Results 1  10
of
22
On Fast Multiplication of Polynomials Over Arbitrary Algebras
 Acta Informatica
, 1991
"... this paper we generalize the wellknown SchonhageStrassen algorithm for multiplying large integers to an algorithm for multiplying polynomials with coefficients from an arbitrary, not necessarily commutative, not necessarily associative, algebra A. Our main result is an algorithm to multiply polyno ..."
Abstract

Cited by 156 (6 self)
 Add to MetaCart
this paper we generalize the wellknown SchonhageStrassen algorithm for multiplying large integers to an algorithm for multiplying polynomials with coefficients from an arbitrary, not necessarily commutative, not necessarily associative, algebra A. Our main result is an algorithm to multiply polynomials of degree ! n in
Faster Algorithms for String Matching Problems: Matching the Convolution Bound
 In Proceedings of the 39th Symposium on Foundations of Computer Science
, 1998
"... In this paper we give a randomized O(n log n)time algorithm for the string matching with don't cares problem. This improves the FischerPaterson bound [10] from 1974 and answers the open problem posed (among others) by Weiner [30] and Galil [11]. Using the same technique, we give an O(n log n)t ..."
Abstract

Cited by 30 (5 self)
 Add to MetaCart
In this paper we give a randomized O(n log n)time algorithm for the string matching with don't cares problem. This improves the FischerPaterson bound [10] from 1974 and answers the open problem posed (among others) by Weiner [30] and Galil [11]. Using the same technique, we give an O(n log n)time algorithm for other problems, including subset matching and tree pattern matching [15, 21, 9, 7, 17] and (general) approximate threshold matching [28, 17]. As this bound essentially matches the complexity of computing of the Fast Fourier Transform which is the only known technique for solving problems of this type, it is likely that the algorithms are in fact optimal. Additionally, the technique used for the threshold matching problem can be applied to the online version of this problem, in which we are allowed to preprocess the text and require to process the pattern in time sublinear in the text length. This result involves an interesting variant of the KarpRabin fingerprint m...
A New Algorithm for Decoding ReedSolomon Codes
 in Communications, Information and Network Security, V.Bhargava, H.V.Poor, V.Tarokh, and S.Yoon
, 2002
"... A new algorithm is developed for decoding ReedSolomon codes. It uses fast Fourier transforms and computes the message symbols directly without explicitly finding error locations or error magnitudes. In the decoding radius (up to half of the minimum distance), the new method is easily adapted for er ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
A new algorithm is developed for decoding ReedSolomon codes. It uses fast Fourier transforms and computes the message symbols directly without explicitly finding error locations or error magnitudes. In the decoding radius (up to half of the minimum distance), the new method is easily adapted for error and erasure decoding. It can also detect all errors outside the decoding radius. Compared with the BerlekampMassey algorithm, discovered in the late 1960's, the new method seems simpler and more natural yet it has a similar time complexity.
Normal Bases over Finite Fields
, 1993
"... Interest in normal bases over finite fields stems both from mathematical theory and practical applications. There has been a lot of literature dealing with various properties of normal bases (for finite fields and for Galois extension of arbitrary fields). The advantage of using normal bases to repr ..."
Abstract

Cited by 9 (0 self)
 Add to MetaCart
Interest in normal bases over finite fields stems both from mathematical theory and practical applications. There has been a lot of literature dealing with various properties of normal bases (for finite fields and for Galois extension of arbitrary fields). The advantage of using normal bases to represent finite fields was noted by Hensel in 1888. With the introduction of optimal normal bases, large finite fields, that can be used in secure and e#cient implementation of several cryptosystems, have recently been realized in hardware. The present thesis studies various theoretical and practical aspects of normal bases in finite fields. We first give some characterizations of normal bases. Then by using linear algebra, we prove that F q n has a basis over F q such that any element in F q represented in this basis generates a normal basis if and only if some groups of coordinates are not simultaneously zero. We show how to construct an irreducible polynomial of degree 2 n with linearly i...
A new analysis of the mceliece cryptosystem based on qcldpc codes
 In Security and Cryptography for Networks – SCN’2008, volume 5229 of Lecture Notes in Computer Science
, 2008
"... Abstract. We improve our proposal of a new variant of the McEliece cryptosystem based on QCLDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now, but has two major drawbacks: long key and low transmission rate. Our variant is based on QCLDPC codes and is ..."
Abstract

Cited by 8 (2 self)
 Add to MetaCart
Abstract. We improve our proposal of a new variant of the McEliece cryptosystem based on QCLDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now, but has two major drawbacks: long key and low transmission rate. Our variant is based on QCLDPC codes and is able to overcome such drawbacks, while avoiding the known attacks. Recently, however, a new attack has been discovered that can recover the private key with limited complexity. We show that such attack can be avoided by changing the form of some constituent matrices, without altering the remaining system parameters. We also propose another variant that exhibits an overall increased security level. We analyze the complexity of the encryption and decryption stages by adopting efficient algorithms for processing large circulant matrices. The ToomCook algorithm and the short Winograd convolution are considered, that give a significant speedup in the cryptosystem operations.
Factoring highdegree polynomials over F2 with Niederreiter’s algorithm on
 the IBM SP2. Mathematics of Computation 68
, 1999
"... Abstract. A C implementation of Niederreiter’s algorithm for factoring polynomials over F2 is described. The most timeconsuming part of this algorithm, which consists of setting up and solving a certain system of linear equations, is performed in parallel. Once a basis for the solution space is fou ..."
Abstract

Cited by 7 (1 self)
 Add to MetaCart
Abstract. A C implementation of Niederreiter’s algorithm for factoring polynomials over F2 is described. The most timeconsuming part of this algorithm, which consists of setting up and solving a certain system of linear equations, is performed in parallel. Once a basis for the solution space is found, all irreducible factors of the polynomial can be extracted by suitable gcdcomputations. For this purpose, asymptotically fast polynomial arithmetic algorithms are implemented. These include Karatsuba & Ofman multiplication, Cantor multiplication and Newton inversion. In addition, a new efficient version of the halfgcd algorithm is presented. Sequential run times for the polynomial arithmetic and parallel run times for the factorization are given. A new “world record ” for polynomial factorization over the binary field is set by showing that a pseudorandomly selected polynomial of degree 300000 can be factored in about 10 hours on 256 nodes of the IBM SP2 at the Cornell Theory Center. 1.
Faster Multiplication in GF(2)[x]
"... Abstract. In this paper, we discuss an implementation of various algorithms for multiplying polynomials in GF(2)[x]: variants of the window methods, Karatsuba’s, ToomCook’s, Schönhage’s and Cantor’s algorithms. For most of them, we propose improvements that lead to practical speedups. ..."
Abstract

Cited by 5 (2 self)
 Add to MetaCart
Abstract. In this paper, we discuss an implementation of various algorithms for multiplying polynomials in GF(2)[x]: variants of the window methods, Karatsuba’s, ToomCook’s, Schönhage’s and Cantor’s algorithms. For most of them, we propose improvements that lead to practical speedups.
Arithmetic and factorization of polynomials over F_2
 PROC. ISSAC 96
, 1996
"... We describe algorithms for polynomial multiplication and polynomial factorization over the binary field F2 and their implementation. They allow polynomials of degree up to 100,000 to be factored in about one day of CPU time. ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
We describe algorithms for polynomial multiplication and polynomial factorization over the binary field F2 and their implementation. They allow polynomials of degree up to 100,000 to be factored in about one day of CPU time.
The BlackBox Niederreiter Algorithm and its Implementation over
 the Binary Field”, Math. Comp
"... Abstract. The most timeconsuming part of the Niederreiter algorithm for factoring univariate polynomials over finite fields is the computation of elements of the nullspace of a certain matrix. This paper describes the socalled “blackbox ” Niederreiter algorithm, in which these elements are found ..."
Abstract

Cited by 2 (0 self)
 Add to MetaCart
Abstract. The most timeconsuming part of the Niederreiter algorithm for factoring univariate polynomials over finite fields is the computation of elements of the nullspace of a certain matrix. This paper describes the socalled “blackbox ” Niederreiter algorithm, in which these elements are found by using a method developed by Wiedemann. The main advantages over an approach based on Gaussian elimination are that the matrix does not have to be stored in memory and that the computational complexity of this approach is lower. The blackbox Niederreiter algorithm for factoring polynomials over the binary field was implemented in the C programming language, and benchmarks for factoring highdegree polynomials over this field are presented. These benchmarks include timings for both a sequential implementation and a parallel implementation running on a small cluster of workstations. In addition, the Wan algorithm, which was recently introduced, is described, and connections between (implementation aspects of) Wan’s and Niederreiter’s algorithm are given. 1.