-
arXiv:1503.02687 [pdf, ps, other]
Minimal Graded Free Resolution for Monomial Curves in $\mathbb{A}^{4}$ defined by almost arithmetic sequences
Abstract: Let $\mm=(m_0,m_1,m_2,n)$ be an almost arithmetic sequence, i.e., a sequence of positive integers with ${\rm gcd}(m_0,m_1,m_2,n) = 1$, such that $m_0<m_1<m_2$ form an arithmetic progression, $n$ is arbitrary and they minimally generate the numerical semigroup $Γ= m_0\N + m_1\N + m_2\N + n\N$. Let $k$ be a field. The homogeneous coordinate ring $k[Γ]$ of the affine monomial curve parametrically def… ▽ More
Submitted 1 January, 2016; v1 submitted 9 March, 2015; originally announced March 2015.
Comments: Accepted for publication in Communication in Algebra
-
arXiv:1108.3203 [pdf, ps, other]
Minimal Graded Free Resolutions for Monomial Curves Defined by Arithmetic Sequences
Abstract: Let $\mm=(m_0,...,m_n)$ be an arithmetic sequence, i.e., a sequence of integers $m_0<...<m_n$ with no common factor that minimally generate the numerical semigroup $\sum_{i=0}^{n}m_i\N$ and such that $m_i-m_{i-1}=m_{i+1}-m_i$ for all $i\in\{1,...,n-1\}$. The homogeneous coordinate ring $Γ_\mm$ of the affine monomial curve parametrically defined by $X_0=t^{m_0},...,X_n=t^{m_n}$ is a graded $R$-mo… ▽ More
Submitted 16 August, 2011; originally announced August 2011.
Comments: 18 PAGES
MSC Class: 13D02; 13A02; 13C40
-
Some Aspects of Quantum Cryptography and Network Security
Abstract: Quantum mechanics is the current best description of the world as we know it. Experiments have shown that quantum predictions are accurate up ten places of decimal. In quantum cryptography much work has been devoted to the study of Quantum Key Distribution (QKD). The purpose of QKD is to securely distribute secret keys between the users in a network. As a result, several quantum cryptographic prot… ▽ More
Submitted 1 June, 2011; v1 submitted 8 May, 2011; originally announced May 2011.
Comments: This was withdrawn because the key distribution figures Figure 1 and 3 in the paper are technically incorrect
Journal ref: International Journal HIT Transaction on ECCN (Electronics, Communication, Computers and Networking), pp. 27-36. Volume 1, No: 1, January 2006
-
GB-hash : Hash Functions Using Groebner Basis
Abstract: In this paper we present an improved version of HF-hash, viz., GB-hash : Hash Functions Using Groebner Basis. In case of HF-hash, the compression function consists of 32 polynomials with 64 variables which were taken from the first 32 polynomials of hidden field equations challenge-1 by forcing last 16 variables as 0. In GB-hash we have designed the compression function in such way that these 32 p… ▽ More
Submitted 30 August, 2011; v1 submitted 24 November, 2010; originally announced November 2010.
Comments: The paper has been withdrawn. The authors have found some weaknesses in this design
-
arXiv:1011.4247 [pdf, ps, other]
Minimal free resolutions for certain affine monomial curve
Abstract: Given an arbitrary field k and an arithmetic sequence of positive integers m_0<...<m_n, we consider the affine monomial curve parameterized by X_0=t^{m_0},...,X_n=t^{m_n}. In this paper, we conjecture that the Betti numbers of its coordinate ring are completely determined by n and the value of m_0 modulo n. We first show that the defining ideal of the monomial curve can be written as a sum of two… ▽ More
Submitted 18 November, 2010; originally announced November 2010.
Comments: 9 pages. To appear in 'Commutative Algebra and its Connections to Geometry (PASI 2009)', Contemporary Mathematics, AMS
MSC Class: 13D02 (primary); 13A02; 13C40 (secondary)
Journal ref: Contemp. Math, 555 (2011) 87-95
-
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Abstract: Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direc- tion, this paper presents a novel approach to share a secret among a hierarchy of users while overcoming the limitations of the already exist- ing mechanisms. Our work is based on traditional (k +1; n)-threshold secret sharing, which is secure as long as an adver… ▽ More
Submitted 7 June, 2010; originally announced June 2010.
Comments: 20 Pages
Journal ref: International Journal of Computer Science and Information Technology 2.3 (2010) 160-179
-
arXiv:1003.0775 [pdf, ps, other]
The Rees Algebra for Certain Monomial Curves
Abstract: In this article, we find the equations defining the Rees algebra for certain Monomial Curves explicitly and use them to prove that the blowup scheme is not smooth. This proves a conjecture of Francia in affirmative, which says that a dimension one prime in a regular local ring is a complete intersection if it has a smooth blowup.
Submitted 11 January, 2011; v1 submitted 3 March, 2010; originally announced March 2010.
-
HF-hash : Hash Functions Using Restricted HFE Challenge-1
Abstract: Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16 variables as zero.… ▽ More
Submitted 5 October, 2009; v1 submitted 8 September, 2009; originally announced September 2009.
Comments: 44 pages including 32 pages appendix (list of polynomials) 2 figures, corrected Surname