>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到affine相关记录180条 . 查询时间(0.096 秒)
In this talk, I will present a proof a decomposition formula of Kazhdan-Lusztig basis for the elements in the lowest two-sided cell of an affine Weyl group. This formula can be used to determine the l...
Bernstein problem for affine maximal type hypersurfaces has been a core problem in affine geometry. A conjecture proposed firstly by Chern (Proc. Japan-United States Sem., Tokyo, 1977, 17-30) for enti...
Affine Springer fibers were introduced by Kazhdan-Lusztig as a generalization of Springer fibers to loop groups. Later they were found to have applications in harmonic analysis in reductive groups ove...
I will talk about affine Grassmannians for the exceptional group of type G_2. This group can be given as automorphisms of octonion algebras. I consider all maximal parahoric subgroups in G_2, and give...
In this talk, we are mainly concerned with invariant geometric flows in affine-related geometries including centro-equiane, centro-affine, affine and affine-symplectic geometries. First, we show that ...
Let $k$ be a field of characteristic 0 and let $C$ be the a smooth affine curve over $k$. We will first discuss applications of strong approximation to the theory of integral quadratic forms over $C$....
The mod p points of a Shimura variety have a conjectural description called the Langlands-Rapoport conjecture. In accordance with the conjecture, Rapoport defined (generalized) affine Deligne-Lusztig ...
Noncommutative cryptography is based on applications of algebraic structures like noncommutative groups, semigroups and non-commutative rings. Its inter-section with Multivariate cryptography contains...
Recently one new key recovery method for a filter generator was proposed. It is based on so-called planar approximations of such a generator. This paper contains the numerical part of the research of ...
For all vectorial boolean functions up to dimension 4, we present canonical representatives for all extended affine (EA) and CCZ equivalence classes. We include the size of each class, as well as its ...
Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure white-box implementation of AES has remained an enduring challenge. Following the footsteps of the o...
Two vectorial Boolean functions are ``CCZ-equivalent'' if there exists an affine permutation mapping the graph of one to the other. It preserves many of the cryptographic properties of a function such...
Our algorithm is based on a new structure (called a \emph{rank table}) which is used to analyze particular algebraic properties of a function that remain invariant under invertible affine transformati...
In this work, we describe a simple and efficient construction of a large subset S of F_p, where p is a prime, such that the set A(S) for any non-identity affine map A over F_p has small intersection w...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...