首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
In this paper we determine the method of multi-parameter interpolation and the scales of Lebesgue spaces $B_{\vec p} \left[ {0,2\pi } \right)$ and Besov spaces $B_{\vec p}^{\vec \alpha } \left[ {0,2\pi } \right)$ , which are generalizations of the Lorentz spacesL pq [0, 2π) and Besov spacesB pq α [0, 2π). We also prove imbedding theorems.  相似文献   

2.
Field inversion in \(\mathbb {F}_{2^{m}}\) dominates the cost of modern software implementations of certain elliptic curve cryptographic operations, such as point encoding/hashing into elliptic curves (Brown et al. in: Submission to NIST, 2008; Brown in: IACR Cryptology ePrint Archive 2008:12, 2008; Aranha et al. in: Cryptology ePrint Archive, Report 2014/486, 2014) Itoh–Tsujii inversion using a polynomial basis and precomputed table-based multi-squaring has been demonstrated to be highly effective for software implementations (Taverne et al. in: CHES 2011, 2011; Oliveira et al. in: J Cryptogr Eng 4(1):3–17, 2014; Aranha et al. in: Cryptology ePrint Archive, Report 2014/486, 2014), but the performance and memory use depend critically on the choice of addition chain and multi-squaring tables, which in prior work have been determined only by suboptimal ad-hoc methods and manual selection. We thoroughly investigated the performance/memory tradeoff for table-based linear transforms used for efficient multi-squaring. Based upon the results of that investigation, we devised a comprehensive cost model for Itoh–Tsujii inversion and a corresponding optimization procedure that is empirically fast and provably finds globally-optimal solutions. We tested this method on eight binary fields commonly used for elliptic curve cryptography; our method found lower-cost solutions than the ad-hoc methods used previously, and for the first time enables a principled exploration of the time/memory tradeoff of inversion implementations.  相似文献   

3.
A combinatorial proof that the number of points of the space \(\overline {{M_{0,n}}} \left( {{F_q}} \right)\) satisfies the recurrent formula for the Poincaré polynomials of the space \(\overline {{M_{0,n}}} \left( \mathbb{C} \right)\) is obtained.  相似文献   

4.
We study Poletsky–Stessin Hardy spaces on complex ellipsoids in \(\mathbb {C}^{n}\). Different from one variable case, classical Hardy spaces are strictly contained in Poletsky–Stessin Hardy spaces on complex ellipsoids so boundary values are not automatically obtained in this case. We have showed that functions belonging to Poletsky–Stessin Hardy spaces have boundary values and they can be approached through admissible approach regions in the complex ellipsoid case. Moreover, we have obtained that polynomials are dense in these spaces. We also considered the composition operators acting on Poletsky–Stessin Hardy spaces on complex ellipsoids and gave conditions for their boundedness and compactness.  相似文献   

5.
Hou  Fei 《The Ramanujan Journal》2022,57(4):1423-1443
The Ramanujan Journal - Let $$k\ge 2$$ be an even integer, and let M be a positive integer. We prove a hybrid subconvexity bound for $$L(1/2,\text {sym}^2 f\otimes \chi )$$ with the associated...  相似文献   

6.
Let ζ be a primitive q′-root of unity. We prove that the series $ \sum\nolimits_{n = 1}^\infty {{{\zeta ^{ \llcorner n\theta \lrcorner } } \mathord{\left/ {\vphantom {{\zeta ^{ \llcorner n\theta \lrcorner } } n}} \right. \kern-0em} n}} $ for θQ converges if and only if θ = p/q with (p,q) = 1 and q′ ? p, and that there exists an uncountable set S of Liouville’s numbers such that the series does not converge when θS.  相似文献   

7.
We examine the semi-Riemannian manifold \(\mathbb {R}^{1,1}\), which is realized as the split complex plane, and its conformal compactification as an analogue of the complex plane and the Riemann sphere. We also consider conformal maps on the compactification and study some of their basic properties.  相似文献   

8.
Feldman  G. M. 《Doklady Mathematics》2020,102(1):296-300
Doklady Mathematics - According to the well-knows Heyde theorem the Gaussian distribution on the real line is characterized by the symmetry of the conditional distribution of one linear form of...  相似文献   

9.
Monatshefte für Mathematik - Let $$\Omega $$ be a $$C^2$$ -smooth bounded pseudoconvex domain in $$\mathbb {C}^n$$ for $$n\ge 2$$ and let $$\varphi $$ be a holomorphic function on $$\Omega $$...  相似文献   

10.
This note describes minimal surfaces S of general type satisfying p g  ≥ 5 and K 2 = 2p g . For p g  ≥ 8 the canonical map of such surfaces is generically finite of degree 2 and the bulk of the paper is a complete characterization of such surfaces with non birational canonical map. It turns out that if p g  ≥ 13, S has always an (unique) genus 2 fibration, whose non 2-connected fibres can be characterized, whilst for p g  ≤ 12 there are two other classes of such surfaces with non birational canonical map.  相似文献   

11.
A generalized strong external difference family (briefly \((v, m; k_1,\dots ,k_m; \lambda _1,\dots ,\lambda _m)\)-GSEDF) was introduced by Paterson and Stinson in 2016. In this paper, we give some nonexistence results for GSEDFs. In particular, we prove that a \((v, 3;k_1,k_2,k_3; \lambda _1,\lambda _2,\lambda _3)\)-GSEDF does not exist when \(k_1+k_2+k_3< v\). We also give a first recursive construction for GSEDFs and prove that if there is a \((v,2;2\lambda ,\frac{v-1}{2};\lambda ,\lambda )\)-GSEDF, then there is a \((vt,2;4\lambda ,\frac{vt-1}{2};2\lambda ,2\lambda )\)-GSEDF with \(v>1\), \(t>1\) and \(v\equiv t\equiv 1\pmod 2\). Then we use it to obtain some new GSEDFs for \(m=2\). In particular, for any prime power q with \(q\equiv 1\pmod 4\), we show that there exists a \((qt, 2;(q-1)2^{n-1},\frac{qt-1}{2};(q-1)2^{n-2},(q-1)2^{n-2})\)-GSEDF, where \(t=p_1p_2\dots p_n\), \(p_i>1\), \(1\le i\le n\), \(p_1, p_2,\dots ,p_n\) are odd integers.  相似文献   

12.
In this note, we introduce the 2kth crank moment \(\mu _{2k}(-1,n)\) weighted by the parity of cranks and show that \((-1)^n \mu _{2k}(-1,n)>0\) for \(n\ge k \ge 0\). When \(k=0\), the inequality \((-1)^n \mu _{2k}(-1,n)>0\) reduces to Andrews and Lewis’s inequality \((-1)^n(M_e(n)-M_o(n))>0\) for \(n\ge 0\), where \(M_e(n)\) (resp. \(M_o(n)\)) denotes the number of partitions of n with even (resp. odd) crank. Several generating functions of \(\mu _{2k}(-1,n)\) are also studied in order to show the positivity of \((-1)^n\mu _{2k}(-1,n)\).  相似文献   

13.
For a vector \(\mathbf a = (a_1,\ldots ,a_r)\) of positive integers, we prove formulas for the restricted partition function \(p_{\mathbf a}(n): = \) the number of integer solutions \((x_1,\dots ,x_r)\) to \(\sum _{j=1}^r a_jx_j=n\) with \(x_1\ge 0, \ldots , x_r\ge 0\) and its polynomial part.  相似文献   

14.
A partial \((k-1)\)-spread in \({\text {PG}}(n-1,q)\) is a collection of \((k-1)\)-dimensional subspaces with trivial intersection. So far, the maximum size of a partial \((k-1)\)-spread in \({\text {PG}}(n-1,q)\) was known for the cases \(n\equiv 0\pmod k\), \(n\equiv 1\pmod k\), and \(n\equiv 2\pmod k\) with the additional requirements \(q=2\) and \(k=3\). We completely resolve the case \(n\equiv 2\pmod k\) for the binary case \(q=2\).  相似文献   

15.
Let \((x_\alpha )\) be a net in a locally solid vector lattice \((X,\tau )\); we say that \((x_\alpha )\) is unbounded \(\tau \)-convergent to a vector \(x\in X\) if \(|x_\alpha -x |\wedge w \xrightarrow {\tau } 0\) for all \(w\in X_+\). In this paper, we study general properties of unbounded \(\tau \)-convergence (shortly \(u\tau \)-convergence). \(u\tau \)-convergence generalizes unbounded norm convergence and unbounded absolute weak convergence in normed lattices that have been investigated recently. We introduce \(u\tau \)-topology and briefly study metrizability and completeness of this topology.  相似文献   

16.
For the Hamilton–Jacobi equation \(H(x,\partial _xu+c)=\alpha (c)\) with \(x\in \mathbb {T}^2\), it is shown in this paper that, for all \(c\in \alpha ^{-1}(E)\) with \(E>\min \alpha \), the elementary weak KAM solutions can be parameterized so that they are \(\frac{1}{3}\)-Hölder continuous in \(C^0\)-topology.  相似文献   

17.
We consider in a group \((G,\cdot )\) the ternary relation
$$\begin{aligned} \kappa := \{(\alpha , \beta , \gamma ) \in G^3 \ | \ \alpha \cdot \beta ^{-1} \cdot \gamma = \gamma \cdot \beta ^{-1} \cdot \alpha \} \end{aligned}$$
and show that \(\kappa \) is a ternary equivalence relation if and only if the set \( \mathfrak Z \) of centralizers of the group G forms a fibration of G (cf. Theorems 2, 3). Therefore G can be provided with an incidence structure
$$\begin{aligned} \mathfrak G:= \{\gamma \cdot Z \ | \ \gamma \in G , Z \in \mathfrak Z(G) \}. \end{aligned}$$
We study the automorphism group of \((G,\kappa )\), i.e. all permutations \(\varphi \) of the set G such that \( (\alpha , \beta , \gamma ) \in \kappa \) implies \((\varphi (\alpha ),\varphi (\beta ),\varphi (\gamma ))\in \kappa \). We show \(\mathrm{Aut}(G,\kappa )=\mathrm{Aut}(G,\mathfrak G)\), \(\mathrm{Aut} (G,\cdot ) \subseteq \mathrm{Aut}(G,\kappa )\) and if \( \varphi \in \mathrm{Aut}(G,\kappa )\) with \(\varphi (1)=1\) and \(\varphi (\xi ^{-1})= (\varphi (\xi ))^{-1}\) for all \(\xi \in G\) then \(\varphi \) is an automorphism of \((G,\cdot )\). This allows us to prove a representation theorem of \(\mathrm{Aut}(G,\kappa )\) (cf. Theorem 6) and that for \(\alpha \in G \) the maps
$$\begin{aligned} \tilde{\alpha }\ : \ G \rightarrow G;~ \xi \mapsto \alpha \cdot \xi ^{-1} \cdot \alpha \end{aligned}$$
of the corresponding reflection structure \((G, \widetilde{G})\) (with \( \tilde{G} := \{\tilde{\gamma }\ | \ \gamma \in G \}\)) are point reflections. If \((G ,\cdot )\) is uniquely 2-divisible and if for \(\alpha \in G\), \(\alpha ^{1\over 2}\) denotes the unique solution of \(\xi ^2=\alpha \) then with \(\alpha \odot \beta := \alpha ^{1\over 2} \cdot \beta \cdot \alpha ^{1\over 2}\), the pair \((G,\odot )\) is a K-loop (cf. Theorem 5).
  相似文献   

18.
Let a sequence \(\Lambda \subset {\mathbb {C}}\) be such that the corresponding system of exponential functions \({\mathcal {E}}(\Lambda ):=\left\{ {\text {e}}^{i\lambda t}\right\} _{\lambda \in \Lambda }\) is complete and minimal in \(L^2(-\pi ,\pi )\), and thus each function \(f\in L^2(-\pi ,\pi )\) corresponds to a nonharmonic Fourier series in \({\mathcal {E}}(\Lambda )\). We prove that if the generating function \(G\) of \(\Lambda \) satisfies the Muckenhoupt \((A_2)\) condition on \({\mathbb {R}}\), then this series admits a linear summation method. Recent results show that the \((A_2)\) condition cannot be omitted.  相似文献   

19.
In this paper, we prove the following version of conformal CR positive mass theorem: Suppose that \((N, J,\theta )\) and \((N, J,\hat{\theta }=e^{2f}\theta )\) are three-dimensional asymptotically flat pseudohermitian manifolds such that their Tanaka-Webster curvatures satisfy \(e^{2f}\hat{R}-R\ge 0.\) Then the p-mass of \((N, J, \theta )\) and \((N, J, \hat{\theta })\) satisfy \( m(J, \hat{\theta })-m(J, \theta )\ge 0, \) and equality holds if and only if \(\hat{\theta }=\theta \). We also prove that the p-mass is independent of the choice of the sequence of coordinates spheres.  相似文献   

20.
For positive integers nk with \(3\le k\le n\), let \(X=\mathbb {F}_{2^n}\setminus \{0,1\}\), \({\mathcal {G}}=\{\{x,x+1\}:x\in X\}\), and \({\mathcal {B}}_k=\left\{ \{x_1,x_2,\ldots ,x_k\}\!\subset \!X:\sum \limits _{i=1}^kx_i=1,\ \sum \limits _{i\in I}x_i\!\ne \!1\ \mathrm{for\ any}\ \emptyset \!\ne \!I\!\subsetneqq \!\{1,2,\ldots ,k\}\right\} \). Lee et al. used the inclusion–exclusion principle to show that the triple \((X,{\mathcal {G}},{\mathcal {B}}_k)\) is a \((k,\lambda _k)\)-GDD of type \(2^{2^{n-1}-1}\) for \(k\in \{3,4,5,6,7\}\) where \(\lambda _k=\frac{\prod _{i=3}^{k-1}(2^n-2^i)}{(k-2)!}\) (Lee et al. in Des Codes Cryptogr,  https://doi.org/10.1007/s10623-017-0395-8, 2017). They conjectured that \((X,{\mathcal {G}},{\mathcal {B}}_k)\) is also a \((k,\lambda _k)\)-GDD of type \(2^{2^{n-1}-1}\) for any integer \(k\ge 8\). In this paper, we use a similar construction and counting principles to show that there is a \((k,\lambda _k)\)-GDD of type \((q^2-q)^{(q^{n-1}-1)/(q-1)}\) for any prime power q and any integers kn with \(3\le k\le n\) where \(\lambda _k=\frac{\prod _{i=3}^{k-1}(q^n-q^i)}{(k-2)!}\). Consequently, their conjecture holds. Such a method is also generalized to yield a \((k,\lambda _k)\)-GDD of type \((q^{\ell +1}-q^{\ell })^{(q^{n-\ell }-1)/(q-1)}\) where \(\lambda _k=\frac{\prod _{i=3}^{k-1}(q^n-q^{\ell +i-1})}{(k-2)!}\) and \(k+\ell \le n+1\).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号