• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Growing a Factor Tree
Growing a Factor Tree

Zeros of a Polynomial Function
Zeros of a Polynomial Function

MATHEMATICAL CRYPTOLOGY
MATHEMATICAL CRYPTOLOGY

S 2
S 2

Lecture 13 - University of Virginia, Department of Computer Science
Lecture 13 - University of Virginia, Department of Computer Science

The ring of evenly weighted points on the projective line
The ring of evenly weighted points on the projective line

Application of the graded Posner theorem
Application of the graded Posner theorem

Lubin-Tate Formal Groups and Local Class Field
Lubin-Tate Formal Groups and Local Class Field

COMP108 Algorithmic Foundations
COMP108 Algorithmic Foundations

Equidistribution and Primes - Princeton Math
Equidistribution and Primes - Princeton Math

The Chebotarëv Density Theorem Applications
The Chebotarëv Density Theorem Applications

x whenever f(x)
x whenever f(x)

IOSR Journal of Computer Engineering (IOSR-JCE)
IOSR Journal of Computer Engineering (IOSR-JCE)

Algebra II
Algebra II

LECTURE 1: REPRESENTATIONS OF SYMMETRIC GROUPS, I 1. Introduction S
LECTURE 1: REPRESENTATIONS OF SYMMETRIC GROUPS, I 1. Introduction S

On the Computation of Confluent Hypergeometric Functions for
On the Computation of Confluent Hypergeometric Functions for

Module 2 Topic C "Math News"
Module 2 Topic C "Math News"

THE CHAIN LEMMA FOR KUMMER ELEMENTS OF DEGREE 3
THE CHAIN LEMMA FOR KUMMER ELEMENTS OF DEGREE 3

Lecture8
Lecture8

Uniform finite generation of the rotation group
Uniform finite generation of the rotation group

Similarity Join in Metric Spaces using eD-Index
Similarity Join in Metric Spaces using eD-Index

... the structure and they are utilized by the pivot-based strategy. Figure 4 illustrates the basic principle of this strategy, the object x is one object of an examined pair and pi is the reference object, called pivot. Provided that the distance between any object and pi is known, the gray area repres ...
Math 601 Solutions to Homework 3
Math 601 Solutions to Homework 3

Square values of Euler`s function
Square values of Euler`s function

Euclid`s Number-Theoretical Work
Euclid`s Number-Theoretical Work

Chebyshev Expansions - Society for Industrial and Applied
Chebyshev Expansions - Society for Industrial and Applied

< 1 ... 60 61 62 63 64 65 66 67 68 ... 231 >

Factorization of polynomials over finite fields

In mathematics and computer algebra the factorization of a polynomial consists of decomposing it into a product of irreducible factors. This decomposition is theoretically possible and is unique for polynomials with coefficients in any field, but rather strong restrictions on the field of the coefficients are needed to allow the computation of the factorization by means of an algorithm. In practice, algorithms have been designed only for polynomials with coefficients in a finite field, in the field of rationals or in a finitely generated field extension of one of them.The case of the factorization of univariate polynomials over a finite field, which is the subject of this article, is especially important, because all the algorithms (including the case of multivariate polynomials over the rational numbers), which are sufficiently efficient to be implemented, reduce the problem to this case (see Polynomial factorization). It is also interesting for various applications of finite fields, such as coding theory (cyclic redundancy codes and BCH codes), cryptography (public key cryptography by the means of elliptic curves), and computational number theory.As the reduction of the factorization of multivariate polynomials to that of univariate polynomials does not have any specificity in the case of coefficients in a finite field, only polynomials with one variable are considered in this article.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report