Results 31 to 40 of about 1,837,784 (319)

Some Multisecret-Sharing Schemes over Finite Fields

open access: yesMathematics, 2020
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.
Selda Çalkavur, Patrick Solé
doaj   +1 more source

Orbital magnetoelectric coupling at finite electric field [PDF]

open access: yes, 2011
We extend the band theory of linear orbital magnetoelectric coupling to treat crystals under finite electric fields. Previous work established that the orbital magnetoelectric response of a generic insulator at zero field comprises three contributions ...
Andrei Malashevich   +3 more
core   +3 more sources

A Holographic Quantum Critical Point at Finite Magnetic Field and Finite Density [PDF]

open access: yes, 2010
We analyze the phase diagram of N=4 supersymmetric Yang-Mills theory with fundamental matter in the presence of a background magnetic field and nonzero baryon number.
Jensen, Kristan   +2 more
core   +1 more source

A sum-product theorem in function fields [PDF]

open access: yes, 2013
Let $A$ be a finite subset of $\ffield$, the field of Laurent series in $1/t$ over a finite field $\mathbb{F}_q$. We show that for any $\epsilon>0$ there exists a constant $C$ dependent only on $\epsilon$ and $q$ such that $\max\{|A+A|,|AA|\}\geq C |A ...
Bloom, Thomas, Jones, Timothy G. F.
core   +1 more source

On the number of solutions of two-variable diagonal quartic equations over finite fields

open access: yesAIMS Mathematics, 2020
Let $p$ be a odd prime number and let $\mathbb{F}_q$ be the finite field of characteristic $p$ with $q$ elements. In this paper, by using the Gauss sum and Jacobi sum, we give an explicit formula for the number $N(x_1^4+x_2^4=c)$ of solutions of the ...
Junyong Zhao, Yang Zhao, Yujun Niu
doaj   +1 more source

Mayfly optimistic hyperelliptic curve cryptosystem

open access: yesFrontiers in Computer Science
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage.
Ramireddy Nava Teja Reddy   +7 more
doaj   +1 more source

Constructions of pseudorandom binary lattices using cyclotomic classes in finite fields

open access: yesOpen Mathematics, 2020
In 2006, Hubert, Mauduit and Sárközy extended the notion of binary sequences to n-dimensional binary lattices and introduced the measures of pseudorandomness of binary lattices.
Chen Xiaolin
doaj   +1 more source

Unit groups of finite group algebras of Abelian groups of order 17 to 20

open access: yesAIMS Mathematics, 2021
Let $ F $ be a finite field of characteristic $ p $ having $ q = p^n $ elements and $ G $ be an abelian group. In this paper, we determine the structure of the group of units of the group algebra $ FG $, where $ G $ is an abelian group of order $ 17\leq |
Yunpeng Bai , Yuanlin Li, Jiangtao Peng
doaj   +1 more source

Computing character degrees via a Galois connection [PDF]

open access: yesInternational Journal of Group Theory, 2015
In a previous paper, the second author established that, given finite fields ...
Mark L. Lewis , John K. McVey
doaj  

On pattern structures of the N-soliton solution of the discrete KP equation over a finite field

open access: yes, 2006
The existence and properties of coherent pattern in the multisoliton solutions of the dKP equation over a finite field is investigated. To that end, starting with an algebro-geometric construction over a finite field, we derive a "travelling wave ...
Białecki M   +8 more
core   +1 more source

Home - About - Disclaimer - Privacy