scholarly journals Cryptography based on the Matrices

2017 ◽  
Vol 37 (3) ◽  
pp. 75-83 ◽  
Author(s):  
M. Zeriouh ◽  
A. Chillali ◽  
Abdelkarim Boua

In this work we introduce a new method of cryptography based on the matrices over a finite field $\mathbb{F}_{q}$, were $q$ is a power of a prime number $p$. The first time we construct thematrix $M=\left(\begin{array}{cc}A_{1} & A_{2} \\0 & A_{3} \\\end{array}\right)$ were \ $A_{i}$ \ with $i \in \{1, 2, 3 \}$ is the matrix oforder $n$ \ in \ $\mathcal{M}(\mathbb{F}_{q})$ - the set ofmatrices with coefficients in $\mathbb{F}_{q}$ - and $0$ is the zero matrix of order $n$. We prove that $M^{l}=\left(\begin{array}{cc}A_{1}^{l} & (A_{2})_{l} \\0 & A_{3}^{l} \\\end{array}\right)$ were $(A_{2})_{l}=\sum\limits_{k=0}^{l-1}A_{1}^{l-1-k}A_{2}A_{3}^{k}$ for all $l\in \mathbb{N}^{\ast}$. After we will make a cryptographic scheme between the two traditional entities Alice and Bob.

2019 ◽  
Vol 38 (3) ◽  
pp. 193-201 ◽  
Author(s):  
A. Boulbot ◽  
Abdelhakim Chillali ◽  
A. Mouhib

Let Fq be a finite field of q elements, where q is a power of a prime number p greater than or equal to 5. In this paper, we study the elliptic curve denoted Ea,b(Fq[e]) over the ring Fq[e], where e2 = e and (a,b) ∈ (Fq[e])2. In a first time, we study the arithmetic of this ring. In addition, using the Weierstrass equation, we define the elliptic curve Ea,b(Fq[e]) and we will show that Eπ0(a),π0(b)(Fq) and Eπ1(a),π1(b)(Fq) are two elliptic curves over the field Fq, where π0 and π1 are respectively the canonical projection and the sum projection of coordinates of X ∈Fq[e]. Precisely, we give a bijection between the sets Ea,b(Fq[e]) and Eπ0(a),π0(b)(Fq)×Eπ1(a),π1(b)(Fq).


2021 ◽  
pp. 1-27
Author(s):  
Anna Naszodi ◽  
Francisco Mendonca

Abstract We develop a method which assumes that marital preferences are characterized either by the scalar-valued measure proposed by Liu and Lu, or by the matrix-valued generalized Liu–Lu measure. The new method transforms an observed contingency table into a counterfactual table while preserving its (generalized) Liu–Lu value. After exploring some analytical properties of the new method, we illustrate its application by decomposing changes in the prevalence of homogamy in the US between 1980 and 2010. We perform this decomposition with two alternative transformation methods as well where both methods capture preferences differently from Liu and Lu. Finally, we use survey evidence to support our claim that out of the three considered methods, the new transformation method is the most suitable for identifying the role of marital preferences at shaping marriage patterns. These data are also in favor of measuring assortativity in preferences à la Liu and Lu.


2015 ◽  
Vol 742 ◽  
pp. 330-334
Author(s):  
Chun Jian Wang ◽  
Wei Yue ◽  
Hai Yan Ji

In allusion to the need of analyzing complex system, we have proposed a method named multi-grade color Petri net. We for the first time use this new method to analyze a missile training simulator system. This model can accurately reflect the complex environments of the system and avoid the difficulty occurring often in developing accurate mathematics model by using classical research approach.


2018 ◽  
Vol 25 (6) ◽  
pp. 1157-1165
Author(s):  
Taoufik Mnasri ◽  
Adel Abbessi ◽  
Rached Ben Younes ◽  
Atef Mazioud

AbstractThis work focuses on identifying the thermal conductivity of composites loaded with phase-change materials (PCMs). Three configurations are studied: (1) the PCMs are divided into identical spherical inclusions arranged in one plane, (2) the PCMs are inserted into the matrix as a plate on the level of the same plane of arrangement, and (3) the PCMs are divided into identical spherical inclusions arranged periodically in the whole matrix. The percentage PCM/matrix is fixed for all cases. A comparison among the various situations is made for the first time, thus providing a new idea on how to insert PCMs into composite matrices. The results show that the composite conductivity is the most important consideration in the first case, precisely when the arrangement plane is parallel with the flux and diagonal to the entry face. In the present work, we are interested in exploring the solid-solid PCMs. The PCM polyurethane and a wood matrix are particularly studied.


2013 ◽  
Vol 2013 ◽  
pp. 1-9 ◽  
Author(s):  
Ruofeng Rao ◽  
Zhilin Pu

By formulating a contraction mapping and the matrix exponential function, the authors apply linear matrix inequality (LMI) technique to investigate and obtain the LMI-based stability criterion of a class of time-delay Takagi-Sugeno (T-S) fuzzy differential equations. To the best of our knowledge, it is the first time to obtain the LMI-based stability criterion derived by a fixed point theory. It is worth mentioning that LMI methods have high efficiency and other advantages in largescale engineering calculations. And the feasibility of LMI-based stability criterion can efficiently be computed and confirmed by computer Matlab LMI toolbox. At the end of this paper, a numerical example is presented to illustrate the effectiveness of the proposed methods.


2014 ◽  
Vol 17 (5) ◽  
Author(s):  
John R. Britnell ◽  
Mark Wildon

AbstractIt is known that the centralizer of a matrix over a finite field depends, up to conjugacy, only on the type of the matrix, in the sense defined by J. A. Green. In this paper an analogue of the type invariant is defined that in general captures more information; using this invariant the result on centralizers is extended to arbitrary fields. The converse is also proved: thus two matrices have conjugate centralizers if and only if they have the same generalized type. The paper ends with the analogous results for symmetric and alternating groups.


1979 ◽  
Vol 44 (3_suppl) ◽  
pp. 1243-1246 ◽  
Author(s):  
A. E. Reading ◽  
C. Harris ◽  
J. R. Newton

Attitudes towards contraceptive methods were sampled among 117 women, in their mid-20's, selecting a new method (Pill, IUD, Injectable) and a comparison group of women undergoing termination of pregnancy for the first time. High concordance was found, suggesting women were applying essentially the same standards in making their selection.


2019 ◽  
Vol 23 ◽  
pp. 201-212
Author(s):  
Shivkumari Panda ◽  
Dibakar Behera ◽  
Tapan Kumar Bastia

This chapter presents the preparation and characterization of some unique properties of nanocomposites by dispersing graphite flakes in commercial unsaturated polyester (UPE) matrix. The composite was prepared by a novel method with the use of solvent swelling technique. Three different specimens of UPE/graphite nanocomposites were fabricated with addition of 1, 2 and 3 wt% of graphite flakes. Except mechanical, viscoelastic and thermo gravimetric properties, transport properties like electrical conductivity, thermal conductivity and water transport properties were studied for the first time. Graphite flakes propose enhanced properties to the composites suggesting homogeneous distribution of the nanofiller in the matrix and strong interaction with the matrix. 2wt% nanofiller loading showed superior essential characteristics and after that the properties reduced may be due to the nucleating tendency of the nanofiller particles. The XRD pattern showed the compatibility of the graphite flakes by introducing a peak around 26.550 in the nanocomposites. SEM Properties are also in agreement with the compatibility. Nanocomposite with 2wt% graphite also showed remarkable enhancement in transport, mechanical, viscoelastic and thermo gravimetric properties. So by introduction of a small quantity of graphite endow the new class of multiphase nanocomposites with inimitable structure and tremendous application.


2021 ◽  
Author(s):  
Michael Prendergast

This paper describes a new method for performing secure encryption of blocks of streaming data. This algorithm is an extension of the RSA encryption algorithm. Instead of using a public key (e,n) where n is the product of two large primes and e is relatively prime to the Euler Totient function, φ(n), one uses a public key (n,m,E), where m is the rank of the matrix E and E is an invertible matrix in GL(m,φ(n)). When m is 1, this last condition is equivalent to saying that E is relatively prime to φ(n), which is a requirement for standard RSA encryption. Rather than a secret private key (d,φ(n)) where d is the inverse of e (mod φ(n)), the private key is (D,φ(n)), where D is the inverse of E (mod (φ(n)). The key to making this generalization work is a matrix generalization of the scalar exponentiation operator that maps the set of m-dimensional vectors with integer coefficients modulo n, onto itself.


2018 ◽  
Author(s):  
Jingjing Yan ◽  
John MacDonald ◽  
Shawn Burdette

Utilizing a photolabile ligand as MOF strut can make a framework undergo full or partial decomposition upon irradiation. For the first time, a nitrophenylacetate derivative has been incorporated into MOF as a backbone linker via PLSE method. The photo-induced decarboxylation of the NPDAC-MOF represents a novel way of degrading a MOF, which provides an innovative approach to formulating photoresponsive porous materials with potential applications in molecular release and drug delivery. When photoactive linker is mixed with non-photolabile linker via partial PLSE, the MOF structure can be retained after irradiation, but with the introduction of multiple defects, offering a new method to create vacancies in MOFs. Defect repair can be achieved by treatment with replacement ligands, the scope of which is an interesting area for developing customizable MOF contents.<br>


Sign in / Sign up

Export Citation Format

Share Document