期刊文献+
共找到119篇文章
< 1 2 6 >
每页显示 20 50 100
Low latency systolic multipliers for finite field GF(2m) based on irreducible polynomials
1
作者 谢佳峰 贺建军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第5期1283-1289,共7页
Systolic implementation of multiplication over GF(2m) is usually very efficient in area-time complexity,but its latency is usually very large.Thus,two low latency systolic multipliers over GF(2m) based on general irre... Systolic implementation of multiplication over GF(2m) is usually very efficient in area-time complexity,but its latency is usually very large.Thus,two low latency systolic multipliers over GF(2m) based on general irreducible polynomials and irreducible pentanomials are presented.First,a signal flow graph(SFG) is used to represent the algorithm for multiplication over GF(2m).Then,the two low latency systolic structures for multiplications over GF(2m) based on general irreducible polynomials and pentanomials are presented from the SFG by suitable cut-set retiming,respectively.Analysis indicates that the proposed two low latency designs involve at least one-third less area-delay product when compared with the existing designs,To the authors' knowledge,the time-complexity of the structures is the lowest found in literature for systolic GF(2m) multipliers based on general irreducible polynomials and pentanomials.The proposed low latency designs are regular and modular,and therefore they are suitable for many time critical applications. 展开更多
关键词 finite field finite field multiplication systolic structure low latency POLYNOMIALS
下载PDF
Fault Attacks on Hyperelliptic Curve Discrete Logarithm Problem over Finite Fields 被引量:2
2
作者 Wang Mingqiang Xue Haiyang Zhan Tao 《China Communications》 SCIE CSCD 2012年第11期150-161,共12页
In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, ... In this paper, we present two explicit invalid-curve attacks on the genus 2 hyperelliptic curve over a finite field. First, we propose two explicit attack models by injecting a one-bit fault in a given divisor. Then, we discuss the construction of an invalid curve based on the faulted divisor. Our attacks are based on the fact that the Hyperelliptic Curve Scalar Multiplication (HECSM) algorithm does not utilize the curve parameters and We consider three hyperelliptic curves as the attack targets. For curve with security level 186 (in bits), our attack method can get the weakest invalid curve with security level 42 (in bits); there are 93 invalid curves with security level less than 50. We also estimate the theoretical probability of getting a weak hyperelliptic curve whose cardinality is a smooth integer. Finally, we show that the complexity of the fault attack is subexponential if the attacker can freely inject a fault in the input divisor. Cryptosystems based on the genus 2 hyperelliptic curves cannot work against our attack algorithm in practice. 展开更多
关键词 hyperelliptic curve discrete logarithm finite field GENUS CRYPTOSYSTEM
下载PDF
Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:5
3
作者 赵辉芳 秦德生 《Northeastern Mathematical Journal》 CSCD 2004年第4期415-423,共9页
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules... Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field nilpotent matrices
下载PDF
AN ANZAHL THEOREM IN SINGULAR PSEUDO-SYMPLECTIC GEOMETRY OVER FINITE FIELDS
4
作者 王恺顺 魏鸿增 张更生 《Acta Mathematica Scientia》 SCIE CSCD 2002年第1期72-78,共7页
This paper obtains formulas for the number of subspaces of a given type contained in a given subspace in singular pseudo-symplectic geometry.
关键词 finite field SUBSPACE singular pseudo-symplectic geometry
下载PDF
Carter subgroups of singular classical groups over finite fields
5
作者 高有 石新华 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期341-346,共6页
Let F q be a finite field with qelements where q=p~α. In the present paper, the authors study the existence and structure of Carter subgroups of singular symplectic group Sp (n+t,n)(F q), singular unitary group U (n+... Let F q be a finite field with qelements where q=p~α. In the present paper, the authors study the existence and structure of Carter subgroups of singular symplectic group Sp (n+t,n)(F q), singular unitary group U (n+t,n)(F (q^2)) and singular orthogonal group O (n+t,n)(F q)(n is even) over finite fields F q. 展开更多
关键词 finite field singular classical groups Carter subgroup
下载PDF
The Construction of Symplectic Involutions Over Finite Field with CharF=2 and Its Applications
6
作者 ZHAO Jing YUAN Jian-xin NAN Ji-zhu 《Chinese Quarterly Journal of Mathematics》 CSCD 2009年第2期173-184,共12页
In the present paper, we compute the number of the symplectic involaLions over the finite field F with chafF = 2, and also one Cartesian authentication code is obtained.Furthermore, its size parameters are computed co... In the present paper, we compute the number of the symplectic involaLions over the finite field F with chafF = 2, and also one Cartesian authentication code is obtained.Furthermore, its size parameters are computed completely. If assume that the coding rules are chosen according to a uniform probability, PI and Ps denote the largest probabilities of a successful impersonation attack and a successful substitution attack respectively, then PI and Ps are also computed. 展开更多
关键词 authentication code symplectic involution finite field
下载PDF
SOME PRIMITIVE POLYNOMIALS OVER FINITE FIELDS
7
作者 Seunghwan Chang June Bok Lee Department of Mathematics, Yonsei University, Seoul 120-749, Korea 《Acta Mathematica Scientia》 SCIE CSCD 2001年第3期412-416,共5页
This paper proves that if qn is large enough, for each element a and primitive element b of Fq, there etists a primitive polynomial of degree n ≥5 over the finite field Fq having a as the coefficient of xn-1 and b as... This paper proves that if qn is large enough, for each element a and primitive element b of Fq, there etists a primitive polynomial of degree n ≥5 over the finite field Fq having a as the coefficient of xn-1 and b as the constant term. This proves that if qn is large enongh, for each element a ∈Fq, there exists a primitive polynomial of degree n ≥ 5 over Fq having a as the coefficient of x. 展开更多
关键词 finite field primitive polynomial
下载PDF
On the Number of Solutions of Some Type Equations in Finite Fields
8
作者 林泓 钱建国 《Northeastern Mathematical Journal》 CSCD 2005年第1期18-24,共7页
By establishing the connection between graph colouring and the solution of some equation systems in finite fields, we obtain some formulas to the number of solutions of some equation systems in finite fields, in terms... By establishing the connection between graph colouring and the solution of some equation systems in finite fields, we obtain some formulas to the number of solutions of some equation systems in finite fields, in terms of chromatic polynomial of a graph. 展开更多
关键词 graph colouring EQUATION finite field
下载PDF
Some Secret Sharing Schemes Based on the Finite Fields
9
作者 Selda Calkavur 《Computer Technology and Application》 2016年第6期269-272,共4页
A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes base... A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes based on the finite fields. 展开更多
关键词 Secret sharing threshold secret sharing scheme finite field.
下载PDF
Construction of PBIB Desings by Using Subspace of Vector Space over Finite Fields
10
作者 Wei Wandi (Dept. of Math. Sichuan University, Chengdu 610014)Yang Benfu ( Dept.of Math. Chengdu Teachers College, Pengzhou 611930) 《西华大学学报(哲学社会科学版)》 1998年第3期1-4,共4页
A new transitivity theorem of the general linear group GLn(Fq)is proved. A kind of new PBIB desings is constructed.
关键词 OVER Construction of PBIB Desings by Using Subspace of Vector Space over finite fields
下载PDF
Some New Results about Trigonometry in Finite Fields
11
作者 Amiri Naser Hasani Fysal 《Advances in Pure Mathematics》 2016年第7期493-497,共5页
In this paper, we study about trigonometry in finite field, we know that , the field with p elements, where p is a prime number if and only if p = 8k + 1 or p = 8k -1. Let F and K be two fields, we say that F is an ex... In this paper, we study about trigonometry in finite field, we know that , the field with p elements, where p is a prime number if and only if p = 8k + 1 or p = 8k -1. Let F and K be two fields, we say that F is an extension of K, if K&sube;F or there exists a monomorphism f: K&rarr;F. Recall that , F[x] is the ring of polynomial over F. If (means that F is an extension of K), an element is algebraic over K if there exists such that f(u) = 0 (see [1]-[4]). The algebraic closure of K in F is , which is the set of all algebraic elements in F over K. 展开更多
关键词 TRIGONOMETRY finite field PRIMITIVE Root of Unity
下载PDF
Zeros of Complete Symmetric Polynomials over Finite Fields 被引量:1
12
作者 CAO Wei 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第4期1772-1788,共17页
Wan and Zhang(2021) obtained a nontrivial lower bound for the number of zeros of complete symmetric polynomials over finite fields,and proposed a problem whether their bound can be improved.In this paper,the author im... Wan and Zhang(2021) obtained a nontrivial lower bound for the number of zeros of complete symmetric polynomials over finite fields,and proposed a problem whether their bound can be improved.In this paper,the author improves Wan-Zhang's bound from three aspects.The proposed results are based on the estimates related to the number of certain permutations and the value sets of non-permutation polynomials associated to the complete symmetric polynomial.And the author believes that there are still possibilities to improve the bounds and hence Wan-Zhang's bound. 展开更多
关键词 Complete symmetric polynomial finite field permutation polynomial value set
原文传递
Approximate Synchronization of Multi-Agent Systems over Finite Fields
13
作者 YU Miao FENG Jun-e +2 位作者 XIA Jianwei FU Shihua SHEN Hao 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2024年第4期1561-1580,共20页
In this paper,the approximate synchronization of leader-follower multiagent systems(MASs) over finite fields is studied in regard to local and global synchronization.First,the approximately synchronous state set(ASSS)... In this paper,the approximate synchronization of leader-follower multiagent systems(MASs) over finite fields is studied in regard to local and global synchronization.First,the approximately synchronous state set(ASSS) is obtained.Second,combined with ASSS and transient periods,some criteria for the local and global approximate synchronization of systems are given.Moreover,the algorithms for calculating the maximum approximately synchronous basin(MASB) and the maximum control invariant set(MCIS) are presented.Third,the global approximate synchronization of the system is achieved by designing the state feedback control,and a design algorithm of the controller using the truth matrix method is proposed.Moreover,the results of approximate synchronization are degenerated to complete synchronization.Last,two examples are shown to demonstrate the results of this paper. 展开更多
关键词 Approximate synchronization finite field multiagent system semi-tensor product state feedback control
原文传递
Dielectric Constant Calculation of Poly(vinylidene fluoride)Based on Finite Field and Density Functional Theory
14
作者 Yong-Zhi Lin Lu-Kun Feng +4 位作者 Ya-Dong Li Chao-Fan Chang Cai-Zhen Zhu Ming-Liang Wang Jian Xu 《Chinese Journal of Polymer Science》 SCIE EI CAS CSCD 2024年第5期655-662,I0009,共9页
In this study,we proposed a novel method that integrates density functional theory(DFT)with the finite field method to accurately estimate the polarizability and dielectric constant of polymers.Our approach effectivel... In this study,we proposed a novel method that integrates density functional theory(DFT)with the finite field method to accurately estimate the polarizability and dielectric constant of polymers.Our approach effectively accounts for the influence of electronic and geometric conformation changed on the dielectric constant.We validated our method using polyethylene(PE)and polytetrafluoroethylene(PTFE)as benchmark materials,and found that it reliably predicted their dielectric constants.Furthermore,we explored the impact of conformation variations in poly(vinylidene fluoride)(PVDF)on its dielectric constant and polarizability.The resulting dielectric constants ofα-andγ-PVDF(3.0)showed excellent agreement with crystalline PVDF in experiments.Our findings illuminate the relationship between PVDF’s structural properties and its electrical behavior,offering valuable insights for material design and applications. 展开更多
关键词 Dielectric constant PVDF finite field DFT
原文传递
Effect of Types and Orders of Electromagnetic Field Finite Element Meshes on Power Communication Harmonic Parameters Calculation Results of Tubular Hydrogenerators
15
作者 Fan Zhennan Chen Jie +1 位作者 Zhou Zhiting Yang Yong 《China Communications》 SCIE CSCD 2024年第10期288-300,共13页
In generator design field,waveform total harmonic distortion(THD)and telephone harmonic factor(THF)are parameters commonly used to measure the impact of generator no-load voltage harmonics on the power communication q... In generator design field,waveform total harmonic distortion(THD)and telephone harmonic factor(THF)are parameters commonly used to measure the impact of generator no-load voltage harmonics on the power communication quality.Tubular hydrogenerators are considered the optimal generator for exploiting low-head,high-flow hydro resources,and they have seen increasingly widespread application in China's power systems recent years.However,owing to the compact and constrained internal space of such generators,their internal magnetic-field harmonics are pronounced.Therefore,accurate calculation of their THD and THF is crucial during the analysis and design stages to ensure the quality of power communication.Especially in the electromagnetic field finite element modeling analysis of such generators,the type and order of the finite element meshes may have a significant impact on the THD and THF calculation results,which warrants in-depth research.To address this,this study takes a real 34 MW large tubular hydrogenerator as an example,and establishes its electromagnetic field finite element model under no-load conditions.Two types of meshes,five mesh densities,and two mesh orders are analyzed to reveal the effect of electromagnetic field finite element mesh types and orders on the calculation results of THD and THF for such generators. 展开更多
关键词 calculation results electromagnetic field finite element meshes power communication harmonic parameters tubular hydrogenerator types and orders
下载PDF
Using Normal Form of Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:8
16
作者 游宏 南基洙 《Journal of Mathematical Research and Exposition》 CSCD 1998年第3期341-346,共6页
In this paper, one construction of Cartesian authentication codes from the normal form of matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are ch... In this paper, one construction of Cartesian authentication codes from the normal form of matrices over finite fields are presented and its size parameters are computed. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the P I and P S , which denote the largest probabilities of a successful impersonation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field normal form of matrices.
下载PDF
Normal Bases and Their Dual-Bases over Finite Fields 被引量:9
17
作者 Qun Ying LIAO Qi SUN 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2006年第3期845-848,共4页
In this paper, we prove the following results: 1) A normal basis N over a finite field is equivalent to its dual basis if and only if the multiplication table of N is symmetric; 2) The normal basis N is self-dual i... In this paper, we prove the following results: 1) A normal basis N over a finite field is equivalent to its dual basis if and only if the multiplication table of N is symmetric; 2) The normal basis N is self-dual if and only if its multiplication table is symmetric and Tr(α^2) = 1, where α generates N; 3) An optimal normal basis N is self-dual if and only if N is a type-Ⅰ optimal normal basis with q = n = 2 or N is a type-Ⅱ optimal normal basis. 展开更多
关键词 Normal bases over finite fields Optimal normal bases Multiplication tables of normal bases
原文传递
On the differential uniformities of functions over finite fields 被引量:4
18
作者 QU LongJiang LI Chao +1 位作者 DAI QingPing KONG ZhiYin 《Science China Mathematics》 SCIE 2013年第7期1477-1484,共8页
In this paper, the possible value of the differential uniformity of a function over finite fields is discussed. It is proved that, the differential uniformity of a function over Fq can be any even integer between 2 an... In this paper, the possible value of the differential uniformity of a function over finite fields is discussed. It is proved that, the differential uniformity of a function over Fq can be any even integer between 2 and q when q is even; and it can be any integer between 1 and q except q-1 when q is odd. Moreover, for any possible differential uniformity t, an explicit construction of a differentially t-uniform function is given. 展开更多
关键词 differential uniformity FUNCTIONS finite field explicit construction
原文传递
Note on the Number of Solutions of Cubic Diagonal Equations over Finite Fields 被引量:3
19
作者 HU Shuangnian WANG Shihan +1 位作者 LI Yanyan NIU Yujun 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2023年第5期369-372,共4页
Let Fqbe the finite field,q=p^(k),with p being a prime and k being a positive integer.Let F_(q)^(*)be the multiplicative group of Fq,that is F_(q)^(*)=F_(q){0}.In this paper,by using the Jacobi sums and an analog of H... Let Fqbe the finite field,q=p^(k),with p being a prime and k being a positive integer.Let F_(q)^(*)be the multiplicative group of Fq,that is F_(q)^(*)=F_(q){0}.In this paper,by using the Jacobi sums and an analog of Hasse-Davenport theorem,an explicit formula for the number of solutions of cubic diagonal equation x_(1)^(3)+x_(2)^(3)+…+x_(n)^(3)=c over Fqis given,where c∈F_(q)^(*)and p≡1(mod 3).This extends earlier results. 展开更多
关键词 finite field rational point diagonal equations Jacobi sums
原文传递
Remarks on the Number of Rational Points on a Class of Hypersurfaces over Finite Fields 被引量:3
20
作者 Hua Huang Wei Gao Wei Cao 《Algebra Colloquium》 SCIE CSCD 2018年第3期533-540,共8页
Let Fq be the finite field of q elements and f be a nonzero polynomial over Fq. For each b ∈ Fq, let Nq(f = b) denote the number of Fq-rational points on the affine hypersurface f = b. We obtain the formula of Nq(... Let Fq be the finite field of q elements and f be a nonzero polynomial over Fq. For each b ∈ Fq, let Nq(f = b) denote the number of Fq-rational points on the affine hypersurface f = b. We obtain the formula of Nq(f= b) for a class of hypersurfaces over Fq by using the greatest invariant factors of degree matrices under certain cases, which generalizes the previously known results. We also give another simple direct proof to the known results. 展开更多
关键词 finite field POLYNOMIAL rational point degree matrix
原文传递
上一页 1 2 6 下一页 到第
使用帮助 返回顶部