In block ciphers, the nonlinear components, also known as sub- stitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves …
La violencia es un flagelo social que campea por todos los escenarios y se requieren esfuerzos multilaterales y variadas estrategias para combatirla. El objetivo de este trabajo investigativo fue aplicar una estrategia de juegos cooperativos para …
In this paper, we apply the method given in the paper “Zero relaxation time limits to a hydrodynamic model of two carrier types for semiconductors” (Mathematische Annalen, 2022, 382: 1031–1046) to study the Cauchy problem for a one dimensional …
En este trabajo investigativo, se analiza la relación entre el clima organizacional y el desempeño laboral del personal que participa en las prácticas empresariales LAEMCO de la Facultad de Ciencias Administrativas y Económicas de la Universidad …
Coding theory is the study of the properties of codes and their respective fitness for specific applications. Codes are used for data compression, cryptography, error detection, error correction, data transmission, and data storage. Codes are studied …
Cayley hash values are defined by paths of some oriented graphs (quivers) called Cayley graphs, whose vertices and arrows are given by elements of a group $\mathfrak{H}$. On the other hand, Brauer messages are obtained by concatenating words …
Snake graphs are connected planar graphs consisting of a finite sequence of adjacent tiles (squares) $T_1, T_2, \ldots,T_n$. In this case, for $1 \leq j \leq n-1$ , two consecutive tiles $T_j$ and $T_{j+1}$ share exactly one edge, either the edge at …
In this paper, we show the local well-posedness for the Cauchy problem for the equation of the Nagumo type in this equation (1) in the Sobolev spaces $H^s(\mathbb{R})$ . If $D0$, the local well-posedness is given for $s 1/2$ and for $s 3/2$ if …
There are several techniques in the classical case for some integro-differential equations involving the concept of entropy to show some properties of the solution. In this work, we deal with the $p$-adic scattering equation. We adapt these methods …
We establish necessary or sufficient conditions to guarantee that skew Poincaré–Birkhoff–Witt extensions are NI or NJ rings. Our results extend those corresponding for skew polynomial rings and establish similar properties for other families of …