Pub Date : 2024-01-18DOI: 10.1007/s00200-023-00642-2
Nurdagül Anbar, Tekgül Kalaycı, Nihal Yurdakul
An almost perfect non-linear (APN) function over (mathbb {F}_{2^n}) is called exceptional APN if it remains APN over infinitely many extensions of (mathbb {F}_{2^n}). Exceptional APN functions have attracted attention of many researchers in the last decades. While the classification of exceptional APN monomials has been done by Hernando and McGuire, it has been conjectured by Aubry, McGuire and Rodier that up to equivalence, the only exceptional APN functions are the Gold and the Kasami–Welch monomial functions. Since then, many partial results have been on classifying non-exceptional APN polynomials. In this paper, for the classification of the exceptional property of APN functions, we introduce a new method that uses techniques from curves over finite fields. Then, we apply the method with Eisenstein’s irreducibility criterion and Kummer’s theorem to obtain new non-exceptional APN functions.
{"title":"On the classification of non-exceptional APN functions","authors":"Nurdagül Anbar, Tekgül Kalaycı, Nihal Yurdakul","doi":"10.1007/s00200-023-00642-2","DOIUrl":"https://doi.org/10.1007/s00200-023-00642-2","url":null,"abstract":"<p>An almost perfect non-linear (APN) function over <span>(mathbb {F}_{2^n})</span> is called exceptional APN if it remains APN over infinitely many extensions of <span>(mathbb {F}_{2^n})</span>. Exceptional APN functions have attracted attention of many researchers in the last decades. While the classification of exceptional APN monomials has been done by Hernando and McGuire, it has been conjectured by Aubry, McGuire and Rodier that up to equivalence, the only exceptional APN functions are the Gold and the Kasami–Welch monomial functions. Since then, many partial results have been on classifying non-exceptional APN polynomials. In this paper, for the classification of the exceptional property of APN functions, we introduce a new method that uses techniques from curves over finite fields. Then, we apply the method with Eisenstein’s irreducibility criterion and Kummer’s theorem to obtain new non-exceptional APN functions.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"28 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Low-Rank Parity-Check (LRPC) codes are a class of rank metric codes that have many applications specifically in network coding and cryptography. Recently, LRPC codes have been extended to Galois rings which are a specific case of finite rings. In this paper, we first define LRPC codes over finite commutative local rings, which are bricks of finite rings, with an efficient decoder. We improve the theoretical bound of the failure probability of the decoder. Then, we extend the work to arbitrary finite commutative rings. Certain conditions are generally used to ensure the success of the decoder. Over finite fields, one of these conditions is to choose a prime number as the extension degree of the Galois field. We have shown that one can construct LRPC codes without this condition on the degree of Galois extension.
{"title":"Low-rank parity-check codes over finite commutative rings","authors":"Hermann Tchatchiem Kamche, Hervé Talé Kalachi, Franck Rivel Kamwa Djomou, Emmanuel Fouotsa","doi":"10.1007/s00200-023-00641-3","DOIUrl":"https://doi.org/10.1007/s00200-023-00641-3","url":null,"abstract":"<p>Low-Rank Parity-Check (LRPC) codes are a class of rank metric codes that have many applications specifically in network coding and cryptography. Recently, LRPC codes have been extended to Galois rings which are a specific case of finite rings. In this paper, we first define LRPC codes over finite commutative local rings, which are bricks of finite rings, with an efficient decoder. We improve the theoretical bound of the failure probability of the decoder. Then, we extend the work to arbitrary finite commutative rings. Certain conditions are generally used to ensure the success of the decoder. Over finite fields, one of these conditions is to choose a prime number as the extension degree of the Galois field. We have shown that one can construct LRPC codes without this condition on the degree of Galois extension.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"18 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139396930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In complex real-world networks, the relation among vertices (people) changes over time. Even with millions of vertices, adding new vertices or deleting a few previous ones can drastically change the network’s dynamics. The Iterated Local Transitivity model is a deterministic model based on the principle of transitivity and local interaction among people. The same has been extended to signed social networks. Let (Sigma) be a signed graph with underlying graph (G = (V, E)) and a function (sigma :Erightarrow {+,-}) assigning signs to the edges. We determine the relation between the characteristic polynomials of signed graph (Sigma) and the signed graph obtained from (Sigma) by adding (deleting) vertices or by adding (deleting) edges. Consequently, we present a recurrence relation for a characteristic polynomial of the Iterated Local Transitivity model for signed graphs.
{"title":"Spectral analysis for signed social networks","authors":"Anita Kumari Rao, Bableen Kaur, Sachin Somra, Deepa Sinha","doi":"10.1007/s00200-023-00639-x","DOIUrl":"https://doi.org/10.1007/s00200-023-00639-x","url":null,"abstract":"<p>In complex real-world networks, the relation among vertices (people) changes over time. Even with millions of vertices, adding new vertices or deleting a few previous ones can drastically change the network’s dynamics. The Iterated Local Transitivity model is a deterministic model based on the principle of transitivity and local interaction among people. The same has been extended to signed social networks. Let <span>(Sigma)</span> be a signed graph with underlying graph <span>(G = (V, E))</span> and a function <span>(sigma :Erightarrow {+,-})</span> assigning signs to the edges. We determine the relation between the characteristic polynomials of signed graph <span>(Sigma)</span> and the signed graph obtained from <span>(Sigma)</span> by adding (deleting) vertices or by adding (deleting) edges. Consequently, we present a recurrence relation for a characteristic polynomial of the Iterated Local Transitivity model for signed graphs.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"9 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139062719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-27DOI: 10.1007/s00200-023-00637-z
Abstract
As an important class of cyclic codes, BCH codes are widely employed in satellite communications, DVDs, CD, DAT etc. In this paper, we determine the dimension of BCH codes of length (frac{q^{2m}-1}{q+1}) over the finite fields ({mathbb {F}}_q). We settle a conjecture about the largest q-cyclotomic coset leader modulo n which was proposed by Wu et al. We also get the second largest q-cyclotomic coset leader modulo n if m is odd. Moreover, we investigate the parameters of ({mathcal {C}}_{(n,q,delta _i)}) (({mathcal {C}}_{(n,q,delta _i)}^perp)) for (i=1,2) and ({mathcal {C}}_{(n,q,delta )}) (({mathcal {C}}_{(n,q,delta )}^perp)) for (2le delta le q-1). What’s more, we obtain many (almost) optimal codes.
{"title":"A class of BCH codes with length $$frac{q^{2m}-1}{q+1}$$","authors":"","doi":"10.1007/s00200-023-00637-z","DOIUrl":"https://doi.org/10.1007/s00200-023-00637-z","url":null,"abstract":"<h3>Abstract</h3> <p>As an important class of cyclic codes, BCH codes are widely employed in satellite communications, DVDs, CD, DAT etc. In this paper, we determine the dimension of BCH codes of length <span> <span>(frac{q^{2m}-1}{q+1})</span> </span> over the finite fields <span> <span>({mathbb {F}}_q)</span> </span>. We settle a conjecture about the largest <em>q</em>-cyclotomic coset leader modulo <em>n</em> which was proposed by Wu et al. We also get the second largest <em>q</em>-cyclotomic coset leader modulo <em>n</em> if <em>m</em> is odd. Moreover, we investigate the parameters of <span> <span>({mathcal {C}}_{(n,q,delta _i)})</span> </span> (<span> <span>({mathcal {C}}_{(n,q,delta _i)}^perp)</span> </span>) for <span> <span>(i=1,2)</span> </span> and <span> <span>({mathcal {C}}_{(n,q,delta )})</span> </span> (<span> <span>({mathcal {C}}_{(n,q,delta )}^perp)</span> </span>) for <span> <span>(2le delta le q-1)</span> </span>. What’s more, we obtain many (almost) optimal codes.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"95 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139062613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-16DOI: 10.1007/s00200-023-00638-y
Wenhui Liu, Xiaoni Du, Xingbin Qiao
Linear codes are widely studied due to their important applications in authentication codes, association schemes and strongly regular graphs, etc. In this paper, a class of at most three-weight linear codes is constructed by selecting a new defining set, then the parameters and weight distributions of codes are determined by exponential sums. Results show that almost all the linear codes we constructed are minimal and we also describe the access structures of the secret sharing schemes based on their dual. Especially, the new binary code is a two-weight projective code and based on which a strongly regular graph with new parameters is designed.
{"title":"Construction of a class of at most three-weight linear codes and the applications","authors":"Wenhui Liu, Xiaoni Du, Xingbin Qiao","doi":"10.1007/s00200-023-00638-y","DOIUrl":"https://doi.org/10.1007/s00200-023-00638-y","url":null,"abstract":"<p>Linear codes are widely studied due to their important applications in authentication codes, association schemes and strongly regular graphs, etc. In this paper, a class of at most three-weight linear codes is constructed by selecting a new defining set, then the parameters and weight distributions of codes are determined by exponential sums. Results show that almost all the linear codes we constructed are minimal and we also describe the access structures of the secret sharing schemes based on their dual. Especially, the new binary code is a two-weight projective code and based on which a strongly regular graph with new parameters is designed.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"6 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138679772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-07DOI: 10.1007/s00200-023-00636-0
Tingting Wu, Li Liu, Lanqiang Li
As a class of linear codes, cyclic codes are widely used in communication systems, consumer electronics and data storage systems due to their favorable properties. In this paper, we construct two classes of optimal p-ary cyclic codes with parameters ([p^m-1, p^m-frac{3m}{2}-2, 4]) by analyzing the solutions of certain polynomials over finite fields. Furthermore, we propose an efficient method to determine the optimality of the 7-ary cyclic code (mathcal {C}_{(0,1,e)}) and present three classes of optimal codes with parameters ([7^m-1,7^m-2m-2,4]). Additionally, we provide the weight distribution of one class of their duals.
{"title":"Several classes of optimal cyclic codes with three zeros","authors":"Tingting Wu, Li Liu, Lanqiang Li","doi":"10.1007/s00200-023-00636-0","DOIUrl":"https://doi.org/10.1007/s00200-023-00636-0","url":null,"abstract":"<p>As a class of linear codes, cyclic codes are widely used in communication systems, consumer electronics and data storage systems due to their favorable properties. In this paper, we construct two classes of optimal <i>p</i>-ary cyclic codes with parameters <span>([p^m-1, p^m-frac{3m}{2}-2, 4])</span> by analyzing the solutions of certain polynomials over finite fields. Furthermore, we propose an efficient method to determine the optimality of the 7-ary cyclic code <span>(mathcal {C}_{(0,1,e)})</span> and present three classes of optimal codes with parameters <span>([7^m-1,7^m-2m-2,4])</span>. Additionally, we provide the weight distribution of one class of their duals.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"58 11 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138563195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-16DOI: 10.1007/s00200-023-00633-3
Jiang Weng, Aiwang Chen, Tao Huang, Weifeng Ji
At present, GLV/GLS scalar multiplication mainly focuses on elliptic curves in Weierstrass form, attempting to find and construct more and more efficiently computable endomorphism. In this paper, we investigate the application of the GLV/GLS scalar multiplication technique to Jacobi Quartic curves. Firstly, we present a concrete construction of efficiently computable endomorphisms for this type of curves over prime fields by exploiting birational equivalence between curves, and obtain a 2-dimensional GLV method. Secondly, we consider the quadratic twists of elliptic curves. By using birational equivalence and Frobenius mapping between curves, we present methods to construct efficiently computable endomorphisms for this type of curves over the quadratic extension field, and obtain a 2-dimensional GLS method. Finally, we obtain a 4-dimensional GLV method on elliptic curves with j-invariant 0 or 1728 by using higher degree twists. The experimental results show that the speedups of the 2-dimensional GLV method and 4-dimensional GLV method compared to 5-NAF method exceed (37.2%) and (109.4%) for Jacobi Quartic curves, respectively. At the same time, when utilizing one of the proposed methods, the scalar multiplication on Jacobi Quartic curves is consistently more efficient than on elliptic curves in Weierstrass form.
{"title":"A special scalar multiplication algorithm on Jacobi quartic curves","authors":"Jiang Weng, Aiwang Chen, Tao Huang, Weifeng Ji","doi":"10.1007/s00200-023-00633-3","DOIUrl":"https://doi.org/10.1007/s00200-023-00633-3","url":null,"abstract":"<p>At present, GLV/GLS scalar multiplication mainly focuses on elliptic curves in Weierstrass form, attempting to find and construct more and more efficiently computable endomorphism. In this paper, we investigate the application of the GLV/GLS scalar multiplication technique to Jacobi Quartic curves. Firstly, we present a concrete construction of efficiently computable endomorphisms for this type of curves over prime fields by exploiting birational equivalence between curves, and obtain a 2-dimensional GLV method. Secondly, we consider the quadratic twists of elliptic curves. By using birational equivalence and Frobenius mapping between curves, we present methods to construct efficiently computable endomorphisms for this type of curves over the quadratic extension field, and obtain a 2-dimensional GLS method. Finally, we obtain a 4-dimensional GLV method on elliptic curves with <i>j</i>-invariant 0 or 1728 by using higher degree twists. The experimental results show that the speedups of the 2-dimensional GLV method and 4-dimensional GLV method compared to 5-NAF method exceed <span>(37.2%)</span> and <span>(109.4%)</span> for Jacobi Quartic curves, respectively. At the same time, when utilizing one of the proposed methods, the scalar multiplication on Jacobi Quartic curves is consistently more efficient than on elliptic curves in Weierstrass form.</p>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"80 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138529956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-02DOI: 10.1007/s00200-023-00634-2
Alcibíades Bustillo-Zárate, Dorothy Bollman, José Ortiz-Ubarri
{"title":"Using elliptic curves to construct 3D arrays","authors":"Alcibíades Bustillo-Zárate, Dorothy Bollman, José Ortiz-Ubarri","doi":"10.1007/s00200-023-00634-2","DOIUrl":"https://doi.org/10.1007/s00200-023-00634-2","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"5 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135934743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-28DOI: 10.1007/s00200-023-00628-0
Alexander Levin
We introduce a new type of characteristic sets of difference polynomials using a generalization of the concept of effective order to the case of partial difference polynomials and a partition of the basic set of translations (sigma). Using properties of these characteristic sets, we prove the existence and outline a method of computation of a multivariate dimension polynomial of a finitely generated difference field extension that describes the transcendence degrees of intermediate fields obtained by adjoining transforms of the generators whose orders with respect to the components of the partition of (sigma) are bounded by two sequences of natural numbers. We show that such dimension polynomials carry essentially more invariants (that is, characteristics of the extension that do not depend on the set of its difference generators) than previously known difference dimension polynomials. In particular, a dimension polynomial of the new type associated with a system of algebraic difference equations gives more information about the system than the classical univariate difference dimension polynomial.
{"title":"Generalized characteristic sets and new multivariate difference dimension polynomials","authors":"Alexander Levin","doi":"10.1007/s00200-023-00628-0","DOIUrl":"10.1007/s00200-023-00628-0","url":null,"abstract":"<div><p>We introduce a new type of characteristic sets of difference polynomials using a generalization of the concept of effective order to the case of partial difference polynomials and a partition of the basic set of translations <span>(sigma)</span>. Using properties of these characteristic sets, we prove the existence and outline a method of computation of a multivariate dimension polynomial of a finitely generated difference field extension that describes the transcendence degrees of intermediate fields obtained by adjoining transforms of the generators whose orders with respect to the components of the partition of <span>(sigma)</span> are bounded by two sequences of natural numbers. We show that such dimension polynomials carry essentially more invariants (that is, characteristics of the extension that do not depend on the set of its difference generators) than previously known difference dimension polynomials. In particular, a dimension polynomial of the new type associated with a system of algebraic difference equations gives more information about the system than the classical univariate difference dimension polynomial.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"35 2022","pages":"31 - 53"},"PeriodicalIF":0.6,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136233322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-25DOI: 10.1007/s00200-023-00630-6
Minjia Shi, Yingying Liu, Jon-Lark Kim, Patrick Solé
{"title":"Frames over finite fields and self-dual codes","authors":"Minjia Shi, Yingying Liu, Jon-Lark Kim, Patrick Solé","doi":"10.1007/s00200-023-00630-6","DOIUrl":"https://doi.org/10.1007/s00200-023-00630-6","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"19 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135217866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}