Actions of finite groups on self-injective rings

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Background on Groups, Rings, and Finite Fields

A thorough understanding of the Agrawal, Kayal, and Saxena primality test requires some tools from algebra and elementary number theory. We collect here some basic definitions and facts. These notes cannot replace a standard text on algebra, but will hopefully provide enough background to make the beautiful result [1] accessible to a computer scientist. We provide numerous exercises so that the...

متن کامل

Torsionfree Dimension of Modules and Self-injective Dimension of Rings

Let R be a left and right Noetherian ring. We introduce the notion of the torsionfree dimension of finitely generated R-modules. For any n 0, we prove that R is a Gorenstein ring with self-injective dimension at most n if and only if every finitely generated left R-module and every finitely generated right R-module have torsionfree dimension at most n, if and only if every finitely generated le...

متن کامل

On semiperfect rings of injective dimension one

We give a characterization of right Noetherian semiprime semiperfect and semidistributive rings with inj. dimAAA 6 1.

متن کامل

A Note on א0-injective Rings

A ring R is called right א0-injective if every right homomorphism from a countably generated right ideal of R to RR can be extended to a homomorphism from RR to RR. In this note, some characterizations of א0-injective rings are given. It is proved that if R is semiperfect, then R is right א0injective if and only if every homomorphism from a countably generated small right ideal of R to RR can b...

متن کامل

Authentication schemes from actions on graphs, groups, or rings

We propose a couple of general ways of constructing authentication schemes from actions of a semigroup on a set, without exploiting any specific algebraic properties of the set acted upon. Then we give several concrete realizations of this general idea, and in particular, we describe several authentication schemes with long-term private keys where forgery (a.k.a. impersonation) is NP-hard. Comp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Pacific Journal of Mathematics

سال: 1980

ISSN: 0030-8730,0030-8730

DOI: 10.2140/pjm.1980.89.69