For the group of endo-permutation modules of a finite p-group, there is a surjective reduction homomorphism from a complete discrete valuation ring of characteristic 0 to its residue field of characteristic p. We prove that this reduction map always has a ...
In the first part of this paper, we propose a uniform interpretation of characteristic classes as obstructions to the reduction of the structure group and to the existence of an equivariant extension of a certain homomorphism defined a priori only on a sin ...
A multifiltration is a functor indexed by Nr that maps any morphism to a monomorphism. The goal of this paper is to describe in an explicit and combinatorial way the natural Nr-graded R[x(1),...x(r)]-module structure on the homology of a multifiltration of ...
Synthesis from examples enables non-expert users to generate programs by specifying examples of their behavior. A domain-specific form of such synthesis has been recently deployed in a widely used spreadsheet software product. In this paper we contribute t ...
A Hausdorff topological semiring is called simple if every non-zero continuous homomorphism into another Hausdorff topological semiring is injective. Classical work by Anzai and Kaplansky implies that any simple compact ring is finite. We generalize this r ...
Morphing commonly refers to the smooth transition from a specific shape into another one, in which the initial and final shapes can be significantly different. In this study, we show that the concept of morphing applied to laser micro-manufacturing offers ...
Holant is a framework of counting characterized by local constraints. It is closely related to other well-studied frameworks such as the counting constraint satisfaction problem (#CSP) and graph homomorphism. An effective dichotomy for such frameworks can ...
We prove existence results à la Jeff Smith for left-induced model category structures, of which the injective model structure on a diagram category is an important example. We further develop the notions of fibrant generation and Postnikov presentation fro ...
We prove that the category of systems of sesquilinear forms over a given hermitian category is equivalent to the category of unimodular 1-hermitian forms over another hermitian category. The sesquilinear forms are not required to be unimodular or defined o ...
We study classes of modules over a commutative ring which allow to do homological algebra relative to such a class. We classify those classes consisting of injective modules by certain subsets of ideals. When the ring is Noetherian the subsets are precisel ...
This paper is devoted to the design and analysis of short undeniable signatures based on a random oracle. Exploiting their online property, we can achieve signatures with a fully scalable size depending on the security level. To this end, we develop a gene ...
We describe a family of decision procedures that extend the decision procedure for quantifier-free constraints on recursive algebraic data types (term algebras) to support recursive abstraction functions. Our abstraction functions are catamorphisms (term a ...
Let k be a field of characteristic /=2 and let W(k) be the Witt ring of k and L a finite extension of k. If L/k is a Galois extension, then the image of rL/k is contained in W(L)Gal(L/k) where rL/k:W(k)→W(L) is the canonical ring homomorphism. Rosenberg an ...
The aim of the invention is to propose the generation, verification and denial of an undeniable signature which has a size smaller than the currently available undeniable signatures, i.e. less than 80 bits. This aim is achieved by the method to generate an ...
Let 1 < p < infinity, let G and H be locally compact groups and let c) be a continuous homomorphism of G into H. We prove, if G is amenable, the existence of a linear contraction of the Banach algebra CVp (G) of the p-convolution operators on G into CVp (H ...
Digital signatures are one of the main achievements of public-key cryptography and constitute a fundamental tool to ensure data authentication. Although their universal verifiability has the advantage to facilitate their verification by the recipient, this ...
This article presents optimization results on the MOVA undeniable signature scheme presented last year by Monnerat and Vaudenay at PKC'04 as well as its generalization proposed at Asiacrypt'04 which is based on a secret group homomorphism. The original MOV ...