Pub Date : 2025-10-03DOI: 10.1007/s00200-025-00707-4
{"title":"Best Paper Award in Memory of Jacques Calmet","authors":"","doi":"10.1007/s00200-025-00707-4","DOIUrl":"10.1007/s00200-025-00707-4","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 6","pages":"1049 - 1049"},"PeriodicalIF":0.6,"publicationDate":"2025-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145369946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-17DOI: 10.1007/s00200-025-00685-7
Teo Mora
{"title":"Correction: In memoriam Kai-Uwe Schmidt","authors":"Teo Mora","doi":"10.1007/s00200-025-00685-7","DOIUrl":"10.1007/s00200-025-00685-7","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 3","pages":"593 - 593"},"PeriodicalIF":0.6,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-11DOI: 10.1007/s00200-025-00676-8
{"title":"Best Paper Award in Memory of Jacques Calmet","authors":"","doi":"10.1007/s00200-025-00676-8","DOIUrl":"10.1007/s00200-025-00676-8","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 1","pages":"1 - 1"},"PeriodicalIF":0.6,"publicationDate":"2025-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-16DOI: 10.1007/s00200-024-00675-1
{"title":"Call for Papers: Special Issue of AAECC Dedicated to the Memory of Joos Heintz","authors":"","doi":"10.1007/s00200-024-00675-1","DOIUrl":"10.1007/s00200-024-00675-1","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 1","pages":"3 - 4"},"PeriodicalIF":0.6,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The LG cryptosystem is a public-key encryption scheme in the rank metric using the recent family of (mathbf{mathrm {lambda }}-)Gabidulin codes and introduced in 2019 by Lau and Tan. In this paper, we present a cryptanalysis showing that the security of several parameters of the scheme have been overestimated. We also show the existence of some weak keys allowing an attacker to find in polynomial time an alternative private key.
{"title":"Security assessment of the LG cryptosystem","authors":"Étienne Burle, Hervé Talé Kalachi, Freddy Lende Metouke, Ayoub Otmani","doi":"10.1007/s00200-024-00671-5","DOIUrl":"10.1007/s00200-024-00671-5","url":null,"abstract":"<div><p>The LG cryptosystem is a public-key encryption scheme in the rank metric using the recent family of <span>(mathbf{mathrm {lambda }}-)</span>Gabidulin codes and introduced in 2019 by Lau and Tan. In this paper, we present a cryptanalysis showing that the security of several parameters of the scheme have been overestimated. We also show the existence of some weak keys allowing an attacker to find in polynomial time an alternative private key.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"187 - 198"},"PeriodicalIF":0.6,"publicationDate":"2024-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-11DOI: 10.1007/s00200-024-00674-2
Sara Ban Martinović, Sanja Rukavina
Type II ({mathbb {Z}}_4)-codes are a class of self-dual ({mathbb {Z}}_4)-codes with Euclidean weights divisible by eight. A Type II ({mathbb {Z}}_4)-code of length n is extremal if its minimum Euclidean weight is equal to (8leftlfloor frac{n}{24}rightrfloor +8.) A small number of such codes is known for lengths greater than or equal to 48. Based on the doubling method, in this paper we develop a method to construct new extremal Type II ({mathbb {Z}}_4)-codes starting from a free extremal Type II ({mathbb {Z}}_4)-code of length 48, 56 or 64. Using this method, we construct extremal Type II ({mathbb {Z}}_4)-codes of length 64 and type (4^{31}2^2). Extremal Type II ({mathbb {Z}}_4)-codes of length 64 of this type were not known before. Moreover, the residue codes of the constructed extremal ({mathbb {Z}}_4)-codes are best known [64, 31] binary codes and the supports of the minimum weight codewords of the residue code and the torsion code of one of these codes yields self-orthogonal 1-design.
{"title":"New extremal Type II ({mathbb {Z}}_4)-codes of length 64","authors":"Sara Ban Martinović, Sanja Rukavina","doi":"10.1007/s00200-024-00674-2","DOIUrl":"10.1007/s00200-024-00674-2","url":null,"abstract":"<div><p>Type II <span>({mathbb {Z}}_4)</span>-codes are a class of self-dual <span>({mathbb {Z}}_4)</span>-codes with Euclidean weights divisible by eight. A Type II <span>({mathbb {Z}}_4)</span>-code of length <i>n</i> is extremal if its minimum Euclidean weight is equal to <span>(8leftlfloor frac{n}{24}rightrfloor +8.)</span> A small number of such codes is known for lengths greater than or equal to 48. Based on the doubling method, in this paper we develop a method to construct new extremal Type II <span>({mathbb {Z}}_4)</span>-codes starting from a free extremal Type II <span>({mathbb {Z}}_4)</span>-code of length 48, 56 or 64. Using this method, we construct extremal Type II <span>({mathbb {Z}}_4)</span>-codes of length 64 and type <span>(4^{31}2^2)</span>. Extremal Type II <span>({mathbb {Z}}_4)</span>-codes of length 64 of this type were not known before. Moreover, the residue codes of the constructed extremal <span>({mathbb {Z}}_4)</span>-codes are best known [64, 31] binary codes and the supports of the minimum weight codewords of the residue code and the torsion code of one of these codes yields self-orthogonal 1-design.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"173 - 186"},"PeriodicalIF":0.6,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-30DOI: 10.1007/s00200-024-00669-z
Joris van der Hoeven, Grégoire Lecerf
Given an algebraic germ of a plane curve at the origin, in terms of a bivariate polynomial, we analyze the complexity of computing an irreducible decomposition up to any given truncation order. With a suitable representation of the irreducible components, and whenever the characteristic of the ground field is zero or larger than the degree of the germ, we design a new algorithm that involves a nearly linear number of arithmetic operations in the ground field plus a small amount of irreducible univariate polynomial factorizations.
{"title":"Plane curve germs and contact factorization","authors":"Joris van der Hoeven, Grégoire Lecerf","doi":"10.1007/s00200-024-00669-z","DOIUrl":"10.1007/s00200-024-00669-z","url":null,"abstract":"<div><p>Given an algebraic germ of a plane curve at the origin, in terms of a bivariate polynomial, we analyze the complexity of computing an irreducible decomposition up to any given truncation order. With a suitable representation of the irreducible components, and whenever the characteristic of the ground field is zero or larger than the degree of the germ, we design a new algorithm that involves a nearly linear number of arithmetic operations in the ground field plus a small amount of irreducible univariate polynomial factorizations.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 1","pages":"5 - 106"},"PeriodicalIF":0.6,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-25DOI: 10.1007/s00200-024-00673-3
Ruihua Shen, Xianping Liu, Xiaofang Xu
In this paper, two classes of permutation pentanomials over finite fields (mathbb {F}_{p^{2m}}) are investigated by transforming the permutation property of polynomials to verifying that some low-degree equations has no solutions in the unit circle. Furthermore, based on the study of the algebraic curves for fractional polynomials, several classes of permutation pentanomials and hexanomials over (mathbb {F}_{5^{2m}}) are discovered. Additionally, we obtain some new permutation pentanomials, quadrinomials and octonomials over (mathbb {F}_{5^{2m}}) from known permutation polynomials in the unit circle.
{"title":"More constructions of permutation pentanomials and hexanomials over (mathbb {F}_{p^{2m}})","authors":"Ruihua Shen, Xianping Liu, Xiaofang Xu","doi":"10.1007/s00200-024-00673-3","DOIUrl":"10.1007/s00200-024-00673-3","url":null,"abstract":"<div><p>In this paper, two classes of permutation pentanomials over finite fields <span>(mathbb {F}_{p^{2m}})</span> are investigated by transforming the permutation property of polynomials to verifying that some low-degree equations has no solutions in the unit circle. Furthermore, based on the study of the algebraic curves for fractional polynomials, several classes of permutation pentanomials and hexanomials over <span>(mathbb {F}_{5^{2m}})</span> are discovered. Additionally, we obtain some new permutation pentanomials, quadrinomials and octonomials over <span>(mathbb {F}_{5^{2m}})</span> from known permutation polynomials in the unit circle.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"149 - 171"},"PeriodicalIF":0.6,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-11-05DOI: 10.1007/s00200-024-00672-4
Ömür Deveci, Anthony G. Shannon, Özgür Erdağ, Güntaç Ceco
In this paper, we define the complex-type k-Padovan numbers and then give the relationships between the (left( 1,k-1right))-bonacci numbers, the k -Padovan numbers and the complex-type k-Padovan numbers by matrix method. In addition, we study the complex-type k-Padovan sequence modulo m and then we show that for some m the periods of the complex type k-Padovan and k-Padovan sequences modulo m are related. Furthermore, we extend the complex-type k-Padovan sequences to groups. Finally, we obtain the periods of the complex-type 4, 5, 6-Padovan sequences in the semidihedral group (SD_{2^{m}}), (left( mge 4right)) with respect to the generating pairs (left( x,yright)) and (left( y,xright)).
{"title":"The complex-type k-Padovan sequences and their applications","authors":"Ömür Deveci, Anthony G. Shannon, Özgür Erdağ, Güntaç Ceco","doi":"10.1007/s00200-024-00672-4","DOIUrl":"10.1007/s00200-024-00672-4","url":null,"abstract":"<div><p>In this paper, we define the complex-type <i>k</i>-Padovan numbers and then give the relationships between the <span>(left( 1,k-1right))</span>-bonacci numbers, the <i>k</i> -Padovan numbers and the complex-type <i>k</i>-Padovan numbers by matrix method. In addition, we study the complex-type <i>k</i>-Padovan sequence modulo <i>m</i> and then we show that for some <i>m</i> the periods of the complex type <i>k</i>-Padovan and <i>k</i>-Padovan sequences modulo <i>m</i> are related. Furthermore, we extend the complex-type <i>k</i>-Padovan sequences to groups. Finally, we obtain the periods of the complex-type 4, 5, 6-Padovan sequences in the semidihedral group <span>(SD_{2^{m}})</span>, <span>(left( mge 4right))</span> with respect to the generating pairs <span>(left( x,yright))</span> and <span>(left( y,xright))</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"131 - 147"},"PeriodicalIF":0.6,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-21DOI: 10.1007/s00200-024-00670-6
Matthias Johann Steiner
Let (mathbb{F}_q) be a finite field of characteristic p. In this paper we prove that the c-Boomerang Uniformity, (c ne 0), for all permutation monomials (x^d), where (d > 1) and (p not mid d), is bounded by (left{ begin{array}{ll} d^2, & c^2 ne 1, d cdot (d - 1), & c = - 1, d cdot (d - 2), & c = 1 end{array} right} .) Further, we utilize this bound to estimate the c-boomerang uniformity of a large class of generalized triangular dynamical systems, a polynomial-based approach to describe cryptographic permutations of (mathbb{F}_{q}^{n}), including the well-known substitution–permutation network.
设(mathbb{F}_q)为特征p的有限域。本文证明了所有排列单项式(x^d)的c-Boomerang均匀性(c ne 0),其中(d > 1)和(p not mid d)都有(left{ begin{array}{ll} d^2, & c^2 ne 1, d cdot (d - 1), & c = - 1, d cdot (d - 2), & c = 1 end{array} right} .)的界。进一步,我们利用这个界估计了一大类广义三角形动力系统的c-Boomerang均匀性,一个基于多项式的方法来描述(mathbb{F}_{q}^{n})的密码排列。包括著名的置换网络。
{"title":"A degree bound for the c-boomerang uniformity of permutation monomials","authors":"Matthias Johann Steiner","doi":"10.1007/s00200-024-00670-6","DOIUrl":"10.1007/s00200-024-00670-6","url":null,"abstract":"<div><p>Let <span>(mathbb{F}_q)</span> be a finite field of characteristic <i>p</i>. In this paper we prove that the <i>c</i>-Boomerang Uniformity, <span>(c ne 0)</span>, for all permutation monomials <span>(x^d)</span>, where <span>(d > 1)</span> and <span>(p not mid d)</span>, is bounded by <span>(left{ begin{array}{ll} d^2, & c^2 ne 1, d cdot (d - 1), & c = - 1, d cdot (d - 2), & c = 1 end{array} right} .)</span> Further, we utilize this bound to estimate the <i>c</i>-boomerang uniformity of a large class of generalized triangular dynamical systems, a polynomial-based approach to describe cryptographic permutations of <span>(mathbb{F}_{q}^{n})</span>, including the well-known substitution–permutation network.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"95 - 130"},"PeriodicalIF":0.6,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-024-00670-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}