Factoring-based public-key cryptosystems have an overall complexity which is dominated by the key-production algorithm, which requires the generation of prime numbers. This is most inconvenient in settings where the key-generation is not an one-off process ...
Let Pi be a cuspidal automorphic representation for GL(4) over a number field F. We obtain unconditional lower bounds on the number of places at which the Satake parameters are not "too large". In the case of self-dual Pi with non-trivial central character ...
Let k be a field of characteristic p, where p is a prime number, let pp_k(G) be the Grothendieck group of p-permutation kG-modules, where G is a finite group, and let Cpp_k(G) be pp_k(G) tensored with the field of complex numbers C. In this article, we fin ...
Responses to a target can be sped up or slowed down by a congruent or incongruent prime, respectively. Even though presentations are rapid, the prime and the target are thought to activate motor responses in strict sequence, with prime activation preceding ...
Association for Research in Vision and Ophthalmology2013
Let k be an algebraically closed field of characteristic p, where p is a prime number or 0. Let G be a finite group and ppk(G) be the Grothendieck group of p-permutation kG-modules. If we tensor it with C, then Cppk becomes a C-linear biset functor. Recall ...
Most of the known public-key cryptosystems have an overall complexity which is dominated by the key-production algorithm, which requires the generation of prime numbers. This is most inconvenient in settings where the key-generation is not an one-off proce ...