• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Chapter 2 Line Segment Intersection
Chapter 2 Line Segment Intersection

student sample chapter 5 - Pearson Higher Education
student sample chapter 5 - Pearson Higher Education

njit-etd2001-032 - New Jersey Institute of Technology
njit-etd2001-032 - New Jersey Institute of Technology

Slides - FI MUNI
Slides - FI MUNI

There a two types of logarithmic, one is Exponential Function
There a two types of logarithmic, one is Exponential Function

2.6 Exponents and Order of Operations
2.6 Exponents and Order of Operations

3.3 | Power Functions and Polynomial Functions
3.3 | Power Functions and Polynomial Functions

Document
Document

Document
Document

... Find a set of permutations corresponding to the internal nodes such that the total weight w(T) is minimized, where w(T) is defined as: w(T) = ∑ d(x,y) for all (x,y) in T Here d(.,.) is the genome rearrangement distance metric defined on pairs of permutations. ...
Constraint Satisfaction Problems with Infinite Templates
Constraint Satisfaction Problems with Infinite Templates

Algebra Curriculum Guide – Unit 1 Expressions
Algebra Curriculum Guide – Unit 1 Expressions

V_HW#5answers - Math User Home Pages
V_HW#5answers - Math User Home Pages

Efficient signature generation by smart cards
Efficient signature generation by smart cards

PPT
PPT

... • Need to solve the Primality testing problem – the decision problem to decide whether a number is a prime CS555 ...
4. Preliminary remarks on Algebraic Groups
4. Preliminary remarks on Algebraic Groups

RULED SURFACES WITH NON-TRIVIAL SURJECTIVE
RULED SURFACES WITH NON-TRIVIAL SURJECTIVE

Rédei symbols and arithmetical mild pro-2-groups
Rédei symbols and arithmetical mild pro-2-groups

PUTNAM TRAINING PROBLEMS, 2011 Exercises 1. Induction. 1.1
PUTNAM TRAINING PROBLEMS, 2011 Exercises 1. Induction. 1.1

The Wolf Colony Algorithm and Its Application
The Wolf Colony Algorithm and Its Application

COMPARISON OF THE DISCRETE AND CONTINUOUS
COMPARISON OF THE DISCRETE AND CONTINUOUS

... presented. On the other hand, even though ϕ2 : Hcont (P ) → Hdisc (P ) is not an isomorphism for the groups of Theorem B, it is not clear whether ϕ2 : H2disc (P ) → H2cont (P ) is an isomorphism or not. Let us explain briefly the main idea behind these constructions. Recall that a group G is called ...
TWO-VARIABLE FIRST-ORDER LOGIC WITH EQUIVALENCE
TWO-VARIABLE FIRST-ORDER LOGIC WITH EQUIVALENCE

... isfiability problems for EQ22 are both 2-NExpTime-hard. Taking into account the above-mentioned results, this settles, for all k ≥ 1, the complexity of satisfiability and finite satisfiability for both EC2k and EQ2k : all these problems are NExpTimecomplete if k = 1, 2-NExpTime-complete if k = 2, an ...
On condition numbers of polynomial eigenvalue problems
On condition numbers of polynomial eigenvalue problems

... where J1 , J2 , . . . , Jκ0 are the p0 ×p0 Jordan blocks of λ0 , and J˜ contains all the Jordan blocks of λ0 of order less than p0 and all the Jordan blocks that correspond to the rest of the eigenvalues of P (λ). Moreover, x1,1 , x2,1 , . . . , xκ0 ,1 are right eigenvectors of P (λ) that correspond ...
School of Mathematics and Statistics The University of Sydney
School of Mathematics and Statistics The University of Sydney

(Public-Key) Cryptography
(Public-Key) Cryptography

IC/2010/073 United Nations Educational, Scientific and
IC/2010/073 United Nations Educational, Scientific and

< 1 ... 35 36 37 38 39 40 41 42 43 ... 231 >

Factorization of polynomials over finite fields

In mathematics and computer algebra the factorization of a polynomial consists of decomposing it into a product of irreducible factors. This decomposition is theoretically possible and is unique for polynomials with coefficients in any field, but rather strong restrictions on the field of the coefficients are needed to allow the computation of the factorization by means of an algorithm. In practice, algorithms have been designed only for polynomials with coefficients in a finite field, in the field of rationals or in a finitely generated field extension of one of them.The case of the factorization of univariate polynomials over a finite field, which is the subject of this article, is especially important, because all the algorithms (including the case of multivariate polynomials over the rational numbers), which are sufficiently efficient to be implemented, reduce the problem to this case (see Polynomial factorization). It is also interesting for various applications of finite fields, such as coding theory (cyclic redundancy codes and BCH codes), cryptography (public key cryptography by the means of elliptic curves), and computational number theory.As the reduction of the factorization of multivariate polynomials to that of univariate polynomials does not have any specificity in the case of coefficients in a finite field, only polynomials with one variable are considered in this article.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report