Skip to main content

Showing 1–4 of 4 results for author: Jamshidpey, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2005.03497  [pdf, other

    cs.SC cs.CC

    Subquadratic-Time Algorithms for Normal Bases

    Authors: Mark Giesbrecht, Armin Jamshidpey, Éric Schost

    Abstract: For any finite Galois field extension $\mathsf{K}/\mathsf{F}$, with Galois group $G = \mathrm{Gal}(\mathsf{K}/\mathsf{F})$, there exists an element $α\in \mathsf{K}$ whose orbit $G\cdotα$ forms an $\mathsf{F}$-basis of $\mathsf{K}$. Such a $α$ is called a normal element and $G\cdotα$ is a normal basis. We introduce a probabilistic algorithm for testing whether a given $α\in \mathsf{K}$ is normal,… ▽ More

    Submitted 23 December, 2020; v1 submitted 5 May, 2020; originally announced May 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1903.03278

    MSC Class: 12Y05; 12F10; 11y16; 68Q25

  2. arXiv:1903.03278  [pdf, ps, other

    cs.SC

    Quadratic Probabilistic Algorithms for Normal Bases

    Authors: Mark Giesbrecht, Armin Jamshidpey, Éric Schost

    Abstract: It is well known that for any finite Galois extension field $K/F$, with Galois group $G = \mathrm{Gal}(K/F)$, there exists an element $α\in K$ whose orbit $G\cdotα$ forms an $F$-basis of $K$. Such an element $α$ is called \emph{normal} and $G\cdotα$ is called a normal basis. In this paper we introduce a probabilistic algorithm for finding a normal element when $G$ is either a finite abelian or a m… ▽ More

    Submitted 7 March, 2019; originally announced March 2019.

    MSC Class: 12Y05; 12F10; 11y16; 68Q25

  3. arXiv:1503.00237  [pdf, other

    cs.MA cs.AI cs.RO

    Task Allocation in Robotic Swarms: Explicit Communication Based Approaches

    Authors: Aryo Jamshidpey, Mohsen Afsharchi

    Abstract: In this paper we study multi robot cooperative task allocation issue in a situation where a swarm of robots is deployed in a confined unknown environment where the number of colored spots which represent tasks and the ratios of them are unknown. The robots should cover this spots as far as possible to do cleaning and sampling actions desirably. It means that they should discover the spots cooperat… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

    Comments: A short version of this paper is accepted by AI2015(conference). It has 13 pages and 4 figures

  4. arXiv:1404.2820  [pdf

    cs.CR

    An Introduction to Digital Signature Schemes

    Authors: Mehran Alidoost Nia, Ali Sajedi, Aryo Jamshidpey

    Abstract: Today, all types of digital signature schemes emphasis on secure and best verification methods. Different digital signature schemes are used in order for the websites, security organizations, banks and so on to verify user's validity. Digital signature schemes are categorized to several types such as proxy, on-time, batch and so on. In this paper, different types of schemes are compared based on s… ▽ More

    Submitted 10 April, 2014; originally announced April 2014.

    Comments: In Proceeding of National Conference on Information Retrieval, 2011