SUPPLEMENT ON THE SYMMETRIC GROUP RUSS WOODROOFE I presented a couple of aspects of the theory of the symmetric group S n differently than what is in Herstein. These notes will sketch this material. You
More informationarxiv: v1 [math.ag] 27 Oct 2007
A NOTE ON SINGULARITY AND NON-PROPER VALUE SET OF POLYNOMIAL MAPS OF C 2 arxiv:0710.5212v1 [math.ag] 27 Oct 2007 NGUYEN VAN CHAU Abstract. Some properties of the relation between the singular point set
More information