Cyclic Algebras of Small Exponent
نویسندگان
چکیده
منابع مشابه
amenability of banach algebras
chapters 1 and 2 establish the basic theory of amenability of topological groups and amenability of banach algebras. also we prove that. if g is a topological group, then r (wluc (g)) (resp. r (luc (g))) if and only if there exists a mean m on wluc (g) (resp. luc (g)) such that for every wluc (g) (resp. every luc (g)) and every element d of a dense subset d od g, m (r)m (f) holds. chapter 3 inv...
15 صفحه اولOn the cyclic Homology of multiplier Hopf algebras
In this paper, we will study the theory of cyclic homology for regular multiplier Hopf algebras. We associate a cyclic module to a triple $(mathcal{R},mathcal{H},mathcal{X})$ consisting of a regular multiplier Hopf algebra $mathcal{H}$, a left $mathcal{H}$-comodule algebra $mathcal{R}$, and a unital left $mathcal{H}$-module $mathcal{X}$ which is also a unital algebra. First, we construct a para...
متن کاملCyclic amenability of Lau product and module extension Banach algebras
Recently, some results have been obtained on the (approximate) cyclic amenability of Lau product of two Banach algebras. In this paper, by characterizing of cyclic derivations on Lau product and module extension Banach algebras, we present general necessary and sufficient conditions for those to be (approximate) cyclic amenable. This not only provides new results on (approximate) cyclic amenabi...
متن کاملThe Structure of the Exponent Set for Finite Cyclic Groups
We survey properties of the set of possible exponents of subsets of Zn (equivalently, exponents of primitive circulant digraphs on n vertices). Let En denote this exponent set. We point out that En contains the positive integers up to √ n, the ‘large’ exponents ⌊ 3 ⌋+1, ⌊ 2 ⌋, n−1, and for even n ≥ 4, the additional value n 2 −1. It is easy to see that no exponent in [n 2 +1, n−2] is possible, ...
متن کاملPower Attack on Small RSA Public Exponent
In this paper, we present a new attack on RSA when the public exponent is short, for instance 3 or 2+1, and when the classical exponent randomization is used. This attack works even if blinding is used on the messages. From a Simple Power Analysis (SPA) we study the problem of recovering the RSA private key when non consecutive bits of it leak from the implementation. We also show that such inf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the American Mathematical Society
سال: 1983
ISSN: 0002-9939
DOI: 10.2307/2044587