JACOBI'S TWO-SQUARE AND FOUR-SQUARE THEOREMS VIA ROGER'S IDENTITY

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quarternions and the Four Square Theorem

The Four Square Theorem was proved by Lagrange in 1770: every positive integer is the sum of at most four squares of positive integers, i.e. n = A2 + B2 + C2 + D2, A, B, C, D ∈ Z An interesting proof is presented here based on Hurwitz integers, a subset of quarternions which act like integers in four dimensions and have the prime divisor property. It is analogous to Fermat’s Two Square Theorem,...

متن کامل

Two-wavelet constants for square integrable representations of G/H

In this paper we introduce two-wavelet constants for square integrable representations of homogeneous spaces. We establish the orthogonality relations fo...

متن کامل

Portent of Heine’s Reciprocal Square Root Identity

Abstract. Precise efforts in theoretical astrophysics are needed to fully understand the mechanisms that govern the structure, stability, dynamics, formation, and evolution of differentially rotating stars. Direct computation of the physical attributes of a star can be facilitated by the use of highly compact azimuthal and separation angle Fourier formulations of the Green’s functions for the l...

متن کامل

Two-stage Kalman Filtering via Structured Square-root

Abstract. This paper considers the problem of estimating an unknown input (bias) by means of the augmented-state Kalman (AKF) filter. To reduce the computational complexity of the AKF, [12] recently developed an optimal two-stage Kalman filter (TS-AKF) that separates the bias estimation from the state estimation, and shows that his new two-stage estimator is equivalent to the standard AKF, but ...

متن کامل

Roots of Square: Cryptanalysis of Double-Layer Square and Square+

Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X as its central map. In addition, it uses embedding to reduce the number of variables in the public key. However, the system was broken at Asiacrypt 2009 using a di erential attack. At PQCrypto 2010 Clough and Ding proposed two n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tamkang Journal of Mathematics

سال: 2021

ISSN: 2073-9826,0049-2930

DOI: 10.5556/j.tkjm.25.1994.4423