• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
THE INTEGERS
THE INTEGERS

the integers
the integers

Chapter 8 - U.I.U.C. Math
Chapter 8 - U.I.U.C. Math

Prime-perfect numbers - Dartmouth Math Home
Prime-perfect numbers - Dartmouth Math Home

Phil 312: Intermediate Logic, Precept 7.
Phil 312: Intermediate Logic, Precept 7.

A Method for Generating Prime Order Elliptic Curves over F q2 c
A Method for Generating Prime Order Elliptic Curves over F q2 c

On the maximal number of facets of 0/1 polytopes
On the maximal number of facets of 0/1 polytopes

A simple proof of Valiant`s lemma
A simple proof of Valiant`s lemma

Chapter 8
Chapter 8

... 1642 – 26441 = 455 (Not a perfect square) 1652 – 26441 = 784 (This is 282, so we are done. x = 165, y = 28, p = 193, q = 137.) Thus, we find 26441 = 193 x 137. ...
Perspective Nonrigid Shape and Motion Recovery
Perspective Nonrigid Shape and Motion Recovery

log x y z − log ( ) log log mn m n
log x y z − log ( ) log log mn m n

High-performance Energy Minimization in Spin
High-performance Energy Minimization in Spin

... where the first summation considers all pairs of adjacent spins. Putting together the energies of all spin configurations gives the Hamiltonian of the system. Thus, the ground state is given by Egs = min(E(σ) | ∀ σ ∈ πn ), where πn is the set of all possible n-spin configurations. Whether we are int ...
Lecture Notes for MA 132 Foundations
Lecture Notes for MA 132 Foundations

A COMPARATIVE STUDY OF ALGORITHMS
A COMPARATIVE STUDY OF ALGORITHMS

Chapter 4 Number theory - School of Mathematical and Computer
Chapter 4 Number theory - School of Mathematical and Computer

§5.1 Exponents and Scientific Notation Definition of an exponent ar
§5.1 Exponents and Scientific Notation Definition of an exponent ar

Section V.27. Prime and Maximal Ideals
Section V.27. Prime and Maximal Ideals

Generating Equivalent Numerical Expressions
Generating Equivalent Numerical Expressions

Generating Equivalent Numerical Expressions
Generating Equivalent Numerical Expressions

ON CONSECUTIVE INTEGER PAIRS WITH THE SAME SUM
ON CONSECUTIVE INTEGER PAIRS WITH THE SAME SUM

Visibility with a Moving Point of View
Visibility with a Moving Point of View

Applications of a Continued Fraction Algorithm to Some Class
Applications of a Continued Fraction Algorithm to Some Class

CMPE-552 Database and File Security
CMPE-552 Database and File Security

... 15.What are the main sources of security vulnerabilities of software? 16. How asymmetric encryption can be used for secure communication? 17. How asymmetric encryption can be used for establishing session key? 18. What is digital signature? What is hash (digest) function? What is one-way function? W ...
QUESTIONS 1 - 46 REVIEW THE OBJECTIVES OF CHAPTER 2.
QUESTIONS 1 - 46 REVIEW THE OBJECTIVES OF CHAPTER 2.

METHODS FOR FINDING FACTORS OF LARGE INTEGERS*
METHODS FOR FINDING FACTORS OF LARGE INTEGERS*

< 1 ... 57 58 59 60 61 62 63 64 65 ... 231 >

Factorization of polynomials over finite fields

In mathematics and computer algebra the factorization of a polynomial consists of decomposing it into a product of irreducible factors. This decomposition is theoretically possible and is unique for polynomials with coefficients in any field, but rather strong restrictions on the field of the coefficients are needed to allow the computation of the factorization by means of an algorithm. In practice, algorithms have been designed only for polynomials with coefficients in a finite field, in the field of rationals or in a finitely generated field extension of one of them.The case of the factorization of univariate polynomials over a finite field, which is the subject of this article, is especially important, because all the algorithms (including the case of multivariate polynomials over the rational numbers), which are sufficiently efficient to be implemented, reduce the problem to this case (see Polynomial factorization). It is also interesting for various applications of finite fields, such as coding theory (cyclic redundancy codes and BCH codes), cryptography (public key cryptography by the means of elliptic curves), and computational number theory.As the reduction of the factorization of multivariate polynomials to that of univariate polynomials does not have any specificity in the case of coefficients in a finite field, only polynomials with one variable are considered in this article.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report