Simplicial set: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>Linas
 
en>SuperJew
Line 1: Line 1:
== Louis Vuitton Sydney  Creasy ==
In [[mathematics]], the '''polynomial basis''' is a [[basis (linear algebra)|basis]] for [[finite extension]]s of [[finite field]]s.


If you been hankering to beam browser tabs for your TV (via an HDMIorWiFiconnected mobile device, of course), CheapCast latest update enables exactly that. Home construction rose to their highest level in nearly 51/2 years in October, suggesting the housing industry recovery remained intact despite recent signs of slowing down. <br><br>(v33) The natural consequence of righteousness is prosperity. This may not be great wealth or [http://www.originpublishing.com.au/common/lightbox/css/contact.asp Louis Vuitton Sydney] fame, but the Lord provides for those who love him.. Features called Hub and Hub permit the users to enjoy various Television shows, movies, and social games. With the help of Beam feature, you can share even large HD videos with other phones by a mere touch. <br><br>Why didn she just include you? [Creasy doesn answer] Pita: Do you think my mom loves? Creasy: I think she afraid of me. But not the same way most people are. I like to assign my students a topic, such as and give my students the task to find out the different types of volcanos that exist, and to explain some of the similarities and differences between the different types. This activity provides students having the ability to practice a number of skills that is involved in the research process, yet still time giving them useful reading and speaking practice. <br><br>Just about everyone who has written at least one has sold one, so that a huge opportunity a [http://www.enginegroup.com.au/dynamo/browser.asp Cheap Nike Australia] lot of people are missing out on. Great post, and up the good work yourself!. What they need to understand is that a focused internet marketing campaign which is properly executed can greatly boost the profile of their business. Even small local businesses can benefit greatly from a web-based marketing campaign because so many [http://www.romavilla.com/graphics/products/large/constants.asp Nike Australia] people are now using online methods (including using searches from mobile devices) to find businesses in their area. <br><br>Concentrate on the cocktail shrimp, smoked salmon, and fruit, salads or vegetable platters. Go easy around the accompanying sauces and dips. By concentrating on the most costeffective charities, we can do that for as many people as possible.Reference: 3. See Branko Milanovic, ''True world income distribution, 1988 and 1993: First calculation according to household surverys alone'', Economic Journal issue 112, 2002, p. <br><br>Open among the below links and go into the URL you want to visit anonymously. They provide both free and paid SSL [http://www.glendavishotel.com.au/images/content.asp Tiffany And Co Brisbane] VPN service. To have offered to run a server included in a larger network. Unfortunately an attacker who wishes to attack whole network might end up targeting your machine to be part of it, even if nobody who uses your server has anything to do with a particular dispute.<ul>
Let α ∈ [[Finite field|GF(''p''<sup>''m''</sup>)]] be the root of a [[primitive polynomial (field theory)|primitive polynomial]] of degree ''m'' over GF(''p''). The polynomial basis of GF(''p''<sup>''m''</sup>) is then
 
  <li>[http://www.jinzhoushi.net/forum.php?mod=viewthread&tid=23182&fromuid=2017 http://www.jinzhoushi.net/forum.php?mod=viewthread&tid=23182&fromuid=2017]</li>
 
  <li>[http://www.kaoshi886.com/forum.php?mod=viewthread&tid=185293 http://www.kaoshi886.com/forum.php?mod=viewthread&tid=185293]</li>
 
  <li>[http://www.juegosetnicos.com.ar/spip.php?article87&lang=ru/ http://www.juegosetnicos.com.ar/spip.php?article87&lang=ru/]</li>
 
  <li>[http://lesalternatifslille.free.fr/spip.php?article1&lang=fr/ http://lesalternatifslille.free.fr/spip.php?article1&lang=fr/]</li>
 
  <li>[http://jz.791.com/news/html/?222747.html http://jz.791.com/news/html/?222747.html]</li>
 
</ul>


== Ray Ban Wayfarer ==
:<math>
\{ 1, \alpha, \ldots, \alpha^{m-1}\}
</math> <ref>
{{cite book | last = Roman | first = Steven | authorlink = Steven Roman | title = Field Theory | publisher = Springer-Verlag | year = 1995 | location = New York | isbn = 0-387-94407-9 }}
</ref>


The only group to not condemn the vandals' actions was the Committee to End Homelessness, a group of activists [http://www.originpublishing.com.au/graphics/titles/rollovers.asp Ray Ban Wayfarer] and former homeless people that has a similar name to, but no affiliation with, the bigger Greater Victoria Coalition to End Homelessness. In a statement, Phil Lyons said the group had nothing to do with the attacks, and went on to say: "We can see the reasons of these attacks but [http://www.taoist.org.au/custom/emailsend.asp Cheap Polo Ralph Lauren Australia] do not favour them. <br><br>Form W7(SP), Solicitud de Nmero de Identificacin Personal del Contribuyente del Servicio de Impuestos Internos (PDF) is available for use by Spanish speakers. They review the applicant's documentation and forward the completed Form W7 to IRS for processing.. <br><br>Blarney Rock was a beacon of bonhomie late at night after trodding it's of 42nd Street. It was cheap, [http://www.romavilla.com/custom/ordersummary.asp Mbt Australia] near to home, and they served food in addition to booze. I find it hard to undergo the AFA site because there are a lot of women. I wish I had a directory of the neighborhood Russian/Ukranian agencies by cities instead of an alphabetical listing. <br><br>Fearing that God is locating a way to sneak back into the kingdom through ideas of quantum consciousness, militant atheists go on the attack against neardeath experiences, telepathy, action at a distance, and all manifestations of purposedriven evolution. Such as the guardians in "A Game of Thrones," these militants haven't actually looked over the wall, and given their absolute conviction that the human brain is the only supply of awareness in the universe, you'd believe that speculative thinking on the subject wouldn't be so threatening. <br><br>A number of different techniques are for sale to harvesting hair follicles during hair transplantation, each with it's own advantages and disadvantages. Regardless of which donor harvesting technique is employed, the proper extraction of the hair follicle is paramount to [http://www.enginegroup.com.au/news/common.asp New Balance Shoes] guarantee the viability of the transplanted hair and steer clear of transection, the cutting of the hair shaft from the hair follicle. <br><br>Amazon chose to not build. Second, their insistance the florida sales tax be waived for them was unreasonable. The thing is, people don't get one shot. Even on my PvP geared Rogue, normal hits from boss monsters won't oneshot me. Serve vegetables like a salad with skewer on the side. In either case is just as good however, when serving guests with unknown dietary restrictions, it is best to serve everything seperatly, allowing them to mix and match to their taste.(Kids enjoy it this way too!) Enjoy!. <br><br>He told us he was just a manager (when the trainee told us he was the owner) and couldn't perform that function. Very weird since he seemed very willing to take 7$ ??!I believe in karma. Dell has bridged the second by offering home computers around the business sites but the home customers do not get the option of business computers. Home clients are told they can buy from the small business site if they like causing them to be feel less valued by Dell.<ul>
The set of elements of GF(''p''<sup>''m''</sup>) can then be represented as:
 
 
  <li>[http://mazzworld.com/forum/viewtopic.php?f=4&t=1035589 http://mazzworld.com/forum/viewtopic.php?f=4&t=1035589]</li>
:<math>
 
\{ 0, 1, \alpha, \alpha^2, \ldots, \alpha^{p^{m}-2} \}
  <li>[http://verdamilio.net/tonio/spip.php?article1739/ http://verdamilio.net/tonio/spip.php?article1739/]</li>
</math>
 
 
  <li>[http://dz.jinmozhe.com/forum.php?mod=viewthread&tid=8922&fromuid=2217 http://dz.jinmozhe.com/forum.php?mod=viewthread&tid=8922&fromuid=2217]</li>
using [[Zech's logarithms]].
 
 
  <li>[http://bbs.17caomei.com/forum.php?mod=viewthread&tid=512792 http://bbs.17caomei.com/forum.php?mod=viewthread&tid=512792]</li>
==Addition==
 
Addition using the polynomial basis is as simple as addition modulo ''p''. For example, in GF(3<sup>''m''</sup>):
  <li>[http://www.zgxmzsw.com/bbs/forum.php?mod=viewthread&tid=417682 http://www.zgxmzsw.com/bbs/forum.php?mod=viewthread&tid=417682]</li>
 
 
:<math>(2\alpha^2 + 2\alpha + 1) + (2\alpha + 2) = 2\alpha^2 + 4\alpha + 3 \mod{3} = 2\alpha^2 + \alpha</math>
</ul>
 
In GF(2<sup>''m''</sup>), addition is especially easy, since addition and subtraction modulo 2 are the same thing, and furthermore this operation can be done in hardware using the basic [[XOR]] logic gate.
 
==Multiplication==
Multiplication of two elements in the polynomial basis can be accomplished in the normal way of multiplication, but there are a number of ways to speed up multiplication, especially in hardware. Using the straightforward method to multiply two elements in GF(''p''<sup>''m''</sup>) requires up to ''m''<sup>2</sup> multiplications in GF(''p'') and up to ''m''<sup>2</sup> &minus; ''m'' additions in GF(''p'').
 
Some of the methods for reducing these values include:
 
*Lookup tables &mdash; a prestored table of results; mainly used for small fields, otherwise the table is too large to implement
*The [[Karatsuba-Ofman algorithm]] &mdash; repeatedly breaking the multiplication into pieces, decreasing the total number of multiplications but increasing the number of additions.  As seen above, addition is very simple, but the overhead in breaking down and recombining the parts involved in Karatsuba-Ofman make it prohibitive for hardware, although it is often used in software.  It can even be used for general multiplication, and is done in many [[computer algebra system]]s such as [[Waterloo Maple]].
*[[Linear feedback shift register]]-based multiplication
*[[Subfield]] computations &mdash; breaking the multiplication in GF(''p''<sup>''m''</sup>) to multiplications in GF(''p''<sup>''x''</sup>) and GF(''p''<sup>''y''</sup>), where ''x'' &times; ''y'' = ''m''. This is not frequently used for cryptographic purposes, since some composite degree fields are avoided because of known attacks on them.
*Pipelined multipliers &mdash; storing intermediate results in buffers so that new values can be loaded into the multiplier faster
*Systolic multipliers &mdash; using many cells that communicate with neighboring cells only;  typically systolic devices are used for computation-intensive operations where input and output sizes are not as important, such as multiplication.
 
==Squaring==
Squaring is an important operation because it can be used for general exponentiation as well as inversion of an element. The most basic way to square an element in the polynomial basis would be to apply a chosen multiplication algorithm on an element twice. In general case, there are minor optimizations that can be made, specifically related to the fact that when multiplying an element by itself, all the bits will be the same. In practice, however, the [[irreducible polynomial]] for the field is chosen with very few nonzero coefficients which makes squaring in polynomial basis of GF(2<sup>''m''</sup>) much simpler than multiplication.<ref>{{Cite document | last1 = Huapeng | first1 = Wu | contribution = On Complexity of Polynomial Basis Squaring in F(2<sup>m</sup>) | title = Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14–15, 2000,  | publisher = Springer | pages = 118 | year = 2001 | postscript = <!--None--> }}</ref>
 
==Inversion==
Inversion of elements can be accomplished in many ways, including:
 
*Lookup tables &mdash; once again, only for small fields otherwise the table is too large for implementation
*Subfield inversion &mdash; by solving systems of equations in subfields
*Repeated square and multiply &mdash; for example in GF(2<sup>''m''</sup>), ''A''<sup>&minus;1</sup> = ''A''<sup>2''m'' &minus; 2</sup>
*The [[Extended Euclidean algorithm]]
*The [[Itoh-Tsujii inversion algorithm]]
 
==Usage==
The polynomial basis is frequently used in [[cryptography|cryptographic]] applications that are based on the [[discrete logarithm problem]] such as [[elliptic curve cryptography]]. 
 
The advantage of the polynomial basis is that multiplication is relatively easy. For contrast, the [[normal basis]] is an alternative to the polynomial basis and it has more complex multiplication but squaring is very simple. Hardware implementations of polynomial basis arithmetic usually consume more power than their normal basis counterparts.
 
==References==
<references/>
 
==See also==
*[[normal basis]]
*[[dual basis in a field extension|dual basis]]
*[[change of bases]]
 
{{DEFAULTSORT:Polynomial Basis}}
[[Category:Linear algebra]]
[[Category:Field theory]]
[[Category:Theory of cryptography]]

Revision as of 22:51, 18 November 2013

In mathematics, the polynomial basis is a basis for finite extensions of finite fields.

Let α ∈ GF(pm) be the root of a primitive polynomial of degree m over GF(p). The polynomial basis of GF(pm) is then

[1]

The set of elements of GF(pm) can then be represented as:

using Zech's logarithms.

Addition

Addition using the polynomial basis is as simple as addition modulo p. For example, in GF(3m):

In GF(2m), addition is especially easy, since addition and subtraction modulo 2 are the same thing, and furthermore this operation can be done in hardware using the basic XOR logic gate.

Multiplication

Multiplication of two elements in the polynomial basis can be accomplished in the normal way of multiplication, but there are a number of ways to speed up multiplication, especially in hardware. Using the straightforward method to multiply two elements in GF(pm) requires up to m2 multiplications in GF(p) and up to m2m additions in GF(p).

Some of the methods for reducing these values include:

  • Lookup tables — a prestored table of results; mainly used for small fields, otherwise the table is too large to implement
  • The Karatsuba-Ofman algorithm — repeatedly breaking the multiplication into pieces, decreasing the total number of multiplications but increasing the number of additions. As seen above, addition is very simple, but the overhead in breaking down and recombining the parts involved in Karatsuba-Ofman make it prohibitive for hardware, although it is often used in software. It can even be used for general multiplication, and is done in many computer algebra systems such as Waterloo Maple.
  • Linear feedback shift register-based multiplication
  • Subfield computations — breaking the multiplication in GF(pm) to multiplications in GF(px) and GF(py), where x × y = m. This is not frequently used for cryptographic purposes, since some composite degree fields are avoided because of known attacks on them.
  • Pipelined multipliers — storing intermediate results in buffers so that new values can be loaded into the multiplier faster
  • Systolic multipliers — using many cells that communicate with neighboring cells only; typically systolic devices are used for computation-intensive operations where input and output sizes are not as important, such as multiplication.

Squaring

Squaring is an important operation because it can be used for general exponentiation as well as inversion of an element. The most basic way to square an element in the polynomial basis would be to apply a chosen multiplication algorithm on an element twice. In general case, there are minor optimizations that can be made, specifically related to the fact that when multiplying an element by itself, all the bits will be the same. In practice, however, the irreducible polynomial for the field is chosen with very few nonzero coefficients which makes squaring in polynomial basis of GF(2m) much simpler than multiplication.[2]

Inversion

Inversion of elements can be accomplished in many ways, including:

  • Lookup tables — once again, only for small fields otherwise the table is too large for implementation
  • Subfield inversion — by solving systems of equations in subfields
  • Repeated square and multiply — for example in GF(2m), A−1 = A2m − 2
  • The Extended Euclidean algorithm
  • The Itoh-Tsujii inversion algorithm

Usage

The polynomial basis is frequently used in cryptographic applications that are based on the discrete logarithm problem such as elliptic curve cryptography.

The advantage of the polynomial basis is that multiplication is relatively easy. For contrast, the normal basis is an alternative to the polynomial basis and it has more complex multiplication but squaring is very simple. Hardware implementations of polynomial basis arithmetic usually consume more power than their normal basis counterparts.

References

  1. 20 year-old Real Estate Agent Rusty from Saint-Paul, has hobbies and interests which includes monopoly, property developers in singapore and poker. Will soon undertake a contiki trip that may include going to the Lower Valley of the Omo.

    My blog: http://www.primaboinca.com/view_profile.php?userid=5889534
  2. Template:Cite document

See also