Triangularization of algebras of operators

Download
1989
Erbengi, Ersin

Suggestions

Square reflection cryptanalysis of 5-round Feistel networks with permutations
Kara, Orhun (2013-09-01)
In this work, we introduce a new generic attack on 5-round Feistel networks whose round functions are random permutations, under the condition that the second and the fourth round keys are equal. The attack is a combination of the square attack technique with the reflection attack technique and exploits the unbalanced distribution of the fixed points of the inner rounds among all the keys. The data complexity of the attack is inverted right perpendicular4m/ninverted left perpendicular2(n/2) chosen plaintext...
Skew configurations of lines in real del pezzo surfaces
Zabun, Remziye Arzu; Finashin, Sergey; Department of Mathematics (2014)
By blowing up projective plane at n<9 points which form a generic configuration, we obtain a del Pezzo surface X of degree d=9-n with a configuration of n skew lines that are exceptional curves over the blown-up points. The anti-canonical linear system maps X to a projective space of dimension d, P^{d}, and the images of these exceptional curves form a configuration of n lines in P^{d}. The subject of our research is the correspondence between the configurations of n generic points in a real projective plan...
Singular inverse Sturm-Liouville problems with Hermite pseudospectral methods
Altundag, H.; Taşeli, Hasan (2021-10-01)
A numerical approximation to recover certain symmetric potentials in the singular inverse Sturm-Liouville problems over (-infinity,infinity) is presented. A Hermite pseudospectral method is employed to cope with the corresponding direct problem on the real line, which is encountered in the iterative procedure proposed for the inverse problem. The usual but unwelcome ill-posed structure of the resulting numerical algorithm has been treated to some extent by the help of a flexible optimization parameter and r...
Rigidified Picard functor and extensions of abelian schemes
Önsiper, Hurşit (Springer Science and Business Media LLC, 1987-12)
Linear codes from weakly regular plateaued functions and their secret sharing schemes
Mesnager, Sihem; Özbudak, Ferruh; Sinak, Ahmet (2019-03-01)
Linear codes, the most significant class of codes in coding theory, have diverse applications in secret sharing schemes, authentication codes, communication, data storage devices and consumer electronics. The main objectives of this paper are twofold: to construct three-weight linear codes from plateaued functions over finite fields, and to analyze the constructed linear codes for secret sharing schemes. To do this, we generalize the recent contribution of Mesnager given in (Cryptogr Commun 9(1):71-84, 2017...
Citation Formats
E. Erbengi, “Triangularization of algebras of operators,” Middle East Technical University, 1989.