首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
  国内免费   1篇
数学   8篇
  2018年   1篇
  2016年   1篇
  2012年   1篇
  2009年   1篇
  2008年   1篇
  2004年   1篇
  2002年   1篇
  1997年   1篇
排序方式: 共有8条查询结果,搜索用时 15 毫秒
1
1.
We prove a finiteness result for the number of solutions of a Diophantine equation of the form \(u_n u_{n+1}\cdots u_{n+k}\pm 1 =\pm u_m^2\), where \(\{ u_n\}_{n\ge 1}\) is a binary recurrent sequence whose characteristic equation has roots which are real quadratic units.  相似文献   
2.
Let 2 ≤ p < 100 be a rational prime and consider equation (3) in the title in integer unknowns x, y, n, k with x > 0, y > 1, n ≥ 3 prime, k ≥ 0 and gcd(x, y) = 1. Under the above conditions we give all solutions of the title equation (see the Theorem). We note that if in (3) gcd(x, y) = 1, our Theorem is an extension of several earlier results [15], [27], [2], [3], [5], [23]. Received: 25 April 2008  相似文献   
3.
We prove that for almost all n, the numerator of the Bernoulli number B2n is divisible by a large prime.  相似文献   
4.
Monatshefte für Mathematik - Diophantine sets, i.e. sets of positive integers A with the property that the product of any two distinct elements of A increased by 1 is a perfect square, have a...  相似文献   
5.
In this paper we present a new one-way function with collision resistance. The security of this function is based on the difficulty of solving a norm form equation. We prove that this function is collision resistant, so it can be used as a one-way hash function. We show that this construction probably provides a family of one-way functions. This revised version was published online in August 2006 with corrections to the Cover Date.  相似文献   
6.
In this paper we deal with a problem of Turán concerning the `distance' of polynomials to irreducible polynomials. Using computational methods we prove that for any monic polynomial of degree there exists a monic polynomial with deg() = deg() such that is irreducible over and the `distance' of and is .

  相似文献   

7.
We investigate the possibility of using index forms as basic ingredients of cryptographically important functions. We suggest the use of a hash function based on index forms and we prove some important properties of the suggested function. The research was supported in part by the Hungarian Academy of Sciences, by grants T048791 and K67580 of the Hungarian NFSR, by the National Office for Research and Technology and by the grant JP-26/2006.  相似文献   
8.
In 1985 Evertse and Gyory [5] gave explicit upper bounds for the number of solutions of norm form equations of the form (1.1) under the hypotheses that (i) x m &nequiv; 0, &alpha; 1 = 1, &alpha; 2 , ... ,&alpha; m-1 are Q-linearly independent and has degree at least 3 overQ( &alpha; 1 ..., &alpha; m-1 ), or that (ii) the degree of i is at least 3 over Q(&alpha; 1 , ..., &alpha; i-1 ) for i = 2, m. Later Gyry [9], Evertse [3] and Evertse and Gy}ory [6] derived general upper bounds for arbitrary norm form equations which include the case (ii), but not the case (i). In the present paper we considerably improve the bounds of [5], and we give a further improvement which is valid for all but at most finitely many possible values of the constant term b of the equation. Our bound obtained under the assumption (ii) is better for almost all b than the general bounds of [9], [3] and [6].  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号