期刊文献+

矩阵的迹在密码中的应用(英文) 被引量:1

The application of cipher to the matrix traces
在线阅读 下载PDF
导出
摘要 ①Tr(Aα.Bβ)≤Tr(αA+βB)②Tr(∏nj=1Ajqj)≤Tr(∑nj=1qjAj)③Tr(∏nj=1Aqj)≤J(a,q,p)≤Tr(∑nj=1qjAj)④⑤Tr{∏nj=1Ajqj}≤J(a,q,p)≤J(a,q,p,λ,l)≤Tr(∑nj=1qjAj)⑤Tr(∏nj=1Aqj)≤J(a,q,p)≤J(a,q,p,λ,l)<J(a,q,p,λ,l2)<......J(a,q,p,λ,lm)≤Tr(∑nj=1qjAj) R. Bellman gets (a) or (b) in [ 1 ].(a) 2Tr(AB) ≤Tr(A^2) +Tr(B^2), (b) Tr(AB)≤{Tr(A^2)}^1/2+·{Tr(B2) }^1/2 This paper has made the results.①Tr(A^α·B^β) ≤Tr(αA +βB)②Tr(Пn,j=1Aj^qj)≤Tr(∑n,j=1qjAj)③Tr(Пn,j=1Aj^qj)≤J(a,q,p)≤Tr(∑n,j=1qjAj)④Tr {Пn,j=1Aj^qj}≤J(a,q,p)≤J(a,q,p,λ,l)≤Tr(∑n,j=1qjAj)⑤Tr(Пn,j=1Aj^qj)≤J(a,q,p)≤J(a,q,p,λ,l1)〈J(a,q,p,λ,l2)〈……〈J(a,q,p,λ,lm)〈…≤Tr(∑n,j=1qjAj)
作者 郝稚传
机构地区 贵州财经学院
出处 《贵州师范大学学报(自然科学版)》 CAS 2006年第1期87-92,共6页 Journal of Guizhou Normal University:Natural Sciences
关键词 不等式 矩阵的迹 随机函数 inequality matrix traces random function
  • 相关文献

参考文献4

  • 1R. Bellman. Some Inequalities for positive Matrices [ J ].Geneal Inequalities 2 ( Beckenbach. E. F. ed) Birkhuser Verlag, 1980 : 89-90.
  • 2Hao Zhichuan. Note on the Inequality of the Arithmetic and Geomentfic Means, Pacific [ J ]. Journal of Mathematics, 1990,143(1) :43-46.
  • 3郝稚传.Generalization and Applications of Holder Inequality[J].Chinese Quarterly Journal of Mathematics,1990,5(4):42-47. 被引量:3
  • 4Hao Zhichuan. Refinement of the Arithmetic - geometric Means Inequality[ J ]. Journal of Mathematical Research & Exposition, 1993,13 ( 1 ) : 10-15.

二级参考文献4

  • 1郝稚传,数学研究与评论,1985年,4期
  • 2谢邦杰,吉林大学自然科学学报,1982年,1期,1页
  • 3谢邦杰,吉林大学自然科学学报,1980年,3期,1页
  • 4谢邦杰,数学学报,1980年,5期,659页

共引文献2

同被引文献11

  • 1尚月强.一种网上求解线性方程组的Guass-Seidel并行迭代算法[J].贵州师范大学学报(自然科学版),2006,24(1):76-80. 被引量:4
  • 2Gordon D M. A Survey of Fast Exponenfiafion Methods [J]. Journal of Algorithms, 1998, 27(1) : 129 - 146.
  • 3Menezes A J, Van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography [M]. Boca Raton: CRC Press, 1996.
  • 4Gathen J, Nocker M. Exponentiation Using Addition Chains for Finite Fields [EB/OL]. [2008 - 3 - 18]. http: //citeseer. nj. nee. com/vonzurgathen00exponentiation.html.
  • 5Koc C. K Analysis of Sliding Window Techniques for Exponentiation [J]. Computers and Mathematics with Applications, 1995, 30(10): 17 - 24.
  • 6Lou D, Chang C. An Adaptive Exponentiation Method [J]. The Journal of Systems and Software, 1998, 42 (1): 59 - 69.
  • 7Dimitrov V. Jullien G Millerw. An Algorithm for Modular Exponentiation[J]. Information Processing Letters, 1998, 66(3) : 155 - 159.
  • 8Brickell E F, Gordon D M, Mccurley K S, et, al. Fast Exponentiation with Precomputation [C]//Advances in Cryptology-Proeeedings of Eurocrypt'92. New York: Springer, 1993: 200- 207.
  • 9Rooij P. De. Efficient Exponentiation Using Precomputation and Vector Addition Chains [C] //Advances in Cryptology- Proceedings of Eurocrypt'94. New York: Springer, 1995:405 -415.
  • 10HANKERSON D,MENEZES A,VANSTONE S.椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部