Consuelo Martínez
University of Oviedo
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Consuelo Martínez.
Memoirs of the American Mathematical Society | 2001
Victor G. Kac; Consuelo Martínez; Efim Zelmanov
Introduction Structure of the even part Cartan type Even part is direct sum of two loop algebras
Proceedings of the National Academy of Sciences of the United States of America | 2003
Consuelo Martínez; Efim Zelmanov
A
Canadian Mathematical Bulletin | 2002
Consuelo Martínez; Efim Zelmanov
is a loop algebra
Designs, Codes and Cryptography | 2005
Jens-Matthias Bohli; Rainer Steinwandt; Maria Isabel Gonzalez Vasco; Consuelo Martínez
J
Transactions of the American Mathematical Society | 1994
Consuelo Martínez
is a finite dimensional Jordan superalgebra or a Jordan superalgebra of a superform The main case Impossible cases Bibliography.
Transactions of the American Mathematical Society | 2009
Consuelo Martínez; Efim Zelmanov
In this article we study Lie superalgebras graded by the root systems P (n) and Q(n).
Journal of Algebra and Its Applications | 2004
Santos González; Consuelo Martínez; Ignacio F. Rúa; V. T. Markov; A. A. Nechaev
Construimos algebras envolventes universales asociativas para varias superalgebras de Jordan.
Communications in Algebra | 1995
Santos González; J.C. Gutiérrez; Consuelo Martínez
The public key cryptosystem MST1 has been introduced by Magliveras et al. [12] (Public Key Cryptosystems from Group Factorizations. Jatra Mountain Mathematical Publications). Its security relies on the hardness of factoring with respect to wild logarithmic signatures. To identify ‘wild-like’ logarithmic signatures, the criterion of being totally-non-transversal has been proposed. We present tame totally-non-transversal logarithmic signatures for the alternating and symmetric groups of degree ≥ 5. Hence, basing a key generation procedure on the assumption that totally-non-transversal logarithmic signatures are ‘wild like’ seems critical. We also discuss the problem of recognizing ‘weak’ totally-non-transversal logarithmic signatures, and demonstrate that another proposed key generation procedure based on permutably transversal logarithmic signatures may produce weak keys.
Transactions of the American Mathematical Society | 2006
Consuelo Martínez; Efim Zelmanov
In this paper we prove that if G is a finitely generated pro-(finite nilpotent) group, then every subgroup Gn , generated by nth powers of elements of G, is closed in G. It is also obtained, as a consequence of the above proof, that if G is a nilpotent group generated by m elements xl, ... , xm, then there is a function f(m, n) such that if every word in x?l of length 1, we denote the subgroups of G generated by all nth powers an, a E G. A. Shalev conjectured that for any n the subgroup Gn is closed in G. This is the same as saying that for arbitrary integers m > 1, n > 1 there exists an integer N = N(m, n) such that in an arbitrary m-generated finite group G every product of nth powers of elements of G can be represented in the form a, **N where ai E G, 1 < i < N. Let us show, for example, that the existence of a function N(m, n) implies that Gn is closed. The subset M = {an . . *aN: al, ... , aN E G} of G is closed as the image of the compact G x ... x G under the continuous map (al, ., aN) -a an ... an Now we can consider the finite nilpotent group G/H, where H is an arbitrary open subgroup of G and so we have GnH = MH, which implies that Gn lies in the closure of M. Hence Gn = M. In this paper we prove Shalevs Conjecture when G is a pro-(finite nilpotent) Received by the editors February 8, 1994. 1991 Mathematics Subject Classification. Primary 20E18; Secondary 20F05. ? 1994 American Mathematical Society 0002-9947/94
Designs, Codes and Cryptography | 2004
Maria Isabel Gonzalez Vasco; Consuelo Martínez; Rainer Steinwandt
1.00 + S.25 per page