• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • Tagged with
  • 35
  • 35
  • 35
  • 35
  • 9
  • 7
  • 7
  • 5
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Algebraic Properties and Invariants of Polyominoes

Romeo, Francesco 08 June 2022 (has links)
Polyominoes are two-dimensional objects obtained by joining edge by edge squares of same size. Originally, polyominoes appeared in mathematical recreations, but it turned out that they have applications in various fields, for example, theoretical physics and bio-informatics. Among the most popular topics in combinatorics related to polyominoes one finds enumerating polyominoes of given size, including the asymptotic growth of the numbers of polyominoes, tiling problems, and reconstruction of polyominoes. Recently Qureshi introduced a binomial ideal induced by the geometry of a given polyomino, called polyomino ideal, and its related algebra. From that moment different authors studied algebraic properties and invariants related to this ideal, such as primality, Gröbner bases, Gorensteinnes and Castelnuovo-Mumford regularity. In this thesis, we provide an overview on the results that we obtained about polyomino ideals and its related algebra. In the first part of the thesis, we discuss questions about the primality and the Gröbner bases of the polyomino ideal. In the second part of the thesis, we talk over the Castelnuovo-Mumford regularity, Hilbert series, and Gorensteinnes of the polyomino ideal and its coordinate ring.
22

On large and small torsion pairs

Sentieri, Francesco 30 June 2022 (has links)
Torsion pairs were introduced by Dickson in 1966 as a generalization of the concept of torsion abelian group to arbitrary abelian categories. Using torsion pairs, we can divide complex abelian categories in smaller parts which are easier to understand. In this thesis we discuss torsion pairs in the category of modules over a finite-dimensional algebra, in particular we explore the relation between torsion pairs in the category of all modules and torsion pairs in the category of finite-dimensional modules. In the second chapter of the thesis, we present the analogue of a classical theorem of Auslander in the context of τ-tilting theory: for a finite-dimensional algebra the number of torsion pairs in the category of finite-dimensional modules is finite if and only if every brick over such algebra is finite- dimensional. In the third chapter, we revisit the Ingalls-Thomas correspondences between torsion pairs and wide subcategories in the context of large torsion pairs. We provide a nice description of the resulting wide subcategories and show that all such subcategories are coreflective. In the final chapter, we describe mutation of cosilting modules in terms of an operation on the Ziegler spectrum of the algebra.
23

On Boolean functions, symmetric cryptography and algebraic coding theory

Calderini, Marco January 2015 (has links)
In the first part of this thesis we report results about some “linear” trapdoors that can be embedded in a block cipher. In particular we are interested in any block cipher which has invertible S-boxes and that acts as a permutation on the message space, once the key is chosen. The message space is a vector space and we can endow it with alternative operations (hidden sums) for which the structure of vector space is preserved. Each of this operation is related to a different copy of the affine group. So, our block cipher could be affine with respect to one of these hidden sums. We show conditions on the S-box able to prevent a type of trapdoors based on hidden sums, in particular we introduce the notion of Anti-Crooked function. Moreover we shows some properties of the translation groups related to these hidden sums, characterizing those that are generated by affine permutations. In that case we prove that hidden sum trapdoors are practical and we can perform a global reconstruction attack. We also analyze the role of the mixing layer obtaining results suggesting the possibility to have undetectable hidden sum trapdoors using MDS mixing layers. In the second part we take into account the index coding with side information (ICSI) problem. Firstly we investigate the optimal length of a linear index code, that is equal to the min-rank of the hypergraph related to the instance of the ICSI problem. In particular we extend the the so-called Sandwich Property from graphs to hypergraphs and also we give an upper bound on the min-rank of an hypergraph taking advantage of incidence structures such as 2-designs and projective planes. Then we consider the more general case when the side information are coded, the index coding with coded side information (ICCSI) problem. We extend some results on the error correction index codes to the ICCSI problem case and a syndrome decoding algorithm is also given.
24

Prime Numbers and Polynomials

Goldoni, Luca January 2010 (has links)
This thesis deals with the classical problem of prime numbers represented by polynomials. It consists of three parts. In the first part I collected many results about the problem. Some of them are quite recent and this part can be considered as a survey of the state of the art of the subject. In the second part I present two results due to P. Pleasants about the cubic polynomials with integer coefficients in several variables. The aim of this part is to simplify the works of Pleasants and modernize the notation employed. In such a way these important theorems are now in a more readable form. In the third part I present some original results related with some algebraic invariants which are the key-tools in the works of Pleasants. The hidden diophantine nature of these invariants makes them very difficult to study. Anyway some results are proved. These results make the results of Pleasants somewhat more effective.
25

Binary quadratic forms, elliptic curves and Schoof's algorithm

Pintore, Federico January 2015 (has links)
In this thesis, I show that the representation of prime integers by reduced binary quadratic forms of given discriminant can be obtained in polynomial complexity using Schoof's algorithm for counting the number of points of elliptic curves over finite fields. It is a remarkable fact that, although an algorithm of Gauss' solved the representation problem long time ago, a solution in polynomial complexity is very recent and almost unnoticed in the literature. Further, I present a viable alternative to Gauss' algorithm, which constitutes the main original contribution of my thesis. This alternative way of computing in polynomial time an explicit solution of the representation problem is particularly suitable whenever the number of not equivalent reduced forms is small. Lastly, I report that, in the efforts of improving Schoof's algorithm, a marginal incompleteness in its original formulation was identified. This weakness was eliminated by a slight modification of the algorithm suggested by Schoof himself.
26

Graphs and pairings of elliptic curves

Mula, Marzio 22 February 2024 (has links)
Most isogeny-based cryptosystems ultimately rely, for their security, on l- IsoPath, i.e. the problem of finding a secret l-smooth isogeny between two elliptic curves. As cryptographic applications usually employ weaker variants of l-IsoPath for practical reasons, it is natural to ask whether these variants are equally hard from a computational perspective. For example, what happens if the endomorphism ring of one of the curves is known? Does the existence of suitable pairings affect the hardness of l-IsoPath? What happens if some non-trivial endomorphisms of the domain and codomain curves are known? These kinds of questions lead to different problems, some of which are considered throughout this thesis. To prevent anyone from knowing the endomorphism ring of a supersingular elliptic curve, we would need a method to hash in the supersingular isogeny graph, i.e. the graph whose vertices are supersingular elliptic curves (up to isomorphism) and whose edges are isogenies of fixed degree. We give examples of cryptographic protocols that could benefit from this and survey some known methods. Since none of them is at the same time efficient and cryptographically secure, we also point out a few alternative approaches. Later on, we leverage the classic Deuring correspondence between supersingular elliptic curves and quaternion orders to study a weaker version of l-IsoPath, inspired by the study of CM theory from the previous part. We then focus on the construction of pairings of elliptic curves, showing that, in the general case, finding distinct pairings compatible with a secret isogeny is no easier than retrieving the isogeny itself. In the presence of an orientation, on the other hand, we show that the existence of suitable self-pairings, together with a recent attack on the isogeny-based key-exchange SIDH, does lead to efficiently solving l- IsoPath for some class-group-action-based protocols. In particular, we completely characterize the cases in which these selfpairings exist. Finally, we introduce a different graph of elliptic curves, which has not been considered before in isogeny-based cryptography and which does not arise, in fact, from isogenies: the Hessian graph. We give a (still partial) account of its remarkable regularity and discuss potential cryptographic applications.
27

Algebraic Construction for Multi-Party Protocols with Focus on Threshold Signatures

Battagliola, Michele 29 April 2024 (has links)
Secure multi-party computation (MPC) is a field of cryptography that aims to provide methods for parties to jointly compute a function over their inputs while keeping those inputs private. Unlike of traditional cryptography where adversary is outside the system of participants, the main task (and challenge) of MPC is to protect participants from internal adversaries, who participate in protocol and can therefore send corrupted. The results presented in this thesis are three-fold. First, we study MPC from a theoretical standpoint, designing a new heuristic and a new proof system useful for proving the security of threshold signatures, a particular kind of MPC protocol. Next, we present new MPC primitives: a novel secret sharing scheme, a threshold version of Schnorr signature, a post quantum secure group action based threshold signature and finally a post quantum oblivious transfer. Lastly, we designed a coercion resistant e-voting protocol, that allows voters to freely votes without being afraid of external adversaries trying to pressure them to vote in a particular way.
28

Schur apolarity and how to use it

Staffolani, Reynaldo 14 February 2022 (has links)
The aim of this thesis is to investigate the tensor decomposition of structured tensors related to SL(n)-irreducible representations. Structured tensors are multilinear objects satisfying specific symmetry relations and their decompositions are of great interest in the applications. In this thesis we look for the decompositions of tensors belonging to irreducible representations of SL(n) into sum of elementary objects associated to points of SL(n)-rational hoogeneous varieties. This family includes Veronese varieties (symmetric tensors), Grassmann varieties (skew-symmetric tensors), and flag varieties. A classic tool to study the decomposition of symmetric tensors is the apolarity theory, which dates back to Sylvester. An analogous skew-symmetric apolarity theory for skew-symmetric tensors have been developed only few years ago. In this thesis we describe a global apolarity theory called Schur apolarity theory, which is suitable for tensors belonging to any irreducible representation of SL(n). Examples, properties and applications of such apolarity are studied with details and original results both in algebra and geoemtry are provided.
29

Existential completion and pseudo-distributive laws: an algebraic approach to the completion of doctrines

Trotta, Davide 17 December 2019 (has links)
The main purpose of this thesis is to combine the categorical approach to logic given by the study of doctrines, with the universal algebraic techniques given by the theory of the pseudo-monads and pseudo-distributive laws. Every completions of doctrines is then formalized by a pseudo-monad, and then combinations of these are studied by the analysis of the pseudo-distributive laws. The starting point are the works of Maietti and Rosolini, in which they describe three completions for elementary doctrines: the first which adds full comprehensions, the second comprehensive diagonals, and the third quotients. Then we determine the existential completion of a primary doctrine, and we prove that the 2-monad obtained from it is lax-idempotent, and that the 2-category of existential doctrines is isomorphic to the 2-category of algebras for this 2-monad. We also show that the existential completion of an elementary doctrine is again elementary and we extend the notion of exact completion of an elementary existential doctrine to an arbitrary elementary doctrine. Finally we present the elementary completion for a primary doctrine whose base category has finite limits. In particular we prove that, using a general results about unification for first order languages, we can easily add finite limits to a syntactic category, and then apply the elementary completion for syntactic doctrines. We conclude with a complete description of elementary completion for primary doctrine whose base category is the free product completion of a discrete category, and we show that the 2-monad constructed from the 2-adjunction is lax-idempotent.
30

Pattern posets: enumerative, algebraic and algorithmic issues

Cervetti, Matteo 22 March 2021 (has links)
The study of patterns in combinatorial structures has grown up in the past few decades to one of the most active trends of research in combinatorics. Historically, the study of permutations which are constrained by not containing subsequences ordered in various prescribed ways has been motivated by the problem of sorting permutations with certain devices. However, the richness of this notion became especially evident from its plentiful appearances in several very different disciplines, such as pure mathematics, mathematical physics, computer science,biology, and many others. In the last decades, similar notions of patterns have been considered on discrete structures other than permutations, such as integer sequences, lattice paths, graphs, matchings and set partitions. In the first part of this talk I will introduce the general framework of pattern posets and some classical problems about patterns. In the second part of this talk I will present some enumerative results obtained in my PhD thesis about patterns in permutations, lattice paths and matchings. In particular I will describe a generating tree with a single label for permutations avoiding the vincular pattern 1 - 32 - 4, a finite automata approach to enumerate lattice excursions avoiding a single pattern and some results about matchings avoiding juxtapositions and liftings of patterns.

Page generated in 0.0589 seconds