共查询到20条相似文献,搜索用时 42 毫秒
1.
The main result in Cossidente and Siciliano (J. Number Theory, Vol. 99 (2003) pp. 373–382) states that if a Singer subgroup of PGL(3,q) is an automorphism group of a projective, geometric
irreducible, non-singular plane algebraic curve
then either
or
. In the former case
is projectively equivalent to the curve
with equation Xq+1Y+Yq+1+X=0 studied by Pellikaan. Furthermore, the curve
has a very nice property from Finite Geometry point of view: apart from the three distinguished points fixed by the Singer
subgroup, the set of its
-rational points can be partitioned into finite projective planes
. In this paper, the full automorphism group of such curves is determined. It turns out that
is the normalizer of a Singer group in
. 相似文献
2.
For a subset ψ of PG(N, 2) a known result states that ψ has polynomial degree ≤ r, r≤ N, if and only if ψ intersects every r-flat of PG(N, 2) in an odd number of points. Certain refinements of this result are considered, and are then applied in the case when
ψ is the Grassmannian
, to show that for n <8 the polynomial degree of
is
. 相似文献
3.
Let Ω and
be a subset of Σ = PG(2n−1,q) and a subset of PG(2n,q) respectively, with Σ ⊂ PG(2n,q) and
. Denote by K the cone of vertex Ω and base
and consider the point set B defined by
in the André, Bruck-Bose representation of PG(2,qn) in PG(2n,q) associated to a regular spread
of PG(2n−1,q). We are interested in finding conditions on
and Ω in order to force the set B to be a minimal blocking set in PG(2,qn) . Our interest is motivated by the following observation. Assume a Property α of the pair (Ω,
) forces B to turn out a minimal blocking set. Then one can try to find new classes of minimal blocking sets working with the list of
all known pairs (Ω,
) with Property α. With this in mind, we deal with the problem in the case Ω is a subspace of PG(2n−1,q) and
a blocking set in a subspace of PG(2n,q); both in a mutually suitable position. We achieve, in this way, new classes and new sizes of minimal blocking sets in PG(2,qn), generalizing the main constructions of [14]. For example, for q = 3h, we get large blocking sets of size qn + 2 + 1 (n≥ 5) and of size greater than qn+2 + qn−6 (n≥ 6). As an application, a characterization of Buekenhout-Metz unitals in PG(2,q2k) is also given. 相似文献
4.
We determine exact values for the k-error linear complexity L
k
over the finite field
of the Legendre sequence
of period p and the Sidelnikov sequence
of period p
m
− 1. The results are
for 1 ≤ k ≤ (p
m
− 3)/2 and
for k≥ (p
m
− 1)/2. In particular, we prove
相似文献
5.
Arlene A. Pascasio Cheryl E. Praeger Blessilda P. Raposa 《Designs, Codes and Cryptography》1996,8(1-2):173-179
We show that a non-symmetric nearly triply regular
designD with
and in which every line has at least q points is AG(n,q) for prime power q > 2 and positiveinteger n 3. 相似文献
6.
Let
be a 2-(v,k,1) design, and let G be a group of automorphisms of
. We show that if G is block primitive, then G does not admit a Ree group
as its socle. 相似文献
7.
Hidetoshi Maeda 《Archiv der Mathematik》2007,88(5):419-424
Let
be an ample vector bundle of rank n – 1 on a smooth complex projective variety X of dimension n≥ 3 such that X is a
-bundle over
and that
for any fiber F of the bundle projection
. The pairs
with
= 2 are classified, where
is the curve genus of
. This allows us to improve some previous results.
Received: 13 June 2006 相似文献
8.
In 2003 and 2004, Kasahara and Sakai suggested the two schemes RSE(2)PKC and RSSE(2)PKC, respectively. Both are examples of
public key schemes based on
ultivariate
uadratic equations. In this article, we first introduce Step-wise Triangular Schemes (STS) as a new class of
ultivariate
uadratic public key schemes. These schemes have m equations, n variables, L steps or layers, r the number of equations and new variables per step and q the size of the underlying finite field
. Then, we derive two very efficient cryptanalytic attacks. The first attack is an inversion attack which computes the message/signature
for given ciphertext/message in O(mn
3
Lq
r
+ n
2
Lrq
r
), the second is a structural attack which recovers an equivalent version of the secret key in O(mn
3
Lq
r
+ mn
4) operations. As the legitimate user also has a workload growing with q
r
to recover a message/compute a signature, q
r
has to be small for efficient schemes and the attacks presented in this article are therefore efficient. After developing
our theory, we demonstrate that both RSE(2)PKC and RSSE(2)PKC are special instances of STS and hence, fall to the attacks
developed in our article. In particular, we give the solution for the crypto challenge proposed by Kasahara and Sakai. Finally,
we demonstrate that STS cannot be the basis for a secure
ultivariate
uadratic public key scheme by discussing all possible variations and pointing out their vulnerabilities. 相似文献
9.
On the Range of the Aluthge Transform 总被引:1,自引:0,他引:1
Let
be the algebra of all bounded linear operators on a complex separable Hilbert space
For an operator
let
be the Aluthge transform of T and we define
for all
where T = U|T| is a polar decomposition of T. In this short note, we consider an elementary property of the range
of Δ. We prove that R(Δ) is neither closed nor dense in
However R(Δ) is strongly dense if
is infinite dimensional.
An erratum to this article is available at . 相似文献
10.
Antoine Deza Boris Goldengorin Dmitrii V. Pasechnik 《Journal of Algebraic Combinatorics》2006,23(2):197-203
We show that the symmetry groups of the cut cone Cutn and the metric cone Metn both consist of the isometries induced by the permutations on
, that is,
for n ≥ 5. For n = 4 we have
. This result can be extended to cones containing the cuts as extreme rays and for which the triangle inequalities are facet-inducing.
For instance,
for n ≥ 5, where Hypn denotes the hypermetric cone. 相似文献
11.
A set of linear maps
, V a finite vector space over a field K, is regular if to each
there corresponds a unique element
such that R(x)=y. In this context, Schur’s lemma implies that
is a field if (and only if) it consists of pairwise commuting elements. We consider when
is locally commutative: at some μ ∈V*, AB(μ)=BA(μ) for all
, and
has been normalized to contain the identity. We show that such locally commutative
are equivalent to commutative semifields, generalizing a result of Ganley, and hence characterizing commutative semifield spreads within the class of translation planes. This enables the determination of the orders |V| for which all locally commutative
on V are (globally) commutative. Similarly, we determine a sharp upperbound for the maximum size of the Schur kernel associated with strictly locally commutative
. We apply our main result to demonstrate the existence of a partial spread of degree 5, with nominated shears axis, that cannot be extend to a commutative semifield spread. Finally, we note that although local commutativity for a regular linear set
implies that the set of Lie products
consists entirely of singular maps, the converse is false. 相似文献
12.
A (k,n)-arc in PG(2,q) is usually defined to be a set
of k points in the plane such that some line meets
in n points but such that no line meets
in more than n points. There is an extensive literature on the topic of (k,n)-arcs. Here we keep the same definition but allow
to be a multiset, that is, permit
to contain multiple points. The case k=q
2+q+2 is of interest because it is the first value of k for which a (k,n)-arc must be a multiset. The problem of classifying (q
2+q+2,q+2)-arcs is of importance in coding theory, since it is equivalent to classifying 3-dimensional q-ary error-correcting codes of length q
2+q+2 and minimum distance q
2. Indeed, it was the coding theory problem which provided the initial motivation for our study. It turns out that such arcs are surprisingly rich in geometric structure. Here we construct several families of (q
2+q+2,q+2)-arcs as well as obtain some bounds and non-existence results. A complete classification of such arcs seems to be a difficult problem. 相似文献
13.
In this paper, we continue our investigation on “Extremal problems under dimension constraints” introduced [1]. The general problem we deal with in this paper can be formulated as follows. Let
be an affine plane of dimension k in
. Given
determine or estimate
.Here we consider and solve the problem in the special case where
is a hyperplane in
and the “forbidden set”
. The same problem is considered for the case, where
is a hyperplane passing through the origin, which surprisingly turns out to be more difficult. For this case we have only partial results.AMS Classification: 05C35, 05B30, 52C99 相似文献
14.
The peak algebra
is a unital subalgebra of the symmetric group algebra, linearly spanned by sums of permutations with a common set of peaks.
By exploiting the combinatorics of sparse subsets of [n−1] (and of certain classes of compositions of n called almost-odd and thin), we construct three new linear bases of
. We discuss two peak analogs of the first Eulerian idempotent and construct a basis of semi-idempotent elements for the peak
algebra. We use these bases to describe the Jacobson radical of
and to characterize the elements of
in terms of the canonical action of the symmetric groups on the tensor algebra of a vector space. We define a chain of ideals
of
, j = 0,...,
, such that
is the linear span of sums of permutations with a common set of interior peaks and
is the peak algebra. We extend the above results to
, generalizing results of Schocker (the case j = 0).
Aguiar supported in part by NSF grant DMS-0302423
Orellana supported in part by the Wilson Foundation 相似文献
15.
We transfer the whole geometry of PG(3, q) over a non-singular quadric Q4,q of PG(4, q) mapping suitably PG(3, q) over Q4,q. More precisely the points of PG(3, q) are the lines of Q4,q; the lines of PG(3, q) are the tangent cones of Q4,q and the reguli of the hyperbolic quadrics hyperplane section of Q4,q. A plane of PG(3, q) is the set of lines of Q4,q meeting a fixed line of Q4,q. We remark that this representation is valid also for a projective space
over any field K and we apply the above representation to construct maximal partial spreads
in PG(3, q). For q even we get new cardinalities for
For q odd the cardinalities are partially known. 相似文献
16.
17.
Humio Ichimura 《Archiv der Mathematik》2006,87(6):539-545
Let p be an odd prime number and
. Let
be the classical Stickelberger ideal of the group ring
. Iwasawa [6] proved that the index
equals the relative class number
of
. In [2], [4] we defined for each subgroup H of G a Stickelberger ideal
of
, and studied some of its properties. In this note, we prove that when
mod 4 and [G : H] = 2, the index
equals the quotient
.
Received: 13 January 2006 相似文献
18.
For pairing based cryptography we need elliptic curves defined over finite fields
whose group order is divisible by some prime
with
where k is relatively small. In Barreto et al. and Dupont et al. [Proceedings of the Third Workshop on Security in Communication Networks (SCN 2002), LNCS, 2576, 2003; Building curves with arbitrary small Mov degree over finite fields, Preprint, 2002], algorithms for the construction of ordinary elliptic curves over prime fields
with arbitrary embedding degree k are given. Unfortunately, p is of size
.We give a method to generate ordinary elliptic curves over prime fields with p significantly less than
which also works for arbitrary k. For a fixed embedding degree k, the new algorithm yields curves with
where
or
depending on k. For special values of k even better results are obtained.We present several examples. In particular, we found some curves where
is a prime of small Hamming weight resp. with a small addition chain.AMS classification: 14H52, 14G50 相似文献
19.
We characterize the finite Veronesean
of all Hermitian varieties of PG(n,q2) as the unique representation of PG(n,q2) in PG(d,q), d n(n+2), where points and lines of PG(n,q2) are represented by points and ovoids of solids, respectively, of PG(d,q), with the only condition that the point set of PG(d,q) corresponding to the point set of PG(n,q2) generates PG(d,q). Using this result for n=2, we show that
is characterized by the following properties: (1)
; (2) each hyperplane of PG(8,q) meets
in q2+1, q3+1 or q3+q2+1 points; (3) each solid of PG(8,q) having at least q+3 points in common with
shares exactly q2+1 points with it.51E24 相似文献
20.
Antonio G. García Miguel A. Hernández-Medina 《Mediterranean Journal of Mathematics》2005,2(3):345-356
Let
be a symmetric operator with compact resolvent defined in a Hilbert space
For any fixed
we consider an entire
function Ka which involves the resolvent of
Associated with Ka we obtain, by duality in
a Hilbert space
of entire functions which becomes a De Branges space of entire functions. This property provides a characterization of
regardless of the anti-linear mapping which has
as its range space. There exists also a sampling formula allowing to recover any function in
from its samples at the sequence of eigenvalues of
This work has been supported by the grant BFM2003–01034 from the D.G.I. of the Spanish Ministerio de Ciencia y Tecnología. 相似文献