Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the tensor rank of multiplication in finite extensions of finite fields and related issues in algebraic geometry
S Ballet, J Pieltant, M Rambaud… - Russian …, 2021 - iopscience.iop.org
In this paper, we give a survey of the known results concerning the tensor rank of
multiplication in finite extensions of finite fields, enriched with some unpublished recent …
multiplication in finite extensions of finite fields, enriched with some unpublished recent …
Squares of random linear codes
I Cascudo, R Cramer, D Mirandola… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Given a linear code C, one can define the dth power of C as the span of all componentwise
products of d elements of C. A power of C may quickly fill the whole space. Our purpose is to …
products of d elements of C. A power of C may quickly fill the whole space. Our purpose is to …
Torsion limits and Riemann-Roch systems for function fields and applications
The Ihara limit (or constant) has been a central problem of study in the asymptotic theory of
global function fields (or equivalently, algebraic curves over finite fields). It addresses global …
global function fields (or equivalently, algebraic curves over finite fields). It addresses global …
Asymptotically good binary linear codes with asymptotically good self-intersection spans
H Randriambololona - IEEE transactions on information theory, 2013 - ieeexplore.ieee.org
If C is a binary linear code, let C< 2> be the linear code spanned by intersections of pairs of
codewords of C. We construct an asymptotically good family of binary linear codes such that …
codewords of C. We construct an asymptotically good family of binary linear codes such that …
The arithmetic codex
In this invited talk, 1 we introduce the notion of arithmetic codex, or codex for short. It
encompasses several well-established notions from cryptography (arithmetic secret sharing …
encompasses several well-established notions from cryptography (arithmetic secret sharing …
On the construction of elliptic Chudnovsky-type algorithms for multiplication in large extensions of finite fields
S Ballet, A Bonnecaze, M Tukumuli - Journal of Algebra and Its …, 2016 - World Scientific
We indicate a strategy in order to construct bilinear multiplication algorithms of type
Chudnovsky in large extensions of any finite field. In particular, using the symmetric version …
Chudnovsky in large extensions of any finite field. In particular, using the symmetric version …
New uniform and asymptotic upper bounds on the tensor rank of multiplication in extensions of finite fields
J Pieltant, H Randriam - Mathematics of Computation, 2015 - ams.org
We obtain new uniform upper bounds for the tensor rank of the multiplication in the
extensions of the finite fields $\mathbb {F} _q $ for any prime power $ q $; moreover, these …
extensions of the finite fields $\mathbb {F} _q $ for any prime power $ q $; moreover, these …
[PDF][PDF] On some bounds for symmetric tensor rank of multiplication in finite fields
S Ballet, J Pieltant, M Rambaud, J Sijsling - arxiv preprint arxiv …, 2016 - arxiv.org
We establish new upper bounds about symmetric bilinear complexity in any extension of
finite fields. Note that these bounds are not asymptotical but uniform. Moreover we give …
finite fields. Note that these bounds are not asymptotical but uniform. Moreover we give …
Shimura modular curves and asymptotic symmetric tensor rank of multiplication in any finite field
S Ballet, J Chaumine, J Pieltant - International Conference on Algebraic …, 2013 - Springer
We obtain new asymptotical bounds for the symmetric tensor rank of multiplication in any
finite extension of any finite field F_q. In this aim, we use the symmetric Chudnovsky-type …
finite extension of any finite field F_q. In this aim, we use the symmetric Chudnovsky-type …
Introducing locality in some generalized AG codes
B Pacifico - arxiv preprint arxiv:2403.00430, 2024 - arxiv.org
In 1999, **ng, Niederreiter and Lam introduced a generalization of AG codes using the
evaluation at non-rational places of a function field. In this paper, we show that one can …
evaluation at non-rational places of a function field. In this paper, we show that one can …