• Title/Summary/Keyword: (p, q)-number

Search Result 319, Processing Time 0.025 seconds

CYCLIC CODES OVER SOME SPECIAL RINGS

  • Flaut, Cristina
    • Bulletin of the Korean Mathematical Society
    • /
    • v.50 no.5
    • /
    • pp.1513-1521
    • /
    • 2013
  • In this paper we will study cyclic codes over some special rings: $\mathbb{F}_q[u]/(u^i)$, $\mathbb{F}_q[u_1,{\ldots},u_i]/(u^2_1,u^2_2,{\ldots},u^2_i,u_1u_2-u_2u_1,{\ldots},u_ku_j-u_ju_k,{\ldots})$, and $\mathbb{F}_q[u,v]/(u^i,v^j,uv-vu)$, where $\mathbb{F}_q$ is a field with $q$ elements $q=p^r$ for some prime number $p$ and $r{\in}\mathbb{N}-\{0\}$.

Subjectivity Study on Broadcasting of Civil Defense Exercise in Nation : Focused on Fire-fighting Officers (국가 민방위 훈련 방송에 대한 주관성 연구 : 소방공무원을 중심으로)

  • Lee, Jei-Young;Kim, Jee-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.216-226
    • /
    • 2019
  • The purpose of this study was to provide basic data for developing strategic programs based on broadcasting of civil defense exercise in nation focused on fire-fighting officers. 33 Q-population (concourse) was selected based on the media related literature review described above, and interviews targeting the general public. As the next step representative statements were chosen randomly and reduced in number to a final 25 statement samples for the purposes of this study. The methodology of a Q-study does not infer the characteristics of the population sample from the sample, selecting of the P-sample is likewise not governed probabilistic sampling methods. Finally, in this research, 41 people were selected as the P-sample.

A Study of Field Application Process of Public Key Algorithm RSA Based on Mathematical Principles and Characteristics through a Diagnostic (수학원리와 특성 진단을 기반으로 한 공개키 RSA 알고리즘의 현장 적용 프로세스)

  • Noh, SiChoon;Song, EunJee;Moon, SongChul
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.71-81
    • /
    • 2015
  • The RSA public key encryption algorithm, a few, key generation, factoring, the Euler function, key setup, a joint expression law, the application process are serial indexes. The foundation of such algorithms are mathematical principles. The first concept from mathematics principle is applied from how to obtain a minority. It is to obtain a product of two very large prime numbers, but readily tracking station the original two prime number, the product are used in a very hard principles. If a very large prime numbers p and q to obtain, then the product is the two $n=p{\times}q$ easy station, a method for tracking the number of p and q from n synthesis and it is substantially impossible. The RSA encryption algorithm, the number of digits in order to implement the inverse calculation is difficult mathematical one-way function and uses the integer factorization problem of a large amount. Factoring the concept of the calculation of the mod is difficult to use in addition to the problem in the reverse direction. But the interests of the encryption algorithm implementation usually are focused on introducing the film the first time you use encryption algorithm but we have to know how to go through some process applied to the field work This study presents a field force applied encryption process scheme based on public key algorithms attribute diagnosis.

CRYPTOGRAPHIC ALGORITHM INVOLVING THE MATRIX Qp*

  • Kannan, J.;Mahalakshmi, M.;Deepshika, A.
    • Korean Journal of Mathematics
    • /
    • v.30 no.3
    • /
    • pp.533-538
    • /
    • 2022
  • Cryptography is one of the most essential developing areas, which deals with the secure transfer of messages. In recent days, there are more number of algorithms have been evolved to provide better security. This work is also such an attempt. In this paper, an algorithm is presented for encryption and decryption which employs the matrix Qp* and the well- known equation x2 - py2 = 1 where p is a prime.

A Study on the Extended RSA Public Key Cryptosystem Based on the Integral Number Theory (정수론에 근거한 확장 RSA 공개키 암호 방식에 관한 연구)

  • 류재관;이지영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.183-188
    • /
    • 1998
  • This paper proposes an extended RSA public-key cryptosystem which extends a conventional one. The number of multiplication times has been increased by extending the modulus parameters p, q. This result shows the increase of computational complexity which required in cryptanalysis. It also improves the strength of RSA public key cryptosystem through this proof which is based on integral number theory.

  • PDF

NEW CONGRUENCES WITH THE GENERALIZED CATALAN NUMBERS AND HARMONIC NUMBERS

  • Elkhiri, Laid;Koparal, Sibel;Omur, Nese
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.5
    • /
    • pp.1079-1095
    • /
    • 2021
  • In this paper, we give new congruences with the generalized Catalan numbers and harmonic numbers modulo p2. One of our results is as follows: for prime number p > 3, $${\sum\limits_{k=(p+1)/2}^{p-1}}\;k^2B_{p,k}B_{p,k-(p-1)/2}H_k{\equiv}(-1)^{(p-1)/2}\(-{\frac{521}{36}}p-{\frac{1}{p}}-{\frac{41}{12}}+pH^2_{3(p-1)/2}-10pq^2_p(2)+4\({\frac{10}{3}}p+1\)q_p(2)\)\;(mod\;p^2),$$ where qp(2) is Fermat quotient.

Classification Analysis and Gradient Analysis on the Forest Vegetation of Mt. Mudung (分類法과 傾度分析에 의한 無等山 蒜林植生 分析)

  • Kim, Chang-Hwan;Kang, Seon-Hee;Kil, Bong-Seop
    • The Korean Journal of Ecology
    • /
    • v.17 no.4
    • /
    • pp.471-484
    • /
    • 1994
  • The forest vegetation types and their structural characteristics in Mt. $Mud\v{u}ng$ were investigated by classification method and ordination method. The forest was classified into 7 communities by ristic composition table: Quercus monogolica community, Q. serrata community, Q.acutissima community, Q.variabilis community, Q.dentata community, Pinus densiflora community and Frainus mandshurica community. Considering the moisture gradient, two kinds of distributuin pattern were shown as follows; F. mandshurica, Q. acturissima, Platycarya strobilacea and Staphylea bumalda were distribute at moist habitats, while Q. monogolica, P. densiflora and Q.variabilis at dry habitats. In continuum analysis, each population occupied different distribution area but it was continuously overlapped. On the successional trends of tree species, it is postulated that Q. mongolica species might dominate the altitudinal zone over 700m.

  • PDF

REMARKS ON THE GAP SET OF R = K + C

  • Tutas, Nesrin
    • Bulletin of the Korean Mathematical Society
    • /
    • v.47 no.2
    • /
    • pp.433-442
    • /
    • 2010
  • $\tilde{G}(P,\;Q)$, a new generalization of the set of gap numbers of a pair of points, was described in [1]. Here we study gap numbers of local subring $R\;=\;\cal{K}\;+\;C$ of algebraic function field over a finite field and we give a formula for the number of elements of $\tilde{G}(P,\;Q)$ depending on pure gaps and R.

Signed degree sequences in signed 3-partite graphs

  • Pirzada, S.;Dar, F.A.
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.11 no.2
    • /
    • pp.9-14
    • /
    • 2007
  • A signed 3-partite graph is a 3-partite graph in which each edge is assigned a positive or a negative sign. Let G(U, V, W) be a signed 3-partite graph with $U\;=\;\{u_1,\;u_2,\;{\cdots},\;u_p\},\;V\;=\;\{v_1,\;v_2,\;{\cdots},\;v_q\}\;and\;W\;=\;\{w_1,\;w_2,\;{\cdots},\;w_r\}$. Then, signed degree of $u_i(v_j\;and\;w_k)$ is $sdeg(u_i)\;=\;d_i\;=\;d^+_i\;-\;d^-_i,\;1\;{\leq}\;i\;{\leq}\;p\;(sdeg(v_j)\;=\;e_j\;=\;e^+_j\;-\;e^-_j,\;1\;{\leq}\;j\;{\leq}q$ and $sdeg(w_k)\;=\;f_k\;=\;f^+_k\;-\;f^-_k,\;1\;{\leq}\;k\;{\leq}\;r)$ where $d^+_i(e^+_j\;and\;f^+_k)$ is the number of positive edges incident with $u_i(v_j\;and\;w_k)$ and $d^-_i(e^-_j\;and\;f^-_k)$ is the number of negative edges incident with $u_i(v_j\;and\;w_k)$. The sequences ${\alpha}\;=\;[d_1,\;d_2,\;{\cdots},\;d_p],\;{\beta}\;=\;[e_1,\;e_2,\;{\cdots},\;e_q]$ and ${\gamma}\;=\;[f_1,\;f_2,\;{\cdots},\;f_r]$ are called the signed degree sequences of G(U, V, W). In this paper, we characterize the signed degree sequences of signed 3-partite graphs.

  • PDF

Reverse Baby-step 2k-ary Adult-step Method for 𝜙((n) Decryption of Asymmetric-key RSA (비대칭키 RSA의 𝜙(n) 해독을 위한 역 아기걸음- 2k-ary 성인걸음법)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.25-31
    • /
    • 2014
  • When the public key e and the composite number n=pq are disclosed but not the private key d in an asymmetric-key RSA, message decryption is carried out by obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and subsequently computing $d=e^{-1}(mod{\phi}(n))$. The most commonly used decryption algorithm is integer factorization of n/p=q or $a^2{\equiv}b^2$(mod n), a=(p+q)/2, b=(q-p)/2. But many of the RSA numbers remain unfactorable. This paper therefore applies baby-step giant-step discrete logarithm and $2^k$-ary modular exponentiation to directly obtain ${\phi}(n)$. The proposed algorithm performs a reverse baby-step and $2^k$-ary adult-step. As a results, it reduces the execution time of basic adult-step to $1/2^k$ times and the memory $m={\lceil}\sqrt{n}{\rceil}$ to l, $a^l$ > n, hence obtaining ${\phi}(n)$ by executing within l times.