Pub Date : 2024-05-13DOI: 10.1007/s00200-024-00658-2
Yan-Ping Wang, Zhengbang Zha
Permutation polynomials with sparse forms over finite fields attract researchers’ great interest and have important applications in many areas of mathematics and engineering. In this paper, by investigating the exponents (s, i) and the coefficients (a,bin mathbb {F}_{q}^{*}), we present some new results of permutation polynomials of the form (f(x)= ax^{q^i(q^{2}-q+1)} + bx^{s} + textrm{Tr}_{q^n/q}(x)) over (mathbb {F}_{q^n}) ((n=2) or 3). The permutation property of the new results is given by studying the number of solutions of special equations over (mathbb {F}_{q^n}).
{"title":"New results of sparse permutation polynomials with trace functions over $$mathbb {F}_{q^n}$$","authors":"Yan-Ping Wang, Zhengbang Zha","doi":"10.1007/s00200-024-00658-2","DOIUrl":"https://doi.org/10.1007/s00200-024-00658-2","url":null,"abstract":"<p>Permutation polynomials with sparse forms over finite fields attract researchers’ great interest and have important applications in many areas of mathematics and engineering. In this paper, by investigating the exponents (<i>s</i>, <i>i</i>) and the coefficients <span>(a,bin mathbb {F}_{q}^{*})</span>, we present some new results of permutation polynomials of the form <span>(f(x)= ax^{q^i(q^{2}-q+1)} + bx^{s} + textrm{Tr}_{q^n/q}(x))</span> over <span>(mathbb {F}_{q^n})</span> (<span>(n=2)</span> or 3). The permutation property of the new results is given by studying the number of solutions of special equations over <span>(mathbb {F}_{q^n})</span>.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140926985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-27DOI: 10.1007/s00200-024-00656-4
Shakir Ali, Atif Ahmad Khan, Bhupendra Singh
Let (k>1) be a fixed integer. In Gupta and Ray (Cryptography and Communications 7: 257–287, 2015), proved the non existence of (2^k times 2^k) orthogonal circulant MDS matrices and involutory circulant MDS matrices over finite fields of characteristic 2. The main aim of this paper is to prove the non-existence of orthogonal circulant MDS matrices of order (2^ktimes 2^k) and involutory circulant MDS matrices of order k over finite commutative rings of characteristic 2. Precisely, we prove that any circulant orthogonal matrix of order (2^k) over finite commutative rings of characteristic 2 with identity is not a MDS matrix. Moreover, some related results are also discussed. Finally, we provide some examples to prove that the assumed restrictions on our main results are not superfluous.
让 (k>1) 是一个固定整数。在 Gupta 和 Ray (Cryptography and Communications 7: 257-287, 2015)一文中,证明了在特征 2 的有限域上(2^k times 2^k) 正交环形 MDS 矩阵和非正交环形 MDS 矩阵的不存在性。本文的主要目的是证明在特征 2 的有限交换环上,阶为 (2^ktimes 2^k) 的正交循环 MDS 矩阵和阶为 k 的非法定循环 MDS 矩阵的不存在性。确切地说,我们证明了在特征 2 的有限交换环上任何阶为 (2^k) 的环状正交矩阵都不是 MDS 矩阵。此外,我们还讨论了一些相关结果。最后,我们提供了一些例子来证明我们对主要结果的假定限制并非多余。
{"title":"On circulant involutory and orthogonal MDS matrices over finite commutative rings","authors":"Shakir Ali, Atif Ahmad Khan, Bhupendra Singh","doi":"10.1007/s00200-024-00656-4","DOIUrl":"https://doi.org/10.1007/s00200-024-00656-4","url":null,"abstract":"<p>Let <span>(k>1)</span> be a fixed integer. In Gupta and Ray (Cryptography and Communications 7: 257–287, 2015), proved the non existence of <span>(2^k times 2^k)</span> orthogonal circulant MDS matrices and involutory circulant MDS matrices over finite fields of characteristic 2. The main aim of this paper is to prove the non-existence of orthogonal circulant MDS matrices of order <span>(2^ktimes 2^k)</span> and involutory circulant MDS matrices of order <i>k</i> over finite commutative rings of characteristic 2. Precisely, we prove that any circulant orthogonal matrix of order <span>(2^k)</span> over finite commutative rings of characteristic 2 with identity is not a MDS matrix. Moreover, some related results are also discussed. Finally, we provide some examples to prove that the assumed restrictions on our main results are not superfluous.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140812697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-27DOI: 10.1007/s00200-024-00655-5
Joris van der Hoeven, Grégoire Lecerf
Consider a multivariate polynomial (f in K [x_1, ldots , x_n]) over a field K, which is given through a black box capable of evaluating f at points in (K^n), or possibly at points in (A^n) for any K-algebra A. The problem of sparse interpolation is to express f in its usual form with respect to the monomial basis. We analyze the complexity of various old and new algorithms for this task in terms of bounds D and T for the total degree of f and its number of terms. We mainly focus on the case when K is a finite field and explore possible speed-ups.
考虑一个域 K 上的多元多项式(f in K [x_1, ldots , x_n]),它通过一个黑盒子给出,黑盒子能够在 (K^n) 中的点对 f 进行求值,也可能在任意 K 代数 A 的 (A^n) 中的点对 f 进行求值。我们用 f 的总阶数和项数的边界 D 和 T 来分析这项任务的各种新旧算法的复杂性。我们主要关注 K 是有限域时的情况,并探索可能的提速方法。
{"title":"Sparse polynomial interpolation: faster strategies over finite fields","authors":"Joris van der Hoeven, Grégoire Lecerf","doi":"10.1007/s00200-024-00655-5","DOIUrl":"https://doi.org/10.1007/s00200-024-00655-5","url":null,"abstract":"<p>Consider a multivariate polynomial <span>(f in K [x_1, ldots , x_n])</span> over a field <i>K</i>, which is given through a black box capable of evaluating <i>f</i> at points in <span>(K^n)</span>, or possibly at points in <span>(A^n)</span> for any <i>K</i>-algebra <i>A</i>. The problem of sparse interpolation is to express <i>f</i> in its usual form with respect to the monomial basis. We analyze the complexity of various old and new algorithms for this task in terms of bounds <i>D</i> and <i>T</i> for the total degree of <i>f</i> and its number of terms. We mainly focus on the case when <i>K</i> is a finite field and explore possible speed-ups.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140813078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-24DOI: 10.1007/s00200-024-00652-8
Hermann Tchatchiem Kamche, Hervé Talé Kalachi
Several problems in algebraic geometry and coding theory over finite rings are modeled by systems of algebraic equations. Among these problems, we have the rank decoding problem, which is used in the construction of public-key cryptosystems. A finite chain ring is a finite ring admitting exactly one maximal ideal and every ideal being generated by one element. In 2004, Nechaev and Mikhailov proposed two methods for solving systems of polynomial equations over finite chain rings. These methods used solutions over the residue field to construct all solutions step by step. However, for some types of algebraic equations, one simply needs partial solutions. In this paper, we combine two existing approaches to show how Gröbner bases over finite chain rings can be used to solve systems of algebraic equations over finite commutative rings. Then, we use skew polynomials and Plücker coordinates to show that some algebraic approaches used to solve the rank decoding problem and the MinRank problem over finite fields can be extended to finite principal ideal rings.
{"title":"Solving systems of algebraic equations over finite commutative rings and applications","authors":"Hermann Tchatchiem Kamche, Hervé Talé Kalachi","doi":"10.1007/s00200-024-00652-8","DOIUrl":"https://doi.org/10.1007/s00200-024-00652-8","url":null,"abstract":"<p>Several problems in algebraic geometry and coding theory over finite rings are modeled by systems of algebraic equations. Among these problems, we have the rank decoding problem, which is used in the construction of public-key cryptosystems. A finite chain ring is a finite ring admitting exactly one maximal ideal and every ideal being generated by one element. In 2004, Nechaev and Mikhailov proposed two methods for solving systems of polynomial equations over finite chain rings. These methods used solutions over the residue field to construct all solutions step by step. However, for some types of algebraic equations, one simply needs partial solutions. In this paper, we combine two existing approaches to show how Gröbner bases over finite chain rings can be used to solve systems of algebraic equations over finite commutative rings. Then, we use skew polynomials and Plücker coordinates to show that some algebraic approaches used to solve the rank decoding problem and the MinRank problem over finite fields can be extended to finite principal ideal rings.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140798004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-20DOI: 10.1007/s00200-024-00657-3
R. Shahriyari, R. Nikandish, A. Tehranian, H. Rasouli
Let R be a commutative ring with identity and A(R) be the set of ideals with non-zero annihilator. The annihilator-ideal graph of R is defined as the graph (mathrm{A_I}(R)) with the vertex set (A(R)^*=A(R)setminus {0}) and two distinct vertices L, K are adjacent if and only if (textrm{Ann}_R(K) cup textrm{Ann}_R(L)) is a proper subset of (textrm{Ann}_R(KL)). In this paper, we determine the metric dimension of (mathrm{A_I}(R)). Also, the twin-free clique number for (mathrm{A_I}(R)) is computed and as an application the strong metric dimension in annihilator-ideal graphs is given.
让 R 是一个具有同一性的交换环,A(R) 是具有非零湮没子的理想集。R 的湮没ideal 图定义为顶点集为 A(R)^*=A(R)setminus {0})的图 (mathrm{A_I}(R))和两个不同顶点 L. K 相邻、当且仅当(textrm{Ann}_R(K) cup textrm{Ann}_R(L))是(textrm{Ann}_R(KL))的适当子集时,K 是相邻的。在本文中,我们确定了 (mathrm{A_I}(R)) 的度量维度。同时,我们还计算了 (mathrm{A_I}(R)) 的无孪生簇数,并给出了湮没者理想图中的强度量维度。
{"title":"Metric dimension and strong metric dimension in annihilator-ideal graphs","authors":"R. Shahriyari, R. Nikandish, A. Tehranian, H. Rasouli","doi":"10.1007/s00200-024-00657-3","DOIUrl":"https://doi.org/10.1007/s00200-024-00657-3","url":null,"abstract":"<p>Let <i>R</i> be a commutative ring with identity and <i>A</i>(<i>R</i>) be the set of ideals with non-zero annihilator. The annihilator-ideal graph of <i>R</i> is defined as the graph <span>(mathrm{A_I}(R))</span> with the vertex set <span>(A(R)^*=A(R)setminus {0})</span> and two distinct vertices <i>L</i>, <i>K</i> are adjacent if and only if <span>(textrm{Ann}_R(K) cup textrm{Ann}_R(L))</span> is a proper subset of <span>(textrm{Ann}_R(KL))</span>. In this paper, we determine the metric dimension of <span>(mathrm{A_I}(R))</span>. Also, the twin-free clique number for <span>(mathrm{A_I}(R))</span> is computed and as an application the strong metric dimension in annihilator-ideal graphs is given.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140623606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let C be a two and three-weight ternary code. Furthermore, we assume that (C_ell ) are t-designs for all (ell ) by the Assmus–Mattson theorem. We show that (t le 5). As a corollary, we provide a new characterization of the (extended) ternary Golay code.
假设 C 是二重和三重三元码。此外,根据阿斯穆斯-马特森定理,我们假设(C_ell )是所有(ell )的t-指定。我们证明了(t (ell 5))。作为推论,我们提供了(扩展的)三元戈莱码的新特征。
{"title":"A note on the Assmus–Mattson theorem for some ternary codes","authors":"Eiichi Bannai, Tsuyoshi Miezaki, Hiroyuki Nakasora","doi":"10.1007/s00200-024-00654-6","DOIUrl":"https://doi.org/10.1007/s00200-024-00654-6","url":null,"abstract":"<p>Let <i>C</i> be a two and three-weight ternary code. Furthermore, we assume that <span>(C_ell )</span> are <i>t</i>-designs for all <span>(ell )</span> by the Assmus–Mattson theorem. We show that <span>(t le 5)</span>. As a corollary, we provide a new characterization of the (extended) ternary Golay code.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140603171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-06DOI: 10.1007/s00200-024-00653-7
Félix Hernández, Gerardo Vega
In this paper we use the puncturing and shortening techniques on two already-known classes of optimal cyclic codes in order to obtain three new classes of optimal linear codes achieving the Griesmer bound. The weight distributions for these codes are settled. We also investigate their dual codes and show that they are either optimal or almost optimal with respect to the sphere-packing bound. Moreover, these duals contain classes of almost maximum distance separable codes which are shown to be proper for error detection. Further, some of the obtained optimal linear codes are suitable for constructing secret sharing schemes with nice access structures.
{"title":"Obtaining new classes of optimal linear codes by puncturing and shortening optimal cyclic codes","authors":"Félix Hernández, Gerardo Vega","doi":"10.1007/s00200-024-00653-7","DOIUrl":"https://doi.org/10.1007/s00200-024-00653-7","url":null,"abstract":"<p>In this paper we use the puncturing and shortening techniques on two already-known classes of optimal cyclic codes in order to obtain three new classes of optimal linear codes achieving the Griesmer bound. The weight distributions for these codes are settled. We also investigate their dual codes and show that they are either optimal or almost optimal with respect to the sphere-packing bound. Moreover, these duals contain classes of almost maximum distance separable codes which are shown to be proper for error detection. Further, some of the obtained optimal linear codes are suitable for constructing secret sharing schemes with nice access structures.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140571164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The investigation of partially APN functions has attracted a lot of research interest recently. In this paper, we present several new infinite classes of 0-APN power functions over (mathbb {F}_{2^n}) by using the multivariate method and resultant elimination, and show that these 0-APN power functions are CCZ-inequivalent to the known ones.
{"title":"Several new infinite classes of 0-APN power functions over $$mathbb {F}_{2^n}$$","authors":"Yuying Man, Shizhu Tian, Nian Li, Xiangyong Zeng, Yanbin Zheng","doi":"10.1007/s00200-024-00651-9","DOIUrl":"https://doi.org/10.1007/s00200-024-00651-9","url":null,"abstract":"<p>The investigation of partially APN functions has attracted a lot of research interest recently. In this paper, we present several new infinite classes of 0-APN power functions over <span>(mathbb {F}_{2^n})</span> by using the multivariate method and resultant elimination, and show that these 0-APN power functions are CCZ-inequivalent to the known ones.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140571160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-23DOI: 10.1007/s00200-024-00649-3
Abstract
In this paper, we consider the finite groups $$begin{aligned} H_{(t,l,m)}=langle a,b,c | a^t=b^l=c^m=1, [a,b]=c, [a,c]=[b,c]=1rangle . end{aligned}$$We obtain the generalized order-k Pell sequences and study their periods. We prove the period of the order-k Pell sequence divided the period of the generalized order-k Pell sequence in the Heisenberg group. Then, the generalized order-k Pell sequence in Heisenberg group are used to define new cyclic groups. As an application, these groups are used in encryption algorithms.
Abstract In this paper, we consider the finite groups $$begin{aligned} H_{(t,l,m)}=langle a,b,c | a^t=b^l=c^m=1, [a,b]=c, [a,c]=[b,c]=1rangle .end{aligned}$$ 我们得到广义的阶 k 佩尔序列并研究它们的周期。我们证明了阶-k 佩尔序列的周期除以海森堡群中广义阶-k 佩尔序列的周期。然后,海森堡群中的广义阶k佩尔序列被用来定义新的循环群。作为一种应用,这些群被用于加密算法中。
{"title":"New cyclic groups based on the generalized order-k Pell sequences in the Heisenberg group and their application in cryptography","authors":"","doi":"10.1007/s00200-024-00649-3","DOIUrl":"https://doi.org/10.1007/s00200-024-00649-3","url":null,"abstract":"<h3>Abstract</h3> <p>In this paper, we consider the finite groups <span> <span>$$begin{aligned} H_{(t,l,m)}=langle a,b,c | a^t=b^l=c^m=1, [a,b]=c, [a,c]=[b,c]=1rangle . end{aligned}$$</span> </span>We obtain the generalized order-<em>k</em> Pell sequences and study their periods. We prove the period of the order-<em>k</em> Pell sequence divided the period of the generalized order-<em>k</em> Pell sequence in the Heisenberg group. Then, the generalized order-<em>k</em> Pell sequence in Heisenberg group are used to define new cyclic groups. As an application, these groups are used in encryption algorithms. </p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140202104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-11DOI: 10.1007/s00200-024-00650-w
Zhiyao Yang, Pinhui Ke, Zuling Chang
This paper focuses on providing the characteristics of generalized Boolean functions from a new perspective. We first generalize the classical Fourier transform and correlation spectrum into what we will call the (rho)-Walsh–Hadamard transform ((rho)-WHT) and the (rho)-correlation spectrum, respectively. Then a direct relationship between the (rho)-correlation spectrum and the (rho)-WHT is presented. We investigate the characteristics and properties of generalized Boolean functions based on the (rho)-WHT and the (rho)-correlation spectrum, as well as the sufficient (or also necessary) conditions and subspace decomposition of (rho)-bent functions. We also derive the (rho)-autocorrelation for a class of generalized Boolean functions on ((n+2))-variables. Secondly, we present a characterization of a class of generalized Boolean functions with (rho)-WHT in terms of the classical Boolean functions. Finally, we demonstrate that (rho)-bent functions can be obtained from a class of composite construction if and only if (rho =1). Some examples of non-affine (rho)-bent functions are also provided.
{"title":"New characterizations of generalized Boolean functions","authors":"Zhiyao Yang, Pinhui Ke, Zuling Chang","doi":"10.1007/s00200-024-00650-w","DOIUrl":"https://doi.org/10.1007/s00200-024-00650-w","url":null,"abstract":"<p>This paper focuses on providing the characteristics of generalized Boolean functions from a new perspective. We first generalize the classical Fourier transform and correlation spectrum into what we will call the <span>(rho)</span>-Walsh–Hadamard transform (<span>(rho)</span>-WHT) and the <span>(rho)</span>-correlation spectrum, respectively. Then a direct relationship between the <span>(rho)</span>-correlation spectrum and the <span>(rho)</span>-WHT is presented. We investigate the characteristics and properties of generalized Boolean functions based on the <span>(rho)</span>-WHT and the <span>(rho)</span>-correlation spectrum, as well as the sufficient (or also necessary) conditions and subspace decomposition of <span>(rho)</span>-bent functions. We also derive the <span>(rho)</span>-autocorrelation for a class of generalized Boolean functions on <span>((n+2))</span>-variables. Secondly, we present a characterization of a class of generalized Boolean functions with <span>(rho)</span>-WHT in terms of the classical Boolean functions. Finally, we demonstrate that <span>(rho)</span>-bent functions can be obtained from a class of composite construction if and only if <span>(rho =1)</span>. Some examples of non-affine <span>(rho)</span>-bent functions are also provided.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}