{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:42:03Z","timestamp":1773247323953,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540545088","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-38424-3_8","type":"book-chapter","created":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T13:05:56Z","timestamp":1196687156000},"page":"109-133","source":"Crossref","is-referenced-by-count":90,"title":["Solving Large Sparse Linear Systems Over Finite Fields"],"prefix":"10.1007","author":[{"given":"B. A.","family":"LaMacchia","sequence":"first","affiliation":[]},{"given":"A. M.","family":"Odlyzko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1137\/0609005","volume":"9","author":"G. S. Ammar","year":"1988","unstructured":"G. S. Ammar and W. G. Gragg, Superfast solution of real positive definite Toeplitz systems, SIAM J. Matrix Anal. Appl., 9 (1988), 61\u201376.","journal-title":"SIAM J. Matrix Anal. Appl."},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/0024-3795(80)90161-5","volume":"34","author":"R. R. Bitmead","year":"1980","unstructured":"R. R. Bitmead and B. D. O. Anderson, Asymptotically fast solution of Toeplitz and related systems of linear equations, Lin. Alg. Appl. 34 (1980), 103\u2013116.","journal-title":"Lin. Alg. Appl."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1137\/0605029","volume":"5","author":"I. F. Blake","year":"1984","unstructured":"I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S. A. Vanstone, Computing logarithms in fields of characteristic two, SIAM J. Alg. Disc. Methods 5 (1984), 276\u2013285.","journal-title":"SIAM J. Alg. Disc. Methods"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1016\/0196-6774(80)90013-9","volume":"1","author":"R. P. Brent","year":"1980","unstructured":"R. P. Brent, F. G. Gustavson, and D. Y. Y. Yun, Fast solution of Toeplitz systems of equations and computation of Pad\u00e9 approximants, J. Algorithms 1 (1980), 259\u2013295.","journal-title":"J. Algorithms"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/TIT.1984.1056941","volume":"30","author":"D. Coppersmith","year":"1984","unstructured":"D. Coppersmith, Fast evaluation of discrete logarithms in fields of characteristic two, IEEE Trans. on Information Theory 30 (1984), 587\u2013594.","journal-title":"IEEE Trans. on Information Theory"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0747-7171(85)80018-3","volume":"1","author":"D. Coppersmith","year":"1985","unstructured":"D. Coppersmith and J. H. Davenport, An application of factoring, J. Symbolic Computation 1 (1985), 241\u2013243.","journal-title":"J. Symbolic Computation"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01840433","volume":"1","author":"D. Coppersmith","year":"1986","unstructured":"D. Coppersmith, A. Odlyzko, and R. Schroeppel, Discrete logarithms in GF(p), Algorithmica 1 (1986), 1\u201315.","journal-title":"Algorithmica"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"D. Coppersmith and S. Winograd, Matrix multiplication via arithmetic progressions, Proc. 19th ACM Symp. Theory Comp. (1987), 1\u20136.","DOI":"10.1145\/28395.28396"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"409","DOI":"10.6028\/jres.049.044","volume":"49","author":"M. R. Hestenes","year":"1952","unstructured":"M. R. Hestenes and E. Stiefel, Methods of conjugate gradients for solving linear systems, J. Res. Nat. Bureau of Standards 49 (1952), 409\u2013436.","journal-title":"J. Res. Nat. Bureau of Standards"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/BF00123958","volume":"1","author":"B. A. LaMacchia","year":"1991","unstructured":"B. A. LaMacchia and A. M. Odlyzko, Computation of discrete logarithms in prime fields, Designs, Codes, and Cryptography 1 (1991), to appear.","journal-title":"Designs, Codes and Cryptography"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"33","DOI":"10.6028\/jres.049.006","volume":"49","author":"C. Lanczos","year":"1952","unstructured":"C. Lanczos, Solution of systems of linear equations by minimized iterations, J. Res. Nat. Bureau of Standards 49 (1952), 33\u201353.","journal-title":"J. Res. Nat. Bureau of Standards"},{"key":"8_CR12","unstructured":"A. K. Lenstra and M. S. Manasse, Factoring by electronic mail, Advances in Cryptology: Proceedings of Eurocrypt\u2019 89, J.-J. Quisquater, ed., to be published."},{"key":"8_CR13","unstructured":"A. K. Lenstra and M. S. Manasse, Factoring with two large primes, Advances in Cryptology: Proceedings of Eurocrypt\u2019 90, I. Damgard, ed., to be published."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"K. S. McCurley, The discrete logarithm problem, in Cryptography and Computational Number Theory, C. Pomerance, ed., Proc. Symp. Appl. Math., Amer. Math. Soc., 1990, to appear.","DOI":"10.1090\/psapm\/042\/1095551"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/TIT.1969.1054260","volume":"IT-15","author":"J. L. Massey","year":"1969","unstructured":"J. L. Massey, Shift-register synthesis and BCH decoding, IEEE Trans. Information Theory IT-15 (1969), 122\u2013127.","journal-title":"IEEE Trans. Information Theory"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1090\/S0025-5718-1975-0369276-7","volume":"29","author":"W. H. Mills","year":"1975","unstructured":"W. H. Mills, Continued fractions and linear recurrences, Math. Comp. 29 (1975), 173\u2013180.","journal-title":"Math. Comp."},{"key":"8_CR17","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/3-540-39757-4_20","volume-title":"Advances in Cryptology: Proceedings of Eurocrypt\u2019 84","author":"A. M. Odlyzko","year":"1985","unstructured":"A. M. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance, Advances in Cryptology: Proceedings of Eurocrypt\u2019 84, T. Beth, N. Cot, I. Ingemarsson, eds., Lecture Notes in Computer Science 209, Springer-Verlag, NY (1985), 224\u2013314."},{"key":"8_CR18","unstructured":"C. Pomerance, Analysis and comparison of some integer factoring algorithms, Computational Methods in Number Theory: Part I, H. W. Lenstra, Jr., and R. Tijdeman, eds., Math. Centre Tract 154 (1982), Math. Centre Amsterdam, 89\u2013139."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"C. Pomerance, Factoring, in Cryptography and Computational Number Theory, C. Pomerance, ed., Proc. Symp. Appl. Math., Amer. Math. Soc., 1990, to appear.","DOI":"10.1090\/psapm\/042\/1095550"},{"key":"8_CR20","unstructured":"C. Pomerance and J. W. Smith, Reduction of large, sparse matrices over a finite field via created catastrophes, manuscript in preparation."},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/BF02165411","volume":"13","author":"V. Strassen","year":"1969","unstructured":"V. Strassen, Gaussian elimination is not optimal, Numerische Math. 13 (1969), 354\u2013356.","journal-title":"Numerische Math"},{"key":"8_CR22","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TIT.1986.1057137","volume":"IT-32","author":"D. H. Wiedemann","year":"1986","unstructured":"D. H. Wiedemann, Solving sparse linear equations over finite fields, IEEE Trans. Information Theory IT-32 (1986), 54\u201362.","journal-title":"IEEE Trans. Information Theory"},{"key":"8_CR23","unstructured":"J. H. Wilkinson, The Algebraic Eigenvalue Problem, Oxford Univ. Press, 1965."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology-CRYPT0\u2019 90"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-38424-3_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,15]],"date-time":"2023-05-15T03:03:00Z","timestamp":1684119780000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-38424-3_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540545088"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/3-540-38424-3_8","relation":{},"subject":[]}}