Results 31 to 40 of about 11,891,302 (357)

The Mathematical Safe Problem and Its Solution (Part 1)

open access: yesКібернетика та комп'ютерні технології, 2020
Introduction. The problem of the mathematical safe arises in the theory of computer games and cryptographic applications. The article considers the formulation of the mathematical safe problem and the approach to its solution using systems of linear ...
S. Kryvyi, H. Hoherchak
doaj   +1 more source

Two Families of Optimal Ternary Cyclic Codes With Two Zeros

open access: yesIEEE Access, 2022
Cyclic codes are an important subclass of linear codes and have wide applications in consumer electronics, data storage systems and communication systems as they have efficient encoding and decoding algorithms.
Jinmei Fan, Binseng Wang
doaj   +1 more source

Calculation of Fourier-Galois transforms in reduced binary number systems [PDF]

open access: yesКомпьютерная оптика, 2018
The paper proposes a new method for calculating Fourier-Galois transforms (number-theoretical transforms), which are a modular analog of the discrete Fourier transform.
Vladimir Chernov
doaj   +1 more source

Enumeration of Involutions of Finite Rings

open access: yesJournal of New Theory, 2021
In this paper, we study a special class of elements in the finite commutative rings called involutions. An involution of a ring R is an element with the property that x^2-1=0 for some x in R.
Sajana Shaık, Chalapathi Tekurı
doaj   +1 more source

On Fields with Finite Information Density [PDF]

open access: yes, 2004
The existence of a natural ultraviolet cutoff at the Planck scale is widely expected. In a previous Letter, it has been proposed to model this cutoff as an information density bound by utilizing suitably generalized methods from the mathematical theory ...
A. Kempf   +25 more
core   +1 more source

Superregular Matrices over Finite Fields

open access: yesMathematics
A trivially zero minor of a matrix is a minor having all its terms in the Leibniz formula equal to zero. A matrix is superregular if all of its minors that are not trivially zero are nonzero.
Paulo Almeida   +2 more
doaj   +1 more source

Repeated-root constacyclic codes of length $ p_1p_2^t p^s $ and their dual codes

open access: yesAIMS Mathematics, 2023
Let $ \mathbb{F}_q $ be the finite field with $ q = p^{k} $ elements, and $ p_{1}, p_{2} $ be two distinct prime numbers different from $ p $. In this paper, we first calculate all the $ q $-cyclotomic cosets modulo $ p_1p_2^t $ as a preparation for the ...
Hongfeng Wu, Li Zhu
doaj   +1 more source

A Generalization of APN Functions for Odd Characteristic [PDF]

open access: yes, 2016
Almost perfect nonlinear (APN) functions on finite fields of characteristic two have been studied by many researchers. Such functions have useful properties and applications in cryptography, finite geometries and so on.
Kuroda, Masamichi, Tsujie, Shuhei
core   +2 more sources

Some Multisecret-Sharing Schemes over Finite Fields

open access: yesMathematics, 2020
A secret sharing scheme is a method of assigning shares for a secret to some participants such that only some distinguished subsets of these subsets can recover the secret while other subsets cannot.
Selda Çalkavur, Patrick Solé
doaj   +1 more source

Counting curves over finite fields

open access: yes, 2014
This is a survey on recent results on counting of curves over finite fields. It reviews various results on the maximum number of points on a curve of genus g over a finite field of cardinality q, but the main emphasis is on results on the Euler ...
van der Geer, Gerard
core   +1 more source

Home - About - Disclaimer - Privacy