Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = Legendre symbol

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 296 KiB  
Article
Boundedness of Variance Functions of Natural Exponential Families with Unbounded Support
by Shaul K. Bar-Lev
Mathematics 2025, 13(13), 2045; https://doi.org/10.3390/math13132045 - 20 Jun 2025
Viewed by 196
Abstract
The variance function (VF) is central to natural exponential family (NEF) theory. Prompted by an online query about whether, beyond the classical normal NEF, other real-line NEFs with bounded VFs exist, we establish three complementary sets of sufficient conditions that yield many such [...] Read more.
The variance function (VF) is central to natural exponential family (NEF) theory. Prompted by an online query about whether, beyond the classical normal NEF, other real-line NEFs with bounded VFs exist, we establish three complementary sets of sufficient conditions that yield many such families. One set imposes a polynomial-growth bound on the NEF’s generating measure, ensuring rapid tail decay and a uniformly bounded VF. A second set relies on the Legendre duality, requiring a uniform positive lower bound on the second derivative of the generating function, which likewise ensures a bounded VF. The third set starts from the standard normal distribution and constructs an explicit sequence of NEFs whose Laplace transforms and VFs remain bounded. Collectively, these results reveal a remarkably broad class of NEFs whose Laplace transforms are not expressible in elementary form (apart from those stemming from the standard normal case), yet can be handled easily using modern symbolic and numerical software. Worked examples show that NEFs with bounded VFs are far more varied than previously recognized, offering practical alternatives to the normal and other classical models for real-data analysis across many fields. Full article
(This article belongs to the Section D1: Probability and Statistics)
Show Figures

Figure 1

19 pages, 805 KiB  
Article
Algebraic Attacks against Grendel: An Arithmetization-Oriented Primitive with the Legendre Symbol
by Jianqiang Ni, Jianhui Zhang, Gaoli Wang, Rui Li and Yanzhao Shen
Symmetry 2023, 15(8), 1563; https://doi.org/10.3390/sym15081563 - 10 Aug 2023
Cited by 1 | Viewed by 1690
Abstract
The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric primitives. Unlike traditional platforms such as servers, microcontrollers, and desktop computers, these primitives are designed to be [...] Read more.
The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric primitives. Unlike traditional platforms such as servers, microcontrollers, and desktop computers, these primitives are designed to be implemented in arithmetical circuits. In terms of security evaluation, arithmetization-oriented primitives are more complex compared to traditional symmetric cryptographic primitives. The arithmetization-oriented permutation Grendel employs the Legendre Symbol to increase the growth of algebraic degrees in its nonlinear layer. To analyze the security of Grendel thoroughly, it is crucial to investigate its resilience against algebraic attacks. This paper presents a preimage attack on the sponge hash function instantiated with the complete rounds of the Grendel permutation, employing algebraic methods. A technique is introduced that enables the elimination of two complete rounds of substitution permutation networks (SPN) in the sponge hash function without significant additional cost. This method can be combined with univariate root-finding techniques and Gröbner basis attacks to break the number of rounds claimed by the designers. By employing this strategy, our attack achieves a gain of two additional rounds compared to the previous state-of-the-art attack. With no compromise to its security margin, this approach deepens our understanding of the design and analysis of such cryptographic primitives. Full article
(This article belongs to the Special Issue New Advances in Symmetric Cryptography)
Show Figures

Figure 1

14 pages, 250 KiB  
Article
On Certain Sum Involving Quadratic Residue
by Kai An Sim and Kok Bin Wong
Mathematics 2022, 10(12), 1981; https://doi.org/10.3390/math10121981 - 8 Jun 2022
Cited by 1 | Viewed by 1337
Abstract
Let p be a prime and Fp be the set of integers modulo p. Let χp be a function defined on Fp such that χp(0)=0 and for [...] Read more.
Let p be a prime and Fp be the set of integers modulo p. Let χp be a function defined on Fp such that χp(0)=0 and for aFp\{0}, set χp(a)=1 if a is a quadratic residue modulo p and χp(a)=1 if a is a quadratic non-residue modulo p. Note that χp(a)=ap is indeed the Legendre symbol. The image of χp in the set of real numbers. In this paper, we consider the following sum xFpχp((xa1)(xa2)(xat)) where a1,a2,,at are distinct elements in Fp. Full article
17 pages, 321 KiB  
Article
On Generalized Lucas Pseudoprimality of Level k
by Dorin Andrica and Ovidiu Bagdasar
Mathematics 2021, 9(8), 838; https://doi.org/10.3390/math9080838 - 12 Apr 2021
Cited by 4 | Viewed by 2460
Abstract
We investigate the Fibonacci pseudoprimes of level k, and we disprove a statement concerning the relationship between the sets of different levels, and also discuss a counterpart of this result for the Lucas pseudoprimes of level k. We then use some [...] Read more.
We investigate the Fibonacci pseudoprimes of level k, and we disprove a statement concerning the relationship between the sets of different levels, and also discuss a counterpart of this result for the Lucas pseudoprimes of level k. We then use some recent arithmetic properties of the generalized Lucas, and generalized Pell–Lucas sequences, to define some new types of pseudoprimes of levels k+ and k and parameter a. For these novel pseudoprime sequences we investigate some basic properties and calculate numerous associated integer sequences which we have added to the Online Encyclopedia of Integer Sequences. Full article
8 pages, 737 KiB  
Article
The Quadratic Residues and Some of Their New Distribution Properties
by Tingting Wang and Xingxing Lv
Symmetry 2020, 12(3), 421; https://doi.org/10.3390/sym12030421 - 5 Mar 2020
Cited by 9 | Viewed by 3466
Abstract
In this paper, we give some interesting identities and asymptotic formulas for one kind of counting function, by studying the computational problems involving the symmetry sums of one kind quadratic residues and quadratic non-residues mod   p . The main methods we used [...] Read more.
In this paper, we give some interesting identities and asymptotic formulas for one kind of counting function, by studying the computational problems involving the symmetry sums of one kind quadratic residues and quadratic non-residues mod   p . The main methods we used are the properties of the Legendre’s symbol mod   p , and the estimate for character sums. As application, we solve two open problems proposed by Zhiwei Sun. Full article
Back to TopTop