相关期刊:《The Journal of China Universities of Posts and Telecommunications》《Algebra Colloquium》《Journal of Donghua University(English Edition)》《Chinese Journal of Electronics》更多>>
supported by the National Natural Science Foundation of China(22133006,21703287);the Natural Science Foundation of Shandong Province(ZR2023QB067,ZR2022MB065);the Science and Technology Program of the University of Jinan(XKY2068-140200568);Major Subject of the University of Jinan(1420702).
The enhancement in the efficiency of triplet-triplet annihilation upconversion(TTA-UC)is mainly determined by the triplet energy transfer(TET)and triplet-triplet annihilation(TTA)between the sensitizers and annihilato...
The NSF(11471108) of China;the NSF(2015JJ2051,2016JJ2050) of Hunan Province;the Teaching Reform Foundation(G21316) of Hunan Province
A unitary right R-module MR satisfies acc on d-annihilators if for every sequence(a;);of elements of R the ascending chain AnnM(a;)■ AnnM(a;a;)■AnnM(a;a;a;)■… of submodules of MR stabilizes. In this paper ...
In this paper we study some properties of the Hurwitz series ring HA over a commutative ring A, such as the nilradical of HA and the chain condition on its an- nihilators. We provide an example showing that the last p...
The human mind understands logical processes and causality and formulates theories based on logical descriptions of empirical evidence. The Principles of Causal Conspiracy is based on defining information as logical c...
This work is supported by the National Natural Science Foundation of China (No.60970134, No.11171323), the IIE's Cryptography Research Project (No.Y2Z0011102), and the Strategic Priority Research Program of the Chinese Academy of Sciences (No.XDA06010701).
Algebraic attacks on stream ciphers exploit annihilators of low degree. From another point of view, we concentrate on annihilators in fewer variables in this paper. This work consists of two parts. Firstly, the concep...
supported by the National Natural Science Foundation of China (61102093, 61170270, 61121061);The Fundamental Research for the Central Universities (BUPT 2012RC0710)
Algebraic immunity is an important cryptographic property of Boolean functions. In this paper, odd-variable balanced Boolean functions with optimal algebraic immunity are obtained by m-sequence and consequently, we ge...
supported by National Natural Science Foundation of China (Grant Nos. 611702070, 61121061,61102093);Fundamental Research for the Central Universities (Grant No. BUPT 2012RC0710)
In this paper, we show a construction of multi-output Boolean functions with optimal algebraic immunity. And, the relationship between the algebraic immunity of a multi-output Boolean function and those of its compone...
supported by the National Natural Science Foundation of China (Grant No. 90604034)
Boolean functions used in stream ciphers against algebraic attacks are required to have a necessary cryptographic property-high algebraic immunity (AI). In this paper, Boolean functions of even variables with the maxi...
Foundation item: the National Natural Science Foundation of China (No. 10671122).
In this paper,we give the equivalent characterizations of principally quasi-Baer modules,and show that any direct summand of a principally quasi-Baer module inherits the property and any finite direct sum of mutually ...
Supported by the National Natural Science Foundations of P.R.China(No.60474022)
In this paper, the concept of α-subsets is introduced in a lattice implication algebra and some properties are discussed. Then we prove that an α-subset is a lattice ideal of L. In the end, we discuss the properties...