Sign of Permutation Induced by Nagata Automorphism over Finite Fields

Size: px
Start display at page:

Download "Sign of Permutation Induced by Nagata Automorphism over Finite Fields"

Transcription

1 Journal of Mathematics Research; Vol. 9, No. 5; October 217 ISSN E-ISSN Published by Canadian Center of Science and Education Sign of Permutation Induced by Nagata Automorphism over Finite Fields Keisuke Hakuta 1 & Tsuyoshi Takagi 2,3 1 Interdisciplinary Graduate School of Science and Engineering, Shimane University, Shimane, Japan 2 Department of Mathematical Informatics, Graduate School of Information Science and Technology, The University of Tokyo, Tokyo, Japan 3 Japan Science and Technology Agency, CREST, Japan Correspondence: Keisuke Hakuta, Interdisciplinary Graduate School of Science and Engineering, Shimane University, 16 Nishikawatsu-cho, Matsue, Shimane, Japan. hakuta@cis.shimane-u.ac.jp Received: July 2, 217 Accepted: August 4, 217 Online Published: September 8, 217 doi:1.5539/jmr.v9n5p54 Abstract URL: This paper proves that the Nagata automorphism over a finite field can be mimicked by a tame automorphism which is a composition of four elementary automorphisms. By investigating the sign of the permutations induced by the above elementary automorphisms, one can see that if the Nagata automorphism is defined over a prime field of characteristic two, the Nagata automorphism induces an odd permutation, and otherwise, the Nagata automorphism induces an even permutation. Keywords: polynomial automorphism, finite field, permutation, nagata automorphism, multivariate polynomial cryptography 1. Introduction Throughout the paper K denotes a field and char(k) denotes the characteristic of the field K. Let K[X 1,..., X n ] be the polynomial ring in n indeterminates X 1,..., X n over K. For polynomials f 1,..., f n K[X 1,..., X n ], the n-tuple of polynomials F = ( f 1,..., f n ) is called a polynomial map. The set of polynomial maps over K and the set of maps from K n to itself are denoted by ME n (K) and Maps(K n, K n ), respectively. We can identify each polynomial map with a map from K n to itself via the following natural map π : ME n (K) Maps(K n, K n ). We denote the set of polynomial automorphisms (resp. affine automorphisms, elementary automorphisms) of K n by GA n (K) (resp. Aff n (K), EA n (K)). Recall that Aff n (K) K n GL n (K). We use the symbol TA n (K) to represent the subgroup of GA n (K) generated by two subgroups Aff n (K) and EA n (K). For F GA n (K), F is called tame automorphism if F TA n (K), and otherwise (F GA n (K) \ TA n (K)) F is called wild automorphism. The Tame Generators Problem asks whether GA n (K) = TA n (K), and is related to the Jacobian conjecture. The equality is trivially true for n = 1 and the equality still holds for n = 2 (Jung-van der Kulk theorem (Jung, 1942), (Kulk, 1953)). For n = 3, Nagata proved that σ GA 2 (K[X 3 ]) \ TA 2 (K[X 3 ]) (Nagata, 1972, Part 2, Theorem 1.4), and he conjectured that σ GA 3 (K) \ TA 3 (K) (Nagata, 1972, Part 2, Conjecture 3.1). The map σ is called the Nagata automorphism (See Equation (1) for the definition of σ). Shestakov and Umirbaev in (Shestakov & Umirbaev, 24, Corollary 9) finally gives an affirmative answer in the case where char(k) =. An algebro-geometric proof of this fact is given by Kishimoto (Kishimoto, 28). Smith (Smith, 1989) shows that the Nagata automorphism is stably tame, and Spodzieja (Spodzieja, 27) gives a direct proof of this fact. We refer to (Essen, 2) for more details. For any finite set T, we denote by Sym(T) (resp. Alt(T)) the symmetric group on T (resp. the alternating group on T). Let us denote by sgn : Sym(T) {±1} the sign function. When K is a finite field F q with q elements (p = char(f q ), q = p m, and m 1), we use the symbol π q instead of π: π q : ME n (F q ) Maps(F n q, F n q). If we restrict the map π q to GA n (F q ), π q (G) is a subgroup of Sym(F n q) for any subgroup G GA n (F q ). Maubach has investigated the subgroup π q (G) in the case G = TA n (F q ) (Maubach, 21, Theorem 2.3). 54

2 Theorem 1. If n 2, then π q (TA n (F q )) = Sym(F n q) if q is odd or q = 2. If q = 2 m where m 2 then π q (TA n (F q )) = Alt(F n q). If there exists F GA n (F 2 m) such that sgn (π 2 m(f)) = 1, then we must have F GA n (F 2 m) \ TA n (F 2 m). This indicates that the polynomial automorphism F is wild. Thus, the following question is very important (Maubach, 28, page 3, Problem). Question 1. For q = 2 m and m 2, do there exist polynomial automorphisms such that the permutations induced by the polynomial automorphisms belong to Sym(F n q) \ Alt(F n q)? It is a natural question to ask the sign of the famous polynomial automorphisms such as the Nagata automorphism (Nagata, 1972, Section 2.1, Equation (1.1)), the Anick automorphism (Cohn, 26, Section 6.1, page 398), and the Nagata- Anick automorphism (Cohn, 26, Section 6.1, page 398). This question is partially solved in the case of the Anick automorphism and the Nagata-Anick automorphism by Hakuta (Hakuta, 217b, Main Theorem 1 and Main Theorem 2). Hakuta also derives the sign of the permutations induced by the affine automorphisms and the elementary automorphisms (Hakuta, 217a, Main Theorem 1 and Main Theorem 2). Moreover, for a given tame automorphism over F q, we can compute the sign of the permutation induced by the tame automorphism over F q under the knowledge of a decomposition of the tame automorphism into a finite number of affine automorphisms and elementary automorphisms (Hakuta, 217a, Corollary 5). However, we emphasize that, at least in our knowledge, the answer of the above problem for the case of the Nagata automorphism over F q is unknown yet. Another motivation for considering the above question comes from multivariate polynomial cryptography (Ding, Gower, & Schmidt, 26). Multivariate polynomial cryptography is a potential candidate for post-quantum cryptography. One such example is the Tame Transformation Method (See, for example, (Chen & Moh, 21), (Ding & Hodges, 24), (Ding & Schmidt, 24), (Goubin & Courtois, 2), (Hakuta, Sato, & Takagi, 216), (Hrdina, Kureš, & Vašík, 21), (Moh, 1999), (Moh, 23), (Moh, Chen, & Yang, 24)). One of the building blocks for multivariate polynomial cryptography is a bijective polynomial map over F q. Thus, it is important to investigate mathematical properties of bijective polynomial maps over F q such as the sign of the permutations induced by bijective polynomial maps over F q, the classification of bijective polynomial maps over F q by individual computation (Maubach & Willems, 214), and so on. This paper proves that the Nagata automorphism over a finite field can be mimicked by a tame automorphism which is a composition of four elementary automorphisms. By investigating the sign of the permutations induced by the above elementary automorphisms, one can see that if the Nagata automorphism is defined over a prime field of characteristic two, the Nagata automorphism induces an odd permutation, and otherwise, the Nagata automorphism induces an even permutation. 2. Sign of Permutation Induced by Nagata Automorphism The Nagata automorphism is defined by The inverse of the Nagata automorphism σ is given by σ := (x 2(xz + y 2 )y (xz + y 2 ) 2 z, y + (xz + y 2 )z, z) GA 3 (K). (1) σ 1 = (x + 2(xz + y 2 )y (xz + y 2 ) 2 z, y (xz + y 2 )z, z). (2) We call π q (σ) the permutation induced by the Nagata automorphism. This section investigates the sign of the permutation π q (σ). Let t be a new variable. We first show that there exists a polynomial h(t) F q [t] such that h(α) = for α F q and h() = 1 for α =. In order to prove this claim, we define the polynomial f (t) F q [t] as follows: f (t) := (t c) F q [t]. c F q We put c := f (). By (Hakuta, 217b, page 26), we have c F q and h(t) := c 1 f (t) F q [t] satisfies the condition (α F h(α) = q), (3) 1 (α = ). We say that F GA n (F q ) can be mimicked by an element of a certain group G if there exists G G such that π q (F) = π q (G) (See (Maubach & Willems, 211, page 35) for more details). We prove the following lemma (Lemma 1) which states that the Nagata automorphism over F q can be mimicked by a composition of four elementary automorphisms. 55

3 Lemma 1. Let ϕ, λ, and ˆλ be elementary automorphisms defined by Then we have ϕ := (x + z q 2 y 2, y, z), λ := (x, y + z 2 x, z), ˆλ := (x 2h(z)y 3, y, z) EA 3 (F q ). π q (σ) = π q (ˆλ ϕ 1 λ ϕ). (4) In other words, the Nagata automorphism σ can be mimicked by ˆλ ϕ 1 λ ϕ TA 3 (F q ) which is a composition of four elementary automorphisms. Proof. It is easy to see that Since ϕ 1 = (x z q 2 y 2, y, z) EA 3 (F q ), we obtain π q (λ ϕ) = π q ((x, y + z 2 x, z) (x + z q 2 y 2, y, z)) π q (ϕ 1 λ ϕ) = π q ((x + z q 2 y 2, y + z 2 (x + z q 2 y 2 ), z)) = π q ((x + z q 2 y 2, y + (xz 2 + z q y 2 ), z)) = π q ((x + z q 2 y 2, y + (xz 2 + zy 2 ), z)) = π q ((x + z q 2 y 2, y + z(xz + y 2 ), z)). = π q ((x z q 2 y 2, y, z) (x + z q 2 y 2, y + z(xz + y 2 ), z)) = π q (((x + z q 2 y 2 ) z q 2 (y + z(xz + y 2 )) 2, y + z(xz + y 2 ), z)) = π q ((x 2(xz + y 2 )yz q 1 (xz + y 2 ) 2 z, y + (xz + y 2 )z, z)). Then we can see that (ϕ 1 σ(x, y, z) (z F λ ϕ)(x, y, z) = q), (x, y, ) σ(x, y, z) = (x 2y 3, y, ) (z = ). From Equation (3), we have (ˆλ ϕ 1 λ ϕ)(x, y, z) = σ(x, y, z) for all (x, y, z) F 3 q. Therefore, π q (σ) = π q (ˆλ ϕ 1 λ ϕ). From Lemma 1, it is sufficient to derive the sign of π q (λ) and π q (ˆλ). We compute sgn(π q (λ)) (resp. sgn(π q (ˆλ))) in Lemma 2 (resp. Lemma 3). We will use these lemmas to prove the main result of this paper (Main Theorem 1). Lemma 2. (Sign of π q (λ)) Let λ be as in Lemma 1. Then we have sgn(π q (λ)) = ( 1) pm 1 (p 1)(q 1) 2. (5) Namely, if q is odd or q = 2 m, m 2 then we have π q (λ) Alt(F 3 q). If q = 2 then we have π q (λ) Sym(F 3 q) \ Alt(F 3 q). Proof. Let us take two elements, z F q. We consider the following map λ (x,z ) : F 3 q F 3 q, One can see that the map λ (x,z ) is bijective. We take Since B ( λ (x,z )) B ( λ(x,z )) = for any ( x, z λ (x,z ) : F 3 q F 3 q (x, y, z) (x, y + z 2 x, z), if x = and z = z, (x, y, z) (x, y, z), otherwise. B ( λ (x,z )) := { (x, y, z) F 3 q λ(x,z )(x, y, z) (x, y, z) }. ) F q F q \ {(, z )}, we have λ =,z F q λ (x,z ), 56

4 which is a composition of disjoint permutations on F 3 q. We decompose the permutation λ (x,z ) as a composition of disjoint cycles on F 3 q for each (, z ) F q F q. In order to find such a decomposition, we define an equivalence relation (λ) on F q : y F q and y F q are equivalent if and only if there exists l {, 1,..., p 1} such that y = y lz 2. We set C (λ) y := {y F q y (λ) y }. We fix a complete system of representatives R λ for the equivalence relation (λ) on F q. Remark that R λ = q/p = p m /p = p m 1. For arbitrary R λ, we define the bijective map λ y,(,z ) : F 3 q F 3 q by λ y,(,z ) : F 3 q F 3 q (x, y, z) ( x, y + z 2 x, z ), if y C y (λ), x =, and z = z, (x, y, z) (x, y, z), otherwise. It is obvious from the definition of the map λ y,(,z ) that λ y,(,z ) is a cycle of length p. Namely, Let us take y R λ. If y C(λ) y then from C (λ) y sgn ( π q ( λy,(,z ))) = ( 1) p 1. C (λ) y λ (x,z ) = =, we have y R λ λ y,(,z ), which is a composition of disjoint cycles on F 3 q. Since π q and sgn are homomorphisms of groups, we obtain sgn ( π q (λ) ) ( ( = sgn πq λy,(,z ))),z F q,y R λ =.,z F q,y R λ ( 1) p 1 = ( 1) pm 1(p 1)(q 1)2 Thus, Equation (5) holds. Lemma 3. (Sign of π q (ˆλ)) Let ˆλ be as in Lemma 1. Then we have sgn(π q (ˆλ)) = 1. (6) Namely, we have π q (ˆλ) Alt(F 3 q). Proof. Since sgn(π q (ˆλ)) = 1 when char(f q ) = 2, it is sufficient to show the assertion for char(f q ) 2. We suppose that char(f q ) 2. By the definition of ˆλ and by Equation (3), we can easily see that (x, y, z) (z F ˆλ(x, y, z) = q), (x 2y 3, y, ) (z = ). Let us take an element y F q and we put z :=. We consider the following map ˆλ (y,z ) : F 3 q F 3 q, One can see that the map ˆλ (y,z ) is bijective. We take ˆλ (y,z ) : F 3 q F 3 q (x, y, z) (x 2y 3, y, z), if y F q and z =, (x, y, z) (x, y, z), otherwise. B (ˆλ (y,z )) := { (x, y, z) F 3 q ˆλ (y,z )(x, y, z) (x, y, z) }. Since B (ˆλ ) (y,z )) B (ˆλ (y,z ) = for any y F q \ {y }, we have ˆλ = ˆλ (y,z ), y F q 57

5 which is a composition of disjoint permutations on F 3 q. We decompose the permutation ˆλ (y,z ) as a composition of disjoint cycles on F 3 q for each y F q. In order to find such a decomposition, we define an equivalence relation (ˆλ) on F q : x F q and x F q are equivalent if and only if there exists l {, 1,..., p 1} such that x = x 2ly 3. We set C (ˆλ) x := {x F q x (ˆλ) x }. (ˆλ) We fix a complete system of representatives Rˆλ for the equivalence relation on F q. Remark that Rˆλ = q/p = pm /p = p m 1. For arbitrary Rˆλ, we define the bijective map ˆλ x,(y,z ) : F 3 q F 3 q by ˆλ x,(y,z ) : F 3 q F 3 q (x, y, z) ( x, y + z 2 x, z ), if x C (ˆλ), y = y, and z = z, (x, y, z) (x, y, z), otherwise. It is obvious from the definition of the map ˆλ x,(y,z ) that ˆλ x,(y,z ) is a cycle of length p. Namely, Let us take x Rˆλ. If x C(ˆλ) then from C (λ) sgn ( π q (ˆλ x,(y,z ))) = ( 1) p 1. C (ˆλ) =, we have ˆλ (y,z ) = ˆλ x,(y,z ), which is a composition of disjoint cycles on F 3 q. Since π q and sgn are homomorphisms of groups, we obtain sgn ( π q (ˆλ )) = sgn ( )) π q (ˆλ x,(y,z ) = Rˆλ,y F q Rˆλ,y F q Rˆλ ( 1) p 1 = ( 1) pm 1 (p 1)(q 1) = 1. Thus we always have sgn(π q (ˆλ)) = 1. Hence, Equation (6) holds. From Lemma 2 and Lemma 3, we have the following main result of this paper (Main Theorem 1). Main Theorem 1. (Sign of Nagata automorphism) If q is odd or q = 2 m, m 2 then we have π q (σ)) Alt(F 3 q). If q = 2 then we have π q (σ) Sym(F 3 q) \ Alt(F 3 q). Namely, 1 (q is odd or q = 2 m and m 2), sgn(π q (σ)) = (7) 1 (q = 2). Proof. From Lemma 1, we have Since π q and sgn are group homomorphisms, we can derive sgn(π q (σ)) = sgn(π q (ˆλ ϕ 1 λ ϕ)). sgn(π q (ˆλ ϕ 1 λ ϕ)) = sgn(π q (ˆλ)π q (ϕ 1 )π q (λ)π q (ϕ)) Thus, it follows immediately from Lemma 2 and Lemma 3. = sgn(π q (ˆλ)) sgn(π q (ϕ 1 )) sgn(π q (λ)) sgn(π q (ϕ)) = sgn(π q (ˆλ)) sgn(π q (ϕ)) 1 sgn(π q (λ)) sgn(π q (ϕ)) = sgn(π q (ˆλ)) sgn(π q (λ)). Remark 1. One can also prove Lemma 2 and Lemma 3 by avoiding the cycle decomposition of permutations. Here, we give a more simple proof of Lemma 2 and Lemma 3. It follows immediately from (Hakuta, 217a, Main Theorem 1) that sgn(π q (ˆλ)) = 1. Again from (Hakuta, 217a, Main Theorem 1), we have 1 (q is odd or q = 2 m and m 2), sgn(π q (λ)) = 1 (q = 2). Thus, Lemma 2 and Lemma 3 hold. 58

6 References Chen, J.-M., & Moh, T. T. (21). On the Goubin-Courtois attack on TTM. Cryptology eprint Archive, Report 21/72. Cohn, P. M. (26). Free Ideal Rings and Localization in General Rings. Cambridge University Press. van den Essen, A. (2). Polynomial Automorphisms and the Jacobian Conjecture. Birkhäuser. Ding, J., Gower, J. E., & Schmidt, D. S. (26). Multivariate Public Key Cryptosystems. Springer. Ding, J., & Hodges, T. (24). Cryptanalysis of an implementation scheme of TTM. J. Algebra Appl., 3(3), Ding, J., & Schmidt, D. (24). The new implementation schemes of the TTM cryptosystem are not secure. In Feng, K., Niederreiter, H., & Xing, C. (Eds.), Coding, Cryptography and Combinatorics, Birkhäuser Verlag. 6 Goubin, L., & Courtois, N., (2). Cryptanalysis of the TTM cryptosystem. In Okamoto, T. (Eds.), Advances in Cryptology ASIACRYPT 2, Springer. 4 Hakuta, K. (217a). On permutations induced by tame automorphisms over finite fields. Acta Math. Vietnam., to appear. Hakuta, K. (217b). Sign of permutations induced by Anick and Nagata-Anick automorphisms over finite fields. Journal of Mathematics Research, 9(4), Hakuta, K., Sato, H., & Takagi, T. (216). On tameness of Matsumoto-Imai central maps in three variables over the finite field F 2. Adv. Math. Commun., 1(2), Hrdina, J., Kureš, M., & Vašík, P. (21). A note on tame polynomial automorphisms and the security of TTM cryptosystem. Appl. Comput. Math., 9(2), Jung, H. W. E. (1942). Über ganze birationale Transformationen der Ebene. J. Reine Angew. Math., 184, Kishimoto, T. (28). A new proof of the non-tameness of the Nagata automorphism from the point of view of the Sarkisov program. Compositio Math., 144, van der Kulk, W. (1953). On polynomial rings in two variables. Nieuw Archief voor Wiskunde, 3(1), Maubach, S. (21). Polynomial automorphisms over finite fields. Serdica Math. J., 27(4), Maubach, S. (28). A problem on polynomial maps over finite fields. arxiv preprint, arxiv: Maubach, S., & Willems, R. (211). Polynomial automorphisms over finite fields: Mimicking tame maps by the Derksen group. Serdica Math. J., 37(4), Maubach, S., & Willems, R. (214). Keller maps of low degree over finite fields. In Cheltsov, I., Ciliberto, C., Flenner, H., McKernan, J., Prokhorov, Y., & Zaidenberg, M. (Eds.), Automorphisms in Birational and Affine Geometry, Springer Moh, T. T. (1999). A Fast Public Key System with Signature and Master Key Functions. Comm. Algebra, 27(5), Moh, T. T. (23). An application of algebraic geometry to encryption: tame transformation method. Rev. Mat. Iberoamericana, 19(2), Moh, T. T., Chen, J.-M., & Yang, B.-Y. (24). Building instances of TTM immune to the Goubin-Courtois attack and the Ding-Schmidt attack. Cryptology eprint Archive, Report 24/168. Nagata, M. (1972). On automorphism group of k[x, y]. Kinokuniya Book Store Co. Ltd. Smith, M. K. (1989). Stably tame automorphisms. J. Pure Appl. Algebra, 58(2), Spodzieja, S. (27). On the Nagata automorphism. Univ. Iagell. Acta Math., 1298(45), Shestakov, I. P., & Umirbaev, U. U. (24). The tame and the wild automorphisms of polynomial rings in three variables. J. Amer. Math. Soc., 17,

7 Copyrights Copyright for this article is retained by the author(s), with first publication rights granted to the journal. This is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license ( 6

A Simple Proof of Jung Theorem on Polynomial Automorphisms of C 2

A Simple Proof of Jung Theorem on Polynomial Automorphisms of C 2 arxiv:math/0408077v [math.ag] 5 Aug 2004 A Simple Proof of Jung Theorem on Polynomial Automorphisms of C 2 Nguyen Van Chau Abstract. The Automorphism Theorem, discovered first by Jung in 942, asserts that

More information

The automorphism theorem and additive group actions on the affine plane

The automorphism theorem and additive group actions on the affine plane The automorphism theorem and additive group actions on the affine plane arxiv:1604.04070v1 [math.ac] 14 Apr 2016 Shigeru Kuroda Abstract Due to Rentschler, Miyanishi and Kojima, the invariant ring for

More information

On the lifting of the Nagata automorphism

On the lifting of the Nagata automorphism Sel. Math. New Ser. DOI 10.1007/s00029-011-0061-3 Selecta Mathematica New Series Alexei Belov-Kanel Jie-Tai Yu Springer Basel AG 2011 Abstract It is proved that all wild z-automorphisms including the well-known

More information

Survey on Polynomial Automorphism Groups

Survey on Polynomial Automorphism Groups David Washington University St. Louis, MO, USA November 3, 2012 Conference on Groups of Automorphisms in Birational and Affine Geometry, Levico Terme, Italy Group of polynomial automorphisms Notation We

More information

New Directions in Multivariate Public Key Cryptography

New Directions in Multivariate Public Key Cryptography New Directions in Shuhong Gao Joint with Ray Heindl Clemson University The 4th International Workshop on Finite Fields and Applications Beijing University, May 28-30, 2010. 1 Public Key Cryptography in

More information

THE AUTOMORPHISM GROUP OF THE FREE ALGEBRA OF RANK TWO. P. M. Cohn

THE AUTOMORPHISM GROUP OF THE FREE ALGEBRA OF RANK TWO. P. M. Cohn Serdica Math. J. 28 (2002), 255-266 THE AUTOMORPHISM GROUP OF THE FREE ALGEBRA OF RANK TWO P. M. Cohn Communicated by V. Drensky Abstract. The theorem of Czerniakiewicz and Makar-Limanov, that all the

More information

THE DEGREE OF THE INVERSE OF A POLYNOMIAL AUTOMORPHISM

THE DEGREE OF THE INVERSE OF A POLYNOMIAL AUTOMORPHISM UNIVERSITATIS IAGELLONICAE ACTA MATHEMATICA, FASCICULUS XLIV 2006 THE DEGREE OF THE INVERSE OF A POLYNOMIAL AUTOMORPHISM by Sabrina Brusadin and Gianluca Gorni Abstract. Let F : C n C n be an invertible

More information

arxiv: v2 [math.ra] 29 May 2018

arxiv: v2 [math.ra] 29 May 2018 arxiv:1708.04361v2 [math.ra] 29 May 2018 A SHORT PROOF THAT THE FREE ASSOCIATIVE ALGEBRA IS HOPFIAN ALEXEI BELOV-KANEL, LOUIS ROWEN AND JIE-TAI YU Abstract. A short proof is given of the fact that for

More information

On a Diophantine Equation 1

On a Diophantine Equation 1 International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 2, 73-81 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.728 On a Diophantine Equation 1 Xin Zhang Department

More information

Key Recovery on Hidden Monomial Multivariate Schemes

Key Recovery on Hidden Monomial Multivariate Schemes Key Recovery on Hidden Monomial Multivariate Schemes Pierre-Alain Fouque 1, Gilles Macario-Rat 2, and Jacques Stern 1 1 École normale supérieure, 45 rue d Ulm, 75005 Paris, France {Pierre-Alain.Fouque,

More information

Gröbner Bases in Public-Key Cryptography

Gröbner Bases in Public-Key Cryptography Gröbner Bases in Public-Key Cryptography Ludovic Perret SPIRAL/SALSA LIP6, Université Paris 6 INRIA ludovic.perret@lip6.fr ECRYPT PhD SUMMER SCHOOL Emerging Topics in Cryptographic Design and Cryptanalysis

More information

Mathematical Research Letters 3, (1996) EQUIVARIANT AFFINE LINE BUNDLES AND LINEARIZATION. Hanspeter Kraft and Frank Kutzschebauch

Mathematical Research Letters 3, (1996) EQUIVARIANT AFFINE LINE BUNDLES AND LINEARIZATION. Hanspeter Kraft and Frank Kutzschebauch Mathematical Research Letters 3, 619 627 (1996) EQUIVARIANT AFFINE LINE BUNDLES AND LINEARIZATION Hanspeter Kraft and Frank Kutzschebauch Abstract. We show that every algebraic action of a linearly reductive

More information

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev alexander. rostovtsev@ibks.ftk.spbstu.ru St. Petersburg State Polytechnic University Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? In [eprint.iacr.org/2009/117]

More information

A short proof of Klyachko s theorem about rational algebraic tori

A short proof of Klyachko s theorem about rational algebraic tori A short proof of Klyachko s theorem about rational algebraic tori Mathieu Florence Abstract In this paper, we give another proof of a theorem by Klyachko ([?]), which asserts that Zariski s conjecture

More information

HILBERT S FOURTEENTH PROBLEM AND LOCALLY NILPOTENT DERIVATIONS

HILBERT S FOURTEENTH PROBLEM AND LOCALLY NILPOTENT DERIVATIONS HILBERT S FOURTEENTH PROBLEM AND LOCALLY NILPOTENT DERIVATIONS DANIEL DAIGLE The first section of this text is a survey of Hilbert s Fourteenth Problem. However the reader will quickly realize that the

More information

A POLAR, THE CLASS AND PLANE JACOBIAN CONJECTURE

A POLAR, THE CLASS AND PLANE JACOBIAN CONJECTURE Bull. Korean Math. Soc. 47 (2010), No. 1, pp. 211 219 DOI 10.4134/BKMS.2010.47.1.211 A POLAR, THE CLASS AND PLANE JACOBIAN CONJECTURE Dosang Joe Abstract. Let P be a Jacobian polynomial such as deg P =

More information

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis

MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Johannes Buchmann 1, Jintai Ding 2, Mohamed Saied Emam Mohamed 1, and Wael Said Abd Elmageed Mohamed 1 1 TU Darmstadt, FB Informatik

More information

Cryptanalysis of the TTM Cryptosystem

Cryptanalysis of the TTM Cryptosystem Cryptanalysis of the TTM Cryptosystem Louis Goubin and Nicolas T Courtois SchlumbergerSema - CP8 36-38 rue de la Princesse BP45 78430 Louveciennes Cedex France LouisGoubin@bullnet,courtois@minrankorg Abstract

More information

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R)

Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R) Cryptanalysis of Patarin s 2-Round Public Key System with S Boxes (2R) Eli Biham Computer Science Department Technion Israel Institute of Technology Haifa 32000, Israel biham@cs.technion.ac.il http://www.cs.technion.ac.il/~biham/

More information

arxiv: v1 [math.ac] 3 Jan 2016

arxiv: v1 [math.ac] 3 Jan 2016 A new characterization of the invertibility of polynomial maps arxiv:1601.00332v1 [math.ac] 3 Jan 2016 ELŻBIETA ADAMUS Faculty of Applied Mathematics, AGH University of Science and Technology al. Mickiewicza

More information

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL

Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL Mohamed Saied Emam Mohamed 1, Jintai Ding 2, and Johannes Buchmann 1 1 TU Darmstadt, FB Informatik Hochschulstrasse 10, 64289 Darmstadt,

More information

z-classes in finite groups of conjugate type (n, 1)

z-classes in finite groups of conjugate type (n, 1) Proc. Indian Acad. Sci. (Math. Sci.) (2018) 128:31 https://doi.org/10.1007/s12044-018-0412-5 z-classes in finite groups of conjugate type (n, 1) SHIVAM ARORA 1 and KRISHNENDU GONGOPADHYAY 2, 1 Department

More information

Hidden Field Equations

Hidden Field Equations Security of Hidden Field Equations (HFE) 1 The security of Hidden Field Equations ( H F E ) Nicolas T. Courtois INRIA, Paris 6 and Toulon University courtois@minrank.org Permanent HFE web page : hfe.minrank.org

More information

FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS

FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ

More information

Efficient variant of Rainbow using sparse secret keys

Efficient variant of Rainbow using sparse secret keys Takanori Yasuda 1, Tsuyoshi Takagi 2, and Kouichi Sakurai 1,3 1 Institute of Systems, Information Technologies and Nanotechnologies, Fukuoka, Japan 2 Institute of Mathematics for Industry, Kyushu University,

More information

BENT POLYNOMIALS OVER FINITE FIELDS

BENT POLYNOMIALS OVER FINITE FIELDS BENT POLYNOMIALS OVER FINITE FIELDS ROBERT S COULTER AND REX W MATTHEWS Abstract. The definition of bent is redefined for any finite field. Our main result is a complete description of the relationship

More information

On a connectedness principle of Shokurov-Kollár type

On a connectedness principle of Shokurov-Kollár type . ARTICLES. SCIENCE CHINA Mathematics March 2019 Vol. 62 No. 3: 411 416 https://doi.org/10.1007/s11425-018-9360-5 On a connectedness principle of Shokurov-Kollár type Christopher D. Hacon 1 & Jingjun Han

More information

CHARACTERIZATION OF GORENSTEIN STRONGLY KOSZUL HIBI RINGS BY F-INVARIANTS

CHARACTERIZATION OF GORENSTEIN STRONGLY KOSZUL HIBI RINGS BY F-INVARIANTS CHARACTERIZATION OF GORENSTEIN STRONGLY KOSZUL HIBI RINGS BY F-INVARIANTS KAZUNORI MATSUDA Abstract. Hibi rings are a kind of graded toric ring on a finite distributive lattice D = J(P ), where P is a

More information

On Permutation Polynomials over Local Finite Commutative Rings

On Permutation Polynomials over Local Finite Commutative Rings International Journal of Algebra, Vol. 12, 2018, no. 7, 285-295 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ija.2018.8935 On Permutation Polynomials over Local Finite Commutative Rings Javier

More information

Simple Matrix Scheme for Encryption (ABC)

Simple Matrix Scheme for Encryption (ABC) Simple Matrix Scheme for Encryption (ABC) Adama Diene, Chengdong Tao, Jintai Ding April 26, 2013 dama Diene, Chengdong Tao, Jintai Ding ()Simple Matrix Scheme for Encryption (ABC) April 26, 2013 1 / 31

More information

arxiv: v1 [math.qa] 5 Feb 2015

arxiv: v1 [math.qa] 5 Feb 2015 Automorphism groups of Witt algebras Jianzhi Han, Yucai Su Department of Mathematics, Tongji University, Shanghai 200092, China arxiv:1502.01441v1 [math.qa] 5 Feb 2015 Abstract: The automorphism groups

More information

A FINITE SEPARATING SET FOR DAIGLE AND FREUDENBURG S COUNTEREXAMPLE TO HILBERT S FOURTEENTH PROBLEM

A FINITE SEPARATING SET FOR DAIGLE AND FREUDENBURG S COUNTEREXAMPLE TO HILBERT S FOURTEENTH PROBLEM A FINITE SEPARATING SET FOR DAIGLE AND FREUDENBURG S COUNTEREXAMPLE TO HILBERT S FOURTEENTH PROBLEM EMILIE DUFRESNE AND MARTIN KOHLS Abstract. This paper gives the first eplicit eample of a finite separating

More information

DISCRIMINANTS, SYMMETRIZED GRAPH MONOMIALS, AND SUMS OF SQUARES

DISCRIMINANTS, SYMMETRIZED GRAPH MONOMIALS, AND SUMS OF SQUARES DISCRIMINANTS, SYMMETRIZED GRAPH MONOMIALS, AND SUMS OF SQUARES PER ALEXANDERSSON AND BORIS SHAPIRO Abstract. Motivated by the necessities of the invariant theory of binary forms J. J. Sylvester constructed

More information

Skew-Frobenius maps on hyperelliptic curves

Skew-Frobenius maps on hyperelliptic curves All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript h been published without reviewing and editing received from the authors: posting the manuscript to SCIS

More information

CANONICAL BUNDLE FORMULA AND VANISHING THEOREM

CANONICAL BUNDLE FORMULA AND VANISHING THEOREM CANONICAL BUNDLE FORMULA AND VANISHING THEOREM OSAMU FUJINO Abstract. In this paper, we treat two different topics. We give sample computations of our canonical bundle formula. They help us understand

More information

A Weak Cipher that Generates the Symmetric Group

A Weak Cipher that Generates the Symmetric Group A Weak Cipher that Generates the Symmetric Group Sean Murphy Kenneth Paterson Peter Wild Information Security Group, Royal Holloway and Bedford New College, University of London, Egham, Surrey TW20 0EX,

More information

Longest element of a finite Coxeter group

Longest element of a finite Coxeter group Longest element of a finite Coxeter group September 10, 2015 Here we draw together some well-known properties of the (unique) longest element w in a finite Coxeter group W, with reference to theorems and

More information

RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES RIMS A Note on an Anabelian Open Basis for a Smooth Variety. Yuichiro HOSHI.

RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES RIMS A Note on an Anabelian Open Basis for a Smooth Variety. Yuichiro HOSHI. RIMS-1898 A Note on an Anabelian Open Basis for a Smooth Variety By Yuichiro HOSHI January 2019 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES KYOTO UNIVERSITY, Kyoto, Japan A Note on an Anabelian Open Basis

More information

Landau s Theorem for π-blocks of π-separable groups

Landau s Theorem for π-blocks of π-separable groups Landau s Theorem for π-blocks of π-separable groups Benjamin Sambale October 13, 2018 Abstract Slattery has generalized Brauer s theory of p-blocks of finite groups to π-blocks of π-separable groups where

More information

Notes on D 4 May 7, 2009

Notes on D 4 May 7, 2009 Notes on D 4 May 7, 2009 Consider the simple Lie algebra g of type D 4 over an algebraically closed field K of characteristic p > h = 6 (the Coxeter number). In particular, p is a good prime. We have dim

More information

A Version of the Grothendieck Conjecture for p-adic Local Fields

A Version of the Grothendieck Conjecture for p-adic Local Fields A Version of the Grothendieck Conjecture for p-adic Local Fields by Shinichi MOCHIZUKI* Section 0: Introduction The purpose of this paper is to prove an absolute version of the Grothendieck Conjecture

More information

FULLY COMMUTATIVE ELEMENTS AND KAZHDAN LUSZTIG CELLS IN THE FINITE AND AFFINE COXETER GROUPS. Jian-yi Shi

FULLY COMMUTATIVE ELEMENTS AND KAZHDAN LUSZTIG CELLS IN THE FINITE AND AFFINE COXETER GROUPS. Jian-yi Shi FULLY COMMUTATIVE ELEMENTS AND KAZHDAN LUSZTIG CELLS IN THE FINITE AND AFFINE COXETER GROUPS Jian-yi Shi Abstract. The main goal of the paper is to show that the fully commutative elements in the affine

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

On the Complexity of the Hybrid Approach on HFEv-

On the Complexity of the Hybrid Approach on HFEv- On the Complexity of the Hybrid Approach on HFEv- Albrecht Petzoldt National Institute of Standards and Technology, Gaithersburg, Maryland, USA albrecht.petzoldt@gmail.com Abstract. The HFEv- signature

More information

Computers and Electrical Engineering

Computers and Electrical Engineering Computers and Electrical Engineering 36 (2010) 56 60 Contents lists available at ScienceDirect Computers and Electrical Engineering journal homepage: wwwelseviercom/locate/compeleceng Cryptanalysis of

More information

On some properties of elementary derivations in dimension six

On some properties of elementary derivations in dimension six Journal of Pure and Applied Algebra 56 (200) 69 79 www.elsevier.com/locate/jpaa On some properties of elementary derivations in dimension six Joseph Khoury Department of Mathematics, University of Ottawa,

More information

arxiv: v8 [math.ra] 13 Apr 2015

arxiv: v8 [math.ra] 13 Apr 2015 SPECIAL CASES OF THE JACOBIAN CONJECTURE VERED MOSKOWICZ arxiv:1501.06905v8 [math.ra] 13 Apr 2015 Abstract. The famous Jacobian conjecture asks if a morphism f : K[x,y] K[x,y] that satisfies Jac(f(x),f(y))

More information

Quantum-resistant cryptography

Quantum-resistant cryptography Quantum-resistant cryptography Background: In quantum computers, states are represented as vectors in a Hilbert space. Quantum gates act on the space and allow us to manipulate quantum states with combination

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

Public key cryptography using Permutation P-Polynomials over Finite Fields

Public key cryptography using Permutation P-Polynomials over Finite Fields Public key cryptography using Permutation P-Polynomials over Finite Fields Rajesh P Singh 1 B. K. Sarma 2 A. Saikia 3 Department of Mathematics Indian Institute of Technology Guwahati Guwahati 781039,

More information

MINIMAL NUMBER OF GENERATORS AND MINIMUM ORDER OF A NON-ABELIAN GROUP WHOSE ELEMENTS COMMUTE WITH THEIR ENDOMORPHIC IMAGES

MINIMAL NUMBER OF GENERATORS AND MINIMUM ORDER OF A NON-ABELIAN GROUP WHOSE ELEMENTS COMMUTE WITH THEIR ENDOMORPHIC IMAGES Communications in Algebra, 36: 1976 1987, 2008 Copyright Taylor & Francis roup, LLC ISSN: 0092-7872 print/1532-4125 online DOI: 10.1080/00927870801941903 MINIMAL NUMBER OF ENERATORS AND MINIMUM ORDER OF

More information

How to sharpen a tridiagonal pair

How to sharpen a tridiagonal pair How to sharpen a tridiagonal pair Tatsuro Ito and Paul Terwilliger arxiv:0807.3990v1 [math.ra] 25 Jul 2008 Abstract Let F denote a field and let V denote a vector space over F with finite positive dimension.

More information

Introduction to Elliptic Curves

Introduction to Elliptic Curves IAS/Park City Mathematics Series Volume XX, XXXX Introduction to Elliptic Curves Alice Silverberg Introduction Why study elliptic curves? Solving equations is a classical problem with a long history. Starting

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

#A34 INTEGERS 13 (2013) A NOTE ON THE MULTIPLICATIVE STRUCTURE OF AN ADDITIVELY SHIFTED PRODUCT SET AA + 1

#A34 INTEGERS 13 (2013) A NOTE ON THE MULTIPLICATIVE STRUCTURE OF AN ADDITIVELY SHIFTED PRODUCT SET AA + 1 #A34 INTEGERS 13 (2013) A NOTE ON THE MULTIPLICATIVE STRUCTURE OF AN ADDITIVELY SHIFTED PRODUCT SET AA + 1 Steven Senger Department of Mathematics, University of Delaware, Newark, Deleware senger@math.udel.edu

More information

On the existence of unramified p-extensions with prescribed Galois group. Osaka Journal of Mathematics. 47(4) P P.1165

On the existence of unramified p-extensions with prescribed Galois group. Osaka Journal of Mathematics. 47(4) P P.1165 Title Author(s) Citation On the existence of unramified p-extensions with prescribed Galois group Nomura, Akito Osaka Journal of Mathematics. 47(4) P.1159- P.1165 Issue Date 2010-12 Text Version publisher

More information

ON GRADED MORITA EQUIVALENCES FOR AS-REGULAR ALGEBRAS KENTA UEYAMA

ON GRADED MORITA EQUIVALENCES FOR AS-REGULAR ALGEBRAS KENTA UEYAMA ON GRADED MORITA EQUIVALENCES FOR AS-REGULAR ALGEBRAS KENTA UEYAMA Abstract. One of the most active projects in noncommutative algebraic geometry is to classify AS-regular algebras. The motivation of this

More information

Even Star Decomposition of Complete Bipartite Graphs

Even Star Decomposition of Complete Bipartite Graphs Journal of Mathematics Research; Vol. 8, No. 5; October 2016 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Even Star Decomposition of Complete Bipartite Graphs E.

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

Normal cyclotomic schemes over a Galois ring

Normal cyclotomic schemes over a Galois ring St.Petersburg Department of Steklov Mathematical Institute Russia (mostly joint work with Ilia Ponomarenko) The 11th International Conference on Finite Fields Friday, July 26, Magdeburg Outline Cyclotomic

More information

TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor

TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor Wuqiang Shen and Shaohua Tang School of Computer Science & Engineering, South China University of Technology, Guangzhou 510006,

More information

Gordans Finiteness Theorem (Hilberts proof slightly modernized)

Gordans Finiteness Theorem (Hilberts proof slightly modernized) Gordans Finiteness Theorem Hilberts proof slightly modernized Klaus Pommerening April 1975 Let k be an infinite entire ring, V = k 2, the free k-module of rank 2, G, the group SLV. Then G acts in a canocical

More information

Diophantine equations via weighted LLL algorithm

Diophantine equations via weighted LLL algorithm Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL algorithm Momonari Kudo Graduate School of Mathematics, Kyushu University, JAPAN Kyushu University Number Theory

More information

K. Tabakov, K. Tchakerian. Communicated by V. Drensky

K. Tabakov, K. Tchakerian. Communicated by V. Drensky Serdica Math. J. 37 (2011), 365 370 (2, 3)-GENERATION OF THE GROUPS PSL 6 (q) K. Tabakov, K. Tchakerian Communicated by V. Drensky Abstract. We prove that the group PSL 6 (q) is (2, 3)-generated for any

More information

Inoculating Multivariate Schemes Against Differential Attacks

Inoculating Multivariate Schemes Against Differential Attacks Inoculating Multivariate Schemes Against Differential Attacks Jintai Ding and Jason E. Gower Department of Mathematical Sciences University of Cincinnati Cincinnati, OH 45221-0025 USA Email: ding@math.uc.edu,

More information

ANNIHILATING POLYNOMIALS, TRACE FORMS AND THE GALOIS NUMBER. Seán McGarraghy

ANNIHILATING POLYNOMIALS, TRACE FORMS AND THE GALOIS NUMBER. Seán McGarraghy ANNIHILATING POLYNOMIALS, TRACE FORMS AND THE GALOIS NUMBER Seán McGarraghy Abstract. We construct examples where an annihilating polynomial produced by considering étale algebras improves on the annihilating

More information

NEW CLASSES OF SET-THEORETIC COMPLETE INTERSECTION MONOMIAL IDEALS

NEW CLASSES OF SET-THEORETIC COMPLETE INTERSECTION MONOMIAL IDEALS NEW CLASSES OF SET-THEORETIC COMPLETE INTERSECTION MONOMIAL IDEALS M. R. POURNAKI, S. A. SEYED FAKHARI, AND S. YASSEMI Abstract. Let be a simplicial complex and χ be an s-coloring of. Biermann and Van

More information

arxiv: v1 [math.dg] 29 Dec 2018

arxiv: v1 [math.dg] 29 Dec 2018 KOSNIOWSKI S CONJECTURE AND WEIGHTS arxiv:1121121v1 [mathdg] 29 Dec 201 DONGHOON JANG Abstract The conjecture of Kosniowski asserts that if the circle acts on a compact unitary manifold M with a non-empty

More information

Comparison between XL and Gröbner Basis Algorithms

Comparison between XL and Gröbner Basis Algorithms Comparison between XL and Gröbner Basis Algorithms Gwénolé Ars 1, Jean-Charles Faugère 2, Hideki Imai 3, Mitsuru Kawazoe 4, and Makoto Sugita 5 1 IRMAR, University of Rennes 1 Campus de Beaulieu 35042

More information

BUI XUAN HAI, VU MAI TRANG, AND MAI HOANG BIEN

BUI XUAN HAI, VU MAI TRANG, AND MAI HOANG BIEN A NOTE ON SUBGROUPS IN A DIVISION RING THAT ARE LEFT ALGEBRAIC OVER A DIVISION SUBRING arxiv:1808.08452v2 [math.ra] 22 Feb 2019 BUI XUAN HAI, VU MAI TRANG, AND MAI HOANG BIEN Abstract. Let D be a division

More information

Generic section of a hyperplane arrangement and twisted Hurewicz maps

Generic section of a hyperplane arrangement and twisted Hurewicz maps arxiv:math/0605643v2 [math.gt] 26 Oct 2007 Generic section of a hyperplane arrangement and twisted Hurewicz maps Masahiko Yoshinaga Department of Mathematice, Graduate School of Science, Kobe University,

More information

On components of vectorial permutations of F n q

On components of vectorial permutations of F n q On components of vectorial permutations of F n q Nurdagül Anbar 1, Canan Kaşıkcı 2, Alev Topuzoğlu 2 1 Johannes Kepler University, Altenbergerstrasse 69, 4040-Linz, Austria Email: nurdagulanbar2@gmail.com

More information

Galois Correspondence Theorem for Picard-Vessiot Extensions

Galois Correspondence Theorem for Picard-Vessiot Extensions Arnold Math J. (2016) 2:21 27 DOI 10.1007/s40598-015-0029-z RESEARCH CONTRIBUTION Galois Correspondence Theorem for Picard-Vessiot Extensions Teresa Crespo 1 Zbigniew Hajto 2 Elżbieta Sowa-Adamus 3 Received:

More information

The Shortest Signatures Ever

The Shortest Signatures Ever The Shortest Signatures Ever Mohamed Saied Emam Mohamed 1, Albrecht Petzoldt 2 1 Technische Universität Darmstadt, Germany 2 Kyushu University, Fukuoka, Japan mohamed@cdc.informatik.tu-darmstadt.de, petzoldt@imi.kyushu-u.ac.jp

More information

A Note on Scalar Multiplication Using Division Polynomials

A Note on Scalar Multiplication Using Division Polynomials 1 A Note on Scalar Multiplication Using Division Polynomials Binglong Chen, Chuangqiang Hu and Chang-An Zhao Abstract Scalar multiplication is the most important and expensive operation in elliptic curve

More information

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem

Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Little Dragon Two: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India October

More information

A NOTE ON RETRACTS AND LATTICES (AFTER D. J. SALTMAN)

A NOTE ON RETRACTS AND LATTICES (AFTER D. J. SALTMAN) A NOTE ON RETRACTS AND LATTICES (AFTER D. J. SALTMAN) Z. REICHSTEIN Abstract. This is an expository note based on the work of D. J. Saltman. We discuss the notions of retract rationality and retract equivalence

More information

Primary Decompositions of Powers of Ideals. Irena Swanson

Primary Decompositions of Powers of Ideals. Irena Swanson Primary Decompositions of Powers of Ideals Irena Swanson 2 Department of Mathematics, University of Michigan Ann Arbor, Michigan 48109-1003, USA iswanson@math.lsa.umich.edu 1 Abstract Let R be a Noetherian

More information

CREMONA MAPS AND INVOLUTIONS

CREMONA MAPS AND INVOLUTIONS CREMONA MAPS AND INVOLUTIONS JULIE DÉSERTI ABSTRACT. We deal with the following question of Dolgachev : is the Cremona group generated by involutions? Answer is yes in dimension see [6]. We give an upper

More information

On the cycle index and the weight enumerator

On the cycle index and the weight enumerator On the cycle index and the weight enumerator Tsuyoshi Miezaki and Manabu Oura Abstract In this paper, we introduce the concept of the complete cycle index and discuss a relation with the complete weight

More information

ON THE ALGEBRAIC INDEPENDENCE OF GENERIC PAINLEVÉ TRANSCENDENTS.

ON THE ALGEBRAIC INDEPENDENCE OF GENERIC PAINLEVÉ TRANSCENDENTS. ON THE ALGEBRAIC INDEPENDENCE OF GENERIC PAINLEVÉ TRANSCENDENTS. JOEL NAGLOO 1, ANAND PILLAY 2 Abstract. We prove that if y = f(y, y, t, α, β,...) is a generic Painlevé equation from among the classes

More information

THE JACOBIAN CONJECTURE: SURVEY OF SOME RESULTS

THE JACOBIAN CONJECTURE: SURVEY OF SOME RESULTS TOPICS IN COMPLEX ANALYSIS BANACH CENTER PUBLICATIONS, VOLUME 31 INSTITUTE OF MATHEMATICS POLISH ACADEMY OF SCIENCES WARSZAWA 1995 THE JACOBIAN CONJECTURE: SURVEY OF SOME RESULTS LUDWIK M. DRUŻKOWSKI Institute

More information

K-loop Structures Raised by the Direct Limits of Pseudo Unitary U(p, a n ) and Pseudo Orthogonal O(p, a n ) Groups

K-loop Structures Raised by the Direct Limits of Pseudo Unitary U(p, a n ) and Pseudo Orthogonal O(p, a n ) Groups Journal of Mathematics Research; Vol. 9, No. 5; October 2017 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education K-loop Structures Raised by the Direct Limits of Pseudo

More information

Finding a derangement

Finding a derangement Finding a derangement Peter J. Cameron, CSG, January 203 Derangements A derangement, or fixed-point-free permutation, is a permutation on a set Ω which leaves no point fixed. Dante Alighieri, in the Inferno

More information

arxiv: v4 [math.ac] 4 Mar 2008

arxiv: v4 [math.ac] 4 Mar 2008 Stable Tameness of Two-Dimensional Polynomial Automorphisms Over a Regular Ring arxiv:0707.3151v4 [math.ac] 4 Mar 2008 Joost Berson, Arno van den Essen, and David Wright January 1, 2009 Abstract In this

More information

Splitting sets and weakly Matlis domains

Splitting sets and weakly Matlis domains Commutative Algebra and Applications, 1 8 de Gruyter 2009 Splitting sets and weakly Matlis domains D. D. Anderson and Muhammad Zafrullah Abstract. An integral domain D is weakly Matlis if the intersection

More information

Available online at J. Math. Comput. Sci. 4 (2014), No. 3, ISSN: ORDERINGS AND PREORDERINGS ON MODULES

Available online at   J. Math. Comput. Sci. 4 (2014), No. 3, ISSN: ORDERINGS AND PREORDERINGS ON MODULES Available online at http://scik.org J. Math. Comput. Sci. 4 (2014), No. 3, 574-586 ISSN: 1927-5307 ORDERINGS AND PREORDERINGS ON MODULES DONGMING HUANG Department of Applied Mathematics, Hainan University,

More information

Computer Mathematics: Proceedings of the Fifth Asian Symposium. Series on Computing, vol. 9, World Scientific, 2001, pp

Computer Mathematics: Proceedings of the Fifth Asian Symposium. Series on Computing, vol. 9, World Scientific, 2001, pp GIESBRECHT S ALGORITHM, THE HFE CRYPTOSYSTEM AND ORE S p s -POLYNOMIALS ROBERT S. COULTER, GEORGE HAVAS AND MARIE HENDERSON Centre for Discrete Mathematics and Computing School of Computer Science and

More information

Finite groups determined by an inequality of the orders of their elements

Finite groups determined by an inequality of the orders of their elements Publ. Math. Debrecen 80/3-4 (2012), 457 463 DOI: 10.5486/PMD.2012.5168 Finite groups determined by an inequality of the orders of their elements By MARIUS TĂRNĂUCEANU (Iaşi) Abstract. In this note we introduce

More information

On Annihilator Small Intersection Graph

On Annihilator Small Intersection Graph International Journal of Contemporary Mathematical Sciences Vol. 12, 2017, no. 7, 283-289 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ijcms.2017.7931 On Annihilator Small Intersection Graph Mehdi

More information

CHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998

CHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998 CHAPTER 0 PRELIMINARY MATERIAL Paul Vojta University of California, Berkeley 18 February 1998 This chapter gives some preliminary material on number theory and algebraic geometry. Section 1 gives basic

More information

FLIPS VS FLOPS (PRIVATE NOTE) Contents 1. Introduction 1 2. Flips vs Flops 2 3. Questions 8 References 9

FLIPS VS FLOPS (PRIVATE NOTE) Contents 1. Introduction 1 2. Flips vs Flops 2 3. Questions 8 References 9 FLIPS VS FLOPS (PRIVATE NOTE) OSAMU FUJINO Abstract. In this note, we count the numbers of flipping and flopping contractions in the category of non-singular toric varieties. Contents 1. Introduction 1

More information

Poly Dragon: An efficient Multivariate Public Key Cryptosystem

Poly Dragon: An efficient Multivariate Public Key Cryptosystem Poly Dragon: An efficient Multivariate Public Key Cryptosystem Rajesh P Singh, A.Saikia, B.K.Sarma Department of Mathematics Indian Institute of Technology Guwahati Guwahati -781039, India May 19, 2010

More information

SOME VARIANTS OF LAGRANGE S FOUR SQUARES THEOREM

SOME VARIANTS OF LAGRANGE S FOUR SQUARES THEOREM Acta Arith. 183(018), no. 4, 339 36. SOME VARIANTS OF LAGRANGE S FOUR SQUARES THEOREM YU-CHEN SUN AND ZHI-WEI SUN Abstract. Lagrange s four squares theorem is a classical theorem in number theory. Recently,

More information

Affine-evasive Sets Modulo a Prime

Affine-evasive Sets Modulo a Prime Affine-evasive Sets Modulo a Prime Divesh Aggarwal October 6, 204 Abstract In this work, we describe a simple and efficient construction of a large subset S of F p, where p is a prime, such that the set

More information

A NOTE ABOUT THE NOWICKI CONJECTURE ON WEITZENBÖCK DERIVATIONS. Leonid Bedratyuk

A NOTE ABOUT THE NOWICKI CONJECTURE ON WEITZENBÖCK DERIVATIONS. Leonid Bedratyuk Serdica Math. J. 35 (2009), 311 316 A NOTE ABOUT THE NOWICKI CONJECTURE ON WEITZENBÖCK DERIVATIONS Leonid Bedratyuk Communicated by V. Drensky Abstract. We reduce the Nowicki conjecture on Weitzenböck

More information

On the number of diamonds in the subgroup lattice of a finite abelian group

On the number of diamonds in the subgroup lattice of a finite abelian group DOI: 10.1515/auom-2016-0037 An. Şt. Univ. Ovidius Constanţa Vol. 24(2),2016, 205 215 On the number of diamonds in the subgroup lattice of a finite abelian group Dan Gregorian Fodor and Marius Tărnăuceanu

More information

Means of unitaries, conjugations, and the Friedrichs operator

Means of unitaries, conjugations, and the Friedrichs operator J. Math. Anal. Appl. 335 (2007) 941 947 www.elsevier.com/locate/jmaa Means of unitaries, conjugations, and the Friedrichs operator Stephan Ramon Garcia Department of Mathematics, Pomona College, Claremont,

More information

SUPPLEMENT ON THE SYMMETRIC GROUP

SUPPLEMENT ON THE SYMMETRIC GROUP SUPPLEMENT ON THE SYMMETRIC GROUP RUSS WOODROOFE I presented a couple of aspects of the theory of the symmetric group S n differently than what is in Herstein. These notes will sketch this material. You

More information

arxiv: v1 [math.ag] 27 Oct 2007

arxiv: v1 [math.ag] 27 Oct 2007 A NOTE ON SINGULARITY AND NON-PROPER VALUE SET OF POLYNOMIAL MAPS OF C 2 arxiv:0710.5212v1 [math.ag] 27 Oct 2007 NGUYEN VAN CHAU Abstract. Some properties of the relation between the singular point set

More information