-
arXiv:2209.05595 [pdf, ps, other]
On the classification of 2-solvable Frobenius Lie algebras
Abstract: We discuss the classification of 2-solvable Frobenius Lie algebras. We prove that every 2-solvable Frobenius Lie algebra splits as a semidirect sum of an n-dimensional vector space V and an n-dimensional maximal Abelian subalgebra (MASA) of the full space of endomorphisms of V. We supply a complete classification of 2-solvable Frobenius Lie algebras corresponding to nonderogatory endomorphisms, as… ▽ More
Submitted 16 July, 2023; v1 submitted 12 September, 2022; originally announced September 2022.
Comments: V3: 26 pages, Latex. A few misprints corrected. To appear at Journal of Lie Theory
MSC Class: 17B05; 17B08; 15A27; 53A15; 53D15; 22E60; 17B60; 70G45; 16W25; 13B25
Journal ref: Journal of Lie Theory 33 (2023), No. 3, 799-830
-
arXiv:2002.08737 [pdf, ps, other]
On systems of commuting matrices, Frobenius Lie algebras and Gerstenhaber's Theorem
Abstract: This work relates to three problems, the classification of maximal Abelian subalgebras (MASAs) of the Lie algebra of square matrices, the classification of 2-step solvable Frobenius Lie algebras and the Gerstenhaber's Theorem. Let M and N be two commuting square matrices of order n with entries in an algebraically closed field K. Then the associative commutative K-algebra, they generate, is of dim… ▽ More
Submitted 29 July, 2021; v1 submitted 18 February, 2020; originally announced February 2020.
Comments: This new version V2, 37 pages in Latex, contains substantial deep changes compared to version 1 which was only 12 pages. In particular, the present version includes deep discussions on the classification of 2-step solvable Frobenius Lie algebras and maximal Abelian subalgebras of sl(n,K)
MSC Class: 15A27; 15B48; 47B47; 17B05; 17B08; 22E60; 15A30; 15A03; 17B30; 15A27; 17B60; 22E60; 15A30; 15A03; 70G45; 16W25; 13B25; 53A15
-
A Lightweight Identification Protocol for Embedded Devices
Abstract: The task of this paper is to introduce a new lightweight identification protocol based on biometric data and elliptic curves. In fact, we combine biometric data and asymetric cryptography, namely elliptic curves and standard tools to design a multifactor identification protocol. Our scheme is light, very fast, secure and robust against all the known attacks on identification protocol. Therefore, o… ▽ More
Submitted 30 August, 2014; v1 submitted 25 August, 2014; originally announced August 2014.