Pub Date : 2022-08-20DOI: 10.1007/s00200-022-00573-4
Rode Grönkvist, Erik Leffler, Anna Torstensson, Victor Ufnarovski
We introduce the concept of subalgebra spectrum, Sp(A), for a subalgebra A of finite codimension in (mathbb {K}[x]). The spectrum is a finite subset of the underlying field. We also introduce a tool, the characteristic polynomial of A, which has the spectrum as its set of zeroes. The characteristic polynomial can be computed from the generators of A, thus allowing us to find the spectrum of an algebra given by generators. We proceed by using the spectrum to get descriptions of subalgebras of finite codimension. More precisely we show that A can be described by a set of conditions that each is either of the type (f(alpha )=f(beta )) for (alpha ,beta) in Sp(A) or of the type stating that some linear combination of derivatives of different orders evaluated in elements of Sp(A) equals zero. We use these types of conditions to, by an inductive process, find explicit descriptions of subalgebras of codimension up to three. These descriptions also include SAGBI bases for each family of subalgebras.
{"title":"Subalgebras in K[x] of small codimension","authors":"Rode Grönkvist, Erik Leffler, Anna Torstensson, Victor Ufnarovski","doi":"10.1007/s00200-022-00573-4","DOIUrl":"10.1007/s00200-022-00573-4","url":null,"abstract":"<div><p>We introduce the concept of subalgebra spectrum, <i>Sp</i>(<i>A</i>), for a subalgebra <i>A</i> of finite codimension in <span>(mathbb {K}[x])</span>. The spectrum is a finite subset of the underlying field. We also introduce a tool, the characteristic polynomial of <i>A</i>, which has the spectrum as its set of zeroes. The characteristic polynomial can be computed from the generators of <i>A</i>, thus allowing us to find the spectrum of an algebra given by generators. We proceed by using the spectrum to get descriptions of subalgebras of finite codimension. More precisely we show that <i>A</i> can be described by a set of conditions that each is either of the type <span>(f(alpha )=f(beta ))</span> for <span>(alpha ,beta)</span> in <i>Sp</i>(<i>A</i>) or of the type stating that some linear combination of derivatives of different orders evaluated in elements of <i>Sp</i>(<i>A</i>) equals zero. We use these types of conditions to, by an inductive process, find explicit descriptions of subalgebras of codimension up to three. These descriptions also include SAGBI bases for each family of subalgebras.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"33 6","pages":"751 - 789"},"PeriodicalIF":0.7,"publicationDate":"2022-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00573-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42481789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-16DOI: 10.1007/s00200-022-00577-0
Wenshuo Guo, Fang-Wei Fu
This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the McEliece setting. Recently a polynomial-time key recovery attack was proposed to break this cryptosystem in some cases. To prevent this attack, we propose the use of subcodes to disguise the secret codes in Modification I. In Modification II, we choose a random matrix of low column rank to mix with the secret matrix. Our analysis shows that these two modifications can both resist the existing structural attacks. Furthermore, these modifications have a much more compact representation of public keys compared to Classic McEliece, which has been selected into the fourth round of the NIST-PQC project.
{"title":"Two modifications for Loidreau’s code-based cryptosystem","authors":"Wenshuo Guo, Fang-Wei Fu","doi":"10.1007/s00200-022-00577-0","DOIUrl":"10.1007/s00200-022-00577-0","url":null,"abstract":"<div><p>This paper presents two modifications for Loidreau’s cryptosystem, a rank metric-based cryptosystem constructed by using Gabidulin codes in the McEliece setting. Recently a polynomial-time key recovery attack was proposed to break this cryptosystem in some cases. To prevent this attack, we propose the use of subcodes to disguise the secret codes in Modification I. In Modification II, we choose a random matrix of low column rank to mix with the secret matrix. Our analysis shows that these two modifications can both resist the existing structural attacks. Furthermore, these modifications have a much more compact representation of public keys compared to Classic McEliece, which has been selected into the fourth round of the NIST-PQC project.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 5","pages":"647 - 665"},"PeriodicalIF":0.6,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81666988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-10DOI: 10.1007/s00200-023-00600-y
Eriola Hoxhaj, Jean Michel Menjanahary, J. Schicho
{"title":"Using algebraic geometry to reconstruct a darboux cyclide from a calibrated camera picture","authors":"Eriola Hoxhaj, Jean Michel Menjanahary, J. Schicho","doi":"10.1007/s00200-023-00600-y","DOIUrl":"https://doi.org/10.1007/s00200-023-00600-y","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":" ","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42691999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-08DOI: 10.1007/s00200-022-00570-7
Katsusuke Nabeshima, Shinichi Tajima
We consider Noetherian operators in the context of symbolic computation. Upon utilizing the theory of holonomic ({mathcal D})-modules, we present a new method for computing Noetherian operators associated to a zero-dimensional ideal. An effective algorithm that consists mainly of linear algebra techniques is proposed for computing them. Moreover, as applications, new computation methods of polynomial ideals are discussed by utilizing the Noetherian operators.
{"title":"Effective algorithm for computing Noetherian operators of zero-dimensional ideals","authors":"Katsusuke Nabeshima, Shinichi Tajima","doi":"10.1007/s00200-022-00570-7","DOIUrl":"10.1007/s00200-022-00570-7","url":null,"abstract":"<div><p>We consider Noetherian operators in the context of symbolic computation. Upon utilizing the theory of holonomic <span>({mathcal D})</span>-modules, we present a new method for computing Noetherian operators associated to a zero-dimensional ideal. An effective algorithm that consists mainly of linear algebra techniques is proposed for computing them. Moreover, as applications, new computation methods of polynomial ideals are discussed by utilizing the Noetherian operators.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"33 6","pages":"867 - 899"},"PeriodicalIF":0.7,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44198290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-06DOI: 10.1007/s00200-022-00575-2
Augustine Musukwa, Massimiliano Sala, Irene Villa, Marco Zaninelli
The weight, balancedness and nonlinearity are important properties of Boolean functions, but they can be difficult to determine in general. In this paper, we study how to compute them for two classes of functions where these problems are more tractable. In particular, we study functions of degree three and the so-called “splitting” functions. The latter are functions that can be written as the sum of two functions defined over disjoint sets of variables. We show how, for splitting functions, studying these properties reduces to the study of simpler functions. We provide then a procedure to compute the weight of a cubic Boolean function. We show computationally that, for a cubic Boolean function with limited number of terms, this procedure is on average significantly more efficient than some other methods.
{"title":"On cryptographic properties of cubic and splitting Boolean functions","authors":"Augustine Musukwa, Massimiliano Sala, Irene Villa, Marco Zaninelli","doi":"10.1007/s00200-022-00575-2","DOIUrl":"10.1007/s00200-022-00575-2","url":null,"abstract":"<div><p>The weight, balancedness and nonlinearity are important properties of Boolean functions, but they can be difficult to determine in general. In this paper, we study how to compute them for two classes of functions where these problems are more tractable. In particular, we study functions of degree three and the so-called “splitting” functions. The latter are functions that can be written as the sum of two functions defined over disjoint sets of variables. We show how, for splitting functions, studying these properties reduces to the study of simpler functions. We provide then a procedure to compute the weight of a cubic Boolean function. We show computationally that, for a cubic Boolean function with limited number of terms, this procedure is on average significantly more efficient than some other methods.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 5","pages":"629 - 645"},"PeriodicalIF":0.6,"publicationDate":"2022-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00575-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42127920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-08-01DOI: 10.1007/s00200-022-00574-3
Mitra Jalali, Reza Nikandish
In this paper, using Gallai’s Theorem and the notion of strong resolving graph, we determine the strong metric dimension in annihilating-ideal graph of commutative rings. For reduced rings, an explicit formula is given and for non-reduced rings, under some conditions, strong metric dimension is computed.
{"title":"Strong metric dimension in annihilating-ideal graph of commutative rings","authors":"Mitra Jalali, Reza Nikandish","doi":"10.1007/s00200-022-00574-3","DOIUrl":"10.1007/s00200-022-00574-3","url":null,"abstract":"<div><p>In this paper, using Gallai’s Theorem and the notion of strong resolving graph, we determine the strong metric dimension in annihilating-ideal graph of commutative rings. For reduced rings, an explicit formula is given and for non-reduced rings, under some conditions, strong metric dimension is computed.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 5","pages":"615 - 627"},"PeriodicalIF":0.6,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47121791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-20DOI: 10.1007/s00200-022-00571-6
Tsuyoshi Miezaki, Hiroyuki Nakasora
Let C be an extremal Type III or IV code and (D_{w}) be the support design of C for weight w. We introduce the numbers, (delta (C)) and s(C), as follows: (delta (C)) is the largest integer t such that, for all weights, (D_{w}) is a t-design; s(C) denotes the largest integer t such that w exists and (D_{w}) is a t-design. Herein, we consider the possible values of (delta (C)) and s(C).
让 C 是极值类型 III 或 IV 码,(D_{w}) 是 C 对于权重 w 的支持设计。我们引入数字 (delta (C)) 和 s(C) 如下:(delta(C))是指对于所有权重,(D_{w})是一个t设计的最大整数t;s(C)表示w存在且(D_{w})是一个t设计的最大整数t。在这里,我们考虑了 (delta (C)) 和 s(C) 的可能值。
{"title":"On the support t-designs of extremal Type III and IV codes","authors":"Tsuyoshi Miezaki, Hiroyuki Nakasora","doi":"10.1007/s00200-022-00571-6","DOIUrl":"10.1007/s00200-022-00571-6","url":null,"abstract":"<div><p>Let <i>C</i> be an extremal Type III or IV code and <span>(D_{w})</span> be the support design of <i>C</i> for weight <i>w</i>. We introduce the numbers, <span>(delta (C))</span> and <i>s</i>(<i>C</i>), as follows: <span>(delta (C))</span> is the largest integer <i>t</i> such that, for all weights, <span>(D_{w})</span> is a <i>t</i>-design; <i>s</i>(<i>C</i>) denotes the largest integer <i>t</i> such that <i>w</i> exists and <span>(D_{w})</span> is a <i>t</i>-design. Herein, we consider the possible values of <span>(delta (C))</span> and <i>s</i>(<i>C</i>).</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 5","pages":"591 - 613"},"PeriodicalIF":0.6,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47484961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-14DOI: 10.1007/s00200-022-00568-1
Hai Q. Dinh, Pramod Kumar Kewat, Nilay Kumar Mondal
Maximum distance separable (MDS) codes have the highest possible error-correcting capability among codes with the same length and size. Let (gamma ) be nonzero in (mathbb {F}_{2^m}.) We consider all cyclic and ((1+ugamma ))-constacyclic codes of length (2^s) over (mathbb {F}_{2^m}+umathbb {F}_{2^m}) with their Lee distance and investigate all the cases whether the corresponding Gray images are MDS by giving an analogue of the Singleton bound for codes over (mathbb {F}_{2^m}+umathbb {F}_{2^m}) with the Lee distance through Gray map.
{"title":"Maximum distance separable repeated-root constacyclic codes over (mathbb {F}_{2^m}+umathbb {F}_{2^m}) with respect to the Lee distance","authors":"Hai Q. Dinh, Pramod Kumar Kewat, Nilay Kumar Mondal","doi":"10.1007/s00200-022-00568-1","DOIUrl":"10.1007/s00200-022-00568-1","url":null,"abstract":"<div><p>Maximum distance separable (MDS) codes have the highest possible error-correcting capability among codes with the same length and size. Let <span>(gamma )</span> be nonzero in <span>(mathbb {F}_{2^m}.)</span> We consider all cyclic and <span>((1+ugamma ))</span>-constacyclic codes of length <span>(2^s)</span> over <span>(mathbb {F}_{2^m}+umathbb {F}_{2^m})</span> with their Lee distance and investigate all the cases whether the corresponding Gray images are MDS by giving an analogue of the Singleton bound for codes over <span>(mathbb {F}_{2^m}+umathbb {F}_{2^m})</span> with the Lee distance through Gray map.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 4","pages":"557 - 571"},"PeriodicalIF":0.6,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47364548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-14DOI: 10.1007/s00200-022-00565-4
Jakub Vašíček, Raffaele Vitolo
We describe software for symbolic computations that we developed in order to find Hamiltonian operators for Witten–Dijkgraaf–Verlinde–Verlinde (WDVV) equations, and verify their compatibility. The computation involves nonlocal (integro-differential) operators, for which specific canonical forms and algorithms have been used.
{"title":"WDVV equations: symbolic computations of Hamiltonian operators","authors":"Jakub Vašíček, Raffaele Vitolo","doi":"10.1007/s00200-022-00565-4","DOIUrl":"10.1007/s00200-022-00565-4","url":null,"abstract":"<div><p>We describe software for symbolic computations that we developed in order to find Hamiltonian operators for Witten–Dijkgraaf–Verlinde–Verlinde (WDVV) equations, and verify their compatibility. The computation involves nonlocal (integro-differential) operators, for which specific canonical forms and algorithms have been used.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"33 6","pages":"915 - 934"},"PeriodicalIF":0.7,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-022-00565-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49642862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this work we define and study binary codes (C_{q,k}) and (overline{C_{q,k}}) obtained from neighborhood designs of Paley-type bipartite graphs P(q, k) and their complements, respectively for q an odd prime. We prove that for some values of q and k the codes ({C}_{q,k}) are self-dual and the codes (overline{C_{q,k}}) are self-orthogonal. Most of these codes tend to be with optimal or near optimal parameters. Next, we extend the codes (C_{q,k}) to get doubly even self dual codes and find that most of these codes are extremal.
{"title":"Construction of self dual codes from graphs","authors":"Nazahet Fellah, Kenza Guenda, Ferruh Özbudak, Padmapani Seneviratne","doi":"10.1007/s00200-022-00567-2","DOIUrl":"10.1007/s00200-022-00567-2","url":null,"abstract":"<div><p>In this work we define and study binary codes <span>(C_{q,k})</span> and <span>(overline{C_{q,k}})</span> obtained from neighborhood designs of Paley-type bipartite graphs <i>P</i>(<i>q</i>, <i>k</i>) and their complements, respectively for <i>q</i> an odd prime. We prove that for some values of <i>q</i> and <i>k</i> the codes <span>({C}_{q,k})</span> are self-dual and the codes <span>(overline{C_{q,k}})</span> are self-orthogonal. Most of these codes tend to be with optimal or near optimal parameters. Next, we extend the codes <span>(C_{q,k})</span> to get doubly even self dual codes and find that most of these codes are extremal.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 4","pages":"545 - 556"},"PeriodicalIF":0.6,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42704749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}