Explicit bounds for primality testing and related problems
E Bach - Mathematics of Computation, 1990 - ams.org
Many number-theoretic algorithms rely on a result of Ankeny, which states that if the
Extended Riemann Hypothesis (ERH) is true, any nontrivial multiplicative subgroup of the …
Extended Riemann Hypothesis (ERH) is true, any nontrivial multiplicative subgroup of the …
Searching for primitive roots in finite fields
V Shoup - Proceedings of the twenty-second annual ACM …, 1990 - dl.acm.org
Let GF (p) be the finite field with p'~ elements where p is prime. We consider the problem of
how to deterministically generate in polynomial time a subset of GF (pn) that contains a …
how to deterministically generate in polynomial time a subset of GF (pn) that contains a …
Factoring polynomials over finite fields: A survey
J Von Zur Gathen, D Panario - Journal of Symbolic Computation, 2001 - Elsevier
Factoring Polynomials Over Finite Fields: A Survey Page 1 doi:10.1006/jsco.1999.1002
Available online at http://www.idealibrary.com on J. Symbolic Computation (2001) 31, 3–17 …
Available online at http://www.idealibrary.com on J. Symbolic Computation (2001) 31, 3–17 …
On the deterministic complexity of factoring polynomials over finite fields
V Shoup - Information Processing Letters, 1990 - Elsevier
We present a new deterministic algorithm for factoring polynomials over Z p of degree n. We
show that the worst-case running time of our algorithm is O (p 1 2 (log p) 2 n 2+∈), which is …
show that the worst-case running time of our algorithm is O (p 1 2 (log p) 2 n 2+∈), which is …
Open problems in number theoretic complexity, II
LM Adleman, KS McCurley - International Algorithmic Number Theory …, 1994 - Springer
This conference (ANTS-I) marks the beginning of what we hope will be a long series of
international conferences on algorithmic number theory. It seems appropropriate, at the …
international conferences on algorithmic number theory. It seems appropropriate, at the …
[HTML][HTML] Permutation group approach to association schemes
S Evdokimov, I Ponomarenko - European Journal of Combinatorics, 2009 - Elsevier
We survey the modern theory of schemes (coherent configurations). The main attention is
paid to the schurity problem and the separability problem. Several applications of schemes …
paid to the schurity problem and the separability problem. Several applications of schemes …
[PDF][PDF] Number theoretic algorithms
E Bach - 1989 - minds.wisconsin.edu
This paper is a report on algorithms to solve problems in number theory. I believe the most
interesting such problems to be those from elementary number theory whose complexity is …
interesting such problems to be those from elementary number theory whose complexity is …
A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.
S Dey, R Ghosh - Cryptology ePrint Archive, 2018 - eprint.iacr.org
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …
permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of …
Factorization of polynomials over finite fields in subexponential time under GRH
S Evdokimov - … Number Theory: First International Symposium, ANTS-I …, 1994 - Springer
We show assuming the Generalized Riemann Hypothethis that the factorization of a one-
variable polynomial of degree n over an explicitly given finite field of cardinality q can be …
variable polynomial of degree n over an explicitly given finite field of cardinality q can be …
Simple algebras are difficult
L Rónyai - Proceedings of the nineteenth annual ACM symposium …, 1987 - dl.acm.org
Let F be a finite field or an algebraic number field. In previous work we have shown how to
find the basic building blocks (the radical and the simple components) of a finite dimensional …
find the basic building blocks (the radical and the simple components) of a finite dimensional …