[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
Covering arrays and hash families
CJ Colbourn - Information security, coding theory and related …, 2011 - ebooks.iospress.nl
The explicit construction of covering arrays arises in many disparate applications in which
factors or components interact. Despite this, current computational tools are effective only …
factors or components interact. Despite this, current computational tools are effective only …
Linear time constructions of some-restriction problems
NH Bshouty - International Conference on Algorithms and …, 2015 - Springer
Linear Time Constructions of Some d-Restriction Problems Page 1 Linear Time Constructions of
Some d-Restriction Problems Nader H. Bshouty(B) Technion, Haifa, Israel …
Some d-Restriction Problems Nader H. Bshouty(B) Technion, Haifa, Israel …
Perfect hash families: the generalization to higher indices
RE Dougherty, CJ Colbourn - Discrete mathematics and applications, 2020 - Springer
Perfect hash families are often represented as combinatorial arrays encoding partitions of k
items into v classes, so that every t or fewer of the items are completely separated by at least …
items into v classes, so that every t or fewer of the items are completely separated by at least …
Improving two recursive constructions for covering arrays
CJ Colbourn, J Zhou - Journal of Statistical Theory and Practice, 2012 - Springer
Recursive constructions for covering arrays employ small ingredient covering arrays to build
large ones. At present the most effective methods are 'cut-and-paste'(or Roux-type) and …
large ones. At present the most effective methods are 'cut-and-paste'(or Roux-type) and …
[图书][B] Hash families and applications to t-restrictions
R Dougherty - 2019 - search.proquest.com
The construction of many families of combinatorial objects remains a challenging problem. A
t-restriction is an array where a predicate is satisfied for every t columns; an example is a …
t-restriction is an array where a predicate is satisfied for every t columns; an example is a …
Linear hash families and forbidden configurations
CJ Colbourn, ACH Ling - Designs, Codes and Cryptography, 2009 - Springer
The classical orthogonal arrays over the finite field underlie a powerful construction of
perfect hash families. By forbidding certain sets of configurations from arising in these …
perfect hash families. By forbidding certain sets of configurations from arising in these …
[PDF][PDF] Perfect hash families from transversal designs
In this paper, we investigate some interesting connections between transversal designs and
perfect hash families. We introduce a class of transversal designs which can be used to …
perfect hash families. We introduce a class of transversal designs which can be used to …
A sequence approach to linear perfect hash families
SG Barwick, WA Jackson - Designs, Codes and Cryptography, 2007 - Springer
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of
order q consists of a set S={\phi_1, ...,\phi_s\} of linear functionals from V to F with the …
order q consists of a set S={\phi_1, ...,\phi_s\} of linear functionals from V to F with the …
A sequence approach to constructing perfect hash families
SG Barwick, WA Jackson - Cryptology ePrint Archive, 2005 - eprint.iacr.org
Abstract A linear $(q^ d, q, t) $-perfect hash family of size $ s $ in a vector space $ V $ of
order $ q^ d $ over a field $ F $ of order $ q $ consists of a set $\phi_1,\ldots,\phi_s $ of …
order $ q^ d $ over a field $ F $ of order $ q $ consists of a set $\phi_1,\ldots,\phi_s $ of …