On another two cryptographic identities in universal Osborn loops
Journal Title: Surveys in Mathematics and its Applications - Year 2010, Vol 5, Issue 0
Abstract
In this study, by establishing an identity for universal Osborn loops, two other identities (of degrees 4 and 6) are deduced from it and they are recognized and recommended for cryptography in a similar spirit in which the cross inverse property (of degree 2) has been used by Keedwell following the fact that it was observed that universal Osborn loops that do not have the 3-power associative property or weaker forms of; inverse property, power associativity and diassociativity to mention a few, will have cycles (even long ones). These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. They were also found applicable to security patterns, arrangements and networks which the CIP may not be applicable to.
Authors and Affiliations
T. Jaiyéolá , J. Adéníran
pplications of generalized Ruscheweyh derivative to univalent functions with finitely many coefficients
By making use of the generalized Ruscheweyh derivative, the authors investigate several interesting properties of certain subclasses of univalent functions having the form<center> f(z) = z - Σ<SUB>n=2..m</...
A unique common fixed point theorem for occasionally weakly compatible maps
The aim of this paper is to establish a unique common fixed point theorem for two pairs of occasionally weakly compatible single and multi-valued maps in a metric space. This result improves the result of Türkoglu et al....
Dynamic shortfall constraints for optimal portfolios
We consider a portfolio problem when a Tail Conditional Expectation constraint is imposed. The financial market is composed of n risky assets driven by geometric Brownian motion and one risk-free asset. The Tail Conditio...
A Fuzzy Commitment Scheme with McEliece's Cipher
In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one o...
Fixed time impulsive differential inclusions
In the paper we study weak and strong invariance of differential inclusions with fixed time impulses and with state constraints.We also investigate some properties of the solution set of impulsive system without state co...