• Title/Summary/Keyword: Scalar

Search Result 1,039, Processing Time 0.025 seconds

SCALAR CURVATURE DECREASE FROM A HYPERBOLIC METRIC

  • Kang, Yutae;Kim, Jongsu
    • The Pure and Applied Mathematics
    • /
    • v.20 no.4
    • /
    • pp.269-276
    • /
    • 2013
  • We find an explicit $C^{\infty}$-continuous path of Riemannian metrics $g_t$ on the 4-d hyperbolic space $\mathbb{H}^4$, for $0{\leq}t{\leq}{\varepsilon}$ for some number ${\varepsilon}$ > 0 with the following property: $g_0$ is the hyperbolic metric on $\mathbb{H}^4$, the scalar curvatures of $g_t$ are strictly decreasing in t in an open ball and $g_t$ is isometric to the hyperbolic metric in the complement of the ball.

Scalar Fourier Modal Method for Wave-optic Optical-element Modeling

  • Kim, Soobin;Hahn, Joonku;Kim, Hwi
    • Current Optics and Photonics
    • /
    • v.5 no.5
    • /
    • pp.491-499
    • /
    • 2021
  • A scalar Fourier modal method for the numerical analysis of the scalar wave equation in inhomogeneous space with an arbitrary permittivity profile, is proposed as a novel theoretical embodiment of Fourier optics. The modeling of devices and systems using conventional Fourier optics is based on the thin-element approximation, but this approach becomes less accurate with high numerical aperture or thick optical elements. The proposed scalar Fourier modal method describes the wave optical characteristics of optical structures in terms of the generalized transmittance function, which can readily overcome a current limitation of Fourier optics.

ON CONFORMALLY FLAT POLYNOMIAL (α, β)-METRICS WITH WEAKLY ISOTROPIC SCALAR CURVATURE

  • Chen, Bin;Xia, KaiWen
    • Journal of the Korean Mathematical Society
    • /
    • v.56 no.2
    • /
    • pp.329-352
    • /
    • 2019
  • In this paper, we study conformally flat (${\alpha}$, ${\beta}$)-metrics in the form $F={\alpha}(1+{\sum_{j=1}^{m}}\;a_j({\frac{\beta}{\alpha}})^j)$ with $m{\geq}2$, where ${\alpha}$ is a Riemannian metric and ${\beta}$ is a 1-form on a smooth manifold M. We prove that if such conformally flat (${\alpha}$, ${\beta}$)-metric F is of weakly isotropic scalar curvature, then it must has zero scalar curvature. Moreover, if $a_{m-1}a_m{\neq}0$, then such metric is either locally Minkowskian or Riemannian.

Utilizing Point Quadruple Scalar Operation in Elliptic Curve Cryptosystem

  • Cho, Sung-Jin;Kim, Seok-Tae;Kim, Han-Doo;Choi, Un-Sook;Heo, Seong-Hun;Hwang, Yoon-Hee;Lee, Sung-Ga
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05a
    • /
    • pp.49-52
    • /
    • 2004
  • Scalar multiplication is the back-bone operation in the elliptic curve cryptosystem. Quad-and-add algorithm replaced the traditional double-and-add algorithm to compute the scalar multiplication. In this paper, we introduce the method of utilizing the point quadruple scalar operation in the elliptic curve cryptosystem. Induced expressions were applied to real cryptosystem and proven at C language level. Point quadruple operation can be utilized to fast and efficient computation in the elliptic curve cryptosystem.

  • PDF

A Numerical Study for the Scalar Dissipation Rate and the Flame Curvature with Flame Propagation Velocity in a Lifted Flame (부상화염에서 화염전파속도에 따른 스칼라소산율과 곡률반경에 대한 수치적 연구)

  • Ha, Ji-Soo;Kim, Tae-Kwon;Park, Jeong;Kim, Kyung-Ho
    • Journal of the Korean Institute of Gas
    • /
    • v.14 no.3
    • /
    • pp.46-52
    • /
    • 2010
  • Flame propagation velocity is the one of the main mechanism of the stabilization of triple flame. To quantity the triple flame propagation velocity, Bilger presents the triple flame propagation velocity, depending on the mixture fraction gradient, based on the laminar jet flow theory. However, in spite of these many analyses, there has not been any attempt to quantify the triple flame propagation velocity with the flame radius of curvature and scalar dissipation rate. In the present research, there was discussion about the radius of flame curvature and scalar dissipation rate, through the numerical study. As a result, we have known that the flame propagation velocity was linear with the nozzle exit velocity and scalar dissipation rate decreases nonlinearly with the flame propagation velocity and radius of curvature of flame increases linearly. Also radius of curvature of flame decreases non-linearly with the scalar dissipation rate. Therefore, we ascertained that there was corelation among the scalar dissipation rate, radius of flame curvature and flame propagation velocity.

A New Scalar Recoding Method against Side Channel Attacks (부채널 공격에 대응하는 새로운 스칼라 레코딩 방법)

  • Ryu, Hyo Myoung;Cho, Sung Min;Kim, TaeWon;Kim, Chang han;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.587-601
    • /
    • 2016
  • In this paper we suggest method for scalar recoding which is both secure against SPA and DPA. Suggested method is countermeasure to power analysis attack through scalar recoding using negative expression. Suggested method ensures safety of SPA by recoding the operation to apply same pattern to each digit. Also, by generating the random recoding output according to random number, safety of DPA is ensured. We also implement precomputation table and modified scalar addition algorithm for addition to protect against SPA that targets digit's sign. Since suggested method itself can ensure safety to both SPA and DPA, it is more effective and efficient. Through suggested method, compared to previous scalar recoding that ensures safety to SPA and DPA, operation efficiency is increased by 11%.

A Combined Random Scalar Multiplication Algorithm Resistant to Power Analysis on Elliptic Curves (전력분석 공격에 대응하는 타원곡선 상의 결합 난수 스칼라 곱셈 알고리즘)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.25-29
    • /
    • 2020
  • The elliptic curve crypto-algorithm is widely used in authentication for IoT environment, since it has small key size and low communication overhead compare to the RSA public key algorithm. If the scalar multiplication, a core operation of the elliptic curve crypto-algorithm, is not implemented securely, attackers can find the secret key to use simple power analysis or differential power analysis. In this paper, an elliptic curve scalar multiplication algorithm using a randomized scalar and an elliptic curve point blinding is suggested. It is resistant to power analysis but does not significantly reduce efficiency. Given a random r and an elliptic curve random point R, the elliptic scalar multiplication kP = u(P+R)-vR is calculated by using the regular variant Shamir's double ladder algorithm, where l+20-bit u≡rn+k(modn) and v≡rn-k(modn) using 2lP=∓cP for the case of the order n=2l±c.