Academia.eduAcademia.edu

Multiplicative Inverse

description67 papers
group0 followers
lightbulbAbout this topic
The multiplicative inverse of a number is another number which, when multiplied with the original number, yields the product of one. For any non-zero number 'a', its multiplicative inverse is represented as 1/a, satisfying the equation a × (1/a) = 1.
lightbulbAbout this topic
The multiplicative inverse of a number is another number which, when multiplied with the original number, yields the product of one. For any non-zero number 'a', its multiplicative inverse is represented as 1/a, satisfying the equation a × (1/a) = 1.
Let p be a prime number. We show that there is a one-to-one correspondence between the set of strongly nilpotent braces and the set of nilpotent pre-Lie rings of cardinality p n , for sufficiently large p. Moreover, there is an injective... more
We define combinatorial representations of finite skew braces and use this idea to produce a database of skew braces of small size. This database is then used to explore different concepts of the theory of skew braces such as ideals,... more
In this paper a simple algebraic formula is obtained for the correspondence between finite right nilpotent F p -braces and finite nilpotent pre-Lie algebras. This correspondence agrees with the correspondence using Lazard's correspondence... more
A low latency architecture to compute the multiplicative inverse and division in a finite field GF(2 ) is presented. Compared to other proposals with the same complexity, this circuit has lower latency and can be used in error-correction... more
The substitution box (S-box) component is the heart of the Advanced Encryption Standard (AES) algorithm. The S-box values are generated from the multiplicative inverse of Galois finite field GF(2 8) with an affine transform. There are... more
This paper introduces the notion of a strongly prime ideal, and shows that the largest solvable ideal in a finite brace equals the intersection of all strongly prime ideals in this brace. This is used to generalise some well known results... more
Braces are generalizations of radical rings, introduced by Rump to study involutive non-degenerate set-theoretical solutions of the Yang-Baxter equation (YBE). Skew braces were also recently introduced as a tool to study not necessarily... more
by MECS Press and 
1 more
For the implementation of error-correcting codes, cryptographic algorithms, and the construction of homomorphic methods for privacy-preserving, there is a need for methods of performing operations on elements GF(2m) that have low... more
This manuscript deals with the theorem on diminution of the Extended Euclidean Algorithm for finding the multiplicative inverse of non-zero elemental polynomials of Galois field  with respect to a monic irreducible polynomial  over ,... more
Standardization of decimal floating-point formats by IEEE in IEEE 754-2008 Standards fuelled the interest on decimal floating-point architectures among the global research community. Although decimal arithmetic architecture research... more
In this paper, we first discussed multiplicative metric mapping by giving some topological properties of the relevant multiplicative metric space. As an interesting result of our discussions, we observed that the set of positive real... more
In this work, we determine the general solution of the quinquevigintic functional equation and also investigate its stability of this equation in the setting of matrix normed spaces and the framework of matrix non-Archimedean fuzzy normed... more
The aim of this paper is to study the stability of reciprocal-cubic functional equation using direct method in non-Archimedean normed spaces.
We prove a weak form of the Krull-Schmidt Theorem concerning the behavior of direct-product decompositions of $G$-groups, biuniform abelian $G$-groups, $G$-semidirect products and the $G$-set $Hom(H,A)$. Here $G$ and $A$ are groups and... more
The Fast Inverse Square Root algorithm has been used in 3D games of past for lighting and reflection calculations, because it offers up to four times performance gains. This paper presents a hardware implementation of the same algorithm... more
The Fast Inverse Square Root algorithm has been used in 3D games of past for lighting and reflection calculations, because it offers up to four times performance gains. This paper presents a hardware implementation of the same algorithm... more
General results on multiplicative lattices found recently by Facchini, Finocchiaro and Janelidze have been studied in the particular case of groups by Facchini, de Giovanni and Trombetti. In this paper we prove that these results hold not... more
It is shown that over an arbitrary field there exists a nil algebra R whose adjoint group R o is not an Engel group. This answers a question by Amberg and Sysak from 1997 [5] and answers related questions from [3, 44]. The case of an... more
The substitution box (S-box) component is the heart of the Advanced Encryption Standard (AES) algorithm. The S-box values are generated from the multiplicative inverse of Galois finite field GF(2 8) with an affine transform. There are... more
Univariate fractions can be transformed to mixed fractions in the equational theory of meadows of characteristic zero.
We study relations between different notions of nilpotency in the context of skew braces and applications to the structure of solutions to the Yang-Baxter equation. In particular, we consider annihilator nilpotent skew braces, an... more
Instance of de Bruijn 3D hypertorus Mapping of de Bruijn 3D hypertorus (16,4,4;2,2,2) 2 Some instances of de Bruijn sequences
Instance of de Bruijn 3D hypertorus Mapping of de Bruijn 3D hypertorus (16,4,4;2,2,2) 2 Some instances of de Bruijn sequences
Most public key crypto systems use finite field modulo arithmetic. This modulo arithmetic is applied on real numbers, binary values and polynomial functions. The computation cost is based on how it works with minimum use of scarce... more
We link the recent theory of L-algebras to previous notions of Universal Algebra and Categorical Algebra concerning subtractive varieties, commutators, multiplicative lattices, and their spectra. We show that the category of L-algebras is... more
This paper describes the hardware implementation methodologies of fixed point binary division algorithms. The implementations have been extended for the execution of the reciprocal of the binary numbers. Radix-2 (binary) implementations... more
Let $M$ be a lattice module over a $C$-lattice $L$. Let $Spec^{s}(M)$ be the collection of all second elements of $M$. In this paper, we consider a topology on $Spec^{s}(M)$, called the second classical Zariski topology as a... more
To Mirian Andrés Gómez in memoriam Resumen. En este artículo consideramos cadenas finitas de elementos en retículos distributivos acotados L, que pueden ser representadas como morfismos Chn → L con dominio una n-cadena estándar con n + 2... more
Computation of multiplicative inverses in finite fields GF (p) and GF (2 n) is the most time consuming operation in elliptic curve cryptography especially when affine coordinates are used. Since the existing algorithms based on extended... more
We study Hall's W-power nilpotent groups from the lattice standpoint. A relationship between the structure of a W-power group G and the structure of the lattice of its subgroups L(G) is established.
Given a finite bijective non-degenerate set-theoretic solution (X, r) of the Yang-Baxter equation we characterize when its structure monoid M (X, r) is Malcev nilpotent. Applying this characterization to solutions coming from racks, we... more
Reverse conversion is an important exercise in achieving the properties of Residue Number System (RNS). Current algorithms available for reverse conversion exhibits greater computational overhead in terms of speed and area. In this paper,... more
There are many results on stability of various forms of functional equations available in the theory of functional equations. The intention of this paper is to introduce an advanced and a new multi-dimensional reciprocal-quadratic... more
We focus on the fragment TFA of λ-calculus which is known to contain only terms which normalize in polynomial time. Inside TFA we translated BEA, a well known, imperative and fast algorithm which calculates the multiplicative inverse of... more
In this paper, we first discussed multiplicative metric mapping by giving some topological properties of the relevant multiplicative metric space. As an interesting result of our discussions, we observed that the set of positive real... more
We present a k-bit encoding of the k-bit binary integers based on a discrete logarithm representation. The representation supports a discrete logarithm number system (DLS) that allows integer multiplication to be reduced to addition and... more
One the challenging in hardware performance is to designing a high speed calculating unit. The higher of calculations speeds in a computer system will be pointed out in terms of performance. As a result, designing a high speed calculating... more
Summary. We formalize in the Mizar System [3], [4], definitions and basic propositions about primary ideals of a commutative ring along with Chapter 4 of [1] and Chapter III of [8]. Additionally other necessary basic ideal operations such... more
In this paper we present a single-chip FPGA full encryptor/decryptor core design of the AES algorithm. Our design performs all of them, encryption, decryption and key scheduling processes. High performance timing figures are obtained... more
Let p be a prime number. We show that there is a one-to-one correspondence between the set of strongly nilpotent braces and the set of nilpotent pre-Lie rings of cardinality p n , for sufficiently large p. Moreover, there is an injective... more
We study series of left ideals of skew left braces that are analogs of upper central series of groups. These concepts allow us to define left and right nilpotent skew left braces. Several results related to these concepts are proved and... more
We define combinatorial representations of finite skew braces and use this idea to produce a database of skew braces of small size. This database is then used to explore different concepts of the theory of skew braces such as ideals,... more
Braces are generalizations of radical rings, introduced by Rump to study involutive non-degenerate set-theoretical solutions of the Yang-Baxter equation (YBE). Skew braces were also recently introduced as a tool to study not necessarily... more
This paper presents a procedure for calculating multiplicative inverses modulo 2 m , based on a novel mathematical approach. The procedure is suitable for software implementation on a general-purpose processor. When counting the total... more
Let K be a ring and let G be a totally ordered group whose elements act as automorphisms on K. We denote by K*G the skew group ring over K. The prime radical P (K*G) is a homogeneous ideal of K*G ([5], Theorem 1.2). From this, P (K*G) = S... more
Download research papers for free!