Results 1 - 10
of
1,864
Quantum Arithmetic on Galois Fields
, 2002
"... In this paper we discuss the problem of performing elementary finite field arithmetic on a quantum computer. Of particular interest, is the controlled-multiplication operation, which is the only groupspecific operation in Shor’s algorithms for factoring and solving the Discrete Log Problem. We descr ..."
Abstract
- Add to MetaCart
describe how to build quantum circuits for performing this operation on the generic Galois fields GF(p k), as well as the boundary cases GF(p) and GF(2 k). We give the detailed size, width and depth complexity of such circuits, which ultimately will allow us to obtain detailed upper bounds on the amount
Galois Field Library: Reference Manual
, 1998
"... Galois Field Library (GFL) is a portable general-purpose computational library of functions written in C for working over finite fields. The library provides a comprehensive treatment of operations in prime fields and their arbitrary finite extensions. Application programmers should find this librar ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Galois Field Library (GFL) is a portable general-purpose computational library of functions written in C for working over finite fields. The library provides a comprehensive treatment of operations in prime fields and their arbitrary finite extensions. Application programmers should find
Bessel Function in Galois Fields
, 2001
"... ABSTRACT Analogues of Bessel functions in function fields of nonzero characteristic are investigated. Certain basic properties , are derived. It was found that (i) their domain and range are contained in the whole universe, (ii) basic recurrence relations hold, (iii) they are not one -to -one, and ..."
Abstract
- Add to MetaCart
ABSTRACT Analogues of Bessel functions in function fields of nonzero characteristic are investigated. Certain basic properties , are derived. It was found that (i) their domain and range are contained in the whole universe, (ii) basic recurrence relations hold, (iii) they are not one -to -one
Galois Field Commitment Scheme
, 2006
"... In [3] the authors give the first mathematical formalization of an unconditionally secure commitment scheme. Their construction has some similarities to one used to build authentication codes, so they raise the question whether there is some relation between commitment schemes and authentication sc ..."
Abstract
- Add to MetaCart
In [3] the authors give the first mathematical formalization of an unconditionally secure commitment scheme. Their construction has some similarities to one used to build authentication codes, so they raise the question whether there is some relation between commitment schemes and authentication schemes. They conjecture that authentication schemes with arbitration can be used, but they stress that the information flows are different. In this
Cryptosystem Over Binary Galois Fields in
"... Abstract—Elliptic Curve Cryptography has many features that distinguish it from other cryptosystems, one of which is that it is still relatively new cryptosystem. As such, many improvements in performance have been discovered during the last few years for Galois Field operations both in Polynomial B ..."
Abstract
- Add to MetaCart
Abstract—Elliptic Curve Cryptography has many features that distinguish it from other cryptosystems, one of which is that it is still relatively new cryptosystem. As such, many improvements in performance have been discovered during the last few years for Galois Field operations both in Polynomial
Results 1 - 10
of
1,864