Graded q-Differential Algebra Approach to q-Connection

Author(s):  
Viktor Abramov
2015 ◽  
Vol 9 (1L) ◽  
pp. 29-38 ◽  
Author(s):  
Viktor Abramov ◽  
Olga Liivapuu

2016 ◽  
Vol 26 (4) ◽  
pp. 803-813 ◽  
Author(s):  
Carine Jauberthie ◽  
Louise Travé-MassuyèEs ◽  
Nathalie Verdière

Abstract Identifiability guarantees that the mathematical model of a dynamic system is well defined in the sense that it maps unambiguously its parameters to the output trajectories. This paper casts identifiability in a set-membership (SM) framework and relates recently introduced properties, namely, SM-identifiability, μ-SM-identifiability, and ε-SM-identifiability, to the properties of parameter estimation problems. Soundness and ε-consistency are proposed to characterize these problems and the solution returned by the algorithm used to solve them. This paper also contributes by carefully motivating and comparing SM-identifiability, μ-SM-identifiability and ε-SM-identifiability with related properties found in the literature, and by providing a method based on differential algebra to check these properties.


2020 ◽  
Vol 15 (1) ◽  
pp. 266-279
Author(s):  
Atul Pandey ◽  
Indivar Gupta ◽  
Dhiraj Kumar Singh

AbstractElGamal cryptosystem has emerged as one of the most important construction in Public Key Cryptography (PKC) since Diffie-Hellman key exchange protocol was proposed. However, public key schemes which are based on number theoretic problems such as discrete logarithm problem (DLP) are at risk because of the evolution of quantum computers. As a result, other non-number theoretic alternatives are a dire need of entire cryptographic community.In 2016, Saba Inam and Rashid Ali proposed a ElGamal-like cryptosystem based on matrices over group rings in ‘Neural Computing & Applications’. Using linear algebra approach, Jia et al. provided a cryptanalysis for the cryptosystem in 2019 and claimed that their attack could recover all the equivalent keys. However, this is not the case and we have improved their cryptanalysis approach and derived all equivalent key pairs that can be used to totally break the ElGamal-like cryptosystem proposed by Saba and Rashid. Using the decomposition of matrices over group rings to larger size matrices over rings, we have made the cryptanalysing algorithm more practical and efficient. We have also proved that the ElGamal cryptosystem proposed by Saba and Rashid does not achieve the security of IND-CPA and IND-CCA.


1994 ◽  
Vol 27 (20) ◽  
pp. 6781-6797 ◽  
Author(s):  
R Floreanini ◽  
L Lapointe ◽  
L Vinet

2003 ◽  
Vol 36 (16) ◽  
pp. 1209-1214
Author(s):  
Maria Pia Saccomani
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document