Symmetric functions

Results: 142



#Item
41Symmetric functions / Representation theory / Algebraic combinatorics / Lambda calculus / Young tableau / Littlewood–Richardson rule / Jeu de taquin / Combinatory logic / Abstract algebra / Algebra / Mathematics

K-THEORETIC SCHUBERT CALCULUS FOR OG(n, 2n + 1) AND JEU DE TAQUIN FOR SHIFTED INCREASING TABLEAUX EDWARD CLIFFORD, HUGH THOMAS, AND ALEXANDER YONG Abstract. We present a proof of a Littlewood-Richardson rule for the K-th

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2010-08-14 13:11:11
42Symmetric functions / Invariant theory / Polynomials / Algebraic combinatorics / Orthogonal polynomials / Macdonald polynomials / Schur polynomial / Schubert polynomial / Symmetric polynomial / Abstract algebra / Algebra / Mathematics

COMBINATORIAL RULES FOR THREE BASES OF POLYNOMIALS COLLEEN ROSS AND ALEXANDER YONG A BSTRACT. We present combinatorial rules (one theorem and two conjectures) concerning three bases of Z[x1 , x2 , ....]. First, we prove

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2015-04-10 22:18:18
43Quantum information science / Cryptographic hash functions / Post-quantum cryptography / McEliece cryptosystem / Quantum key distribution / NIST hash function competition / Quantum computer / Advanced Encryption Standard / Symmetric-key algorithm / Cryptography / Quantum cryptography / Public-key cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
44Group action / Group theory / Symmetry / Equivalence relation / Camera lens / Surjective function / Function / Mathematics / Mathematical analysis / Functions and mappings

Symmetric Lenses (Full version) Martin Hofmann Benjamin Pierce

Add to Reading List

Source URL: dmwit.com

Language: English - Date: 2010-08-11 18:17:21
45Symmetric functions / Algebraic geometry / Invariant theory / Algebraic combinatorics / Representation theory / Schur polynomial / Littlewood–Richardson rule / Grassmannian / Determinantal variety / Abstract algebra / Algebra / Mathematics

Commutative Algebra and Algebraic Geometry Seminar Organizer: D. Eisenbud Tuesday, 3:45–6:00pm, 939 Evans Apr. 6

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2008-08-21 11:47:25
46Symmetric functions / Representation theory / Algebraic combinatorics / Measure theory / Littlewood–Richardson rule / Young tableau / Symbol / Grassmannian / Support / Abstract algebra / Algebra / Mathematics

Discrete Mathematics and Theoretical Computer Science DMTCS vol. (subm.), by the authors, 1–1 Genomic Tableaux and Combinatorial K-Theory

Add to Reading List

Source URL: www.math.uiuc.edu

Language: English - Date: 2015-04-14 09:40:42
47Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
48Power analysis / Cryptographic hash functions / Timing attack / Symmetric-key algorithm / Hamming weight / Triple DES / Crypt / RSA / VEST / Cryptography / Data Encryption Standard / Public-key cryptography

Di erential Power Analysis Paul Kocher, Joshua Ja e, and Benjamin Jun Cryptography Research, Inc. 607 Market Street, 5th Floor San Francisco, CA 94105, USA. http://www.cryptography.com

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-08-26 17:02:16
49Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
50Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
UPDATE