[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Factoring polynomials over finite fields: A survey

J Von Zur Gathen, D Panario - Journal of Symbolic Computation, 2001 - Elsevier
Factoring Polynomials Over Finite Fields: A Survey Page 1 doi:10.1006/jsco.1999.1002
Available online at http://www.idealibrary.com on J. Symbolic Computation (2001) 31, 3–17 …

[图书][B] Finite Fields: Theory and Computation: The meeting point of number theory, computer science, coding theory and cryptography

I Shparlinski - 2013 - books.google.com
This book is mainly devoted to some computational and algorithmic problems in finite fields
such as, for example, polynomial factorization, finding irreducible and primitive polynomials …

A summary of McEliece-type cryptosystems and their security

D Engelbert, R Overbeck, A Schmidt - Journal of Mathematical …, 2007 - degruyter.com
In this paper we give an overview of some of the cryptographic applications which were
derived from the proposal of RJ McEliece to use error correcting codes for cryptographic …

Tensor rank: Some lower and upper bounds

B Alexeev, MA Forbes… - 2011 IEEE 26th Annual …, 2011 - ieeexplore.ieee.org
The results of Strassen and Raz show that good enough tensor rank lower bounds have
implications for algebraic circuit/formula lower bounds. We explore tensor rank lower and …

Optimizing Galois Field arithmetic for diverse processor architectures and applications

KM Greenan, EL Miller, TJES SJ - 2008 IEEE International …, 2008 - ieeexplore.ieee.org
Galois field implementations are central to the design of many reliable and secure systems,
with many systems implementing them in software. The two most common Galois field …

Cryptography in subgroups of

J Groth - Theory of Cryptography Conference, 2005 - Springer
We demonstrate the cryptographic usefulness of a small subgroup of Z_n^* of hidden order.
Cryptographic schemes for integer commitment and digital signatures have been suggested …

Full classification of permutation rational functions and complete rational functions of degree three over finite fields

A Ferraguti, G Micheli - Designs, Codes and Cryptography, 2020 - Springer
Let q be a prime power, F _q F q be the finite field of order q and F _q (x) F q (x) be the field
of rational functions over F _q F q. In this paper we classify and count all rational functions φ …

A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.

S Dey, R Ghosh - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …

Efficient software implementations of large finite fields GF(2n) for secure storage applications

J Luo, KD Bowers, A Oprea, L Xu - ACM Transactions on Storage (TOS), 2012 - dl.acm.org
Finite fields are widely used in constructing error-correcting codes and cryptographic
algorithms. In practice, error-correcting codes use small finite fields to achieve high …