• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Homework: square roots and factorization
Homework: square roots and factorization

Iterative Methods
Iterative Methods

... sequence of values that converges to the solution of the system.  Computation is halted in an indirect algorithm when when a specified accuracy is reached. ...
Global linear convergence of an augmented Lagrangian algorithm
Global linear convergence of an augmented Lagrangian algorithm

Public-key cryptography and message authentication
Public-key cryptography and message authentication

a – b
a – b

Practice Assignment 6 Solution - GUC MET
Practice Assignment 6 Solution - GUC MET

4-2 - Mr. C. Street
4-2 - Mr. C. Street

PPT - Snowmass 2001
PPT - Snowmass 2001

... PDEs and SVMs can help us conduct more powerful searches and make more precise ...
An Algorithm for Solving Scaled Total Least Squares Problems
An Algorithm for Solving Scaled Total Least Squares Problems

CDM Algorithms for propositional Logic
CDM Algorithms for propositional Logic

Elementary Number Theory and Cryptography, Michaelmas 2014
Elementary Number Theory and Cryptography, Michaelmas 2014

Dividing Polynomials
Dividing Polynomials

Pre-Regional Mathematical Olympiad (West Bengal)
Pre-Regional Mathematical Olympiad (West Bengal)

2-6 Prime Factorization
2-6 Prime Factorization

MATH20212: Algebraic Structures 2
MATH20212: Algebraic Structures 2

Document
Document

Long Division of Polynomials
Long Division of Polynomials

Exam 2. Math 320. Fall 2010 Prof. Bernardo M. Ábrego Name. 12/06
Exam 2. Math 320. Fall 2010 Prof. Bernardo M. Ábrego Name. 12/06

Parallel algorithms for addition in non
Parallel algorithms for addition in non

Document
Document

... table very well, then it can be very time-consuming when you want to determine the factors of numbers. It is very useful to know the prime factors of a given number. This refers to the prime numbers that are multiplied to produce the given number. ...
Fast Generation of Prime Numbers on Portable Devices
Fast Generation of Prime Numbers on Portable Devices

Polynomial Zeros - FM Faculty Web Pages
Polynomial Zeros - FM Faculty Web Pages

The Simulated Greedy Algorithm for Several Submodular Matroid Secretary Problems Princeton University
The Simulated Greedy Algorithm for Several Submodular Matroid Secretary Problems Princeton University

EXAMPLE SHEET 3 1. Let A be a k-linear category, for a
EXAMPLE SHEET 3 1. Let A be a k-linear category, for a

A simple normality criterion leading to a counterexample to the
A simple normality criterion leading to a counterexample to the

... If any family of meromorphic functions satisfying a property P in an arbitrary domain is necessarily normal, then a function that is meromorphic in C and possesses the property P reduces to a constant. Though the converse of the Bloch principle holds under some additional conditions, the general con ...
< 1 ... 99 100 101 102 103 104 105 106 107 ... 231 >

Factorization of polynomials over finite fields

In mathematics and computer algebra the factorization of a polynomial consists of decomposing it into a product of irreducible factors. This decomposition is theoretically possible and is unique for polynomials with coefficients in any field, but rather strong restrictions on the field of the coefficients are needed to allow the computation of the factorization by means of an algorithm. In practice, algorithms have been designed only for polynomials with coefficients in a finite field, in the field of rationals or in a finitely generated field extension of one of them.The case of the factorization of univariate polynomials over a finite field, which is the subject of this article, is especially important, because all the algorithms (including the case of multivariate polynomials over the rational numbers), which are sufficiently efficient to be implemented, reduce the problem to this case (see Polynomial factorization). It is also interesting for various applications of finite fields, such as coding theory (cyclic redundancy codes and BCH codes), cryptography (public key cryptography by the means of elliptic curves), and computational number theory.As the reduction of the factorization of multivariate polynomials to that of univariate polynomials does not have any specificity in the case of coefficients in a finite field, only polynomials with one variable are considered in this article.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report