Results 31 to 40 of about 14,403 (212)

Variation of stable birational types in positive characteristic [PDF]

open access: yesÉpijournal de Géométrie Algébrique, 2020
Let k be an uncountable algebraically closed field and let Y be a smooth projective k-variety which does not admit a decomposition of the diagonal. We prove that Y is not stably birational to a very general hypersurface of any given degree and dimension.
Stefan Schreieder
doaj   +1 more source

Degree of the Product of Two Algebraic Numbers One of Which Is of Prime Degree

open access: yesMathematics, 2023
Let α and β be two algebraic numbers such that deg(α)=m and deg(β)=p, where p is a prime number not dividing m. This research is focused on the following two objectives: to discover new conditions under which deg(αβ)=mp; to determine the complete list of
Paulius Virbalas
doaj   +1 more source

A Topological Perspective on Interacting Algebraic Theories [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2017
Techniques from higher categories and higher-dimensional rewriting are becoming increasingly important for understanding the finer, computational properties of higher algebraic theories that arise, among other fields, in quantum computation.
Amar Hadzihasanovic
doaj   +1 more source

A construction of the polylogarithm motive [PDF]

open access: yesÉpijournal de Géométrie Algébrique
Classical polylogarithms give rise to a variation of mixed Hodge-Tate structures on the punctured projective line $S=\mathbb{P}^1\setminus \{0, 1, \infty\}$, which is an extension of the symmetric power of the Kummer variation by a trivial variation.
Clément Dupont, Javier Fresán
doaj   +1 more source

ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS

open access: yesBarekeng, 2023
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj   +1 more source

On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory [PDF]

open access: yesJournal of Fuzzy Extension and Applications
Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia.
Mohammad Abobala   +2 more
doaj   +1 more source

Proof in C17 Algebra

open access: yesPhilosophia Scientiæ, 2005
This paper considers the birth of algebraic proof by looking at the works of Cardano, Viète, Harriot and Pell. The transition from geometric to algebraic proof was mediated by appeals to the Eudoxan theory of proportions in book V of Euclid.
Brendan Larvor
doaj   +1 more source

The nilpotent structure of open-closed string field theory

open access: yesJournal of High Energy Physics, 2023
In this note we revisit the homotopy-algebraic structure of oriented bosonic open-closed string field theory and we give a new compact formulation in terms of a single cyclic open-closed co-derivation which defines a single nilpotent structure describing
Carlo Maccaferri   +2 more
doaj   +1 more source

On the quantum security of high-dimensional RSA protocol

open access: yesJournal of Mathematical Cryptology
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine   +3 more
doaj   +1 more source

Tensors, !-graphs, and non-commutative quantum structures [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
Categorical quantum mechanics (CQM) and the theory of quantum groups rely heavily on the use of structures that have both an algebraic and co-algebraic component, making them well-suited for manipulation using diagrammatic techniques.
Aleks Kissinger, David Quick
doaj   +1 more source

Home - About - Disclaimer - Privacy