首页 > 最新文献

Cryptography and Communications最新文献

英文 中文
Correction: Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation 更正:非周期性汉明相关性下的低命中区跳频序列集
Pub Date : 2024-04-12 DOI: 10.1007/s12095-024-00714-1
Xing Liu
{"title":"Correction: Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation","authors":"Xing Liu","doi":"10.1007/s12095-024-00714-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00714-1","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 12","pages":"647"},"PeriodicalIF":0.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140710647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mumford representation and Riemann-Roch space of a divisor on a hyperelliptic curve 超椭圆曲线上除数的姆福德表示和黎曼-罗赫空间
Pub Date : 2024-04-10 DOI: 10.1007/s12095-024-00713-2
Giovanni Falcone, Giuseppe Filippone

For an (imaginary) hyperelliptic curve (mathcal {H}) of genus g, with a Weierstrass point (Omega ), taken as the point at infinity, we determine a basis of the Riemann-Roch space (mathcal {L}(Delta + m Omega )), where (Delta ) is of degree zero, directly from the Mumford representation of (Delta ). This provides in turn a generating matrix of a Goppa code.

对于一条属g的(虚)超椭圆曲线(mathcal {H}),有一个魏尔斯特拉斯点(Weierstrass point (Omega)),取为无穷远处的点;我们直接从(Delta )的芒福德表示法确定黎曼-罗赫空间(Riemann-Roch space)(mathcal {L}(Delta + m Omega ))的基,其中(Delta )为零度。这反过来又提供了一个戈帕编码的生成矩阵。
{"title":"Mumford representation and Riemann-Roch space of a divisor on a hyperelliptic curve","authors":"Giovanni Falcone, Giuseppe Filippone","doi":"10.1007/s12095-024-00713-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00713-2","url":null,"abstract":"<p>For an (imaginary) hyperelliptic curve <span>(mathcal {H})</span> of genus <i>g</i>, with a Weierstrass point <span>(Omega )</span>, taken as the point at infinity, we determine a basis of the Riemann-Roch space <span>(mathcal {L}(Delta + m Omega ))</span>, where <span>(Delta )</span> is of degree zero, directly from the Mumford representation of <span>(Delta )</span>. This provides in turn a generating matrix of a Goppa code.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128 模块加法的新线性近似和 SPARX-64/128 的改进微分线性密码分析
Pub Date : 2024-04-01 DOI: 10.1007/s12095-024-00708-z
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi

Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128.

差分线性密码分析是一种攻击 ARX 密码的高效密码分析方法,已被用于对许多 ARX 基元(如 Chaskey 和 Chacha)进行最佳攻击。本文介绍了对另一种基于 ARX 的块密码 SPARX-64/128 的差分线性密码分析。我们首先根据 SPARX-64/128 的结构构建了多个 6 轮差分线性区分器,然后通过在区分器之前添加一个 7 轮差分特征和在区分器之后添加一个 1 轮线性近似,将它们扩展为 14 轮差分线性区分器。然后,我们引入一种新的模块加法线性近似,并利用它在 14 轮微分线性区分器之后再扩展一轮。利用 15 轮差分线性区分器,我们提出了对 18 轮 SPARX-64/128 的差分线性攻击。
{"title":"New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128","authors":"Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi","doi":"10.1007/s12095-024-00708-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00708-z","url":null,"abstract":"<p>Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequences with ideal auto-correlation derived from group actions 由群体行为得出的具有理想自相关性的序列
Pub Date : 2024-03-22 DOI: 10.1007/s12095-024-00710-5
Hongyang Xiao, Xiwang Cao

Bent functions have a number of practical applications in cryptography, coding theory, and other fields. Fourier transform is a key tool to study bent functions on finite abelian groups. Using Fourier transforms, in this paper, we first present two necessary and sufficient conditions on the existence of bent functions via faithful actions of finite abelian groups and then show two constructions of sequences with ideal auto-correlation (SIACs). In addition, we construct a periodic complementary sequence set (PCSS) by rearranging a periodic multiple shift sequence (PMSS) corresponding to a bent function on a finite abelian group. Some concrete constructions of SIACs and PCSSs are provided to illustrate the efficiency of our methods.

弯曲函数在密码学、编码理论和其他领域有许多实际应用。傅立叶变换是研究有限无边群上弯曲函数的重要工具。本文利用傅立叶变换,首先提出了通过有限无边群的忠实作用实现弯曲函数存在的两个必要条件和充分条件,然后展示了两种具有理想自相关性的序列(SIAC)的构造。此外,我们还通过重新排列与有限无边群上的弯曲函数相对应的周期性多移序列(PMSS),构建了周期性互补序列集(PCSS)。我们提供了一些 SIAC 和 PCSS 的具体构造,以说明我们方法的效率。
{"title":"Sequences with ideal auto-correlation derived from group actions","authors":"Hongyang Xiao, Xiwang Cao","doi":"10.1007/s12095-024-00710-5","DOIUrl":"https://doi.org/10.1007/s12095-024-00710-5","url":null,"abstract":"<p>Bent functions have a number of practical applications in cryptography, coding theory, and other fields. Fourier transform is a key tool to study bent functions on finite abelian groups. Using Fourier transforms, in this paper, we first present two necessary and sufficient conditions on the existence of bent functions via faithful actions of finite abelian groups and then show two constructions of sequences with ideal auto-correlation (SIACs). In addition, we construct a periodic complementary sequence set (PCSS) by rearranging a periodic multiple shift sequence (PMSS) corresponding to a bent function on a finite abelian group. Some concrete constructions of SIACs and PCSSs are provided to illustrate the efficiency of our methods.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"306 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140202440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring 具有有限交换链系数环的仿射代数上的阿贝尔和常阿贝尔多义码
Pub Date : 2024-03-15 DOI: 10.1007/s12095-024-00707-0
Gülsüm Gözde Yılmazgüç, Javier de la Cruz, Edgar Martínez-Moro

This paper studies Abelian and consta-Abelian polyadic codes over rings defined as affine algebras over chain rings. For this purpose, we use the classical construction via splittings and multipliers of the underlying Abelian group. We also derive some results on the structure of the associated polyadic codes and the number of codes under these conditions.

本文研究定义为链环上仿射代数的环上阿贝尔和常阿贝尔多义码。为此,我们使用了通过底层阿贝尔群的分裂和乘数的经典构造。我们还推导出了一些关于相关多子编码结构和这些条件下编码数量的结果。
{"title":"Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring","authors":"Gülsüm Gözde Yılmazgüç, Javier de la Cruz, Edgar Martínez-Moro","doi":"10.1007/s12095-024-00707-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00707-0","url":null,"abstract":"<p>This paper studies Abelian and consta-Abelian polyadic codes over rings defined as affine algebras over chain rings. For this purpose, we use the classical construction via splittings and multipliers of the underlying Abelian group. We also derive some results on the structure of the associated polyadic codes and the number of codes under these conditions.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Representing the inverse map as a composition of quadratics in a finite field of characteristic 2 将逆映射表示为特征 2 有限域中的二次函数组合
Pub Date : 2024-03-09 DOI: 10.1007/s12095-024-00702-5
Florian Luca, Santanu Sarkar, Pantelimon Stănică

In 1953, Carlitz showed that all permutation polynomials over ({mathbb F}_q), where (q>2) is a power of a prime, are generated by the special permutation polynomials (x^{q-2}) (the inversion) and ( ax+b) (affine functions, where (0ne a, bin {mathbb F}_q)). Recently, Nikova, Nikov and Rijmen (2019) proposed an algorithm (NNR) to find a decomposition of the inverse function in quadratics, and computationally covered all dimensions (nle 16). Petrides (2023) theoretically found a class of integers for which it is easy to decompose the inverse into quadratics, and improved the NNR algorithm, thereby extending the computation up to (nle 32). In this paper, we extend Petrides’ result, as well as we propose a new number theoretical approach, which allows us to easily cover all (surely, odd) exponents up to 250, at least.

1953年,Carlitz证明了({mathbb F}_q)上的所有置换多项式,其中(q>2)是素数的幂,由特殊置换多项式(x^{q-2})(反函数)和( ax+b)(仿射函数,其中(0ne a, bin {mathbb F}_q))生成。最近,Nikova、Nikov和Rijmen(2019)提出了一种算法(NNR)来寻找二次函数的反函数分解,并在计算上覆盖了所有维度(nle 16)。Petrides (2023)从理论上找到了一类很容易将反函数分解成二次函数的整数,并改进了NNR算法,从而将计算扩展到了(nle 32)。在本文中,我们扩展了 Petrides 的结果,并提出了一种新的数论方法,使我们能够轻松地涵盖至少 250 以下的所有(肯定的奇数)指数。
{"title":"Representing the inverse map as a composition of quadratics in a finite field of characteristic 2","authors":"Florian Luca, Santanu Sarkar, Pantelimon Stănică","doi":"10.1007/s12095-024-00702-5","DOIUrl":"https://doi.org/10.1007/s12095-024-00702-5","url":null,"abstract":"<p>In 1953, Carlitz showed that all permutation polynomials over <span>({mathbb F}_q)</span>, where <span>(q&gt;2)</span> is a power of a prime, are generated by the special permutation polynomials <span>(x^{q-2})</span> (the inversion) and <span>( ax+b)</span> (affine functions, where <span>(0ne a, bin {mathbb F}_q)</span>). Recently, Nikova, Nikov and Rijmen (2019) proposed an algorithm (NNR) to find a decomposition of the inverse function in quadratics, and computationally covered all dimensions <span>(nle 16)</span>. Petrides (2023) theoretically found a class of integers for which it is easy to decompose the inverse into quadratics, and improved the NNR algorithm, thereby extending the computation up to <span>(nle 32)</span>. In this paper, we extend Petrides’ result, as well as we propose a new number theoretical approach, which allows us to easily cover all (surely, odd) exponents up to 250, at least.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140098240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improvement on Weil bounds for character sums of polynomials over finite fields 有限域上多项式特征和的魏尔界的改进
Pub Date : 2024-03-06 DOI: 10.1007/s12095-024-00706-1
Fengwei Li, Fanhui Meng, Ziling Heng, Qin Yue

Let (mathbb {F}_q) be a finite field with q elements, where q is a power of a prime p. In this paper, we obtain an improvement on Weil bounds for character sums associated to a polynomial f(x) over (mathbb {F}_q ), which extends the results of Wan et al. (Des. Codes Cryptogr. 81, 459–468, 2016) and Wu et al. (Des. Codes Cryptogr. 90, 2813–2821, 2022).

让 (mathbb {F}_q) 是一个有 q 个元素的有限域,其中 q 是素数 p 的幂次。在本文中,我们获得了对(mathbb {F}_q )上多项式 f(x) 相关特征和的 Weil 边界的改进,它扩展了 Wan 等人 (Des. Codes Cryptogr 81, 459-468, 2016) 和 Wu 等人 (Des. Codes Cryptogr 90, 2813-2821, 2022) 的结果。(Des. Codes Cryptogr. 81, 459-468, 2016) 和 Wu 等人 (Des. Codes Cryptogr. 90, 2813-2821, 2022) 的结果。
{"title":"An improvement on Weil bounds for character sums of polynomials over finite fields","authors":"Fengwei Li, Fanhui Meng, Ziling Heng, Qin Yue","doi":"10.1007/s12095-024-00706-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00706-1","url":null,"abstract":"<p>Let <span>(mathbb {F}_q)</span> be a finite field with <i>q</i> elements, where <i>q</i> is a power of a prime <i>p</i>. In this paper, we obtain an improvement on Weil bounds for character sums associated to a polynomial <i>f</i>(<i>x</i>) over <span>(mathbb {F}_q )</span>, which extends the results of Wan et al. (Des. Codes Cryptogr. <b>81</b>, 459–468, 2016) and Wu et al. (Des. Codes Cryptogr. <b>90</b>, 2813–2821, 2022).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"300 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The [1, 0]-twisted generalized Reed-Solomon code [1,0]扭曲的广义里德-所罗门码
Pub Date : 2024-02-27 DOI: 10.1007/s12095-024-00704-3
Canze Zhu, Qunying Liao

In this paper, we not only give the parity check matrix of the [1, 0]-twisted generalized Reed-Solomon (in short, TGRS) code, but also determine the weight distribution. Especially, we show that the [1, 0]-TGRS code is not GRS or EGRS. Furthermore, we present a sufficient and necessary condition for any punctured code of the [1, 0]-TGRS code to be self-orthogonal, and then construct several classes of self-dual or almost self-dual [1, 0]-TGRS codes. Finally, on the basis of these self-dual or almost self-dual [1, 0]-TGRS codes, we obtain some LCD [1, 0]-TGRS codes.

本文不仅给出了[1, 0]-扭曲广义里德-所罗门码(简称 TGRS)的奇偶校验矩阵,还确定了权重分布。特别是,我们证明了 [1, 0]-TGRS 码不是 GRS 或 EGRS。此外,我们还提出了[1, 0]-TGRS 码的任何穿点码都是自正交的充分必要条件,然后构造了几类自双或几乎自双的[1, 0]-TGRS 码。最后,在这些自双或近似自双 [1, 0]-TGRS 码的基础上,我们得到了一些 LCD [1, 0]-TGRS 码。
{"title":"The [1, 0]-twisted generalized Reed-Solomon code","authors":"Canze Zhu, Qunying Liao","doi":"10.1007/s12095-024-00704-3","DOIUrl":"https://doi.org/10.1007/s12095-024-00704-3","url":null,"abstract":"<p>In this paper, we not only give the parity check matrix of the [1, 0]-twisted generalized Reed-Solomon (in short, TGRS) code, but also determine the weight distribution. Especially, we show that the [1, 0]-TGRS code is not GRS or EGRS. Furthermore, we present a sufficient and necessary condition for any punctured code of the [1, 0]-TGRS code to be self-orthogonal, and then construct several classes of self-dual or almost self-dual [1, 0]-TGRS codes. Finally, on the basis of these self-dual or almost self-dual [1, 0]-TGRS codes, we obtain some LCD [1, 0]-TGRS codes.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139978007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boolean functions of binary Type-II and Type-III/II complementary array pairs 二进制 Type-II 和 Type-III/II 互补阵列对的布尔函数
Pub Date : 2024-02-24 DOI: 10.1007/s12095-024-00701-6
Erzhong Xue, Zilong Wang, Jinjin Chai

The sequence pairs of length (2^{m}) projected from Type-II and Type-III/II complementary array pairs of size (2times 2times cdots times 2) (m-times) form Type-II and Type-III complementary sequence pairs, respectively. An exhaustive search for binary Type-II and Type-III complementary sequence pairs of small lengths (2^{m}) ((m=1,2,3,4)) shows that they are all projected from the aforementioned complementary array pairs, whose algebraic normal forms satisfy specified expressions. It’s natural to ask whether the conclusion holds for all m. In this paper, we proved that these expressions of algebraic normal forms determine all the binary Type-II and Type-III/II complementary array pairs of size (2times 2times cdots times 2).

从大小为 (2times 2times cdots times 2) (m-times) 的 Type-II 和 Type-III/II 互补数组对投影出来的长度为 (2^{m}) 的序列对分别形成 Type-II 和 Type-III 互补序列对。对小长度 (2^{m}) (m=1,2,3,4)的二进制 Type-II 和 Type-III 互补序列对的穷举搜索表明,它们都是从上述互补数组对中投射出来的,其代数正常形式满足指定的表达式。在本文中,我们证明了这些代数正常形式的表达式决定了所有大小为 (2times 2times cdots times 2) 的二进制 Type-II 和 Type-III/II 互补数组对。
{"title":"Boolean functions of binary Type-II and Type-III/II complementary array pairs","authors":"Erzhong Xue, Zilong Wang, Jinjin Chai","doi":"10.1007/s12095-024-00701-6","DOIUrl":"https://doi.org/10.1007/s12095-024-00701-6","url":null,"abstract":"<p>The sequence pairs of length <span>(2^{m})</span> projected from Type-II and Type-III/II complementary array pairs of size <span>(2times 2times cdots times 2)</span> (<i>m</i>-times) form Type-II and Type-III complementary sequence pairs, respectively. An exhaustive search for binary Type-II and Type-III complementary sequence pairs of small lengths <span>(2^{m})</span> (<span>(m=1,2,3,4)</span>) shows that they are all projected from the aforementioned complementary array pairs, whose algebraic normal forms satisfy specified expressions. It’s natural to ask whether the conclusion holds for all <i>m</i>. In this paper, we proved that these expressions of algebraic normal forms determine all the binary Type-II and Type-III/II complementary array pairs of size <span>(2times 2times cdots times 2)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complete characterization of a class of permutation trinomials in characteristic five 特性五中一类置换三项式的完整表征
Pub Date : 2024-02-21 DOI: 10.1007/s12095-024-00705-2
Markus Grassl, Ferruh Özbudak, Buket Özkaya, Burcu Gülmez Temür

In this paper, we address an open problem posed by Bai and Xia in [2]. We study polynomials of the form (f(x)=x^{4q+1}+lambda _1x^{5q}+lambda _2x^{q+4}) over the finite field ({mathbb F}_{5^{k}}), which are not quasi-multiplicative equivalent to any of the known permutation polynomials in the literature. We find necessary and sufficient conditions on (lambda _1, lambda _2 in {mathbb F}_{5^{k}}) so that f(x) is a permutation monomial, binomial, or trinomial of ({mathbb F}_{5^{2k}}).

在本文中,我们讨论了白和夏在 [2] 中提出的一个开放性问题。我们研究了有限域 ({mathbb F}_{5^{k}}) 上的形式为 (f(x)=x^{4q+1}+lambda _1x^{5q}+lambda _2x^{q+4}/)的多项式,这些多项式与文献中任何已知的置换多项式都不是准相乘等价的。我们找到了关于 (lambda _1, lambda _2 in {mathbb F}_{5^{k}}) 的必要条件和充分条件,以便 f(x) 是 ({mathbb F}_{5^{2k}}) 的置换单项式、二项式或三项式。
{"title":"Complete characterization of a class of permutation trinomials in characteristic five","authors":"Markus Grassl, Ferruh Özbudak, Buket Özkaya, Burcu Gülmez Temür","doi":"10.1007/s12095-024-00705-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00705-2","url":null,"abstract":"<p>In this paper, we address an open problem posed by Bai and Xia in [2]. We study polynomials of the form <span>(f(x)=x^{4q+1}+lambda _1x^{5q}+lambda _2x^{q+4})</span> over the finite field <span>({mathbb F}_{5^{k}})</span>, which are not quasi-multiplicative equivalent to any of the known permutation polynomials in the literature. We find necessary and sufficient conditions on <span>(lambda _1, lambda _2 in {mathbb F}_{5^{k}})</span> so that <i>f</i>(<i>x</i>) is a permutation monomial, binomial, or trinomial of <span>({mathbb F}_{5^{2k}})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139921188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptography and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1