Faster Multiplication in GF(2)[x]
暂无分享,去创建一个
Richard P. Brent | Pierrick Gaudry | Emmanuel Thomé | Paul Zimmermann | P. Zimmermann | R. Brent | P. Gaudry | Emmanuel Thomé
[1] Joachim von zur Gathen,et al. Arithmetic and factorization of polynomials over F_2 , 1996, ISSAC 1996.
[2] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[3] David G. Cantor,et al. On arithmetical algorithms over finite fields , 1989, Journal of combinatorial theory. Series A.
[4] Joris van der Hoeven. The truncated fourier transform and applications , 2004, ISSAC '04.
[5] Susanne Wetzel,et al. LiDIA—a library for computational number theory , 1997, SIGS.
[6] S. Cook,et al. ON THE MINIMUM COMPUTATION TIME OF FUNCTIONS , 1969 .
[7] 晋輝 趙,et al. H. Cohen, G. Frey, R. Avanzi, C. Doche, T. Lange, K. Nguyen and F. Vercauteren (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography, Discrete Math. Appl. (Boca Raton)., Chapman & Hall/CRC, 2006年,xxxiv + 808ページ. , 2009 .
[8] Pierrick Gaudry,et al. A gmp-based implementation of schönhage-strassen's large integer multiplication algorithm , 2007, ISSAC '07.
[9] Arjen K. Lenstra,et al. A Kilobit Special Number Field Sieve Factorization , 2007, ASIACRYPT.
[10] Emmanuel Thomé,et al. Subquadratic Computation of Vector Generating Polynomials and Improvement of the Block Wiedemann Algorithm , 2002, J. Symb. Comput..
[11] Richard P. Brent,et al. A Multi-level Blocking Distinct Degree Factorization Algorithm , 2007, ArXiv.
[12] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[13] Peter Roelse. Factoring high-degree polynomials over F2 with Niederreiter's algorithm on the IBM SP2 , 1999, Math. Comput..
[14] Arnold Schönhage,et al. Schnelle Multiplikation von Polynomen über Körpern der Charakteristik 2 , 1977, Acta Informatica.
[15] L. G. Lidia,et al. A library for computational number theory , 1997 .
[16] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[17] André Weimerskirch,et al. Generic GF(2) Arithmetic in Software and Its Application to ECC , 2003, ACISP.
[18] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[19] Joachim von zur Gathen,et al. Arithmetic and factorization of polynomial over F2 (extended abstract) , 1996, ISSAC '96.
[20] Joachim von zur Gathen,et al. Polynomial factorization over F2 , 2002, Math. Comput..
[21] Peter L. Montgomery,et al. Five, six, and seven-term Karatsuba-like formulae , 2005, IEEE Transactions on Computers.
[22] Pierrick Gaudry,et al. The mpFq library and implementing curve-based key exchanges , 2007 .
[23] C. Small. Arithmetic of Finite Fields , 1991 .
[24] David G. Gantor. On arithmetical algorithms over finite fields , 1989 .
[25] Marco Bodrato,et al. Towards Optimal Toom-Cook Multiplication for Univariate and Multivariate Polynomials in Characteristic 2 and 0 , 2007, WAIFI.