Results 31 to 40 of about 14,403 (212)
Variation of stable birational types in positive characteristic [PDF]
Let k be an uncountable algebraically closed field and let Y be a smooth projective k-variety which does not admit a decomposition of the diagonal. We prove that Y is not stably birational to a very general hypersurface of any given degree and dimension.
Stefan Schreieder
doaj +1 more source
Degree of the Product of Two Algebraic Numbers One of Which Is of Prime Degree
Let α and β be two algebraic numbers such that deg(α)=m and deg(β)=p, where p is a prime number not dividing m. This research is focused on the following two objectives: to discover new conditions under which deg(αβ)=mp; to determine the complete list of
Paulius Virbalas
doaj +1 more source
A Topological Perspective on Interacting Algebraic Theories [PDF]
Techniques from higher categories and higher-dimensional rewriting are becoming increasingly important for understanding the finer, computational properties of higher algebraic theories that arise, among other fields, in quantum computation.
Amar Hadzihasanovic
doaj +1 more source
A construction of the polylogarithm motive [PDF]
Classical polylogarithms give rise to a variation of mixed Hodge-Tate structures on the punctured projective line $S=\mathbb{P}^1\setminus \{0, 1, \infty\}$, which is an extension of the symmetric power of the Kummer variation by a trivial variation.
Clément Dupont, Javier Fresán
doaj +1 more source
ALGEBRAIC CRYPTANALYSIS ON NTRU-HPS AND NTRU-HRSS
NTRU is a lattice-based public-key cryptosystem designed by Hoffstein, Pipher, and Silverman in 1996. NTRU published on Algorithmic Number Theory Symposium (ANTS) in 1998.
Fadila Paradise, Kiki Ariyanti Sugeng
doaj +1 more source
On novel security systems based on the 2-cyclic refined integers and the foundations of 2-cyclic refined number theory [PDF]
Integers play a basic role in the structures of asymmetric crypto-algorithms. Many famous public key crypto-schemes use the basics of number theory to share keys and decrypt and encrypt messages and multimedia.
Mohammad Abobala +2 more
doaj +1 more source
This paper considers the birth of algebraic proof by looking at the works of Cardano, Viète, Harriot and Pell. The transition from geometric to algebraic proof was mediated by appeals to the Eudoxan theory of proportions in book V of Euclid.
Brendan Larvor
doaj +1 more source
The nilpotent structure of open-closed string field theory
In this note we revisit the homotopy-algebraic structure of oriented bosonic open-closed string field theory and we give a new compact formulation in terms of a single cyclic open-closed co-derivation which defines a single nilpotent structure describing
Carlo Maccaferri +2 more
doaj +1 more source
On the quantum security of high-dimensional RSA protocol
The idea of extending the classical RSA protocol using algebraic number fields was introduced by Takagi and Naito (Construction of RSA cryptosystem over the algebraic field using ideal theory and investigation of its security.
Rahmani Nour-eddine +3 more
doaj +1 more source
Tensors, !-graphs, and non-commutative quantum structures [PDF]
Categorical quantum mechanics (CQM) and the theory of quantum groups rely heavily on the use of structures that have both an algebraic and co-algebraic component, making them well-suited for manipulation using diagrammatic techniques.
Aleks Kissinger, David Quick
doaj +1 more source

