Zobrazeno 1 - 10
of 221
pro vyhledávání: '"Nuida, Koji"'
Autor:
Hashimoto, Yuji, Nuida, Koji
It is known that any isogeny graph consisting of ordinary elliptic curves over $\mathbb{F}_q$ with $q = p$ or $p^2$ has a special structure, called a volcano graph. We have a bound $h < \log_2 \sqrt{4q}$ of a height $h$ of the $2$-volcano graph. In t
Externí odkaz:
http://arxiv.org/abs/2409.00505
In algebraic geometry, superspecial curves are important research objects. While the number of superspecial genus-3 curves in characteristic $p$ is known, the number of hyperelliptic ones among them has not been determined even for small $p$. In this
Externí odkaz:
http://arxiv.org/abs/2401.10500
Autor:
Nuida, Koji
Publikováno v:
Discrete Mathematics Letters, vol.13 (2024) 108-110
Zorn's Lemma is a well-known equivalent of the Axiom of Choice. It is usually regarded as a topic in axiomatic set theory, and its historically standard proof (from the Axiom of Choice) relies on transfinite recursion, a non-elementary set-theoretic
Externí odkaz:
http://arxiv.org/abs/2305.10258
In this paper, we introduce a kind of decomposition of a finite group called a uniform group factorization, as a generalization of exact factorizations of a finite group. A group $G$ is said to admit a uniform group factorization if there exist subgr
Externí odkaz:
http://arxiv.org/abs/2302.02831
Autor:
Nuida, Koji
In this note, we give a remark on the structure of centralizers of involutions in Coxeter groups.
Comment: 3 pages
Comment: 3 pages
Externí odkaz:
http://arxiv.org/abs/2212.14767
Publikováno v:
Designs, Codes and Cryptography (2023)
Private Simultaneous Messages (PSM) model is a minimal model for secure multiparty computation. Feige, Kilian, and Naor (STOC 1994) and Ishai (Cryptology and Information Security Series 2013) constructed PSM protocols based on quadratic residues. In
Externí odkaz:
http://arxiv.org/abs/2209.01859
Autor:
Nuida, Koji
In the area of cryptography, fully homomorphic encryption (FHE) enables any entity to perform arbitrary computation on encrypted data without decrypting the ciphertexts. An ongoing group-theoretic approach to construct FHE schemes uses a certain "com
Externí odkaz:
http://arxiv.org/abs/2208.02468
Autor:
Suzuki, Keita, Nuida, Koji
Akiyama et al. (Int. J. Math. Indust., 2019) proposed a post-quantum key exchange protocol that is based on the hardness of solving a system of multivariate non-linear polynomial equations but has a design strategy different from ordinary multivariat
Externí odkaz:
http://arxiv.org/abs/2107.05924
Autor:
Odagawa, Takuto, Nuida, Koji
DeepLLL algorithm (Schnorr, 1994) is a famous variant of LLL lattice basis reduction algorithm, and PotLLL algorithm (Fontein et al., 2014) and $S^2$LLL algorithm (Yasuda and Yamaguchi, 2019) are recent polynomial-time variants of DeepLLL algorithm d
Externí odkaz:
http://arxiv.org/abs/2105.14695
Autor:
Nuida, Koji
The group structure on the rational points of elliptic curves plays several important roles, in mathematics and recently also in other areas such as cryptography. However, the famous proofs for the group property (in particular, for its associative l
Externí odkaz:
http://arxiv.org/abs/2008.05705