首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
Feldman  G. M. 《Doklady Mathematics》2020,102(1):296-300
Doklady Mathematics - According to the well-knows Heyde theorem the Gaussian distribution on the real line is characterized by the symmetry of the conditional distribution of one linear form of...  相似文献   

3.
This paper deals with a class of pseudorandom bit generators – modified alternating –generators. This class is constructed similarly to the class of alternating step generators. Three subclasses of are distinguished, namely linear, mixed and nonlinear generators. The main attention is devoted to the subclass of linear and mixed generators generating periodic sequences with maximal period lengths. A necessary and sufficient condition for all sequences generated by the linear generators of to be with maximal period lengths is formulated. Such sequences have good statistical properties, such as distribution of zeroes and ones, and large linear complexity. Two methods of cryptanalysis of the proposed generators are given. Finally, three new classes of modified alternating –generators, designed especially to be more secure, are presented.  相似文献   

4.
5.
We study Poletsky–Stessin Hardy spaces on complex ellipsoids in \(\mathbb {C}^{n}\). Different from one variable case, classical Hardy spaces are strictly contained in Poletsky–Stessin Hardy spaces on complex ellipsoids so boundary values are not automatically obtained in this case. We have showed that functions belonging to Poletsky–Stessin Hardy spaces have boundary values and they can be approached through admissible approach regions in the complex ellipsoid case. Moreover, we have obtained that polynomials are dense in these spaces. We also considered the composition operators acting on Poletsky–Stessin Hardy spaces on complex ellipsoids and gave conditions for their boundedness and compactness.  相似文献   

6.
S. Bauer and M. Furuta defined a stable cohomotopy refinement of the Seiberg–Witten invariants. In this paper, we prove a vanishing theorem of Bauer–Furuta invariants for 4-manifolds with smooth -actions. As an application, we give a constraint on smooth -actions on homotopy K3#K3, and construct a nonsmoothable locally linear -action on K3#K3. We also construct a nonsmoothable locally linear -action on K3.   相似文献   

7.
Monatshefte für Mathematik - Let $$\Omega $$ be a $$C^2$$ -smooth bounded pseudoconvex domain in $$\mathbb {C}^n$$ for $$n\ge 2$$ and let $$\varphi $$ be a holomorphic function on $$\Omega $$...  相似文献   

8.
This note describes minimal surfaces S of general type satisfying p g  ≥ 5 and K 2 = 2p g . For p g  ≥ 8 the canonical map of such surfaces is generically finite of degree 2 and the bulk of the paper is a complete characterization of such surfaces with non birational canonical map. It turns out that if p g  ≥ 13, S has always an (unique) genus 2 fibration, whose non 2-connected fibres can be characterized, whilst for p g  ≤ 12 there are two other classes of such surfaces with non birational canonical map.  相似文献   

9.
We give a criterion for the annihilator in U(\( \mathfrak{s}\mathfrak{l} \)(∞)) of a simple highest weight \( \mathfrak{s}\mathfrak{l} \)(∞)-module to be nonzero. As a consequence we show that, in contrast with the case of \( \mathfrak{s}\mathfrak{l} \)(n), the annihilator in U(\( \mathfrak{s}\mathfrak{l} \)(∞)) of any simple highest weight \( \mathfrak{s}\mathfrak{l} \)(∞)-module is integrable, i.e., coincides with the annihilator of an integrable \( \mathfrak{s}\mathfrak{l} \)(∞)-module. Furthermore, we define the class of ideal Borel subalgebras of \( \mathfrak{s}\mathfrak{l} \)(∞), and prove that any prime integrable ideal in U(\( \mathfrak{s}\mathfrak{l} \)(∞)) is the annihilator of a simple \( \mathfrak{b} \) 0-highest weight module, where \( \mathfrak{b} \) 0 is any fixed ideal Borel subalgebra of \( \mathfrak{s}\mathfrak{l} \)(∞). This latter result is an analogue of the celebrated Duoflo Theorem for primitive ideals.  相似文献   

10.
The Ramanujan Journal - We apply Heine’s method—the key idea Heine used in 1846 to derive his famous transformation formula for $$_2\phi _1$$ series—to multiple basic series over...  相似文献   

11.
Field inversion in \(\mathbb {F}_{2^{m}}\) dominates the cost of modern software implementations of certain elliptic curve cryptographic operations, such as point encoding/hashing into elliptic curves (Brown et al. in: Submission to NIST, 2008; Brown in: IACR Cryptology ePrint Archive 2008:12, 2008; Aranha et al. in: Cryptology ePrint Archive, Report 2014/486, 2014) Itoh–Tsujii inversion using a polynomial basis and precomputed table-based multi-squaring has been demonstrated to be highly effective for software implementations (Taverne et al. in: CHES 2011, 2011; Oliveira et al. in: J Cryptogr Eng 4(1):3–17, 2014; Aranha et al. in: Cryptology ePrint Archive, Report 2014/486, 2014), but the performance and memory use depend critically on the choice of addition chain and multi-squaring tables, which in prior work have been determined only by suboptimal ad-hoc methods and manual selection. We thoroughly investigated the performance/memory tradeoff for table-based linear transforms used for efficient multi-squaring. Based upon the results of that investigation, we devised a comprehensive cost model for Itoh–Tsujii inversion and a corresponding optimization procedure that is empirically fast and provably finds globally-optimal solutions. We tested this method on eight binary fields commonly used for elliptic curve cryptography; our method found lower-cost solutions than the ad-hoc methods used previously, and for the first time enables a principled exploration of the time/memory tradeoff of inversion implementations.  相似文献   

12.
In this paper, we extend the lattice Constructions D, \(D'\) and \(\overline{D}\) (this latter is also known as Forney’s code formula) from codes over \(\mathbb {F}_p\) to linear codes over \(\mathbb {Z}_q\), where \(q \in \mathbb {N}\). We define an operation in \(\mathbb {Z}_q^n\) called zero-one addition, which coincides with the Schur product when restricted to \(\mathbb {Z}_2^n\) and show that the extended Construction \(\overline{D}\) produces a lattice if and only if the nested codes are closed under this addition. A generalization to the real case of the recently developed Construction \(A'\) is also derived and we show that this construction produces a lattice if and only if the corresponding code over \(\mathbb {Z}_q[X]/X^a\) is closed under a shifted zero-one addition. One of the motivations for this work is the recent use of q-ary lattices in cryptography.  相似文献   

13.
Periodica Mathematica Hungarica - Let $$\mathbb N$$ be the set of positive integers, and denote by $$\begin{aligned} \lambda (A)=\inf \{t>0:\sum _{a\in A} a^{-t}<\infty \}...  相似文献   

14.
15.
EL Mahi  A.  Ziane  M. 《Acta Mathematica Hungarica》2021,165(1):146-155
Acta Mathematica Hungarica - For a real biquadratic field, we denote by $$\lambda$$ , $$\mu$$ and $$\nu$$ the Iwasawa invariants of cyclotomic $$\mathbb{Z}_{2}$$ -extension of $$k$$ . We give...  相似文献   

16.
A maximal surface with isolated singularities in a complete flat Lorentzian 3-manifold
is said to be entire if it lifts to a (periodic) entire multigraph in . In addition, is called of finite type if it has finite topology, finitely many singular points and is a finitely sheeted multigraph. Complete (or proper) maximal immersions with isolated singularities in are entire, and entire embedded maximal surfaces in with a finite number of singularities are of finite type. We classify complete flat Lorentzian 3-manifolds carrying entire maximal surfaces of finite type, and deal with the topology, Weierstrass representation and asymptotic behavior of this kind of surfaces. Finally, we construct new examples of periodic entire embedded maximal surfaces in with fundamental piece having finitely many singularities.   相似文献   

17.
A singular rank one perturbation of a self-adjoint operator A in a Hilbert space is considered, where and but with the usual A–scale of Hilbert spaces. A modified version of the Aronszajn-Krein formula is given. It has the form where F denotes the regularized Borel transform of the scalar spectral measure of A associated with . Using this formula we develop a variant of the well known Aronszajn–Donoghue spectral theory for a general rank one perturbation of the class.Submitted: March 14, 2002 Revised: December 15, 2002  相似文献   

18.
In this paper, we provide a new proof for the Dedekind \(\eta \)-function identities discovered by Somos. During this process, we found two new Dedekind \(\eta \)-function identities. Furthermore, we extract interesting partition identities from some of the \(\eta \)-function identities.  相似文献   

19.
In this paper we propose a primal-dual homotopy method for \(\ell _1\)-minimization problems with infinity norm constraints in the context of sparse reconstruction. The natural homotopy parameter is the value of the bound for the constraints and we show that there exists a piecewise linear solution path with finitely many break points for the primal problem and a respective piecewise constant path for the dual problem. We show that by solving a small linear program, one can jump to the next primal break point and then, solving another small linear program, a new optimal dual solution is calculated which enables the next such jump in the subsequent iteration. Using a theorem of the alternative, we show that the method never gets stuck and indeed calculates the whole path in a finite number of steps. Numerical experiments demonstrate the effectiveness of our algorithm. In many cases, our method significantly outperforms commercial LP solvers; this is possible since our approach employs a sequence of considerably simpler auxiliary linear programs that can be solved efficiently with specialized active-set strategies.  相似文献   

20.
The main aim of this article is to study the hypercomplex π-operator over \mathbbCn+1{\mathbb{C}^{n+1}} via real, compact, n + 1-dimensional manifolds called domain manifolds. We introduce an intrinsic Dirac operator for such types of domain manifolds and define an intrinsic π-operator, study its mapping properties and introduce a Clifford–Beltrami equation in this context.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号