• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Ch13sols
Ch13sols

Build-Up Method Example. Find LCM(36,60).
Build-Up Method Example. Find LCM(36,60).

Ahuja_elem_algo
Ahuja_elem_algo

...  Topological Ordering: A graph G = (N, A) is said to have a topological ordering if its nodes can be numbered so that for each arc (i, j)  A, i < j. ...
How to Hash into Elliptic Curves
How to Hash into Elliptic Curves

... Some elliptic curve cryptosystems require to hash into an elliptic curve, for instance the Boneh-Franklin identity based encryption scheme [1]. In this scheme, a particular supersingular elliptic curve is used, for which there exists a one-to-one mapping f from the base field Fp to the curve. This e ...
Test Review: Rational Functions and Complex Zeros
Test Review: Rational Functions and Complex Zeros

Section 3
Section 3

Computing Greatest Common Divisors and Factorizations in
Computing Greatest Common Divisors and Factorizations in

Garrett 10-05-2011 1 We will later elaborate the ideas mentioned earlier: relations
Garrett 10-05-2011 1 We will later elaborate the ideas mentioned earlier: relations

LNCS 4168 - Univariate Polynomial Real Root Isolation: Continued
LNCS 4168 - Univariate Polynomial Real Root Isolation: Continued

Use the five properties of exponents to simplify each of
Use the five properties of exponents to simplify each of

MA314 (Part 2) 2012-2013 - School of Mathematics, Statistics
MA314 (Part 2) 2012-2013 - School of Mathematics, Statistics

Test Ch5 review (5-1 to 5-6)
Test Ch5 review (5-1 to 5-6)

Petroleum Engineering 284
Petroleum Engineering 284

Chapter 4
Chapter 4

... 1. Upper Bound. If r > 0 and all numbers in the quotient row of the synthetic division, including the remainder, are nonnegative, then r is an upper bound of the real zeros of P(x). 2. Lower Bound. If r < 0 and all numbers in the quotient row of the synthetic division, including the remainder, alter ...
Partial Fraction Decomposition Examples
Partial Fraction Decomposition Examples

Design of Algorithms - Homework II (Solutions)
Design of Algorithms - Homework II (Solutions)

Greatest Common Factor, Lowest Common Multiple
Greatest Common Factor, Lowest Common Multiple

CSE 599d - Quantum Computing Shor`s Algorithm
CSE 599d - Quantum Computing Shor`s Algorithm

Name
Name

Grobner
Grobner

Factoring Composite Numbers - TI Education
Factoring Composite Numbers - TI Education

Constructibility of Regular n-Gons
Constructibility of Regular n-Gons

Factoring Composite Numbers - TI Education
Factoring Composite Numbers - TI Education

(1) 4(3x – 5)( 3x – 5 - Seaford School District
(1) 4(3x – 5)( 3x – 5 - Seaford School District

PRIME RINGS SATISFYING A POLYNOMIAL IDENTITY is still direct
PRIME RINGS SATISFYING A POLYNOMIAL IDENTITY is still direct

< 1 ... 174 175 176 177 178 179 180 181 182 ... 231 >

Factorization of polynomials over finite fields

In mathematics and computer algebra the factorization of a polynomial consists of decomposing it into a product of irreducible factors. This decomposition is theoretically possible and is unique for polynomials with coefficients in any field, but rather strong restrictions on the field of the coefficients are needed to allow the computation of the factorization by means of an algorithm. In practice, algorithms have been designed only for polynomials with coefficients in a finite field, in the field of rationals or in a finitely generated field extension of one of them.The case of the factorization of univariate polynomials over a finite field, which is the subject of this article, is especially important, because all the algorithms (including the case of multivariate polynomials over the rational numbers), which are sufficiently efficient to be implemented, reduce the problem to this case (see Polynomial factorization). It is also interesting for various applications of finite fields, such as coding theory (cyclic redundancy codes and BCH codes), cryptography (public key cryptography by the means of elliptic curves), and computational number theory.As the reduction of the factorization of multivariate polynomials to that of univariate polynomials does not have any specificity in the case of coefficients in a finite field, only polynomials with one variable are considered in this article.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report