Various Approximate Multiplicative Inverse Lie $$\star $$-Derivations

Author(s):  
B. V. Senthil Kumar ◽  
Khalifa Al-Shaqsi ◽  
Hemen Dutta
Author(s):  
Goh Yie Yen ◽  
Siti Zarina Md Naziri ◽  
Rizalafande Che Ismail ◽  
Mohd Nazrin Md Isa ◽  
Razaidi Hussin

2011 ◽  
Vol 07 (05) ◽  
pp. 1279-1302 ◽  
Author(s):  
HUANING LIU

Recently there has been much progress in the study of arithmetic progressions. An important tool in these developments is the Gowers uniformity norm. In this paper we study the Gowers norm for pseudorandom binary sequences, and establish some connections between these two subjects. Some examples are given to show that the "good" pseudorandom sequences have small Gowers norm. Furthermore, we introduce two large families of pseudorandom binary sequences constructed by the multiplicative inverse and additive character, and study the pseudorandom measures and the Gowers norm of these sequences by using the estimates of exponential sums and properties of the Vandermonde determinant. Our constructions are superior to the previous ones from some points of view.


2019 ◽  
Vol 16 ◽  
pp. 8317-8321
Author(s):  
Waleed Eltayeb Ahmed

This paper presents how the steps that used to determine a multiplicative inverse by method based on the Euclidean algorithm, can be used to find a greatest common divisor for polynomials in the Galois field (2^n ).


Author(s):  
Jaime David Rios Arrañaga ◽  
◽  
Janneth Alejandra Salamanca Chavarin ◽  
Juan José Raygoza Panduro ◽  
Edwin Christian Becerra Alvarez ◽  
...  

The S-box is a basic important component in symmetric key encryption, used in block ciphers to confuse or hide the relationship between the plaintext and the ciphertext. In this paper a way to develop the transformation of an input of the S-box specified in AES encryption system through an artificial neural network and the multiplicative inverse in Galois Field is presented. With this implementation more security is achieved since the values of the S-box remain hidden and the inverse table serves as a distractor since it would appear to be the complete S-box. This is implemented on MATLAB and HSPICE using a network of perceptron neurons with a hidden layer and null error.


Sign in / Sign up

Export Citation Format

Share Document