Iterate LogarithmRiemann FunctionExponential EstimateFor a Wiener field with an arbitrary finite number of parameters, we construct the law of the iterated logarithm in the functional form. We consider the problem for random fields of a certain type to reside within curvilinear boundaries without ...
Sedimentary characteristics of core YE-2 from the central mud area in the South Yellow Sea during last 8400 years and its interspace coarse layers[J]. Marine Geology and Quaternary Geology, 2009, 29(5): 1-11. Google Scholar [24] Liu Z, Trentesaux A, Clemens S C, et al. Clay ...
Nonlinear Mathematics for Uncertainty and its Applicatons. Springer, Berlin-Heidelbeg, pp. 19-30 CrossRef Chen, Z J, Wu, P Y, Li, B M (2013) A strong law of large numbers for non-additive probabilities. Internat J Approx Reason 54: pp. 365-377 CrossRef Denis, L, Hu, M S, ...
The nature of the number e and its properties. The relationship between e and exponential and natural logarithm functions. The significance of e in mathematics and various fields such as statistics and economics. The history of the discovery and development of the concept of e. The connection bet...
It is an error for --include or the end of an included file to come between an option and its arguments. For example, ''ries 1.2345 --eval-expression --include expres- sions.txt'' will produce an error regardless of the contents of ''expressions.txt'', because --eval-expression must...
This paper presents a new pre-computationaided DLP solving algorithm and a theoretical analysis of its performance.The advantage of our algorithm over existing pre-computation aided DLP solving algorithms will be by a smallmultiplicative factor. However, this seemingly small advantage will nevertheless ...
Important public-key cryptosystems, such as the Diffie-Hellman key exchange protocol, the ElGamal encryption and signa-ture schemes, the U.S. Government's Digital Signature Algorithm (DSA), and its elliptic curve analogue (ECDSA), rely on the difficulty of the DLP [MvOV97]. These and other...
well-known and widely accepted conjectures concerning the expected ranks of elliptic curves over the ra- tionals. Keyword: Elliptic curve cryptosystem, discrete logarithm, partial lift- ing. 1 Introduction The discrete logarithm problem over elliptic curves is a natural analog of the discrete ...
The system, method, and devices of the invention each have several aspects, no single one of which is solely responsible for its desirable attributes. Without limiting the scope of this invention, its more prominent features will now be discussed briefly. After considering this discussion, and par...
Varadharajan and R. Sanders,“Public key distribution in matrix rings”, Electronic Letters, 20 (1984), 386–387. CrossRef S. Pohlig and M. Hellman,“An improved algorithm for computing logarithms over GF(p n ) and its cryptographic significance”, IEEE Trans. Info. Th., 24 (1978), ...