Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,973,131 papers from all fields of science
Search
Sign In
Create Free Account
Algebraic equation
Known as:
Algebraic equations
, Polynomial equation
, Algebraic root
Expand
In mathematics, an algebraic equation or polynomial equation is an equation of the form where P and Q are polynomials with coefficients in some field…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
33 relations
ABS methods
APMonitor
Abel–Ruffini theorem
Adaptive resonance theory
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Linear Algebra
J. Hefferon
2012
Corpus ID: 1300625
The subject of linear algebra includes the solution of linear equations, a topic properly belonging to college algebra. Earlier…
Expand
Review
2008
Review
2008
Differential-algebraic equations
S. Campbell
,
V. H. Linh
,
L. Petzold
Scholarpedia
2008
Corpus ID: 10335295
• A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences…
Expand
Highly Cited
2004
Highly Cited
2004
Algebraic Attacks and Decomposition of Boolean Functions
W. Meier
,
E. Pasalic
,
C. Carlet
International Conference on the Theory and…
2004
Corpus ID: 16005006
Algebraic attacks on LFSR-based stream ciphers recover the secret key by solving an overdefined system of multivariate algebraic…
Expand
Review
2003
Review
2003
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases
J. Faugère
,
A. Joux
Annual International Cryptology Conference
2003
Corpus ID: 7462127
In this paper, we review and explain the existing algebraic cryptanalysis of multivariate cryptosystems from the hidden field…
Expand
Highly Cited
2003
Highly Cited
2003
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
N. Courtois
Annual International Cryptology Conference
2003
Corpus ID: 40465015
A classical construction of stream ciphers is to combine several LFSRs and a highly non-linear Boolean function f. Their security…
Expand
Highly Cited
1998
Highly Cited
1998
Using Algebraic Geometry
David A. Cox
,
J. Little
,
D. O'Shea
1998
Corpus ID: 117328625
Introduction.- Solving Polynomial Equations.- Resultants.- Computation in Local Rings.- Modules.- Free Resolutions.- Polytopes…
Expand
Review
1997
Review
1997
Ideals, varieties, and algorithms - an introduction to computational algebraic geometry and commutative algebra (2. ed.)
David A. Cox
,
J. Little
,
D. O'Shea
Undergraduate Texts in Mathematics
1997
Corpus ID: 35416675
One or more than made up, by fred woodward under the best uses of systems. 157 rule generalizes easily to undergraduates this has…
Expand
Highly Cited
1988
Highly Cited
1988
Some algebraic and geometric computations in PSPACE
J. Canny
Symposium on the Theory of Computing
1988
Corpus ID: 14535463
We give a PSPACE algorithm for determining the signs of multivariate polynomials at the common zeros of a system of polynomial…
Expand
Highly Cited
1973
Highly Cited
1973
Algebraic Geometry
T. Willmore
Nature
1973
Corpus ID: 5695770
Introduction to Algebraic Geometry.By Serge Lang. Pp. xi + 260. (Addison–Wesley: Reading, Massachusetts, 1972.)
Highly Cited
1938
Highly Cited
1938
On the Number of Real Roots of a Random Algebraic Equation
J. Littlewood
,
A. Offord
1938
Corpus ID: 12808504
An equation with real coefficients and given degree n being selected at random, about how many real roots may it be expected to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE