派博傳思國際中心

標(biāo)題: Titlebook: Applications of Finite Fields; Ian F. Blake,XuHong Gao,Tomik Yaghoobian,Alfred J. Book 1993 Springer-Verlag US 1993 algorithms.coding theo [打印本頁]

作者: Ensign    時間: 2025-3-21 19:42
書目名稱Applications of Finite Fields影響因子(影響力)




書目名稱Applications of Finite Fields影響因子(影響力)學(xué)科排名




書目名稱Applications of Finite Fields網(wǎng)絡(luò)公開度




書目名稱Applications of Finite Fields網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Applications of Finite Fields被引頻次




書目名稱Applications of Finite Fields被引頻次學(xué)科排名




書目名稱Applications of Finite Fields年度引用




書目名稱Applications of Finite Fields年度引用學(xué)科排名




書目名稱Applications of Finite Fields讀者反饋




書目名稱Applications of Finite Fields讀者反饋學(xué)科排名





作者: AMOR    時間: 2025-3-21 22:30
Construction of Irreducible Polynomials,metic in extension fields and are found in many applications, including coding theory [5], cryptography [13], computer algebra systems [11], multivariate polynomial factorization [21], and parallel polynomial arithmetic [18].
作者: 閃光東本    時間: 2025-3-22 00:43

作者: Countermand    時間: 2025-3-22 05:40

作者: coltish    時間: 2025-3-22 11:59

作者: ABASH    時間: 2025-3-22 16:27
Reference work 2013Latest editionInterest in normal bases over finite fields stems from both purely mathematical curiosity and practical applications. The practical aspects of normal bases will be treated in Chapter 5. In the present chapter, we discuss the theoretical aspects of normal bases over finite fields.
作者: 類似思想    時間: 2025-3-22 19:27

作者: Muscularis    時間: 2025-3-22 22:38
Normal Bases,Interest in normal bases over finite fields stems from both purely mathematical curiosity and practical applications. The practical aspects of normal bases will be treated in Chapter 5. In the present chapter, we discuss the theoretical aspects of normal bases over finite fields.
作者: 聯(lián)合    時間: 2025-3-23 02:48

作者: Ige326    時間: 2025-3-23 07:49
Affiliated Values Bidding Modeln is on the existence of certain types of bases, their duals and their enumeration. There has been considerable activity in this area in the past decade and while many of the questions are resolved, a few of the important ones remain open. The presentation here tries to complement that of Lidl and N
作者: 官僚統(tǒng)治    時間: 2025-3-23 10:28
Reference work 2013Latest edition . and . . ≠ 0. To be more precise, . (.) is called a . to distinguish the more general situation where more indeterminates are involved. Most of this chapter will deal with univariate polynomials but the multivariate case will be briefly mentioned at the end.
作者: 思想    時間: 2025-3-23 16:04
Affiliated Values Bidding Modelmetic in extension fields and are found in many applications, including coding theory [5], cryptography [13], computer algebra systems [11], multivariate polynomial factorization [21], and parallel polynomial arithmetic [18].
作者: Heart-Rate    時間: 2025-3-23 18:52

作者: Insulin    時間: 2025-3-24 00:34

作者: allergy    時間: 2025-3-24 04:29
Affiliated Values Bidding Modellogarithms of elements in G is infeasible. We may take . to be a cyclic subgroup of .(..), the group of ..-rational points of an elliptic curve defined over ..; this was first suggested by N. Koblitz [10] and V. Miller [17]. Since the addition in this group is relatively simple, and moreover the dis
作者: Cumulus    時間: 2025-3-24 09:21

作者: anagen    時間: 2025-3-24 13:23

作者: dagger    時間: 2025-3-24 16:24
The Springer International Series in Engineering and Computer Sciencehttp://image.papertrans.cn/a/image/159429.jpg
作者: 偏狂癥    時間: 2025-3-24 21:00

作者: carbohydrate    時間: 2025-3-25 00:29
Reference work 2013Latest edition . and . . ≠ 0. To be more precise, . (.) is called a . to distinguish the more general situation where more indeterminates are involved. Most of this chapter will deal with univariate polynomials but the multivariate case will be briefly mentioned at the end.
作者: Seizure    時間: 2025-3-25 03:33

作者: 失眠癥    時間: 2025-3-25 09:35
Adjacent (Neighboring) Extreme Pointsfor factoring integers [8, 9], for primality proving [2, 11, 12] and for the construction of pseudorAndom bit generators [4]. In Chapter 8 we study how elliptic curves can be used in constructing efficient and secure cryptosystems, while in Chapter 10 we will discuss how good error-correcting codes may be obtained by using elliptic curves.
作者: Leaven    時間: 2025-3-25 15:36

作者: Spina-Bifida    時間: 2025-3-25 17:52
Optimal Normal Bases,xample, see [12]). The complexity of the hardware design of such multiplication schemes is heavily dependent on the choice of the normal bases used. Hence it is essential to find normal bases of low complexity.
作者: 不能仁慈    時間: 2025-3-25 22:04

作者: Geyser    時間: 2025-3-26 01:50
https://doi.org/10.1007/978-1-4419-1153-7le the reader to understAnd the algebraic geometric codes. The majority of this chapter is based on the treatment of Fulton [2]. For a more complete treatment of algebraic geometry the reader should consult that reference, or the recent book by Moreno [4]. Some other stAndard textbooks in algebraic geometry are [1, 3, 7, 9].
作者: 山間窄路    時間: 2025-3-26 05:37
Introduction to Algebraic Geometry,le the reader to understAnd the algebraic geometric codes. The majority of this chapter is based on the treatment of Fulton [2]. For a more complete treatment of algebraic geometry the reader should consult that reference, or the recent book by Moreno [4]. Some other stAndard textbooks in algebraic geometry are [1, 3, 7, 9].
作者: ovation    時間: 2025-3-26 08:58

作者: 要控制    時間: 2025-3-26 15:56
Elliptic Curve Cryptosystems,crete logarithm problem in . is believed to be intractable, elliptic curve cryptosystems have the potential to provide security equivalent to that of existing public key schemes, but with shorter key lengths. Having short key lengths is a factor that can be crucial in some applications, for example the design of smart card systems.
作者: Firefly    時間: 2025-3-26 17:20

作者: CRAFT    時間: 2025-3-26 23:09

作者: 展覽    時間: 2025-3-27 04:28
Book 1993Inrecent years we have witnessed a resurgence of interest in finite fields, and this is partly due to important applications in coding theory and cryptography. The purpose of this book is to introduce the reader to some of these recent developments. It should be of interest to a wide range of studen
作者: 泰然自若    時間: 2025-3-27 06:45

作者: Deference    時間: 2025-3-27 10:59
Affiliated Values Bidding Modelcrete logarithm problem in . is believed to be intractable, elliptic curve cryptosystems have the potential to provide security equivalent to that of existing public key schemes, but with shorter key lengths. Having short key lengths is a factor that can be crucial in some applications, for example the design of smart card systems.
作者: byline    時間: 2025-3-27 17:12
Introduction to Finite Fields and Bases,n is on the existence of certain types of bases, their duals and their enumeration. There has been considerable activity in this area in the past decade and while many of the questions are resolved, a few of the important ones remain open. The presentation here tries to complement that of Lidl and N
作者: thrombosis    時間: 2025-3-27 21:40
Factoring Polynomials over Finite Fields, . and . . ≠ 0. To be more precise, . (.) is called a . to distinguish the more general situation where more indeterminates are involved. Most of this chapter will deal with univariate polynomials but the multivariate case will be briefly mentioned at the end.
作者: 易碎    時間: 2025-3-27 22:13

作者: Immunoglobulin    時間: 2025-3-28 02:59
Optimal Normal Bases,in either hardware or software, is required. Work in this area has resulted in several hardware and software designs or implementations [7, 8, 22, 23, 24, 27], including single-chip exponentiators for the fields ., and an encryption processor for . public key cryptography. These products are based o
作者: GONG    時間: 2025-3-28 06:39

作者: exclamation    時間: 2025-3-28 12:50
Elliptic Curve Cryptosystems,logarithms of elements in G is infeasible. We may take . to be a cyclic subgroup of .(..), the group of ..-rational points of an elliptic curve defined over ..; this was first suggested by N. Koblitz [10] and V. Miller [17]. Since the addition in this group is relatively simple, and moreover the dis
作者: Androgen    時間: 2025-3-28 17:36

作者: 易受騙    時間: 2025-3-28 22:47
Codes From Algebraic Geometry,. [17] who showed that the longstAnding Gilbert-Varshamov lower bound can be exceeded for alphabet sizes larger than 49. The Gilbert-Varshamov bound, established in 1952, is a lower bound on the information rate of good codes. This lower bound was not improved until 1982 with the discovery of good a
作者: obsolete    時間: 2025-3-29 01:51

作者: 節(jié)約    時間: 2025-3-29 03:09

作者: nutrients    時間: 2025-3-29 07:50





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
延庆县| 依兰县| 武定县| 彰武县| 如东县| 紫阳县| 西平县| 宁国市| 景德镇市| 绥芬河市| 忻州市| 乌拉特前旗| 盈江县| 迁西县| 旺苍县| 报价| 富锦市| 綦江县| 枞阳县| 三台县| 徐闻县| 拉萨市| 宁强县| 景谷| 祁阳县| 确山县| 闻喜县| 连江县| 马鞍山市| 闻喜县| 杭锦后旗| 太湖县| 古田县| 荣成市| 古蔺县| 沂水县| 从江县| 吉首市| 绥芬河市| 白城市| 乐业县|