نتایج جستجو برای: weak multiplication module

تعداد نتایج: 231304  

Journal: :Electronics 2023

Polynomial multiplication is the most computationally expensive part of lattice-based cryptography algorithm. However, existing acceleration schemes have problems, such as low performance and high hardware resource overhead. Based on polynomial number theoretic transformation (NTT), this paper proposed a simple element Montgomery module reduction with pipeline structure to realize fast multipli...

2001
Florin Panaite

Let A be a finite dimensional Hopf algebra, D(A) = A ⊗A its Drinfel’d double and H(A) = A#A its Heisenberg double. The relation between D(A) and H(A) has been found by J.-H. Lu in [24] (see also [33], p. 196): the multiplication of H(A) may be obtained by twisting the multiplication of D(A) by a certain left 2-cocycle which in turn is obtained from the R-matrix of D(A). It was also obtained in ...

2003
ALBERTO ELDUQUE

The centralizer algebra of the action of U(n) on the real tensor powers ⊗RV of its natural module, V = Cn, is described by means of a modification in the multiplication of the signed Brauer algebras. The relationships of this algebra with the invariants for U(n) and with the decomposition of ⊗RV into irreducible submodules is considered.

2009
Erkay Savas Çetin Kaya Koç

The basic arithmetic operations (i.e. addition, multiplication, and inversion) in finite fields, GF (q), where q = p k and p is a prime integer, have several applications in cryptography, such as RSA algorithm, Diffie-Hellman key exchange algorithm [1], the US federal Digital Signature Standard [2], elliptic curve cryptography [3, 4], and also recently identity based cryptography [5, 6]. Most p...

2017
Francois Couchot

It is proven that the weak dimension of each FP-injective module over a chain ring which is either Archimedean or not semicoherent is less or equal to 2. This implies that the projective dimension of any countably generated FP-injective module over an Archimedean chain ring is less or equal to 3. By [7, Theorem 1], for any module G over a commutative arithmetical ring R the weak dimension of G ...

2016
Sameer Chavan Rani Kumari RANI KUMARI

Let κ be an U-invariant reproducing kernel and let H (κ) denote the reproducing kernel Hilbert C[z1, . . . , zd]-module associated with the kernel κ. Let Mz denote the d-tuple of multiplication operators Mz1 , . . . ,Mzd on H (κ). For a positive integer ν and d-tuple T = (T1, . . . , Td), consider the defect operator

2016
Sameer Chavan Rani Kumari RANI KUMARI

Let κ be an U-invariant reproducing kernel and let H (κ) denote the reproducing kernel Hilbert C[z1, . . . , zd]-module associated with the kernel κ. Let Mz denote the d-tuple of multiplication operators Mz1 , . . . ,Mzd on H (κ). For a positive integer ν and d-tuple T = (T1, . . . , Td), consider the defect operator

2015
Alex Samuel Bamunoba

Lerch’s formulae for Euler quotients in the rings Z and Fq[t] have already been studied. In this paper, we extend the study of these quotients to number fields and the Carlitz module. In the number fields case, we prove a version of Lerch’s formula for OKHil , the ring of integers of the Hilbert class field of a number field K. In the Fq[t] case, we replace the usual multiplication in Fq[t] wit...

2009
ALEXANDER PAVLOV

Continuing the research on the Banach-Saks and Schur properties started in (cf. [10]) we investigate analogous properties in the module context. As an environment serves the class of Hilbert C∗-modules. Some properties of weak module topologies on Hilbert C∗-modules are described. Natural module analogues of the classical weak Banach-Saks and the classical Schur properties are defined and studi...

2013
Shinsaku Kiyomoto Tsukasa Ishiguro

In this paper, we present a protocol for a ID-based signature scheme using a tamperresistant module that holds a private key for signing. This is a distributed-signature scheme, and a computation using a private key is executed on the tamper-resistant module (TRM), with the remaining computations performed on a host PC. The scheme is secure against both passive and active adversaries, even thos...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید