Narrow your search

Library

ULB (2)

ULiège (2)

FARO (1)

KU Leuven (1)

LUCA School of Arts (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

UGent (1)

More...

Resource type

book (2)


Language

English (2)


Year
From To Submit

2020 (2)

Listing 1 - 2 of 2
Sort by

Book
The Riesz transform of codimension smaller than one and the Wolff energy
Authors: --- --- ---
ISBN: 9781470442132 Year: 2020 Publisher: Providence, RI : American Mathematical Society,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Fix d [greater than or equal to] 2, and s [epsilon] (d - 1, d). We characterize the non-negative locally finite non-atomic Borel measures [mu] in Rd for which the associated s-Riesz transform is bounded in L²([mu]) in terms of the Wolff energy. This extends the range of s in which the Mateu-Prat-Verdera characterization of measures with bounded s-Riesz transform is known. As an application, we give a metric characterization of the removable sets for locally Lipschitz continuous solutions of the fractional Laplacian operator (-[delta])[infinity]/2, [infinity] [epsilon] (1, 2), in terms of a well-known capacity from non-linear potential theory. This result contrasts sharply with removability results for Lipschitz harmonic functions"--


Book
Interactions between Group Theory, Symmetry and Cryptology
Author:
ISBN: 3039288032 3039288024 Year: 2020 Publisher: MDPI - Multidisciplinary Digital Publishing Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.

Listing 1 - 2 of 2
Sort by