[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
Factoring polynomials over finite fields: A survey
J Von Zur Gathen, D Panario - Journal of Symbolic Computation, 2001 - Elsevier
Factoring Polynomials Over Finite Fields: A Survey Page 1 doi:10.1006/jsco.1999.1002
Available online at http://www.idealibrary.com on J. Symbolic Computation (2001) 31, 3–17 …
Available online at http://www.idealibrary.com on J. Symbolic Computation (2001) 31, 3–17 …
[图书][B] Finite Fields: Theory and Computation: The meeting point of number theory, computer science, coding theory and cryptography
I Shparlinski - 2013 - books.google.com
This book is mainly devoted to some computational and algorithmic problems in finite fields
such as, for example, polynomial factorization, finding irreducible and primitive polynomials …
such as, for example, polynomial factorization, finding irreducible and primitive polynomials …
A summary of McEliece-type cryptosystems and their security
D Engelbert, R Overbeck, A Schmidt - Journal of Mathematical …, 2007 - degruyter.com
In this paper we give an overview of some of the cryptographic applications which were
derived from the proposal of RJ McEliece to use error correcting codes for cryptographic …
derived from the proposal of RJ McEliece to use error correcting codes for cryptographic …
Tensor rank: Some lower and upper bounds
B Alexeev, MA Forbes… - 2011 IEEE 26th Annual …, 2011 - ieeexplore.ieee.org
The results of Strassen and Raz show that good enough tensor rank lower bounds have
implications for algebraic circuit/formula lower bounds. We explore tensor rank lower and …
implications for algebraic circuit/formula lower bounds. We explore tensor rank lower and …
Optimizing Galois Field arithmetic for diverse processor architectures and applications
Galois field implementations are central to the design of many reliable and secure systems,
with many systems implementing them in software. The two most common Galois field …
with many systems implementing them in software. The two most common Galois field …
Cryptography in subgroups of
J Groth - Theory of Cryptography Conference, 2005 - Springer
We demonstrate the cryptographic usefulness of a small subgroup of Z_n^* of hidden order.
Cryptographic schemes for integer commitment and digital signatures have been suggested …
Cryptographic schemes for integer commitment and digital signatures have been suggested …
Full classification of permutation rational functions and complete rational functions of degree three over finite fields
A Ferraguti, G Micheli - Designs, Codes and Cryptography, 2020 - Springer
Let q be a prime power, F _q F q be the finite field of order q and F _q (x) F q (x) be the field
of rational functions over F _q F q. In this paper we classify and count all rational functions φ …
of rational functions over F _q F q. In this paper we classify and count all rational functions φ …
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
S Dey, R Ghosh - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …
Efficient software implementations of large finite fields GF(2n) for secure storage applications
Finite fields are widely used in constructing error-correcting codes and cryptographic
algorithms. In practice, error-correcting codes use small finite fields to achieve high …
algorithms. In practice, error-correcting codes use small finite fields to achieve high …