Results 1 to 10 of about 1,802,459 (260)
On a Dynamical Approach to Some Prime Number Sequences [PDF]
We show how the cross-disciplinary transfer of techniques from dynamical systems theory to number theory can be a fruitful avenue for research. We illustrate this idea by exploring from a nonlinear and symbolic dynamics viewpoint certain patterns ...
Lucas Lacasa +3 more
doaj +2 more sources
Computational challenges and solutions: Prime number generation for enhanced data security. [PDF]
This paper addresses the computational methods and challenges associated with prime number generation, a critical component in encryption algorithms for ensuring data security.
Amal Ezz-Eldien +6 more
doaj +2 more sources
Translator's abstractThis paper deals with one of the important and interesting topics in Number Theory under the title of prime number races, which is less discussed in Persian texts. All prime numbers (except 2) can be written in the form 4n+1 or 4n+3.
Mohammad Reza Esfandiari
doaj +1 more source
A Remark on the Factorization of Factorials [PDF]
The subject of this paper is to study distribution of the prime factors p and their exponents, which we denote by vp (n!), in standard factorization of n! into primes. We show that for each θ > 0 the primes p not exceeding nθ eventually assume almost all
Mehdi Hassani, Mahmoud Marie
doaj +1 more source
The average value of a certain number-theoretic function over the primes [PDF]
We consider functions F:ℤ_{≥0}→ℤ_{≥0} for which there exists a positive integer n such that two conditions hold: F(p) divides n for every prime p, and for each divisor d of n and every prime p, we have that d divides F(p) iff d divides F(p mod d ...
Louis Rubin
doaj +1 more source
ALTERNATIVE PROOF OF THE INFINITUDE PRIMES AND PRIME PROPERTIES
Prime numbers is one of kind number that have many uses, one of which is cryptography. The uniqueness of prime numbers in their divisors and distributions causes prime numbers to be widely used in digital security systems. In number theory, one of famous
Dinni Rahma Oktaviani +2 more
doaj +1 more source
Blockchain Security Mechanism Design Based on Chinese Cryptosystem SM2 Algorithm
The cryptographic system is the foundation of blockchain security mechanisms. This paper constructs a blockchain security mechanism based on the Chinese national cryptographic SM2 algorithm, involving the generation of public–private key pairs and the ...
Lu Meng, Zeyao Liu
doaj +1 more source
On the number of edges of a graph and its complement [PDF]
Let G=(V,E) be a graph. The complement of G is the graph G¯:=(V,[V]2 \ E) where [V]2 is the set of pairs {x,y} of distinct elements of V. If K is a subset of V, the restriction of G to K is the graph G↾K:=(K,[K]2∩E).
Jamel Dammak +2 more
doaj +1 more source
Relation between Prime and Composite Number
This article was not peer-reviewed. No abstract available.
Raju Ram Thapa
doaj +3 more sources
On the Universal Encoding Optimality of Primes
The factorial-additive optimality of primes, i.e., that the sum of prime factors is always minimum, implies that prime numbers are a solution to an integer linear programming (ILP) encoding optimization problem. The summative optimality of primes follows
Ioannis N. M. Papadakis
doaj +1 more source

