Pub Date : 2025-11-25DOI: 10.1016/j.ffa.2025.102761
Li Zhu , Jinle Liu , Hongfeng Wu
Cyclotomic coset is a classical notion in the theory of finite fields which has wide applications in various computation problems. Let q be a prime power, and n be a positive integer coprime to q. In this paper we determine explicitly the representatives and the sizes of all q-cyclotomic cosets modulo n in the general settings. We introduce the definition of 2-adic cyclotomic system, which is a profinite space consists of certain compatible sequences of cyclotomic cosets. A precise characterization of the structure of the 2-adic cyclotomic system is given, which reveals the general formula for representatives of cyclotomic cosets. With the representatives and the sizes of q-cyclotomic cosets modulo n, we improve the formulas for the factorizations of and of over given in [4]. As a consequence, we classify the cyclic codes over finite fields via giving their generator polynomials. Moreover, the self-dual cyclic codes are determined and enumerated.
{"title":"Explicit representatives and sizes of cyclotomic cosets and their application to cyclic codes over finite fields","authors":"Li Zhu , Jinle Liu , Hongfeng Wu","doi":"10.1016/j.ffa.2025.102761","DOIUrl":"10.1016/j.ffa.2025.102761","url":null,"abstract":"<div><div>Cyclotomic coset is a classical notion in the theory of finite fields which has wide applications in various computation problems. Let <em>q</em> be a prime power, and <em>n</em> be a positive integer coprime to <em>q</em>. In this paper we determine explicitly the representatives and the sizes of all <em>q</em>-cyclotomic cosets modulo <em>n</em> in the general settings. We introduce the definition of 2-adic cyclotomic system, which is a profinite space consists of certain compatible sequences of cyclotomic cosets. A precise characterization of the structure of the 2-adic cyclotomic system is given, which reveals the general formula for representatives of cyclotomic cosets. With the representatives and the sizes of <em>q</em>-cyclotomic cosets modulo <em>n</em>, we improve the formulas for the factorizations of <span><math><msup><mrow><mi>X</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>1</mn></math></span> and of <span><math><msub><mrow><mi>Φ</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>(</mo><mi>X</mi><mo>)</mo></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><mi>q</mi></mrow></msub></math></span> given in <span><span>[4]</span></span>. As a consequence, we classify the cyclic codes over finite fields via giving their generator polynomials. Moreover, the self-dual cyclic codes are determined and enumerated.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"111 ","pages":"Article 102761"},"PeriodicalIF":1.2,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145624202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-25DOI: 10.1016/j.ffa.2025.102759
A.M. Maksaev, N.Y. Medved, V.V. Promyslov
Denote by the space of all matrices over a field. For a fixed , we investigate bijective maps such that iff , for any . When , we not only characterize such maps on matrix spaces, but prove that such maps are equal isometries even on more general metric spaces that we call discrete-triangular. For an arbitrary k, we prove that the same characterization holds for the matrices over finite fields, except for matrices over the field of 2 elements. To do this, we use theory of association schemes, specifically the bilinear forms scheme, and investigate its eigenvalues and intersection numbers.
{"title":"Maps preserving a fixed rank-distance on matrices over finite fields","authors":"A.M. Maksaev, N.Y. Medved, V.V. Promyslov","doi":"10.1016/j.ffa.2025.102759","DOIUrl":"10.1016/j.ffa.2025.102759","url":null,"abstract":"<div><div>Denote by <span><math><msub><mrow><mi>M</mi></mrow><mrow><mi>m</mi><mo>×</mo><mi>n</mi></mrow></msub></math></span> the space of all <span><math><mi>m</mi><mo>×</mo><mi>n</mi></math></span> matrices over a field. For a fixed <span><math><mn>1</mn><mo>⩽</mo><mi>k</mi><mo>⩽</mo><mi>min</mi><mo></mo><mo>(</mo><mi>m</mi><mo>,</mo><mi>n</mi><mo>)</mo></math></span>, we investigate bijective maps <span><math><msub><mrow><mi>φ</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>φ</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>:</mo><msub><mrow><mi>M</mi></mrow><mrow><mi>m</mi><mo>×</mo><mi>n</mi></mrow></msub><mo>→</mo><msub><mrow><mi>M</mi></mrow><mrow><mi>m</mi><mo>×</mo><mi>n</mi></mrow></msub></math></span> such that <span><math><mi>rk</mi><mo>(</mo><mi>A</mi><mo>−</mo><mi>B</mi><mo>)</mo><mo>=</mo><mi>k</mi></math></span> iff <span><math><mi>rk</mi><mo>(</mo><msub><mrow><mi>φ</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>(</mo><mi>A</mi><mo>)</mo><mo>−</mo><msub><mrow><mi>φ</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>B</mi><mo>)</mo><mo>)</mo><mo>=</mo><mi>k</mi></math></span>, for any <span><math><mi>A</mi><mo>,</mo><mspace></mspace><mi>B</mi><mo>∈</mo><msub><mrow><mi>M</mi></mrow><mrow><mi>m</mi><mo>×</mo><mi>n</mi></mrow></msub></math></span>. When <span><math><mi>k</mi><mo><</mo><mi>min</mi><mo></mo><mo>(</mo><mi>m</mi><mo>,</mo><mi>n</mi><mo>)</mo><mo>/</mo><mn>2</mn></math></span>, we not only characterize such maps on matrix spaces, but prove that such maps are equal isometries even on more general metric spaces that we call discrete-triangular. For an arbitrary <em>k</em>, we prove that the same characterization holds for the matrices over finite fields, except for <span><math><mn>2</mn><mo>×</mo><mn>2</mn></math></span> matrices over the field of 2 elements. To do this, we use theory of association schemes, specifically the bilinear forms scheme, and investigate its eigenvalues and intersection numbers.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"111 ","pages":"Article 102759"},"PeriodicalIF":1.2,"publicationDate":"2025-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145624275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-21DOI: 10.1016/j.ffa.2025.102762
John Bamberg , Geertrui Van de Voorde
The Hermitian Veronesean in , given by , is a well-studied rational curve, and forms a special set of the Hermitian surface . In this paper, we give two local characterisations of the Hermitian Veronesean, based on sublines and triples of points in perspective.
{"title":"On the Hermitian Veronesean","authors":"John Bamberg , Geertrui Van de Voorde","doi":"10.1016/j.ffa.2025.102762","DOIUrl":"10.1016/j.ffa.2025.102762","url":null,"abstract":"<div><div>The Hermitian Veronesean in <span><math><mrow><mi>PG</mi></mrow><mo>(</mo><mn>3</mn><mo>,</mo><msup><mrow><mi>q</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span>, given by <span><math><mi>V</mi><mo>:</mo><mo>=</mo><mo>{</mo><mo>(</mo><mn>1</mn><mo>,</mo><mi>x</mi><mo>,</mo><msup><mrow><mi>x</mi></mrow><mrow><mi>q</mi></mrow></msup><mo>,</mo><msup><mrow><mi>x</mi></mrow><mrow><mi>q</mi><mo>+</mo><mn>1</mn></mrow></msup><mo>)</mo><mo>:</mo><mi>x</mi><mo>∈</mo><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>q</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></msub><mo>}</mo><mo>∪</mo><mo>{</mo><mo>(</mo><mn>0</mn><mo>,</mo><mn>0</mn><mo>,</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo><mo>}</mo></math></span>, is a well-studied rational curve, and forms a <em>special</em> set of the Hermitian surface <span><math><mi>H</mi><mo>(</mo><mn>3</mn><mo>,</mo><msup><mrow><mi>q</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span>. In this paper, we give two local characterisations of the Hermitian Veronesean, based on sublines and triples of points in perspective.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"111 ","pages":"Article 102762"},"PeriodicalIF":1.2,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145580235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-20DOI: 10.1016/j.ffa.2025.102753
Guido Lido
We describe a provably quasi-polynomial algorithm to compute discrete logarithms in the multiplicative groups of finite fields of small characteristic, that is finite fields whose characteristic is logarithmic in the order. We partially follow the heuristically quasi-polynomial algorithm presented by Barbulescu, Gaudry, Joux and Thomé. The main difference is to use a presentation of the finite field based on elliptic curves: the abundance of elliptic curves ensures the existence of such a presentation.
{"title":"A provably quasi-polynomial algorithm for the discrete logarithm problem in finite fields of small characteristic","authors":"Guido Lido","doi":"10.1016/j.ffa.2025.102753","DOIUrl":"10.1016/j.ffa.2025.102753","url":null,"abstract":"<div><div>We describe a provably quasi-polynomial algorithm to compute discrete logarithms in the multiplicative groups of finite fields of small characteristic, that is finite fields whose characteristic is logarithmic in the order. We partially follow the heuristically quasi-polynomial algorithm presented by Barbulescu, Gaudry, Joux and Thomé. The main difference is to use a presentation of the finite field based on elliptic curves: the abundance of elliptic curves ensures the existence of such a presentation.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"111 ","pages":"Article 102753"},"PeriodicalIF":1.2,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145546710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-10DOI: 10.1016/j.ffa.2025.102758
Xiujing Zheng, Sujuan Huang, Shixin Zhu
The linear l-intersection pairs of codes are a generalization of linear complementary dual (LCD) codes, hulls of codes and linear complementary pairs (LCPs) of codes. Matrix-product codes are extended versions derived from shorter codes through matrix-product techniques. In this paper, we investigate linear l-intersection pairs of matrix-product codes. The characterization of these pairs can be achieved by examining the dimension of the intersection between their respective constituent codes. For the dimension part of the conjecture for linear l-intersection pairs of codes proposed by Guenda et al. (Des Codes Cryptogr. 88: 133-152, 2020), we prove that if the conjecture holds for prime lengths, then its dimension part holds. As a practical application, linear l-intersection pairs of matrix-product codes are utilized to the constructions of asymmetric quantum error-correcting (AQEC) codes and asymmetric entanglement-assisted quantum error-correcting (AEAQEC) codes. Some instances exhibit favorable parameters.
线性l交码对是线性互补对偶码、码壳和码的线性互补对的推广。矩阵积代码是通过矩阵积技术从较短的代码衍生而来的扩展版本。本文研究了矩阵积码的线性l交对。这些对的特征可以通过检查它们各自组成代码之间的交集的维度来实现。对于Guenda et al. (Des codes Cryptogr. 88: 133- 152,2020)提出的线性l交码对猜想的维数部分,证明了如果该猜想对于素数长度成立,则其维数部分成立。在实际应用中,将线性l交对矩阵积码用于构造非对称量子纠错码和非对称纠缠辅助量子纠错码。有些实例显示出有利的参数。
{"title":"Linear l-intersection pairs of matrix-product codes and their applications","authors":"Xiujing Zheng, Sujuan Huang, Shixin Zhu","doi":"10.1016/j.ffa.2025.102758","DOIUrl":"10.1016/j.ffa.2025.102758","url":null,"abstract":"<div><div>The linear <em>l</em>-intersection pairs of codes are a generalization of linear complementary dual (LCD) codes, hulls of codes and linear complementary pairs (LCPs) of codes. Matrix-product codes are extended versions derived from shorter codes through matrix-product techniques. In this paper, we investigate linear <em>l</em>-intersection pairs of matrix-product codes. The characterization of these pairs can be achieved by examining the dimension of the intersection between their respective constituent codes. For the dimension part of the conjecture for linear <em>l</em>-intersection pairs of codes proposed by Guenda et al. (Des Codes Cryptogr. <strong>88</strong>: 133-152, 2020), we prove that if the conjecture holds for prime lengths, then its dimension part holds. As a practical application, linear <em>l</em>-intersection pairs of matrix-product codes are utilized to the constructions of asymmetric quantum error-correcting (AQEC) codes and asymmetric entanglement-assisted quantum error-correcting (AEAQEC) codes. Some instances exhibit favorable parameters.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"110 ","pages":"Article 102758"},"PeriodicalIF":1.2,"publicationDate":"2025-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145519892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-07DOI: 10.1016/j.ffa.2025.102756
Robert S. Coulter , Paul Hearding
Given a subset S of a finite field, an S-complete mapping is a polynomial for which is a permutation polynomial over the finite field for each . In this paper, we introduce a new method for constructing permutation polynomials and use it to establish a class of S-complete mappings with “large” S.
{"title":"On S-complete mappings for large S","authors":"Robert S. Coulter , Paul Hearding","doi":"10.1016/j.ffa.2025.102756","DOIUrl":"10.1016/j.ffa.2025.102756","url":null,"abstract":"<div><div>Given a subset <em>S</em> of a finite field, an <em>S</em>-complete mapping is a polynomial <span><math><mi>f</mi><mo>(</mo><mi>X</mi><mo>)</mo></math></span> for which <span><math><mi>f</mi><mo>(</mo><mi>X</mi><mo>)</mo><mo>+</mo><mi>c</mi><mi>X</mi></math></span> is a permutation polynomial over the finite field for each <span><math><mi>c</mi><mo>∈</mo><mi>S</mi></math></span>. In this paper, we introduce a new method for constructing permutation polynomials and use it to establish a class of <em>S</em>-complete mappings with “large” <em>S</em>.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"110 ","pages":"Article 102756"},"PeriodicalIF":1.2,"publicationDate":"2025-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145466211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-05DOI: 10.1016/j.ffa.2025.102752
Tong Lin , Qiang Wang
Using arbitrary bases for the finite field over , we obtain the generalized Möbius transformations (GMTs), which are a class of bijections between the projective geometry and the set of roots of unity , where is any integer. We also introduce a class of projective polynomials, using the properties of which we determine the inverses of the GMTs. Moreover, we study the roots of those projective polynomials, which lead to a three-way correspondence between partitions of and . Through this correspondence and the GMTs, we construct permutation polynomials of index over .
{"title":"Permutation polynomials and finite projective spaces","authors":"Tong Lin , Qiang Wang","doi":"10.1016/j.ffa.2025.102752","DOIUrl":"10.1016/j.ffa.2025.102752","url":null,"abstract":"<div><div>Using arbitrary bases for the finite field <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><mi>q</mi></mrow></msub></math></span>, we obtain the generalized Möbius transformations (GMTs), which are a class of bijections between the projective geometry <span><math><mtext>PG</mtext><mo>(</mo><mi>n</mi><mo>−</mo><mn>1</mn><mo>,</mo><mi>q</mi><mo>)</mo></math></span> and the set of roots of unity <span><math><msub><mrow><mi>μ</mi></mrow><mrow><mfrac><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>1</mn></mrow><mrow><mi>q</mi><mo>−</mo><mn>1</mn></mrow></mfrac></mrow></msub><mo>⊆</mo><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span>, where <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span> is any integer. We also introduce a class of projective polynomials, using the properties of which we determine the inverses of the GMTs. Moreover, we study the roots of those projective polynomials, which lead to a three-way correspondence between partitions of <span><math><msubsup><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup></mrow><mrow><mo>⁎</mo></mrow></msubsup><mo>,</mo><msub><mrow><mi>μ</mi></mrow><mrow><mfrac><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>1</mn></mrow><mrow><mi>q</mi><mo>−</mo><mn>1</mn></mrow></mfrac></mrow></msub></math></span> and <span><math><mtext>PG</mtext><mo>(</mo><mi>n</mi><mo>−</mo><mn>1</mn><mo>,</mo><mi>q</mi><mo>)</mo></math></span>. Through this correspondence and the GMTs, we construct permutation polynomials of index <span><math><mfrac><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>1</mn></mrow><mrow><mi>q</mi><mo>−</mo><mn>1</mn></mrow></mfrac></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span>.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"110 ","pages":"Article 102752"},"PeriodicalIF":1.2,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145466210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-04DOI: 10.1016/j.ffa.2025.102757
Mohammed Rahmani , Abderrahmane Nitaj , Mhammed Ziane
Let be an RSA modulus, and be an integer. Two recently algebraic variants of the RSA cryptosystem use a public exponent e for encryption, and a private exponent d for decryption with , where . In this paper, we propose an attack on the two variants using Coppersmith's method and lattice basis reduction. Our attack breaks the systems when d is less than an explicit bound that depends only on n and N. We analyze the security of the RSA variants characterized by the equation . Specifically, we propose a novel attack utilizing lattice-based methods and Coppersmith's technique, when the prime numbers p and q share an amount of their least significant bits. This enables the efficient recovery of the primes p and q in polynomial time.
{"title":"Cryptanalysis of some algebraic variants of the RSA cryptosystem","authors":"Mohammed Rahmani , Abderrahmane Nitaj , Mhammed Ziane","doi":"10.1016/j.ffa.2025.102757","DOIUrl":"10.1016/j.ffa.2025.102757","url":null,"abstract":"<div><div>Let <span><math><mi>N</mi><mo>=</mo><mi>p</mi><mi>q</mi></math></span> be an RSA modulus, and <span><math><mi>n</mi><mo>≥</mo><mn>1</mn></math></span> be an integer. Two recently algebraic variants of the RSA cryptosystem use a public exponent <em>e</em> for encryption, and a private exponent <em>d</em> for decryption with <span><math><mi>e</mi><mi>d</mi><mo>≡</mo><mn>1</mn><mspace></mspace><mo>(</mo><mrow><mi>mod</mi></mrow><mspace></mspace><msub><mrow><mi>φ</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>(</mo><mi>N</mi><mo>)</mo><mo>)</mo></math></span>, where <span><math><msub><mrow><mi>φ</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>(</mo><mi>N</mi><mo>)</mo><mo>=</mo><mrow><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>1</mn><mo>)</mo></mrow><mrow><mo>(</mo><msup><mrow><mi>q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>1</mn><mo>)</mo></mrow></math></span>. In this paper, we propose an attack on the two variants using Coppersmith's method and lattice basis reduction. Our attack breaks the systems when <em>d</em> is less than an explicit bound that depends only on <em>n</em> and <em>N</em>. We analyze the security of the RSA variants characterized by the equation <span><math><mi>e</mi><mi>d</mi><mo>−</mo><mi>k</mi><msub><mrow><mi>φ</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>(</mo><mi>N</mi><mo>)</mo><mo>=</mo><mn>1</mn></math></span>. Specifically, we propose a novel attack utilizing lattice-based methods and Coppersmith's technique, when the prime numbers <em>p</em> and <em>q</em> share an amount of their least significant bits. This enables the efficient recovery of the primes <em>p</em> and <em>q</em> in polynomial time.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"110 ","pages":"Article 102757"},"PeriodicalIF":1.2,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145466204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-04DOI: 10.1016/j.ffa.2025.102754
Tonghui Zhang , Pinhui Ke , Zuling Chang
Three classes of binary linear codes with at most four nonzero weights were constructed in this paper, in which two of them are projective three-weight codes. As applications, s-sum sets for any odd were constructed.
{"title":"Construction of three class of at most four-weight binary linear codes and their applications","authors":"Tonghui Zhang , Pinhui Ke , Zuling Chang","doi":"10.1016/j.ffa.2025.102754","DOIUrl":"10.1016/j.ffa.2025.102754","url":null,"abstract":"<div><div>Three classes of binary linear codes with at most four nonzero weights were constructed in this paper, in which two of them are projective three-weight codes. As applications, <em>s</em>-sum sets for any odd <span><math><mi>s</mi><mo>></mo><mn>1</mn></math></span> were constructed.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"110 ","pages":"Article 102754"},"PeriodicalIF":1.2,"publicationDate":"2025-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145466207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-03DOI: 10.1016/j.ffa.2025.102751
Jong Yoon Hyun , Zhao Hu
In this paper, we develop a construction method that uses given projective two-weight linear codes to recursively produce new ones. Numerous constructions of projective two-weight linear codes are provided building upon well-known projective two-weight linear codes.
{"title":"Recursive construction of projective two-weight linear codes","authors":"Jong Yoon Hyun , Zhao Hu","doi":"10.1016/j.ffa.2025.102751","DOIUrl":"10.1016/j.ffa.2025.102751","url":null,"abstract":"<div><div>In this paper, we develop a construction method that uses given projective two-weight linear codes to recursively produce new ones. Numerous constructions of projective two-weight linear codes are provided building upon well-known projective two-weight linear codes.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":"110 ","pages":"Article 102751"},"PeriodicalIF":1.2,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145466209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}