Results 11 to 20 of about 251 (71)

On n‐fold implicative filters of lattice implication algebras

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 26, Issue 11, Page 695-699, 2001., 2001
We introduce the notion of n‐fold implicative filters and n‐fold implicative lattice implication algebras. We give characterizations of n‐fold implicative filters and n‐fold implicative lattice implication algebras. Finally, we construct an extension property for n‐fold implicative filter.
Young Bae Jun
wiley   +1 more source

Flattening NTRU for Evaluation Key Free Homomorphic Encryption

open access: yesJournal of Mathematical Cryptology, 2020
We propose a new FHE scheme F-NTRU that adopts the flattening technique proposed in GSW to derive an NTRU based scheme that (similar to GSW) does not require evaluation keys or key switching.
Doröz Yarkın, Sunar Berk
doaj   +1 more source

Regular and Boolean elements in hoops and constructing Boolean algebras using regular filters

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2023
We study hoops in order to give some new characterizations for regular and Boolean elements in hoops and we study the relationship between them. Specially, we prove that any bounded v-hoop is a Stone algebra if and only if MV -center set and Boolean ...
Aaly Kologani M.   +2 more
doaj   +1 more source

Chain Polytopes and Algebras with Straightening Laws [PDF]

open access: yes, 2015
It will be shown that the toric ring of the chain polytope of a finite partially ordered set is an algebra with straightening laws on a finite distributive lattice.
Hibi, Takayuki, Li, Nan
core   +1 more source

Some operations on lattice implication algebras

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 27, Issue 1, Page 45-52, 2001., 2001
We introduce the concept of a ⊗‐closed set and a ⊗‐homomorphism in lattice implication algebras, and we discuss some of their properties. Next, we introduce the fuzzy implicative filter and obtain equivalent conditions. Finally, we discuss the operation ⊗, fuzzy filters and fuzzy implicative filters.
E. H. Roh   +3 more
wiley   +1 more source

Class of Sheffer stroke BCK-algebras

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2022
In this paper, Sheffer stroke BCK-algebra is defined and its features are investigated. It is indicated that the axioms of a Sheffer stroke BCK-algebra are independent.
Oner Tahsin   +2 more
doaj   +1 more source

On Implicator Groupoids [PDF]

open access: yes, 2016
In a paper published in 2012, the second author extended the well-known fact that Boolean algebras can be defined using only implication and a constant, to De Morgan algebras-this result led him to introduce, and investigate (in the same paper), the ...
Cornejo, Juan M.   +1 more
core   +2 more sources

Hyperfinite and standard unifications for physical theories

open access: yesInternational Journal of Mathematics and Mathematical Sciences, Volume 28, Issue 2, Page 93-102, 2001., 2001
A set of physical theories is represented by a nonempty subset {SNjV|j∈ℕ} of the lattice of consequence operators defined on a language Λ. It is established that there exists a unifying injection 𝒮 defined on the nonempty set of significant representations for natural systems M ⊂ Λ. If W ∈ M, then 𝒮W is a hyperfinite ultralogic and ⋃{SNjV(W)|j∈ℕ}=𝒮W(*W)
Robert A. Herrmann
wiley   +1 more source

New topology in residuated lattices

open access: yesOpen Mathematics, 2018
In this paper, by using the notion of upsets in residuated lattices and defining the operator Da(X), for an upset X of a residuated lattice L we construct a new topology denoted by τa and (L, τa) becomes a topological space.
Holdon L.C.
doaj   +1 more source

(In)Security of Ring-LWE Under Partial Key Exposure

open access: yesJournal of Mathematical Cryptology, 2020
We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under ...
Dachman-Soled Dana   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy