scholarly journals Sums Over Primes II

Author(s):  
Rusen Li

In this paper, we give explicit asymptotic formulas for some sums over primes involving generalized alternating hyperharmonic numbers of types I, II and III. Analogous results for numbers with $k$-prime factors will also be considered.

2014 ◽  
Vol 10 (08) ◽  
pp. 2011-2036 ◽  
Author(s):  
Renrong Mao

Bringmann, Mahlburg and Rhoades proved asymptotic formulas for all the even moments of the ranks and cranks of partitions with polynomial error terms. In this paper, motivated by their work, we apply the same method and obtain asymptotics for the two rank moments of overpartitions.


2020 ◽  
Vol 63 (4) ◽  
pp. 1031-1047
Author(s):  
Florian Luca ◽  
Sibusiso Mabaso ◽  
Pantelimon Stănică

AbstractIn this paper, for a positive integer n ≥ 1, we look at the size and prime factors of the iterates of the Ramanujan τ function applied to n.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Kusano Takaŝi ◽  
Jelena V. Manojlović

AbstractWe study the asymptotic behavior of eventually positive solutions of the second-order half-linear differential equation(p(t)\lvert x^{\prime}\rvert^{\alpha}\operatorname{sgn}x^{\prime})^{\prime}+q(% t)\lvert x\rvert^{\alpha}\operatorname{sgn}x=0,where q is a continuous function which may take both positive and negative values in any neighborhood of infinity and p is a positive continuous function satisfying one of the conditions\int_{a}^{\infty}\frac{ds}{p(s)^{1/\alpha}}=\infty\quad\text{or}\quad\int_{a}^% {\infty}\frac{ds}{p(s)^{1/\alpha}}<\infty.The asymptotic formulas for generalized regularly varying solutions are established using the Karamata theory of regular variation.


2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Darius Bunandar ◽  
Luke C. G. Govia ◽  
Hari Krovi ◽  
Dirk Englund

AbstractQuantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments, however, predict their achievable key rates using asymptotic formulas, which assume the transmission of an infinite number of signals, partly because QKD proofs with finite transmissions (and finite-key lengths) can be difficult. Here we develop a robust numerical approach for calculating the key rates for QKD protocols in the finite-key regime in terms of two semi-definite programs (SDPs). The first uses the relation between conditional smooth min-entropy and quantum relative entropy through the quantum asymptotic equipartition property, and the second uses the relation between the smooth min-entropy and quantum fidelity. The numerical programs are formulated under the assumption of collective attacks from the eavesdropper and can be promoted to withstand coherent attacks using the postselection technique. We then solve these SDPs using convex optimization solvers and obtain numerical calculations of finite-key rates for several protocols difficult to analyze analytically, such as BB84 with unequal detector efficiencies, B92, and twin-field QKD. Our numerical approach democratizes the composable security proofs for QKD protocols where the derived keys can be used as an input to another cryptosystem.


Sign in / Sign up

Export Citation Format

Share Document