Zobrazeno 1 - 10
of 17 320
pro vyhledávání: '"finite field"'
Autor:
Zhichao Tang, Xiang Fan
Publikováno v:
AIMS Mathematics, Vol 9, Iss 10, Pp 26557-26578 (2024)
Cyclotomic numbers and Jacobi sums, introduced over two centuries ago by Gauss and Jacobi, respectively, are pivotal in number theory and find wide applications in combinatorial designs, coding theory, cryptography, and information theory. The cyclot
Externí odkaz:
https://doaj.org/article/e9d3612a9bfe4e6a98f83490ab55c058
Autor:
Ballico, Edoardo
Publikováno v:
Arab Journal of Mathematical Sciences, 2023, Vol. 30, Issue 2, pp. 245-255.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/AJMS-10-2022-0242
Publikováno v:
AIMS Mathematics, Vol 9, Iss 8, Pp 21656-21671 (2024)
Let a prime $ p\equiv 1(\text{mod}3) $ and $ z $ be non-cubic in $ \mathbb{F}_p $. Gauss proved that the number of solutions of equation $ x_1^3+x_2^3+zx_3^3 = 0 $ in $ \mathbb{F}_p $ was $ p^2+\frac{1}{2}(p-1)(9d-c) $, where $ c $ was uniquely deter
Externí odkaz:
https://doaj.org/article/d65a536409a542d19d2bac4fbac9b483
Autor:
Edoardo Ballico
Publikováno v:
Arab Journal of Mathematical Sciences, Vol 30, Iss 2, Pp 245-255 (2024)
Purpose – The author studies forms over finite fields obtained as the determinant of Hermitian matrices and use these determinatal forms to define and study the base polynomial of a square matrix over a finite field. Design/methodology/approach –
Externí odkaz:
https://doaj.org/article/4936b47a9e3a4f749a3560a9fb80397e
Publikováno v:
AIMS Mathematics, Vol 9, Iss 7, Pp 18236-18246 (2024)
Codebooks with small inner-product correlations are desirable in many fields, including compressed sensing, direct spread code division multiple access (CDMA) systems, and space-time codes. The objective of this paper is to present a class of codeboo
Externí odkaz:
https://doaj.org/article/8e791366ae2347fda66adbff0e59eb85
Autor:
Ramireddy Nava Teja Reddy, M. Kavitha, G. Sudarsana Reddy, Amr Yousef, Kareem M. AboRas, Ahmed Emara, Ch. Rami Reddy
Publikováno v:
Frontiers in Computer Science, Vol 6 (2024)
Various applications use asymmetric cryptography to secure communications between both parties, and it raises the main issue of generating vast amounts of computation and storage. Thus, elliptic curve cryptography (ECC) is a methodology that emerged
Externí odkaz:
https://doaj.org/article/d9cb99dabba442a1af5d78c8462f1b0f