首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 42 毫秒
1.
The main result in Cossidente and Siciliano (J. Number Theory, Vol. 99 (2003) pp. 373–382) states that if a Singer subgroup of PGL(3,q) is an automorphism group of a projective, geometric irreducible, non-singular plane algebraic curve then either or . In the former case is projectively equivalent to the curve with equation Xq+1Y+Yq+1+X=0 studied by Pellikaan. Furthermore, the curve has a very nice property from Finite Geometry point of view: apart from the three distinguished points fixed by the Singer subgroup, the set of its -rational points can be partitioned into finite projective planes . In this paper, the full automorphism group of such curves is determined. It turns out that is the normalizer of a Singer group in .  相似文献   

2.
For a subset ψ of PG(N, 2) a known result states that ψ has polynomial degree ≤ r, rN, if and only if ψ intersects every r-flat of PG(N, 2) in an odd number of points. Certain refinements of this result are considered, and are then applied in the case when ψ is the Grassmannian , to show that for n <8 the polynomial degree of is .  相似文献   

3.
Let Ω and be a subset of Σ = PG(2n−1,q) and a subset of PG(2n,q) respectively, with Σ ⊂ PG(2n,q) and . Denote by K the cone of vertex Ω and base and consider the point set B defined by
in the André, Bruck-Bose representation of PG(2,qn) in PG(2n,q) associated to a regular spread of PG(2n−1,q). We are interested in finding conditions on and Ω in order to force the set B to be a minimal blocking set in PG(2,qn) . Our interest is motivated by the following observation. Assume a Property α of the pair (Ω, ) forces B to turn out a minimal blocking set. Then one can try to find new classes of minimal blocking sets working with the list of all known pairs (Ω, ) with Property α. With this in mind, we deal with the problem in the case Ω is a subspace of PG(2n−1,q) and a blocking set in a subspace of PG(2n,q); both in a mutually suitable position. We achieve, in this way, new classes and new sizes of minimal blocking sets in PG(2,qn), generalizing the main constructions of [14]. For example, for q = 3h, we get large blocking sets of size qn + 2 + 1 (n≥ 5) and of size greater than qn+2 + qn−6 (n≥ 6). As an application, a characterization of Buekenhout-Metz unitals in PG(2,q2k) is also given.  相似文献   

4.
We determine exact values for the k-error linear complexity L k over the finite field of the Legendre sequence of period p and the Sidelnikov sequence of period p m  − 1. The results are
for 1 ≤ k ≤ (p m  − 3)/2 and for k≥ (p m  − 1)/2. In particular, we prove
  相似文献   

5.
We show that a non-symmetric nearly triply regular designD with and in which every line has at least q points is AG(n,q) for prime power q > 2 and positiveinteger n 3.  相似文献   

6.
Let be a 2-(v,k,1) design, and let G be a group of automorphisms of . We show that if G is block primitive, then G does not admit a Ree group as its socle.  相似文献   

7.
Let be an ample vector bundle of rank n – 1 on a smooth complex projective variety X of dimension n≥ 3 such that X is a -bundle over and that for any fiber F of the bundle projection . The pairs with = 2 are classified, where is the curve genus of . This allows us to improve some previous results. Received: 13 June 2006  相似文献   

8.
In 2003 and 2004, Kasahara and Sakai suggested the two schemes RSE(2)PKC and RSSE(2)PKC, respectively. Both are examples of public key schemes based on ultivariate uadratic equations. In this article, we first introduce Step-wise Triangular Schemes (STS) as a new class of ultivariate uadratic public key schemes. These schemes have m equations, n variables, L steps or layers, r the number of equations and new variables per step and q the size of the underlying finite field . Then, we derive two very efficient cryptanalytic attacks. The first attack is an inversion attack which computes the message/signature for given ciphertext/message in O(mn 3 Lq r + n 2 Lrq r ), the second is a structural attack which recovers an equivalent version of the secret key in O(mn 3 Lq r + mn 4) operations. As the legitimate user also has a workload growing with q r to recover a message/compute a signature, q r has to be small for efficient schemes and the attacks presented in this article are therefore efficient. After developing our theory, we demonstrate that both RSE(2)PKC and RSSE(2)PKC are special instances of STS and hence, fall to the attacks developed in our article. In particular, we give the solution for the crypto challenge proposed by Kasahara and Sakai. Finally, we demonstrate that STS cannot be the basis for a secure ultivariate uadratic public key scheme by discussing all possible variations and pointing out their vulnerabilities.  相似文献   

9.
On the Range of the Aluthge Transform   总被引:1,自引:0,他引:1  
Let be the algebra of all bounded linear operators on a complex separable Hilbert space For an operator let be the Aluthge transform of T and we define for all where T = U|T| is a polar decomposition of T. In this short note, we consider an elementary property of the range of Δ. We prove that R(Δ) is neither closed nor dense in However R(Δ) is strongly dense if is infinite dimensional. An erratum to this article is available at .  相似文献   

10.
We show that the symmetry groups of the cut cone Cutn and the metric cone Metn both consist of the isometries induced by the permutations on , that is, for n ≥ 5. For n = 4 we have . This result can be extended to cones containing the cuts as extreme rays and for which the triangle inequalities are facet-inducing. For instance, for n ≥ 5, where Hypn denotes the hypermetric cone.  相似文献   

11.
A set of linear maps , V a finite vector space over a field K, is regular if to each there corresponds a unique element such that R(x)=y. In this context, Schur’s lemma implies that is a field if (and only if) it consists of pairwise commuting elements. We consider when is locally commutative: at some μ ∈V*, AB(μ)=BA(μ) for all , and has been normalized to contain the identity. We show that such locally commutative are equivalent to commutative semifields, generalizing a result of Ganley, and hence characterizing commutative semifield spreads within the class of translation planes. This enables the determination of the orders |V| for which all locally commutative on V are (globally) commutative. Similarly, we determine a sharp upperbound for the maximum size of the Schur kernel associated with strictly locally commutative . We apply our main result to demonstrate the existence of a partial spread of degree 5, with nominated shears axis, that cannot be extend to a commutative semifield spread. Finally, we note that although local commutativity for a regular linear set implies that the set of Lie products consists entirely of singular maps, the converse is false.  相似文献   

12.
A (k,n)-arc in PG(2,q) is usually defined to be a set of k points in the plane such that some line meets in n points but such that no line meets in more than n points. There is an extensive literature on the topic of (k,n)-arcs. Here we keep the same definition but allow to be a multiset, that is, permit to contain multiple points. The case k=q 2+q+2 is of interest because it is the first value of k for which a (k,n)-arc must be a multiset. The problem of classifying (q 2+q+2,q+2)-arcs is of importance in coding theory, since it is equivalent to classifying 3-dimensional q-ary error-correcting codes of length q 2+q+2 and minimum distance q 2. Indeed, it was the coding theory problem which provided the initial motivation for our study. It turns out that such arcs are surprisingly rich in geometric structure. Here we construct several families of (q 2+q+2,q+2)-arcs as well as obtain some bounds and non-existence results. A complete classification of such arcs seems to be a difficult problem.  相似文献   

13.
In this paper, we continue our investigation on “Extremal problems under dimension constraints” introduced [1]. The general problem we deal with in this paper can be formulated as follows. Let be an affine plane of dimension k in . Given determine or estimate .Here we consider and solve the problem in the special case where is a hyperplane in and the “forbidden set” . The same problem is considered for the case, where is a hyperplane passing through the origin, which surprisingly turns out to be more difficult. For this case we have only partial results.AMS Classification: 05C35, 05B30, 52C99  相似文献   

14.
The peak algebra is a unital subalgebra of the symmetric group algebra, linearly spanned by sums of permutations with a common set of peaks. By exploiting the combinatorics of sparse subsets of [n−1] (and of certain classes of compositions of n called almost-odd and thin), we construct three new linear bases of . We discuss two peak analogs of the first Eulerian idempotent and construct a basis of semi-idempotent elements for the peak algebra. We use these bases to describe the Jacobson radical of and to characterize the elements of in terms of the canonical action of the symmetric groups on the tensor algebra of a vector space. We define a chain of ideals of , j = 0,..., , such that is the linear span of sums of permutations with a common set of interior peaks and is the peak algebra. We extend the above results to , generalizing results of Schocker (the case j = 0). Aguiar supported in part by NSF grant DMS-0302423 Orellana supported in part by the Wilson Foundation  相似文献   

15.
We transfer the whole geometry of PG(3, q) over a non-singular quadric Q4,q of PG(4, q) mapping suitably PG(3, q) over Q4,q. More precisely the points of PG(3, q) are the lines of Q4,q; the lines of PG(3, q) are the tangent cones of Q4,q and the reguli of the hyperbolic quadrics hyperplane section of Q4,q. A plane of PG(3, q) is the set of lines of Q4,q meeting a fixed line of Q4,q. We remark that this representation is valid also for a projective space over any field K and we apply the above representation to construct maximal partial spreads in PG(3, q). For q even we get new cardinalities for For q odd the cardinalities are partially known.  相似文献   

16.
17.
Let p be an odd prime number and . Let be the classical Stickelberger ideal of the group ring . Iwasawa [6] proved that the index equals the relative class number of . In [2], [4] we defined for each subgroup H of G a Stickelberger ideal of , and studied some of its properties. In this note, we prove that when mod 4 and [G : H] = 2, the index equals the quotient . Received: 13 January 2006  相似文献   

18.
For pairing based cryptography we need elliptic curves defined over finite fields whose group order is divisible by some prime with where k is relatively small. In Barreto et al. and Dupont et al. [Proceedings of the Third Workshop on Security in Communication Networks (SCN 2002), LNCS, 2576, 2003; Building curves with arbitrary small Mov degree over finite fields, Preprint, 2002], algorithms for the construction of ordinary elliptic curves over prime fields with arbitrary embedding degree k are given. Unfortunately, p is of size .We give a method to generate ordinary elliptic curves over prime fields with p significantly less than which also works for arbitrary k. For a fixed embedding degree k, the new algorithm yields curves with where or depending on k. For special values of k even better results are obtained.We present several examples. In particular, we found some curves where is a prime of small Hamming weight resp. with a small addition chain.AMS classification: 14H52, 14G50  相似文献   

19.
We characterize the finite Veronesean of all Hermitian varieties of PG(n,q2) as the unique representation of PG(n,q2) in PG(d,q), d n(n+2), where points and lines of PG(n,q2) are represented by points and ovoids of solids, respectively, of PG(d,q), with the only condition that the point set of PG(d,q) corresponding to the point set of PG(n,q2) generates PG(d,q). Using this result for n=2, we show that is characterized by the following properties: (1) ; (2) each hyperplane of PG(8,q) meets in q2+1, q3+1 or q3+q2+1 points; (3) each solid of PG(8,q) having at least q+3 points in common with shares exactly q2+1 points with it.51E24  相似文献   

20.
Let be a symmetric operator with compact resolvent defined in a Hilbert space For any fixed we consider an entire function Ka which involves the resolvent of Associated with Ka we obtain, by duality in a Hilbert space of entire functions which becomes a De Branges space of entire functions. This property provides a characterization of regardless of the anti-linear mapping which has as its range space. There exists also a sampling formula allowing to recover any function in from its samples at the sequence of eigenvalues of This work has been supported by the grant BFM2003–01034 from the D.G.I. of the Spanish Ministerio de Ciencia y Tecnología.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号