期刊文献+
共找到119篇文章
< 1 2 6 >
每页显示 20 50 100
Construction of PBIB Desings by Using Subspace of Vector Space over Finite Fields
1
作者 Wei Wandi (Dept. of Math. Sichuan University, Chengdu 610014)Yang Benfu ( Dept.of Math. Chengdu Teachers College, Pengzhou 611930) 《西华大学学报(哲学社会科学版)》 1998年第3期1-4,共4页
A new transitivity theorem of the general linear group GLn(Fq)is proved. A kind of new PBIB desings is constructed.
关键词 OVER Construction of PBIB Desings by Using Subspace of Vector Space over finite fields
下载PDF
Fault Attacks on Hyperelliptic Curve Discrete Logarithm Problem over Finite Fields 被引量:2
2
作者 Wang Mingqiang Xue Haiyang Zhan Tao 《China Communications》 SCIE CSCD 2012年第11期150-161,共12页
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ... In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. 展开更多
关键词 hyperelliptic curve discrete logarithm finite field GENUS CRYPTOSYSTEM
下载PDF
Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:5
3
作者 赵辉芳 秦德生 《Northeastern Mathematical Journal》 CSCD 2004年第4期415-423,共9页
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules... Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field nilpotent matrices
下载PDF
AN ANZAHL THEOREM IN SINGULAR PSEUDO-SYMPLECTIC GEOMETRY OVER FINITE FIELDS
4
作者 王恺顺 魏鸿增 张更生 《Acta Mathematica Scientia》 SCIE CSCD 2002年第1期72-78,共7页
This paper obtains formulas for the number of subspaces of a given type contained in a given subspace in singular pseudo-symplectic geometry.
关键词 finite field SUBSPACE singular pseudo-symplectic geometry
下载PDF
Carter subgroups of singular classical groups over finite fields
5
作者 高有 石新华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期341-346,共6页
Let F q be a finite field with qelements where q=p~α. In the present paper, the authors study the existence and structure of Carter subgroups of singular symplectic group Sp (n+t,n)(F q), singular unitary group U (n+... Let F q be a finite field with qelements where q=p~α. In the present paper, the authors study the existence and structure of Carter subgroups of singular symplectic group Sp (n+t,n)(F q), singular unitary group U (n+t,n)(F (q^2)) and singular orthogonal group O (n+t,n)(F q)(n is even) over finite fields F q. 展开更多
关键词 finite field singular classical groups Carter subgroup
下载PDF
SOME PRIMITIVE POLYNOMIALS OVER FINITE FIELDS
6
作者 Seunghwan Chang June Bok Lee Department of Mathematics, Yonsei University, Seoul 120-749, Korea 《Acta Mathematica Scientia》 SCIE CSCD 2001年第3期412-416,共5页
This paper proves that if qn is large enough, for each element a and primitive element b of Fq, there etists a primitive polynomial of degree n ≥5 over the finite field Fq having a as the coefficient of xn-1 and b as... This paper proves that if qn is large enough, for each element a and primitive element b of Fq, there etists a primitive polynomial of degree n ≥5 over the finite field Fq having a as the coefficient of xn-1 and b as the constant term. This proves that if qn is large enongh, for each element a ∈Fq, there exists a primitive polynomial of degree n ≥ 5 over Fq having a as the coefficient of x. 展开更多
关键词 finite field primitive polynomial
下载PDF
On the Number of Solutions of Some Type Equations in Finite Fields
7
作者 林泓 钱建国 《Northeastern Mathematical Journal》 CSCD 2005年第1期18-24,共7页
By establishing the connection between graph colouring and the solution of some equation systems in finite fields, we obtain some formulas to the number of solutions of some equation systems in finite fields, in terms... By establishing the connection between graph colouring and the solution of some equation systems in finite fields, we obtain some formulas to the number of solutions of some equation systems in finite fields, in terms of chromatic polynomial of a graph. 展开更多
关键词 graph colouring EQUATION finite field
下载PDF
Some Secret Sharing Schemes Based on the Finite Fields
8
作者 Selda Calkavur 《Computer Technology and Application》 2016年第6期269-272,共4页
A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes base... A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes based on the finite fields. 展开更多
关键词 Secret sharing threshold secret sharing scheme finite field.
下载PDF
Some New Results about Trigonometry in Finite Fields
9
作者 Amiri Naser Hasani Fysal 《Advances in Pure Mathematics》 2016年第7期493-497,共5页
In this paper, we study about trigonometry in finite field, we know that , the field with p elements, where p is a prime number if and only if p = 8k + 1 or p = 8k -1. Let F and K be two fields, we say that F is an ex... In this paper, we study about trigonometry in finite field, we know that , the field with p elements, where p is a prime number if and only if p = 8k + 1 or p = 8k -1. Let F and K be two fields, we say that F is an extension of K, if K&sube;F or there exists a monomorphism f: K&rarr;F. Recall that , F[x] is the ring of polynomial over F. If (means that F is an extension of K), an element is algebraic over K if there exists such that f(u) = 0 (see [1]-[4]). The algebraic closure of K in F is , which is the set of all algebraic elements in F over K. 展开更多
关键词 TRIGONOMETRY finite Field PRIMITIVE Root of Unity
下载PDF
Approximate Synchronization of Multi-Agent Systems over Finite Fields
10
作者 YU Miao FENG Jun-e +2 位作者 XIA Jianwei FU Shihua SHEN Hao 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第4期1561-1580,共20页
In this paper,the approximate synchronization of leader-follower multiagent systems(MASs) over finite fields is studied in regard to local and global synchronization.First,the approximately synchronous state set(ASSS)... In this paper,the approximate synchronization of leader-follower multiagent systems(MASs) over finite fields is studied in regard to local and global synchronization.First,the approximately synchronous state set(ASSS) is obtained.Second,combined with ASSS and transient periods,some criteria for the local and global approximate synchronization of systems are given.Moreover,the algorithms for calculating the maximum approximately synchronous basin(MASB) and the maximum control invariant set(MCIS) are presented.Third,the global approximate synchronization of the system is achieved by designing the state feedback control,and a design algorithm of the controller using the truth matrix method is proposed.Moreover,the results of approximate synchronization are degenerated to complete synchronization.Last,two examples are shown to demonstrate the results of this paper. 展开更多
关键词 Approximate synchronization finite field multiagent system semi-tensor product state feedback control
原文传递
Zeros of Complete Symmetric Polynomials over Finite Fields
11
作者 CAO Wei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第4期1772-1788,共17页
Wan and Zhang(2021) obtained a nontrivial lower bound for the number of zeros of complete symmetric polynomials over finite fields,and proposed a problem whether their bound can be improved.In this paper,the author im... Wan and Zhang(2021) obtained a nontrivial lower bound for the number of zeros of complete symmetric polynomials over finite fields,and proposed a problem whether their bound can be improved.In this paper,the author improves Wan-Zhang's bound from three aspects.The proposed results are based on the estimates related to the number of certain permutations and the value sets of non-permutation polynomials associated to the complete symmetric polynomial.And the author believes that there are still possibilities to improve the bounds and hence Wan-Zhang's bound. 展开更多
关键词 Complete symmetric polynomial finite field permutation polynomial value set
原文传递
A Class of Quadratic Matrix Equations over Finite Fields
12
作者 Yin Chen Xinxin Zhang 《Algebra Colloquium》 SCIE CSCD 2023年第1期169-180,共12页
We exhibit an explicit formula for the cardinality of solutions to a class of quadratic matrix equations over finite fields.We prove that the orbits of these solutions under the natural conjugation action of the gener... We exhibit an explicit formula for the cardinality of solutions to a class of quadratic matrix equations over finite fields.We prove that the orbits of these solutions under the natural conjugation action of the general linear groups can be separated by classical conjugation invariants defined by characteristic polynomials.We also find a generating set for the vanishing ideal of these orbits. 展开更多
关键词 matrix equations general linear groups finite fields separating invariants
原文传递
Note on the Number of Solutions of Cubic Diagonal Equations over Finite Fields 被引量:2
13
作者 HU Shuangnian WANG Shihan +1 位作者 LI Yanyan NIU Yujun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第5期369-372,共4页
Let Fqbe the finite field,q=p^(k),with p being a prime and k being a positive integer.Let F_(q)^(*)be the multiplicative group of Fq,that is F_(q)^(*)=F_(q){0}.In this paper,by using the Jacobi sums and an analog of H... Let Fqbe the finite field,q=p^(k),with p being a prime and k being a positive integer.Let F_(q)^(*)be the multiplicative group of Fq,that is F_(q)^(*)=F_(q){0}.In this paper,by using the Jacobi sums and an analog of Hasse-Davenport theorem,an explicit formula for the number of solutions of cubic diagonal equation x_(1)^(3)+x_(2)^(3)+…+x_(n)^(3)=c over Fqis given,where c∈F_(q)^(*)and p≡1(mod 3).This extends earlier results. 展开更多
关键词 finite field rational point diagonal equations Jacobi sums
原文传递
On Deep Holes of Projective Reed-Solomon Codes over Finite Fields with Even Characteristic
14
作者 XU Xiaofan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第1期15-19,共5页
Projective Reed-Solomon code is an important class of maximal distance separable codes in reliable communication and deep holes play important roles in its decoding.In this paper,we obtain two classes of deep holes of... Projective Reed-Solomon code is an important class of maximal distance separable codes in reliable communication and deep holes play important roles in its decoding.In this paper,we obtain two classes of deep holes of projective Reed-Solomon codes over finite fields with even characteristic.That is,let F_(q) be finite field with even characteristic,k∈{2,q-2},and let u(x)be the Lagrange interpolation polynomial of the first q components of the received vector u∈F_(q)+1 q Suppose that the(q+1)-th component of u is 0,and u(x)=λx^(k)+f_(≤k-2)(x),λx^(q-2)+f_(≤k-2)(x),where λ∈F^(*)_(q) and f_(≤k-2)(x)is a polynomial over F_(q) with degree no more than k-2.Then the received vector u is a deep hole of projective Reed-Solomon codes PRS(F_(q),k).In fact,our result partially solved an open problem on deep holes of projective Reed-Solomon codes proposed by Wan in 2020. 展开更多
关键词 finite field even characteristic projective Reed-Solomon code deep hole
原文传递
Effect of Types and Orders of Electromagnetic Field Finite Element Meshes on Power Communication Harmonic Parameters Calculation Results of Tubular Hydrogenerators
15
作者 Fan Zhennan Chen Jie +1 位作者 Zhou Zhiting Yang Yong 《China Communications》 SCIE CSCD 2024年第10期288-300,共13页
In generator design field,waveform total harmonic distortion(THD)and telephone harmonic factor(THF)are parameters commonly used to measure the impact of generator no-load voltage harmonics on the power communication q... In generator design field,waveform total harmonic distortion(THD)and telephone harmonic factor(THF)are parameters commonly used to measure the impact of generator no-load voltage harmonics on the power communication quality.Tubular hydrogenerators are considered the optimal generator for exploiting low-head,high-flow hydro resources,and they have seen increasingly widespread application in China's power systems recent years.However,owing to the compact and constrained internal space of such generators,their internal magnetic-field harmonics are pronounced.Therefore,accurate calculation of their THD and THF is crucial during the analysis and design stages to ensure the quality of power communication.Especially in the electromagnetic field finite element modeling analysis of such generators,the type and order of the finite element meshes may have a significant impact on the THD and THF calculation results,which warrants in-depth research.To address this,this study takes a real 34 MW large tubular hydrogenerator as an example,and establishes its electromagnetic field finite element model under no-load conditions.Two types of meshes,five mesh densities,and two mesh orders are analyzed to reveal the effect of electromagnetic field finite element mesh types and orders on the calculation results of THD and THF for such generators. 展开更多
关键词 calculation results electromagnetic field finite element meshes power communication harmonic parameters tubular hydrogenerator types and orders
下载PDF
Using Normal Form of Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:8
16
作者 游宏 南基洙 《Journal of Mathematical Research and Exposition》 CSCD 1998年第3期341-346,共6页
In this paper, one construction of Cartesian authentication codes from the normal form of matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are ch... In this paper, one construction of Cartesian authentication codes from the normal form of matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the P I and P S , which denote the largest probabilities of a successful impersonation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field normal form of matrices.
下载PDF
Normal Bases and Their Dual-Bases over Finite Fields 被引量:9
17
作者 Qun Ying LIAO Qi SUN 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2006年第3期845-848,共4页
In this paper, we prove the following results: 1) A normal basis N over a finite field is equivalent to its dual basis if and only if the multiplication table of N is symmetric; 2) The normal basis N is self-dual i... In this paper, we prove the following results: 1) A normal basis N over a finite field is equivalent to its dual basis if and only if the multiplication table of N is symmetric; 2) The normal basis N is self-dual if and only if its multiplication table is symmetric and Tr(α^2) = 1, where α generates N; 3) An optimal normal basis N is self-dual if and only if N is a type-Ⅰ optimal normal basis with q = n = 2 or N is a type-Ⅱ optimal normal basis. 展开更多
关键词 Normal bases over finite fields Optimal normal bases Multiplication tables of normal bases
原文传递
Exponential Sums over Finite Fields 被引量:2
18
作者 WAN Daqing 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2021年第4期1225-1278,共54页
This is an expository paper on algebraic aspects of exponential sums over finite fields.This is a new direction.Various examples,results and open problems are presented along the way,with particular emphasis on Gauss ... This is an expository paper on algebraic aspects of exponential sums over finite fields.This is a new direction.Various examples,results and open problems are presented along the way,with particular emphasis on Gauss periods,Kloosterman sums and one variable exponential sums.One main tool is the applications of various p-adic methods.For this reason,the author has also included a brief exposition of certain p-adic estimates of exponential sums.The material is based on the lectures given at the 2020 online number theory summer school held at Xiamen University.Notes were taken by Shaoshi Chen and Ruichen Xu. 展开更多
关键词 Degrees of exponential sums finite fields Gauss sums Kloosterman sums L-FUNCTIONS
原文传递
On the Number of Solutions of Certain Equations over Finite Fields 被引量:4
19
作者 Zheng Jun ZHAO Xi Wang CAO 《Journal of Mathematical Research and Exposition》 CSCD 2010年第6期957-966,共10页
Let Fq be a finite field with q = pf elements,where p is an odd prime.Let N(a1x12 + ···+anxn2 = bx1 ···xs) denote the number of solutions(x1,...,xn) of the equation a1x12 +·&#... Let Fq be a finite field with q = pf elements,where p is an odd prime.Let N(a1x12 + ···+anxn2 = bx1 ···xs) denote the number of solutions(x1,...,xn) of the equation a1x12 +···+ anxn2 = bx1 ···xs in Fnq,where n 5,s n,and ai ∈ F*q,b ∈ F*q.In this paper,we solve the problem which the present authors mentioned in an earlier paper,and obtain a reduction formula for the number of solutions of equation a1x21 + ··· + anxn2 = bx1 ···xs,where n 5,3 ≤ s n,under a certain restriction on coefficients.We also obtain an explicit formula for the number of solutions of equation a1x21 + ··· + anxn2 = bx1 ···xn-1 in Fqn under a restriction on n and q. 展开更多
关键词 finite fields solutions of equation multiplicative character inclusion-exclusion principle.
下载PDF
On observability of Galois nonlinear feedback shift registers over finite fields 被引量:1
20
作者 Zhe GAO Jun’e FENG +1 位作者 Yongyuan YU Yanjun CUI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第10期1533-1545,共13页
Observability ensures that any two distinct initial states can be uniquely determined by their outputs,so the stream ciphers can avoid unobservable nonlinear feedback shift registers(NFSRs)to prevent the occurrence of... Observability ensures that any two distinct initial states can be uniquely determined by their outputs,so the stream ciphers can avoid unobservable nonlinear feedback shift registers(NFSRs)to prevent the occurrence of equivalent keys.This paper discusses the observability of Galois NFSRs over finite fields.Galois NFSRs are treated as logical networks using the semi-tensor product.The vector form of the state transition matrix is introduced,by which a necessary and sufficient condition is proposed,as well as an algorithm for determining the observability of general Galois NFSRs.Moreover,a new observability matrix is defined,which can derive a matrix method with lower computation complexity.Furthermore,the observability of two special types of Galois NFSRs,a full-length Galois NFSR and a nonsingular Galois NFSR,is investigated.Two methods are proposed to determine the observability of these two special types of NFSRs,and some numerical examples are provided to support these results. 展开更多
关键词 OBSERVABILITY Nonlinear feedback shift registers(NFSRs) Galois NFSRs Semi-tensor product finite fields Logical networks
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部