Date: Fri, 9 Aug 2024 | Total: 6

Endosplit $p$-permutation resolutions play an instrumental role in verifying Brou\'{e}'s abelian defect group conjecture in numerous cases. In this article, we give a complete classification of endosplit $p$-permutation resolutions and reduce the question of Galois descent of an endosplit $p$-permutation resolution to the Galois descent of the module it resolves. This is shown using techniques from the study of endotrivial complexes, the invertible objects of the bounded homotopy category of $p$-permutation modules. As an application, we show that a refinement of Brou\'{e}'s conjecture proposed by Kessar and Linckelmann holds for all blocks of $p$-solvable groups.

We give a description of finitely generated prosoluble subgroups of the profinite completion of $3$-manifold groups and virtually compact special groups.

This paper is concerned with rational curves on real classical groups. Our contributions are three-fold: (i) We determine the structure of quadratic rational curves on real classical groups. As a consequence, we completely classify quadratic rational curves on $\mathrm{U}_n$, $\mathrm{O}_n(\mathbb{R})$, $\mathrm{O}_{n-1,1}(\mathbb{R})$ and $\mathrm{O}_{n-2,2}(\mathbb{R})$. (ii) We prove a decomposition theorem for rational curves on real classical groups, which can be regarded as a non-commutative generalization of the fundamental theorem of algebra and partial fraction decomposition. (iii) As an application of (i) and (ii), we generalize Kempe's Universality Theorem to rational curves on homogeneous spaces.

In this paper, we propose a novel construction for a symmetric encryption scheme, referred as SEBQ which is based on the structure of quasigroup. We utilize concepts of chaining like mode of operation and present a block cipher with in-built properties. We prove that SEBQ shows resistance against chosen plaintext attack (CPA) and by applying unbalanced Feistel transformation [19], it achieves security against chosen ciphertext attacks (CCA). Subsequently, we conduct an assessment of the randomness of the proposed scheme by running the NIST test suite and we analyze the impact of the initial vector, secret key and plaintext on ciphertext through an avalanche effect analysis. We also compare the results with existing schemes based on quasigroups [11,46]. Moreover, we analyze the computational complexity in terms of number of operations needed for encryption and decryption process.

In this study, it is proven that the universal equivalence of general linear groups (admitting the inverse-transpose automorphism) of orders greater than $2$, over local, not necessarily commutative rings with $1/2$, is equivalent to the coincidence of the orders of the groups and the universal equivalence of the corresponding rings.

Kuz'min (1996) characterized groups having Wirtinger presentations in relation to their second group homology. In this paper, we further refine the relation between these groups and their second group homology.