Results 1 to 10 of about 775 (194)

Classification of Unit Groups of Five Radical Zero Completely Primary Finite Rings Whose First and Second Galois Ring Module Generators Are of the Order pk,k=2,3,4 [PDF]

open access: goldJournal of Mathematics, 2022
Let R0=GRpkr,pk be a Galois maximal subring of  R  so that R=R0⊕U⊕V⊕W⊕Y, where U,V,W, and Y are R0/pR0 spaces considered as R0-modules, generated by the sets u1,⋯,ue,v1,⋯,vf,w1,⋯,wg, and y1,⋯,yh, respectively.
Hezron Saka Were, Maurice Owino Oduor
doaj   +2 more sources

Content-adaptive LSB steganography with saliency fusion, ACO dispersion, and hybrid encryption with ablation study [PDF]

open access: yesScientific Reports
Image steganography is a security technique that conceals secret information within digital images in such a way that makes the hidden content imperceptible to human vision and difficult to detect statistically.
Ahmed Aljughaiman, Rana Alrawashdeh
doaj   +2 more sources

Derived equivalence, recollements under H-Galois extensions

open access: yesAIMS Mathematics, 2023
In this paper, assume that $ H $ is a Hopf algebra and $ A/B $ is an $ H $-Galois extension. Firstly, by introducing the concept of an $ H $-stable tilting complex $ T_{\bullet} $ over $ B $, we show that $ T_{\bullet}\otimes_BA $ is a tilting complex ...
Jinlei Dong, Fang Li, Longgang Sun
doaj   +1 more source

Hopf Differential Graded Galois Extensions

open access: yesMathematics, 2022
We introduce the concept of Hopf dg Galois extensions. For a finite dimensional semisimple Hopf algebra H and an H-module dg algebra R, we show that D(R#H)≅D(RH) is equivalent to that R/RH is a Hopf differential graded Galois extension.
Bo-Ye Zhang
doaj   +1 more source

An Efficient Audio Encryption Scheme Based on Finite Fields

open access: yesIEEE Access, 2021
Finite fields are well-studied algebraic structures with enormous efficient properties which have applications in the fields of cryptology and coding theory.
Dawood Shah   +5 more
doaj   +1 more source

Hopf Quasigroup Galois Extensions and a Morita Equivalence

open access: yesMathematics, 2023
For H, a Hopf coquasigroup, and A, a left quasi-H-module algebra, we show that the smash product A#H is linked to the algebra of H invariants AH by a Morita context.
Huaiwen Guo, Shuanhong Wang
doaj   +1 more source

Overconvergent modular forms are highest-weight vectors in the Hodge-Tate weight zero part of completed cohomology

open access: yesForum of Mathematics, Sigma, 2021
We construct a $(\mathfrak {gl}_2, B(\mathbb {Q}_p))$ and Hecke-equivariant cup product pairing between overconvergent modular forms and the local cohomology at $0$ of a sheaf on $\mathbb {P}^1$, landing in the compactly supported completed $\mathbb {C ...
Sean Howe
doaj   +1 more source

Optimization and FPGA implementation of RS coding algorithm

open access: yesDianzi Jishu Yingyong, 2020
Aiming at the problems of large amount of computation and high complexity of multiplication of Galois Field(GF) in the common RS coding algorithm, the RS coding module is optimized and the multiplier factor is obtained.
Li Jinming, Liu Mengxin, Cheng Naipeng
doaj   +1 more source

Gorenstein Flat Modules of Hopf-Galois Extensions

open access: yesMathematics, 2023
Let A/B be a right H-Galois extension over a semisimple Hopf algebra H. The purpose of this paper is to give the relationship of Gorenstein flat dimensions between the algebra A and its subalgebra B, and obtain that the global Gorenstein flat dimension ...
Qiaoling Guo   +3 more
doaj   +1 more source

A block encryption algorithm based on exponentiation transform

open access: yesCogent Engineering, 2020
This paper proposes a new block encryption algorithm for cryptographic information protection. It describes a new transformation method EM (Exponentiation Module), which is part of the algorithm, and a method of S-box obtaining.
Nursulu Kapalova   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy