On canonical subfield preserving polynomials
نویسندگان
چکیده
منابع مشابه
Topology Preserving 2-subfield 3d Thinning Algorithms
This paper presents a new family of 3D thinning algorithms for extracting skeleton–like shape features (i.e, centerline, medial surface, and topological kernel) from volumetric images. A 2-subfield strategy is applied: all points in a 3D picture are partitioned into two subsets which are alternatively activated. At each iteration, a parallel operator is applied for deleting some border points i...
متن کاملCanonical Commutation Relation Preserving Maps
We study maps preserving the Heisenberg commutation relation ab − ba = 1. We find a one-parameter deformation of the standard realization of the above algebra in terms of a coordinate and its dual derivative. It involves a non-local “coordinate” operator while the dual “derivative” is just the Jackson finite-difference operator. Substitution of this realization into any differential operator in...
متن کاملShape Preserving Approximation by Polynomials
We are going to survey recent developments and achievements in shape preserving approximation by polynomials. We wish to approximate a function f deened on a nite interval, say ?1; 1], while preserving certain intrinsic \shape" properties. To be speciic we demand that the approximation process preserve properties of f , like its sign in all or part of the interval, its monotonicity, convexity, ...
متن کاملRoot Preserving Transformations of Polynomials
Consider the real vector space P2 of all polynomials of degree at most 2. High-school students study the roots of the polynomials in P2, while linear algebra students study linear transformations on P2. Is it possible to bring these two groups together to do some joint research? For example, a linear algebra student chooses a specific linear transformation T : P2 → P2 and asks others to study t...
متن کاملPowers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
In this paper we investigate univariate algebraic attacks on filter generators over extension fields Fq = F2n with focus on the WelchGong (WG) family of stream ciphers. Our main contribution is to break WG-5, WG-7, WG-8 and WG-16 by combining results on the so-called spectral immunity (minimum distance of certain cyclic codes) with properties of the WG type stream cipher construction. The spect...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Acta Arithmetica
سال: 2014
ISSN: 0065-1036,1730-6264
DOI: 10.4064/aa166-1-3