Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Year Year arrow
arrow-active-down-0
Publisher Publisher arrow
arrow-active-down-1
Journal
1
Journal arrow
arrow-active-down-2
Institution Institution arrow
arrow-active-down-3
Institution Country Institution Country arrow
arrow-active-down-4
Publication Type Publication Type arrow
arrow-active-down-5
Field Of Study Field Of Study arrow
arrow-active-down-6
Topics Topics arrow
arrow-active-down-7
Open Access Open Access arrow
arrow-active-down-8
Language Language arrow
arrow-active-down-9
Filter Icon Filter 1
Export
Sort by: Relevance
  • New
  • Research Article
  • 10.46298/fi.12479
Normal Forms for Elements of ${}^*$-Continuous Kleene Algebras Representing the Context-Free Languages
  • Jan 14, 2026
  • Fundamenta Informaticae
  • Mark Hopkins + 1 more

Within the tensor product $K \mathop{\otimes_{\cal R}} C_2'$ of any ${}^*$-continuous Kleene algebra $K$ with the polycyclic ${}^*$-continuous Kleene algebra $C_2'$ over two bracket pairs there is a copy of the fixed-point closure of $K$: the centralizer of $C_2'$ in $K \mathop{\otimes_{\cal R}} C_2'$. Using an automata-theoretic representation of elements of $K\mathop{\otimes_{\cal R}} C_2'$ à la Kleene, with the aid of normal form theorems that restrict the occurrences of brackets on paths through the automata, we develop a foundation for a calculus of context-free expressions without variable binders. We also give some results on the bra-ket ${}^*$-continuous Kleene algebra $C_2$, motivate the ``completeness equation'' that distinguishes $C_2$ from $C_2'$, and show that $C_2'$ already validates a relativized form of this equation. final version. 42 pages, 4 figures. References sorted alphabetically

  • New
  • Open Access Icon
  • Research Article
  • 10.46298/fi.12451
Representing Sugihara monoids via weakening relations
  • Jan 11, 2026
  • Fundamenta Informaticae
  • Andrew Craig + 1 more

We show that all Sugihara monoids can be represented as algebras of binary relations, with the monoid operation given by relational composition. Moreover, the binary relations are weakening relations. The first step is to obtain an explicit relational representation of all finite odd Sugihara chains. Our construction mimics that of Maddux (2010), where a relational representation of the finite even Sugihara chains is given. We define the class of representable Sugihara monoids as those which can be represented as reducts of distributive involutive FL-algebras of binary relations. We then show that the class of representable distributive involutive FL-algebras is closed under ultraproducts. This fact is used to demonstrate that the two infinite Sugihara monoids that generate the quasivariety are also representable. From this it follows that all Sugihara monoids are representable. 27 pages, 1 figure

  • New
  • Research Article
  • 10.46298/fi.14425
Unidirectional Key Update in Updatable Encryption, Revisited
  • Jan 11, 2026
  • Fundamenta Informaticae
  • M Jurkiewicz + 1 more

In this paper we construct a new efficient updatable encryption (UE) scheme based on FrodoPKE learning with errors key encapsulation. We analyse the security of the proposed scheme in the backward-leak uni-directional setting within the rand-ind-eu-cpa model. Since the underlying computationally hard problem here is LWE, the scheme is secure against both classical and quantum attacks.

  • New
  • Research Article
  • 10.46298/fi.12364
Relational Algebraic Approach to the Real Numbers: The Least-Upper-Bound Property
  • Jan 11, 2026
  • Fundamenta Informaticae
  • Michael Winter

In this paper we continue the investigation of a real number object, i.e., an object representing the real numbers, in categories of relations. Our axiomatization is based on a relation algebraic version of Tarski's axioms of the real numbers. It was already shown that the addition of such an object forms a dense, linear ordered abelian group. In the current paper we will focus on the least-upper-bound property of such an object.

  • New
  • Research Article
  • 10.46298/fi.14346
Privacy for Quantum Annealing. Attack on Spin Reversal Transformations in the case of cryptanalysis
  • Jan 11, 2026
  • Fundamenta Informaticae
  • Mateusz Leśniak + 1 more

This paper demonstrates that applying spin reversal transformations (SRT), commonly known as a sufficient method for privacy enhancement in problems solved using quantum annealing, does not guarantee privacy for all possible cases. We show how to recover the original problem from the Ising problem obtained using SRT when the resulting problem in Ising form represents the algebraic attack on the $E_0$ stream cipher. A small example illustrates how to retrieve the original problem from that transformed by SRT. Moreover, we show that our method is efficient also for full-scale problems.

  • New
  • Research Article
  • 10.46298/fi.14373
MNT Elliptic Curves with Non-Prime Order
  • Dec 31, 2025
  • Fundamenta Informaticae
  • Maciej Grześkowiak

Miyaji, Nakabayashi, and Takano proposed the algorithm for the construction of prime order pairing-friendly elliptic curves with embedding degrees $k=3,4,6$. We present a method for generating generalized MNT curves. The order of such pairing-friendly curves is the product of two prime numbers.

  • New
  • Research Article
  • 10.46298/fi.12436
A Theory of Conversion Relations for Prefixed Units of Measure
  • Dec 29, 2025
  • Fundamenta Informaticae
  • Baltasar Trancón Y Widemann + 1 more

Units of measure with prefixes and conversion rules are given a formal semantic model in terms of categorial group theory. Basic structures and both natural and contingent semantic operations are defined. Conversion rules are represented as a class of ternary relations with both group-like and category-like properties. A hierarchy of subclasses is explored, each satisfying stronger useful algebraic properties than the preceding, culminating in a direct efficient conversion-by-rewriting algorithm.

  • New
  • Research Article
  • 10.46298/fi.13125
Dialectica Petri Nets
  • Dec 23, 2025
  • Fundamenta Informaticae
  • Elena Di Lavore + 2 more

The categorical modeling of Petri nets has received much attention recently. The Dialectica construction has also had its fair share of attention. We revisit the use of the Dialectica construction as a categorical model for Petri nets generalising the original application to suggest that Petri nets with different kinds of transitions can be modelled in the same categorical framework. Transitions representing truth-values, probabilities, rates or multiplicities, evaluated in different algebraic structures called lineales are useful and are modelled here in the same category. We investigate (categorical instances of) this generalised model and its connections to more recent models of categorical nets. Final version for Fundamenta Informaticae

  • Research Article
  • 10.46298/fi.10201
The geodesic cover problem for butterfly networks
  • Oct 27, 2025
  • Fundamenta Informaticae
  • Paul Manuel + 3 more

A geodesic cover, also known as an isometric path cover, of a graph is a set of geodesics which cover the vertex set of the graph. An edge geodesic cover of a graph is a set of geodesics which cover the edge set of the graph. The geodesic (edge) cover number of a graph is the cardinality of a minimum (edge) geodesic cover. The (edge) geodesic cover problem of a graph is to find the (edge) geodesic cover number of the graph. Surprisingly, only partial solutions for these problems are available for most situations. In this paper we demonstrate that the geodesic cover number of the $r$-dimensional butterfly is $\lceil (2/3)2^r\rceil$ and that its edge geodesic cover number is $2^r$.

  • Research Article
  • 10.46298/fi.13487
A concentration phenomenon for $h$-extra edge-connectivity reliability analysis of enhanced hypercubes $Q_{n,2}$ with exponentially many faulty links
  • Oct 26, 2025
  • Fundamenta Informaticae
  • Yali Sun + 3 more

Reliability assessment of interconnection networks is critical to the design and maintenance of multiprocessor systems. The $(n, k)$-enhanced hypercube $Q_{n,k}$, as a variation of the hypercube $Q_{n}$, was proposed by Tzeng and Wei in 1991. As an extension of traditional edge-connectivity, $h$-extra edge-connectivity of a connected graph $G,$ $λ_h(G),$ is an essential parameter for evaluating the reliability of interconnection networks. This article intends to study the $h$-extra edge-connectivity of the $(n,2)$-enhanced hypercube $Q_{n,2}$. Suppose that the link malfunction of an interconnection network $Q_{n,2}$ does not isolate any subnetwork with no more than $h-1$ processors, the minimum number of these possible faulty links concentrates on a constant $2^{n-1}$ for each integer $\lceil\frac{11\times2^{n-1}}{48}\rceil \leq h \leq 2^{n-1}$ and $n\geq 9$. That is, for about $77.083\%$ of values where $h\leq2^{n-1},$ the corresponding $h$-extra edge-connectivity of $Q_{n,2}$, $λ_h(Q_{n,2})$, presents a concentration phenomenon. Moreover, the lower and upper bounds of $h$ mentioned above are both tight.