This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, finding irreducible and primitive polynomials, the distribution of these primitive polynomials and of primitive points on elliptic curves, constructing bases of
Finite Fields: Theory and Computation: The Meeting Point of Number Theory, Computer Science, Coding Theory and Cryptography
β Scribed by Igor E. Shparlinski (auth.)
- Publisher
- Springer Netherlands
- Year
- 1999
- Tongue
- English
- Leaves
- 531
- Series
- Mathematics and Its Applications 477
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, finding irreducible and primitive polynomials, the distribution of these primitive polynomials and of primitive points on elliptic curves, constructing bases of various types and new applications of finite fields to other areas of mathematics. For completeness we inΒ clude two special chapters on some recent advances and applications of the theory of congruences (optimal coefficients, congruential pseudo-random number generΒ ators, modular arithmetic, etc.) and computational number theory (primality testing, factoring integers, computation in algebraic number theory, etc.). The problems considered here have many applications in Computer Science, CodΒ ing Theory, Cryptography, Numerical Methods, and so on. There are a few books devoted to more general questions, but the results contained in this book have not till now been collected under one cover. In the present work the author has attempted to point out new links among different areas of the theory of finite fields. It contains many very important results which previously could be found only in widely scattered and hardly available conference proceedings and journals. In particular, we extensively review results which originally appeared only in Russian, and are not well known to mathematicians outside the former USSR.
β¦ Table of Contents
Front Matter....Pages i-xiv
Introduction....Pages 1-11
Links Flowchart....Pages 13-15
Polynomial Factorization....Pages 17-44
Finding Irreducible and Primitive Polynomials....Pages 45-64
The Distribution of Irreducible, Primitive and Other Special Polynomials and Matrices....Pages 65-98
Bases and Computation in Finite Fields....Pages 99-148
Coding Theory and Algebraic Curves....Pages 149-213
Elliptic Curves....Pages 215-237
Recurrence Sequences in Finite Fields and Cyclic Linear Codes....Pages 239-264
Finite Fields and Discrete Mathematics....Pages 265-324
Congruences....Pages 325-359
Some Related Problems....Pages 361-401
Back Matter....Pages 403-528
β¦ Subjects
Field Theory and Polynomials; Number Theory; Numeric Computing; Symbolic and Algebraic Manipulation; Discrete Mathematics in Computer Science
π SIMILAR VOLUMES
The refereed proceedings of the First International Conference on Finite Fields, Coding Theory, and Advances in Communications and Computing. The volume aims to encourage interaction between the theoretical aspects of finite fields and applications in many areas including information theory.
<p>This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the NaΒ tional University of Singapore
<p>This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the NaΒ tional University of Singapore
<b>The only book to provide a unified view of the interplay between computational </b><b>number theory and cryptography</b><p>Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines