Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Almost Perfect c-Nonlinear Permutations with Trace Functions Over 𝔽2n

    In this paper, by using the Weil sums, we derive that the c-differential uniformity of permutation polynomial of the form F(x)=x+Tr(H(x)+H(x+1))𝔽2n[x] is equal to 2 for H(x)=x2i+2j+1 with 1ijn1 and gcd(n,i)=gcd(n,j)=gcd(n,ij)=1, or H(x)=n1i,j=1x2i+2j+1 with 1i<jn1, where n=2k+1. In particular, several explicit classes of APcN permutations over 𝔽2n are presented using different choices of the pair (i,j) for the monomial H(x)=x2i+2j+1.

  • articleNo Access

    The edge code of hypergraphs

    Given a hypergraph , we introduce a new class of evaluation toric codes called edge codes derived from . We analyze these codes, focusing on determining their basic parameters. We provide estimations for the minimum distance, particularly in scenarios involving d-uniform clutters. Additionally, we demonstrate that these codes exhibit self-orthogonality. Furthermore, we compute the minimum distances of edge codes for all graphs with five vertices.

  • articleNo Access

    The boomerang uniformity of three classes of permutation polynomials over 𝔽2n

    Permutation polynomials with low boomerang uniformity have wide applications in cryptography. In this paper, by utilizing the Weil sums technique and solving some certain equations over 𝔽2n, we determine the boomerang uniformity of these permutation polynomials: (1) f1(x)=(x2m+x+δ)22m+1+x, where n=3m, δ𝔽2n with Trnm(δ)=1; (2) f2(x)=(x2m+x+δ)22m1+2m1+x, where n=3m, δ𝔽2n with Trnm(δ)=0; (3) f3(x)=(x2m+x+δ)23m1+2m1+x, where n=3m, δ𝔽2n with Trnm(δ)=0. The results show that the boomerang uniformity of f1(x), f2(x) and f3(x) can attain 2n.

  • articleNo Access

    A class of error-detecting codes based on T-quasigroups

    In this paper, we propose a new class of error-detecting codes based on quasigroups using automorphisms of the finite field 𝔽pn and the additive group (𝔽p,+). We demonstrate that these codes are effective in detecting burst errors caused by hardware damage or noisy transmission. We also explore the codes ability to detect various types of double errors, including transposition errors, twin errors, and phonetic errors. Our analysis extends beyond bit-level errors to include block-level errors. Finally, we provide a comparative analysis and demonstrate the real-world applications of our code.

  • articleOpen Access

    F-Diophantine sets over finite fields

    Let k2, q be an odd prime power, and F𝔽q[x1,,xk] be a polynomial. An F-Diophantine set over a finite field 𝔽q is a set A𝔽q such that F(a1,a2,,ak) is a square in 𝔽q whenever a1,a2,,ak are distinct elements in A. In this paper, we provide a strategy to construct a large F-Diophantine set, provided that F has a nice property in terms of its monomial expansion. In particular, when F=x1x2xk+1, our construction gives a k-Diophantine tuple over 𝔽q with size klogq, significantly improving the Θ((logq)1/(k1)) lower bound in a recent paper by Hammonds–Kim–Miller–Nigam–Onghai–Saikia–Sharma.

  • articleNo Access

    An elliptic curve-based approach for enhanced security of substitution-permutation networks

    A well-designed substitution-permutation network (SPN) relies on several interspersed rounds of S-boxes and P-boxes, fulfilling the properties of Shannon’s confusion and diffusion. In any SPN, the role of the confusion constituent, S-box, is essentially decisive as one-bit change in the key leads to the change in several of the round keys. Consequentially, every round key spreads out over all the bits, changing the ciphertext in an absolutely complex manner. The unpredictable advancement of secured cryptographic systems escorts an indispensable demand to develop new S-box generators, offering optimized security features on a reduced computational cost. It has been established that the use of elliptic curves in cryptography offers elevated security with a reduced key size. In the proposed work, we deploy high resistance of elliptic curves’ point addition system against modern cryptanalysis, to evolve a substitution algorithm. Precisely, we use the complex algebraic structure of an elliptic curve group over a finite field. Our novel approach reduces the computational labor just by utilizing the nonlinear point-addition mechanism to design a substitution algorithm. The idea is supported through a step by step illustration of problem formulation. The outcomes of the proposed algorithm are judged through all the fundamental evaluation parameters and a comprehensive analysis including comparison with some recent techniques is also presented that proves the effectiveness of our model.

  • articleNo Access

    CONSTRUCTING NEW APN FUNCTIONS FROM KNOWN PN FUNCTIONS

    We present a method for constructing almost perfect nonlinear (APN) functions in odd characteristic by modifying some values of known perfect nonlinear functions. As a consequence, new APN polynomial functions such as ones over 𝔽13 which are CCZ-inequivalent to known APN functions are obtained.

  • articleNo Access

    Two Boolean Functions with Five-Valued Walsh Spectra and High Nonlinearity

    For cryptographic systems the method of confusion and diffusion is used as a fundamental technique to achieve security. Confusion is reflected in nonlinearity of certain Boolean functions describing the cryptographic transformation. In this paper, we present two Boolean functions which have low Walsh spectra and high nonlinearity. In the proof of the nonlinearity, a new method for evaluating some exponential sums over finite fields is provided.

  • articleNo Access

    Constructing New Piecewise Differentially 4-Uniform Permutations from Known APN Functions

    A method for constructing piecewise differentially 4-uniform permutations has been recently introduced by Zha, Hu and Sun. By using this method, we provide two new infinite families of differentially 4-uniform permutations from the known APN functions. The CCZ inequivalence between these constructed functions and the known differentially 4-uniform permutations are also investigated by computation.

  • articleNo Access

    Bounds on Subspace Codes Based on Orthogonal Space Over Finite Fields of Characteristic 2

    In this paper, the Sphere-packing bound, Wang-Xing-Safavi-Naini bound, Johnson bound and Gilbert-Varshamov bound on the subspace code of length 2ν+δ, size M, minimum subspace distance 2j based on m-dimensional totally singular subspace in the (2ν+δ)-dimensional orthogonal space 𝔽q(2ν+δ) over finite fields 𝔽q of characteristic 2, denoted by (2ν+δ,M,2j,m)q, are presented, where ν is a positive integer, δ=0,1,2, 0mν, 0jm. Then, we prove that (2ν+δ,M,2j,m)q codes attain the Wang-Xing-Safavi-Naini bound if and only if they are certain Steiner structures in (m,0,0;2ν+δ), where (m,0,0;2ν+δ) denotes the collection of all the m-dimensional totally singular subspaces in the (2ν+δ)-dimensional orthogonal space 𝔽q(2ν+δ) over 𝔽q of characteristic 2. Finally, Gilbert-Varshamov bound and linear programming bound on the subspace code (2ν+δ,M,d)q in (2ν+δ) are provided, where (2ν+δ) denotes the collection of all the totally singular subspaces in the (2ν+δ)-dimensional orthogonal space 𝔽q(2ν+δ) over 𝔽q of characteristic 2.

  • articleNo Access

    Monomial Generalized Almost Perfect Nonlinear Functions

    Generalized almost perfect nonlinear (GAPN) functions were defined to satisfy some generalizations of basic properties of almost perfect nonlinear (APN) functions for even characteristic. In particular, on finite fields of even characteristic, GAPN functions coincide with APN functions. In this paper, we study monomial GAPN functions for odd characteristic. We give monomial GAPN functions whose algebraic degree are maximum or minimum on a finite field of odd characteristic. Moreover, we define a generalization of exceptional APN functions and give typical examples.

  • articleNo Access

    A Novel Approach Towards Degree and Walsh-Transform of Boolean Functions

    Boolean functions are fundamental bricks in the development of various applications in Cryptography and Coding theory by making benefit from the weights of related Boolean functions (Walsh spectrum). Towards this, the discrete Fourier transform (Walsh–Hadamard) plays a pivotal tool. The work in this paper is dedicated towards the algebraic and numerical degrees, together with the relationship between weights of Boolean function and their Walsh transforms. We introduce Walsh matrices and generalize them to any arbitrary Boolean function. This improves the complexity in computation of Walsh–Hadamard and Fourier transform in certain cases. We also discuss some useful results related to the degree of the algebraic normal form using Walsh–Hadamard transform.

  • articleNo Access

    E-polynomial of SL2(ℂ)-character varieties of free groups

    Let 𝖥r be a free group of rank r, 𝔽q a finite field of order q, and let SLn(𝔽q) act on Hom(𝖥r, SLn(𝔽q)) by conjugation. We describe a general algorithm to determine the cardinality of the set of orbits Hom(𝖥r, SLn(𝔽q))/SLn(𝔽q). Our first main theorem is the implementation of this algorithm in the case n = 2. As an application, we determine the E-polynomial of the character variety Hom(𝖥r, SL2(ℂ))//SL2(ℂ), and of its smooth and singular locus. Thus we determine the Euler characteristic of these spaces.

  • articleNo Access

    CHARACTERIZATION OF SOLVABLE GROUPS AND SOLVABLE RADICAL

    We give a survey of new characterizations of finite solvable groups and the solvable radical of an arbitrary finite group which were obtained over the past decade. We also discuss generalizations of these results to some classes of infinite groups and their analogues for Lie algebras. Some open problems are discussed as well.

  • articleFree Access

    On the existence of primitive normal elements of rational form over finite fields of even characteristic

    Let q be an even prime power and m2 an integer. By 𝔽q, we denote the finite field of order q and by 𝔽qm its extension of degree m. In this paper, we investigate the existence of a primitive normal pair (α,f(α)), with f(x)=ax2+bx+cdx+e𝔽qm(x) where the rank of the matrix F=(abc0de)M2×3(𝔽qm) is 2. Namely, we establish sufficient conditions to show that nearly all fields of even characteristic possess such elements, except for (110010) if q=2 and m is odd, and then we provide an explicit small list of possible and genuine exceptional pairs (q,m).

  • articleFree Access

    On m-tuples of nilpotent 2×2 matrices over an arbitrary field

    The algebra of GLn-invariants of m-tuples of n×n matrices with respect to the action by simultaneous conjugation is a classical topic in case of infinite base field. On the other hand, in case of a finite field generators of polynomial invariants are not known even for a pair of 2×2 matrices. Working over an arbitrary field we classified all GL2-orbits on m-tuples of 2×2 nilpotent matrices for all m>0. As a consequence, we obtained a minimal separating set for the algebra of GL2-invariant polynomial functions of m-tuples of 2×2 nilpotent matrices. We also described the least possible number of elements of a separating set for an algebra of invariant polynomial functions over a finite field.

  • articleNo Access

    ON ESTIMATING THE STATE OF A FINITE LEVEL QUANTUM SYSTEM

    We revisit the problem of mutually unbiased measurements in the context of estimating the unknown state of a d-level quantum system, first studied (in the framework of quantum information) by Wootters and fields7 in 1989 and later investigated by Bandyopadhyay et al.3 in 2001 and Pittenger and Rubin6 in 2003. Our approach is based directly on the Weyl operators in the L2-space over a finite field when d=pr is the power of a prime. When d is not a prime power we sacrifice a bit of optimality and construct a recovery operator for reconstructing the unknown state from the probabilities of elementary events in different measurements.

  • articleNo Access

    DEGREE MATRICES AND ESTIMATES FOR EXPONENTIAL SUMS OF POLYNOMIALS OVER FINITE FIELDS

    Let f be a multivariate polynomial over a finite field and its degree matrix be composed of the degree vectors appearing in f. In this paper, we provide an elementary approach to estimating the exponential sums of the polynomials with positive square degree matrices in terms of the elementary divisors of the degree matrices.

  • articleNo Access

    On the construction of elliptic Chudnovsky-type algorithms for multiplication in large extensions of finite fields

    We indicate a strategy in order to construct bilinear multiplication algorithms of type Chudnovsky in large extensions of any finite field. In particular, using the symmetric version of the generalization of Randriambololona specialized on the elliptic curves, we show that it is possible to construct such algorithms with low bilinear complexity. More precisely, if we only consider the Chudnovsky-type algorithms of type symmetric elliptic, we show that the symmetric bilinear complexity of these algorithms is in formula where n corresponds to the extension degree, and formula is the iterated logarithm. Moreover, we show that the construction of such algorithms can be done in time polynomial in n. Finally, applying this method we present the effective construction, step by step, of such an algorithm of multiplication in the finite field 𝔽357.

  • articleNo Access

    Further results on permutation polynomials of the form (xpmx+δ)s+L(x) over 𝔽p2m

    Several classes of permutation polynomials with given form over 𝔽p2m were recently proposed by Tu, Zeng, Li and Helleseth. In this paper, continuing their work, we present more permutation polynomials of the form (xpmx+δ)s+L(x) over the finite field 𝔽p2m, where L(x) is a linearized polynomial with coefficients in 𝔽p.