• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 12
  • 8
  • 6
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 99
  • 99
  • 38
  • 27
  • 22
  • 21
  • 17
  • 15
  • 15
  • 15
  • 15
  • 14
  • 14
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Frobenius-Like Permutations and Their Cycle Structure

Virani, Adil B 09 May 2015 (has links)
Polynomial functions over finite fields are a major tool in computer science and electrical engineering and have a long history. Some of its aspects, like interpolation and permutation polynomials are described in this thesis. A complete characterization of subfield compatible polynomials (f in E[x] such that f(K) is a subset of L, where K,L are subfields of E) was recently given by J. Hull. In his work, he introduced the Frobenius permutation which played an important role. In this thesis, we fully describe the cycle structure of the Frobenius permutation. We generalize it to a permutation called a monomial permutation and describe its cycle factorization. We also derive some important congruences from number theory as corollaries to our work.
52

Noncommutative Iwasawa Main Conjectures for Varieties over Finite Fields

Witte, Malte 10 June 2009 (has links) (PDF)
We state and prove an analogue for varieties over finite fields of T. Fukaya's and K. Kato's version of the noncommutative Iwasawa main conjecture. Moreover, we explain how this statement can be reinterpreted in terms of Waldhausen K-theory.
53

Criptografia de curvas elípticas / Cryptography of elliptic curves

Angulo, Rigo Julian Osorio 15 March 2017 (has links)
Submitted by JÚLIO HEBER SILVA (julioheber@yahoo.com.br) on 2017-03-20T17:15:17Z No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Approved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2017-03-21T12:06:48Z (GMT) No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Made available in DSpace on 2017-03-21T12:06:48Z (GMT). No. of bitstreams: 2 Dissertação - Rigo Julian Osorio Angulo - 2017.pdf: 1795543 bytes, checksum: 4342f624ff7c02485e9e888135bcbc18 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-03-15 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / According to history, the main objective of cryptography was always to provide security in communications, to keep them out of the reach of unauthorized entities. However, with the advent of the era of computing and telecommunications, applications of encryption expanded to offer security, to the ability to: verify if a message was not altered by a third party, to be able to verify if a user is who claims to be, among others. In this sense, the cryptography of elliptic curves, offers certain advantages over their analog systems, referring to the size of the keys used, which results in the storage capacity of the devices with certain memory limitations. Thus, the objective of this work is to offer the necessary mathematical tools for the understanding of how elliptic curves are used in public key cryptography. / Segundo a história, o objetivo principal da criptografia sempre foi oferecer segurança nas comunicações, para mantê-las fora do alcance de entidades não autorizadas. No entanto, com o advento da era da computação e as telecomunicações, as aplicações da criptografia se expandiram para oferecer além de segurança, a capacidade de: verificar que uma mensagem não tenha sido alterada por um terceiro, poder verificar que um usuário é quem diz ser, entre outras. Neste sentido, a criptografia de curvas elípticas, oferece certas ventagens sobre seu sistemas análogos, referentes ao tamanho das chaves usadas, redundando isso na capacidade de armazenamento dos dispositivos com certas limitações de memória. Assim, o objetivo deste trabalho é fornecer ao leitor as ferramentas matemáticas necessá- rias para a compreensão de como as curvas elípticas são usadas na criptografia de chave pública.
54

On Weierstrass points and some properties of curves of Hurwitz type / Pontos de Weierstrass e algumas propriedades das curvas do tipo Hurwitz

Grégory Duran Cunha 07 February 2018 (has links)
This work presents several results on curves of Hurwitz type, defined over a finite field. In 1961, Tallini investigated plane irreducible curves of minimum degree containing all points of the projective plane PG(2,q) over a finite field of order q. We prove that such curves are Fq3(q2+q+1)-projectively equivalent to the Hurwitz curve of degree q+2, and compute some of itsWeierstrass points. In addition, we prove that when q is prime the curve is ordinary, that is, the p-rank equals the genus of the curve. We also compute the automorphism group of such curve and show that some of the quotient curves, arising from some special cyclic automorphism groups, are still curves of Hurwitz type. Furthermore, we solve the problem of explicitly describing the set of all Weierstrass pure gaps supported by two or three special points on Hurwitz curves. Finally, we use the latter characterization to construct Goppa codes with good parameters, some of which are current records in the Mint table. / Este trabalho apresenta vários resultados em curvas do tipo Hurwitz, definidas sobre um corpo finito. Em 1961, Tallini investigou curvas planas irredutíveis de grau mínimo contendo todos os pontos do plano projetivo PG(2,q) sobre um corpo finito de ordem q. Provamos que tais curvas são Fq3(q2+q+1)-projetivamente equivalentes à curva de Hurwitz de grau q+2, e calculamos alguns de seus pontos de Weierstrass. Em adição, provamos que, quando q é primo, a curva é ordinária, isto é, o p-rank é igual ao gênero da curva. Também calculamos o grupo de automorfismos desta curva e mostramos que algumas das curvas quocientes, construídas a partir de certos grupos cíclicos de automorfismos, são ainda curvas do tipo Hurwitz. Além disso, solucionamos o problema de descrever explicitamente o conjunto de todos os gaps puros de Weierstrass suportados por dois ou três pontos especiais em curvas de Hurwitz. Finalmente, usamos tal caracterização para construir códigos de Goppa com bons parâmetros, sendo alguns deles recordes na tabela Mint.
55

Corpos de funções algébricas sobre corpos finitos / Algebraic Function Fields over finite fields

Alex Freitas de Campos 22 November 2017 (has links)
Este trabalho é essencialmente sobre pontos racionais em curvas algébricas sobre corpos finitos ou, equivalentemente, lugares racionais em corpos de funções algébricas em uma variável sobre corpos finitos. O objetivo é a demonstração da existência de constantes aq e bq ∈ R> 0 tais que se g ≥ aq. N + bq, então existe uma curva sobre Fq de gênero g com N pontos racionais. / This work is essentially about rational points on algebraic curves over finite fields or, equivalently, rational places on algebraic function fields of one variable over finite fields. The aim is the proof of the existence of constants aq and bq ∈ R> 0 such that if g ≥ aq ∈ aq . N+bq then there exists a curve over Fq of genus g with N rational points.
56

Noncommutative Iwasawa Main Conjectures for Varieties over Finite Fields

Witte, Malte 17 November 2008 (has links)
We state and prove an analogue for varieties over finite fields of T. Fukaya''s and K. Kato''s version of the noncommutative Iwasawa main conjecture. Moreover, we explain how this statement can be reinterpreted in terms of Waldhausen K-theory.
57

Algebraic theory for discrete models in systems biology

Hinkelmann, Franziska 31 August 2011 (has links)
This dissertation develops algebraic theory for discrete models in systems biology. Many discrete model types can be translated into the framework of polynomial dynamical systems (PDS), that is, time- and state-discrete dynamical systems over a finite field where the transition function for each variable is given as a polynomial. This allows for using a range of theoretical and computational tools from computer algebra, which results in a powerful computational engine for model construction, parameter estimation, and analysis methods. Formal definitions and theorems for PDS and the concept of PDS as models of biological systems are introduced in section 1.3. Constructing a model for given time-course data is a challenging problem. Several methods for reverse-engineering, the process of inferring a model solely based on experimental data, are described briefly in section 1.3. If the underlying dependencies of the model components are known in addition to experimental data, inferring a "good" model amounts to parameter estimation. Chapter 2 describes a parameter estimation algorithm that infers a special class of polynomials, so called nested canalyzing functions. Models consisting of nested canalyzing functions have been shown to exhibit desirable biological properties, namely robustness and stability. The algorithm is based on the parametrization of nested canalyzing functions. To demonstrate the feasibility of the method, it is applied to the cell-cycle network of budding yeast. Several discrete model types, such as Boolean networks, logical models, and bounded Petri nets, can be translated into the framework of PDS. Section 3 describes how to translate agent-based models into polynomial dynamical systems. Chapter 4, 5, and 6 are concerned with analysis of complex models. Section 4 proposes a new method to identify steady states and limit cycles. The method relies on the fact that attractors correspond to the solutions of a system of polynomials over a finite field, a long-studied problem in algebraic geometry which can be efficiently solved by computing Gröbner bases. Section 5 introduces a bit-wise implementation of a Gröbner basis algorithm for Boolean polynomials. This implementation has been incorporated into the core engine of Macaulay 2. Chapter 6 discusses bistability for Boolean models formulated as polynomial dynamical systems. / Ph. D.
58

Repairing Cartesian Codes with Linear Exact Repair Schemes

Valvo, Daniel William 10 June 2020 (has links)
In this paper, we develop a scheme to recover a single erasure when using a Cartesian code,in the context of a distributed storage system. Particularly, we develop a scheme withconsiderations to minimize the associated bandwidth and maximize the associateddimension. The problem of recovering a missing node's data exactly in a distributedstorage system is known as theexact repair problem. Previous research has studied theexact repair problem for Reed-Solomon codes. We focus on Cartesian codes, and show wecan enact the recovery using a linear exact repair scheme framework, similar to the oneoutlined by Guruswami and Wooters in 2017. / Master of Science / Distributed storage systems are systems which store a single data file over multiple storage nodes. Each storage node has a certain storage efficiency, the "space" required to store the information on that node. The value of these systems, is their ability to safely store data for extended periods of time. We want to design distributed storage systems such that if one storage node fails, we can recover it from the data in the remaining nodes. Recovering a node from the data stored in the other nodes requires the nodes to communicate data with each other. Ideally, these systems are designed to minimize the bandwidth, the inter-nodal communication required to recover a lost node, as well as maximize the storage efficiency of each node. A great mathematical framework to build these distributed storage systems on is erasure codes. In this paper, we will specifically develop distributed storage systems that use Cartesian codes. We will show that in the right setting, these systems can have a very similar bandwidth to systems build from Reed-Solomon codes, without much loss in storage efficiency.
59

Fecho Galoisiano de sub-extensões quárticas do corpo de funções racionais sobre corpos finitos / Galois closures of quartic sub-fields of rational function fields over finite fields

Monteza, David Alberto Saldaña 26 June 2017 (has links)
Seja p um primo, considere q = pe com e ≥ 1 inteiro. Dado o polinômio f (x) = x4+ax3+bx2+ cx+d ∈ Fq[x], consideremos o polinômio F(T) = T4 +aT3 +bT2 +cT + d - y ∈ Fq(y)[T], com y = f (x) sobre Fq(y). O objetivo desse trabalho é determinar o número de polinômios f (x) que tem seu grupo de galois associado GF isomorfo a cada subgrupo transitivo (prefixado) de S4. O trabalho foi baseado no artigo: Galois closures of quartic sub-fields of rational function fields, usando equações auxiliares associadas ao polinômio minimal F(T) de graus 3 e 2 (DUMMIT, 1994); bem como uma caraterização das curvas projetivas planas de grau 2 não singulares. Se car(k) ≠ 2, associamos a F(T) sua cúbica resolvente RF(T) e seu discriminante ΔF. Em seguida obtemos condições para GF ≅ C4 (vide Teorema 2.9), que é ocaso fundamental para determinação dos demais casos. Se car(k) = 2, procuramos determinar condições para GRF ≅ A3, associando ao polinômio RF(T) sua quadrática resolvente P(T) (vide a Proposição 2.13). Apos ter homogeneizado P(T), usamos uma das consequências do teorema de Bézout, a saber, uma curva algébrica projetiva plana C de grau 2 é irredutível se, e somente se, C não tem pontos singulares. Nesta dissertação obtemos resultados semelhantes com uma abordagem relativamente diferente daquela usada pelo autor R. Valentini. / Let be p a prime, q = pe whit e ≥ 1 integer. Let a polynomial f (x) = x4+ax3+bx2+cx+d ∈ Fq[x], considering the polynomial F(T)=T4+aT3+bT2+cT +d, with y= f (x) over Fq(y)[T]. The purpose of the current research is to determine the numbers of polynomials f (x) which have its associated Galois group GF, this GF is isomorphic for each transitive subgroup (prefixed) of A4. This project is based on the article: Galois closures of quartic sub-fields of rational function fields, using auxiliary equations associated to the minimal polynomial F(T) of degrees 3 and 2 (DUMMIT, 1994); besides a characterization of non-singular projective plane curves of degree 2 was used. If car(k) ≠ 2, associated to F(T) the resolvent cubic RF(T) and its discriminant ΔF then conditions for GF are obtained as GF ≅ C4 which is the fundamental case for determining the other cases (Theorem 2.9). If car(k) = 2, to find conditions for GRF ≅ A3, associated to the polynomial RF(T) its resolvent quadratic p(T) (Proposition 2.13). Homogenizing p(T), one of the consequences of the Bezout theorem was applied. It is, a projective plane curve C, which grade 2, is irreducible if and only if C is smooth. In the current dissertation, similar results were obtained using a different approach developed by the author R. Valentini.
60

Parametrização e otimização de criptografia de curvas elípticas amigáveis a emparelhamentos. / Parameterization and optmization of pairing-friendly elliptic curves.

Pereira, Geovandro Carlos Crepaldi Firmino 27 April 2011 (has links)
A tendência para o futuro da tecnologia é a produção de dispositivos eletrônicos e de computação cada vez menores. Em curto e médio prazos, ainda há poucos recursos de memória e processamento neste ambiente. A longo prazo, conforme a Física, a Química e a Microeletrônica se desenvolvem, constata-se significativo aumento na capacidade de tais dispositivos. No intervalo de curto e médio prazos, entre 20 e 50 anos, até que a tecnologia tenha avanços, soluções leves de software se vêem necessárias. No Brasil, o protocolo de assinatura digital RSA é o mais amplamente adotado, sendo obsolescente como padrão. O problema é que os avanços tecnológicos impõem um aumento considerável no tamanho das chaves criptográficas para que se mantenha um nível de segurança adequado, resultando efeitos indesejáveis em tempo de processamento, largura de banda e armazenamento. Como solução imediata, temos a criptografia de curvas elípticas sendo mais adequada para utilização por órgãos públicos e empresas. Dentro do estudo de curvas elípticas, este trabalho contribui especificamente com a introdução de uma nova subfamília das curvas amigáveis a emparelhamento Barreto-Naehrig (BN). A subfamília proposta tem uma descrição computacionalmente simples, tornando-a capaz de oferecer oportunidades de implementação eficiente. A escolha das curvas BN também se baseia no fato de possibilitarem uma larga faixa de níveis práticos de segurança. A partir da subfamília introduzida foram feitas algumas implementações práticas começando com algoritmos mais básicos de operações em corpos de extensão, passando por algoritmos de aritmética elíptica e concluindo com o cálculo da função de emparelhamento. A combinação da nova subfamília BN com a adoção de técnicas de otimização, cuidadosamente escolhidas, permitiu a mais eficiente implementação do emparelhamento Ate ótimo, operação bastante útil em aplicações criptográficas práticas. / The trend for the future consists of steadfast shrinking of electrical and computing devices. In the short to medium term, one will still find constrained storage and processing resources in that environment. In the long run, as Physics, Chemistry and Microelectronics progress, the capabilities of such devices are likely to increase. In 20 to 50 years from now, until technology has firm advances, lightweight software solutions will be needed. In Brazil, the most widely adopted signature protocol, the RSA scheme, is obsolescent as a standard. The problem is that technological advances impose a considerable increase in cryptographic key sizes in order to maintain a suitable security level, bringing about undesirable effects in processing time, bandwidth occupation and storage requirements. As an immediate solution, we have the Elliptic Curve Cryptography which is more suitable for utilization in public agencies and industry. In the field of elliptic curves, this work contributes specifically with the introduction of a new subfamily of the pairing-friendly Barreto-Naehrig (BN) curves. The proposed subfamily has a computationally simple description, and makes it able to offer opportunities for efficient implementation. The choice of the BN curves is also based on the fact that they allow a range of practical security levels. Furthermore, there were made practical implementations from the introduced subfamily, like the most basic extension fields algorithms, elliptic curve arithmetic and pairing computation. The adoption of the new BN subfamily with carefully chosen optimization techniques allowed the most efficient implementation of the optimal Ate pairing, which is a very useful operation in many practical cryptographic applications.

Page generated in 0.0532 seconds