• Title/Summary/Keyword: *-derivation

Search Result 2,161, Processing Time 0.024 seconds

A Contour-Integral Derivation of the Asymptotic Distribution of the Sample Partial Autocorrelations with Lags Greater than p of an AR(p) Model

  • Park, B. S.
    • Journal of the Korean Statistical Society
    • /
    • v.17 no.1
    • /
    • pp.24-29
    • /
    • 1988
  • The asymptotic distribution of the sample partial autocorrelation terms after lag p of an AR(p) model has been shown by Dixon(1944). The derivation is based on multivariate analysis and looks tedious. In this paper we present an interesting contour-integral derivation.

  • PDF

ON f-DERIVATIONS FROM SEMILATTICES TO LATTICES

  • Yon, Yong Ho;Kim, Kyung Ho
    • Communications of the Korean Mathematical Society
    • /
    • v.29 no.1
    • /
    • pp.27-36
    • /
    • 2014
  • In this paper, we introduce the notion of f-derivations from a semilattice S to a lattice L, as a generalization of derivation and f-derivation of lattices. Also, we define the simple f-derivation from S to L, and research the properties of them and the conditions for a lattice L to be distributive. Finally, we prove that a distributive lattice L is isomorphic to the class $SD_f(S,L)$ of all simple f-derivations on S to L for every ${\wedge}$-homomorphism $f:S{\rightarrow}L$ such that $f(x_0){\vee}f(y_0)=1$ for some $x_0,y_0{\in}S$, in particular, $$L{\simeq_-}=SD_f(S,L)$$ for every ${\wedge}$-homomorphism $f:S{\rightarrow}L$ such that $f(x_0)=1$ for some $x_0{\in}S$.

JORDAN GENERALIZED DERIVATIONS ON TRIVIAL EXTENSION ALGEBRAS

  • Bahmani, Mohammad Ali;Bennis, Driss;Vishki, Hamid Reza Ebrahimi;Attar, Azam Erfanian;Fahid, Barahim
    • Communications of the Korean Mathematical Society
    • /
    • v.33 no.3
    • /
    • pp.721-739
    • /
    • 2018
  • In this paper, we investigate the problem of describing the form of Jordan generalized derivations on trivial extension algebras. One of the main results shows, under some conditions, that every Jordan generalized derivation on a trivial extension algebra is the sum of a generalized derivation and an antiderivation. This result extends the study of Jordan generalized derivations on triangular algebras (see [12]), and also it can be considered as a "generalized" counterpart of the results given on Jordan derivations of a trivial extension algebra (see [11]).

THE RANGE INCLUSION RESULTS FOR ALGEBRAIC NIL DERIVATIONS ON COMMUTATIVE AND NONCOMMUTATIVE ALGEBRAS

  • Toumi, Mohamed Ali
    • The Pure and Applied Mathematics
    • /
    • v.20 no.4
    • /
    • pp.243-249
    • /
    • 2013
  • Let A be an algebra and D a derivation of A. Then D is called algebraic nil if for any $x{\in}A$ there is a positive integer n = n(x) such that $D^{n(x)}(P(x))=0$, for all $P{\in}\mathbb{C}[X]$ (by convention $D^{n(x)}({\alpha})=0$, for all ${\alpha}{\in}\mathbb{C}$). In this paper, we show that any algebraic nil derivation (possibly unbounded) on a commutative complex algebra A maps into N(A), where N(A) denotes the set of all nilpotent elements of A. As an application, we deduce that any nilpotent derivation on a commutative complex algebra A maps into N(A), Finally, we deduce two noncommutative versions of algebraic nil derivations inclusion range.

CHARACTERIZATIONS OF JORDAN DERIVABLE MAPPINGS AT THE UNIT ELEMENT

  • Li, Jiankui;Li, Shan;Luo, Kaijia
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.2
    • /
    • pp.277-283
    • /
    • 2022
  • Let 𝒜 be a unital Banach algebra, 𝓜 a unital 𝒜-bimodule, and 𝛿 a linear mapping from 𝒜 into 𝓜. We prove that if 𝛿 satisfies 𝛿(A)A-1+A-1𝛿(A)+A𝛿(A-1)+𝛿(A-1)A = 0 for every invertible element A in 𝒜, then 𝛿 is a Jordan derivation. Moreover, we show that 𝛿 is a Jordan derivable mapping at the unit element if and only if 𝛿 is a Jordan derivation. As an application, we answer the question posed in [4, Problem 2.6].

Secure Password System against Imposter (타인의 관찰에 의한 패스워드 노출로부터 안전한 패스워드 시스템)

  • Park, Sung-Bae;Park, Seung-Bae;Kang, Moon-Seol
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.141-144
    • /
    • 2003
  • We present a new password system, called dual password system, with the user verification procedure. Dual password system is the first password system in the world preventing the exposure of secret information to imposter at the terminal. User of dual password system matches two alphabets at same location of first password and second password iteratively for inputting password. Therefore, the deriving method of first password and second password from the password is important in dual password system. Related to the deriving method of first password and second password from password, a new problem, called dual password derivation problem, is defined, and the evaluation factors for the solutions of the dual password derivation problem are presented.

REGULARITY OF GENERALIZED DERIVATIONS IN BCI-ALGEBRAS

  • Muhiuddin, G.
    • Communications of the Korean Mathematical Society
    • /
    • v.31 no.2
    • /
    • pp.229-235
    • /
    • 2016
  • In this paper we study the regularity of inside (or outside) (${\theta},{\phi}$)-derivations in BCI-algebras X and prove that let $d_{({\theta},{\phi})}:X{\rightarrow}X$ be an inside (${\theta},{\phi}$)-derivation of X. If there exists a ${\alpha}{\in}X$ such that $d_{({\theta},{\phi})}(x){\ast}{\theta}(a)=0$, then $d_{({\theta},{\phi})}$ is regular for all $x{\in}X$. It is also shown that if X is a BCK-algebra, then every inside (or outside) (${\theta},{\phi}$)-derivation of X is regular. Furthermore the concepts of ${\theta}$-ideal, ${\phi}$-ideal and invariant inside (or outside) (${\theta},{\phi}$)-derivations of X are introduced and their related properties are investigated. Finally we obtain the following result: If $d_{({\theta},{\phi})}:X{\rightarrow}X$ is an outside (${\theta},{\phi}$)-derivation of X, then $d_{({\theta},{\phi})}$ is regular if and only if every ${\theta}$-ideal of X is $d_{({\theta},{\phi})}$-invariant.

A Method of Statistical Randomness Test for Key Derivation Functions (키유도함수의 통계적 난수성 평가 방법)

  • Kang, Ju-Sung;Yi, Ok-Yeon;Youm, Ji-Sun;Cho, Jin-Woong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.47-60
    • /
    • 2010
  • Randomness is a basic security evaluation item for the most cryptographic algorithms. NIST has proposed a statistical test suit for random number generators for cryptographic applications in the process of AES project. However the test suit of NIST is customized to block ciphers which have the same input and output lengths. It needs to revise NIST's test suit for key derivation functions which have multiple output blocks. In this paper we propose a revised method of NIST's statistical randomness test adequate to the most key derivation functions and some experimental results for key derivation functions of 3GSM and NIST.

Provable Security of Key Derivation Functions Based on the Block Ciphers (블록암호 기반 키유도함수의 증명가능 안전성)

  • Kang, Ju-Sung;Yi, Ok-Yeon;Youm, Ji-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.3-16
    • /
    • 2010
  • Key derivation functions are used within many cryptographic systems in order to generate various keys from a fixed short key string. In this paper we survey a state-of-the-art in the key derivation functions and wish to examine the soundness of the functions on the view point of provable security. Especially we focus on the key derivation functions using pseudorandom functions which are recommended by NISI recently, and show that the variant of Double-Pipeline Iteration mode using pseudorandom permutations is a pseudorandom function. Block ciphers can be regarded as practical primitives of pseudorandom permutations.