On a generalized combinatorial conjecture involving addition mod 2 k 1

Size: px
Start display at page:

Download "On a generalized combinatorial conjecture involving addition mod 2 k 1"

Transcription

1 On a generalized combinatorial conjecture involving addition mod k 1 Gérard Cohen Jean-Pierre Flori Tuesday 14 th February, 01 Abstract In this note, e give a simple proof of the combinatorial conjecture proposed by Tang, Carlet and Tang, based on hich they constructed to classes of Boolean functions ith many good cryptographic properties. We also give more general properties about the generalization of the conjecture they propose. 1 Introduction In a very recent paper inspired by the previous ork of Tu and Deng [6], Tang, Carlet and Tang [5] constructed an infinite family of Boolean functions ith many good cryptographic interesting properties depending on the validity of the folloing combinatorial property: Conjecture 1. k, max # (a, b ( Z/( k 1Z } a b = t; (a + (b k 1 k 1. t (Z/( k 1Z They verified it experimentally for k 9, as ell as the folloing generalized property for k 15 here u Z/( k 1Z is such that gcd(u, k 1 = 1: Conjecture. k, max # (a, b ( Z/( k 1Z } ua ± b = t; (a + (b k 1 k 1. t (Z/( k 1Z This generalized conjecture includes the original conjecture proposed by Tu and Deng [6]. From no on, let us denote by S k,t,±,u the quantity of interest: S k,t,±,u = # (a, b ( Z/( k 1Z } ua ± b = t; (a + (b k 1. In Section, e give some general properties about such sets and their cardinalities. In Section 3, e give the proof of Conjecture 1. In Section 4, e conjecture a recursive formula for k 1 S k,t,,1. Institut Télécom, Télécom ParisTech, UMR 7539, CNRS LTCI, 46 rue Barrault, F Paris Cedex 13, France, flori,cohen}@enst.fr 1

2 General properties Here e follo the approach of the previous attempts to prove the original conjecture of Tu and Deng [, 1]. We recall the elementary results: Lemma 1. For k 1, a Z/( k 1Z, (a = (a; a ( Z/( k 1Z, ( a = k (a. We first remark that for a given a Z/( k 1Z, b must be equal to ±(t ua, hence the folloing lemma. Lemma. For k, S k,t,±,u = # a Z/( k 1Z (a + (±(t ua k 1 }. We no sho that is enough to study the conjecture for one t, but also one u, in each cyclotomic class. Lemma 3. For k, S k,t,±,u = S k,t,±,u. Proof. Indeed a a is a permutation of Z/( k 1Z so that S k,t,±,u = # a Z/( k 1Z (a + (±(t ua k 1 } = # a Z/( k 1Z (a + (±(t ua k 1 } = # a Z/( k 1Z (a + (±(t ua k 1 } = S k,t,±,u. Lemma 4. For k, S k,t,±,u = S k,t,±,u. Proof. Using the previous lemma: S k,t,±,u = S k,t,±,u = # a Z/( k 1Z (a + (±(t ua k 1 } = # a Z/( k 1Z (a + (±(t ua k 1 } = S k,t,±,u. We no sho a more elaborate relation. Lemma 5. For k and gcd(u, k 1 = 1, S k,t,±,u = S k,±u 1 t,±,u 1.

3 Proof. We use the fact that a u 1 ( a + t is a permutation of Z/( k 1Z. S k,t,±,u = # a Z/( k 1Z (a + (±(t ua k 1 } = # a Z/( k 1Z (u 1 ( a + t + (a k 1 } = # a Z/( k 1Z (±(±u 1 t u 1 a + (a k 1 } = S k,±u 1 t,±,u 1. 3 Proof of the conjecture We no prove Conjecture 1, and so its extension for u equal to any poer of, that is Conjecture for u = i and the sign, according to Lemma 4. First, e note that for u = 1 and the sign, Lemma 5 becomes S k,t,,1 = S k, t,,1. Second, for the specific values of a = 0, t, e have that (0 + ( t = ( t k 1, and (t + (0 = (t k 1, so that e alays have 0, t} a Z/( k 1Z (a + ( (t a k 1 }. Finally, for a 0, t, e have that (a + ( (t a = k ( a + k (t a = k (( a + (t a. Then using the fact that a a is a permutation of Z/( k 1Z: Hence S k,t,,1 = + # a Z/( k 1Z \ 0, t} (a + ( (t a k 1 } = + # a Z/( k 1Z \ 0, t} ( a + (t a k + 1 } = + # a Z/( k 1Z ( a + (t a k + 1 } = + # a Z/( k 1Z (a + (t + a k + 1 } = + ( k 1 # a Z/( k 1Z (a + (t + a k } + ( k 1 # a Z/( k 1Z (a + (t + a k 1 } k + 1 S k, t,,1 k + 1 S k,t,,1. S k,t,,1 k + 1, but e kno that S k,t,,1 is an integer, hich concludes the proof of Conjecture 1. 3

4 We also note that for t = 0, S k,0,,1 = # a Z/( k 1Z (a k 1 } = = k 1 =0 k 1 =0 # a Z/( k 1Z (a = } ( k, hich is equal to k 1 ( k (k+1/ if k is odd, and k 1 ( ( k k/ 1 k/ k / if k is even. Therefore the conjecture can be naturally extended to include the case t = 0. 4 Computing the exact gap If e rerite the above reasoning more carefully, e find that S k,t,,1 = k 1 + (1 # a Z/( k 1Z (a + (t + a = k } /. It is an interesting problem to find a closed-form formula for the value of M k,t = # a ( Z/( k 1Z } (a + (t + a = k, M k = min M k,t. t Z/( k 1Z We denote by k the folloing value k = M k 1 so that S k,t,,1 = k 1 k. The experimental results of Tang, Carlet and Tang suggest that the folloing recursive formula is verified: k + 1 if k even, k+1 = k + 1 Γ (k 1/ if k odd, here n 1 Γ n = 1 + and C = ( /( + 1 is the -th Catalan number. Γn is the sequence A in OEIS [3]. Further experimental investigations made ith Sage [4] sho that the minimal value M k seems to be attained for t = 1 if k is even and t = 3 if k is odd. In fact, the next proposition gives explicit formulae for M k,1 and M k,3. We recall that r(a, t = (a + t (a (t can be interpreted as the number of carries occurring hile adding a and t. Then e can describe M k,t as M k,t = # a ( Z/( k 1Z } (a + (t + a = k = # a ( Z/( k 1Z } (a + (t r(a, t = k = # a ( Z/( k 1Z } r(a, t = k + (t + (a. =0, C 4

5 Proposition 1. For k, M k,1 = (k+1/ ( 1 Proof. We kno that M k,1 = M k, 1, so e enumerate the set of a s verifying r(a, 1 = (a 1 according to (a or equivalently r(a, 1. The binary expansion of 1 is First, for any number t Z/( k 1Z, 0 r(a, t k, so e deduce that a must verify 1 (a (k + 1/. Second, for a given number of carries r, a number a verifying r(a, 1 = r must be of the folloing form 1 = , a =???? r Such a description is valid even if r(a, 1 = k. So, for a given eight, a number a verifying (a = and r(a, 1 = 1 must be of the folloing form 1 = , a =????10---0, 1 ith the other 1 bits equal to 1 anyhere among the first bits. Hence there are ( 1 differents a s of eight verifying r(a, 1 = 1. Finally, summing up on 1 (k + 1/, e get that M k,1 = (k+1/ ( 1. Proposition. For k 3, M k,3 = 1 + k/ ( 1 Proof. We proceed as in the proof of Proposition 1. The arguments are only slightly more technical. We kno that M k,3 = M k, 3, so e enumerate the set of a s verifying r(a, 3 = (a according to (a or equivalently r(a, 3. The binary expansion of 3 is First, from r(a, 3 = (a, e deduce that 1 k/ + 1. Second, for a given number of carries r, there are no different possibilities... ( k (t For any t Z/( k 1Z, there are exactly k (t 1 =0 different a s producing no carries. Indeed, such a s are characterized by the facts that they have no bits equal to 1 in front of any bit of t equal to 1 and that they can not have only 1 s in front of the bits of t equal to 0. For t = 3, the such a s are exactly 0, 1 and and both 1 and have eight 1. Then, for a given number of carries 1 r < k/, a number a verifying r(a, 3 = r cannot have its to last bits (in front of the to bits of 3 equal to 0 equal to 1. Otherise it ould produce k carries. So it must be of one of the folloing forms 3 = , a =????10--0?0, r a =??? r 1 5

6 So for a given eight, a number a verifying (a = and r(a, 3 = must be of one of the folloing forms 3 = , a =????10--0?0, a =??? , 3 ith the other 1 bits set to 1 anyhere among the remaining bits in the first case, and the other bits set to 1 anyhere among the 4 first bits in the second one. Hence there are ( ( differents a s of eight. Finally, if k is odd and (a = k/ + 1, then r(a, t = k 1 and a must be of the folloing form 3 = , a =????101. There are ( 4 different such a s. And, if k is even and (a = k/ + 1, then r(a, t = k and a must be of the folloing form There are also ( 4 different such a s. Therefore, e find that M k,3 = + = 1 + k/ = 3 = , k/ a =?????11. ( + 1 ( 1 k/ +1. = ( 4 We no prove recurrence relations for M k,1 and M k,3. Corollary 1. If k is even, then If k is odd, then M k,1 + 1 = M k+1,3. M k,3 Γ (k 1/ = (M k+1,1 1/. Proof. The first equality is a simple consequence of the fact k/ = (k + 1/ hen k is even. For the second one, e rite M k,3 Γ (k 1/ = 1 + = k/ (k 1/ ( 1 1 ( 1 (k 3/ =0 (k 3/ =0 ( (k 3/ ( = 1 + ( 1/( + 1, ( /( + 1 /( + 1 6

7 and (M k+1,1 1/ = = k/ +1 = (k 1/ ( / 1 ( /, so that e can equivalently sho that ( (k 3/ k 1 ( = (3 /( + 1 (k 1/, hich follos from a simple induction. For k = 3, this reduces to 0 = 0 hich is indeed true; for k > 3 odd, e have ( ( k + 1 k 1 = 4k/(k + 1 (k + 1/ (k 1/ ( k 1 = (4 1/(k + 1, (k 1/ and (k 1/ ( (3 /( + 1 = (k 3/ ( ( (3 /( + 1 k 1 + (3 1/(k + 1 (k 1/. To conclude this section, let us note that M k,1 M k,3 if k is even and M k,3 M k,1 if k is odd. So, if e assume that these are indeed the minimal values M k according to the parity of k, then k is given by (Mk,1 1/ if k even, k = (M k,3 1/ if k odd, and the recursive formulae are proved. References [1] Jean-Pierre Flori and Hugues Randriam. On the number of carries occuring in an addition mod k 1. Cryptology eprint Archive, Report 011/45, [] Jean-Pierre Flori, Hugues Randriam, Gérard D. Cohen, and Sihem Mesnager. On a conjecture about binary strings distribution. In Claude Carlet and Alexander Pott, editors, SETA, volume 6338 of Lecture Notes in Computer Science, pages Springer, 010. [3] The OEIS Foundation Inc. The On-Line Encyclopedia of Integer Sequences. [4] William Stein. Sage: Open Source Mathematical Softare (Version The Sage Group,

8 [5] Deng Tang, Claude Carlet, and Xiaohu Tang. Highly nonlinear boolean functions ith optimal algebraic immunity and good behavior against fast algebraic attacks. Cryptology eprint Archive, Report 011/366, [6] Ziran Tu and Yingpu Deng. A conjecture about binary strings and its applications on constructing boolean functions ith optimal algebraic immunity. Des. Codes Cryptography, 60(1:1 14,

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

The degree sequence of Fibonacci and Lucas cubes

The degree sequence of Fibonacci and Lucas cubes The degree sequence of Fibonacci and Lucas cubes Sandi Klavžar Faculty of Mathematics and Physics University of Ljubljana, Slovenia and Faculty of Natural Sciences and Mathematics University of Maribor,

More information

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

Statistical and Linear Independence of Binary Random Variables

Statistical and Linear Independence of Binary Random Variables Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.

More information

Dickson Polynomials that are Involutions

Dickson Polynomials that are Involutions Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

arxiv: v1 [math.gm] 1 Oct 2015

arxiv: v1 [math.gm] 1 Oct 2015 A WINDOW TO THE CONVERGENCE OF A COLLATZ SEQUENCE arxiv:1510.0174v1 [math.gm] 1 Oct 015 Maya Mohsin Ahmed maya.ahmed@gmail.com Accepted: Abstract In this article, we reduce the unsolved problem of convergence

More information

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced

More information

Bivariate Uniqueness in the Logistic Recursive Distributional Equation

Bivariate Uniqueness in the Logistic Recursive Distributional Equation Bivariate Uniqueness in the Logistic Recursive Distributional Equation Antar Bandyopadhyay Technical Report # 629 University of California Department of Statistics 367 Evans Hall # 3860 Berkeley CA 94720-3860

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

ON THE AVERAGE RESULTS BY P. J. STEPHENS, S. LI, AND C. POMERANCE

ON THE AVERAGE RESULTS BY P. J. STEPHENS, S. LI, AND C. POMERANCE ON THE AVERAGE RESULTS BY P J STEPHENS, S LI, AND C POMERANCE IM, SUNGJIN Abstract Let a > Denote by l ap the multiplicative order of a modulo p We look for an estimate of sum of lap over primes p on average

More information

EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER

EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER EXPLICIT CONSTANTS IN AVERAGES INVOLVING THE MULTIPLICATIVE ORDER KIM, SUNGJIN DEPARTMENT OF MATHEMATICS UNIVERSITY OF CALIFORNIA, LOS ANGELES MATH SCIENCE BUILDING 667A E-MAIL: 70707@GMAILCOM Abstract

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

A relative of the Thue-Morse Sequence

A relative of the Thue-Morse Sequence A relative of the Thue-Morse Sequence Jean-Paul Allouche C.N.R.S. U.R.A. 0226, Math., Université Bordeaux I, F-33405 Talence cedex, FRANCE André Arnold LaBRI, Université Bordeaux I, F-33405 Talence cedex,

More information

Endogeny for the Logistic Recursive Distributional Equation

Endogeny for the Logistic Recursive Distributional Equation Zeitschrift für Analysis und ihre Anendungen Journal for Analysis and its Applications Volume 30 20, 237 25 DOI: 0.47/ZAA/433 c European Mathematical Society Endogeny for the Logistic Recursive Distributional

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

Math 249B. Geometric Bruhat decomposition

Math 249B. Geometric Bruhat decomposition Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique

More information

How Long Does it Take to Catch a Wild Kangaroo?

How Long Does it Take to Catch a Wild Kangaroo? Ho Long Does it Take to Catch a Wild Kangaroo? Ravi Montenegro Prasad Tetali ABSTRACT The discrete logarithm problem asks to solve for the exponent x, given the generator g of a cyclic group G and an element

More information

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori arxiv:608.05008v2 [math.nt] 9 Aug 206 Abstract In this note, the polar decomposition of binary fields of even

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

On the Arithmetic Walsh Coefficients of Boolean Functions

On the Arithmetic Walsh Coefficients of Boolean Functions Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

There are no Barker arrays having more than two dimensions

There are no Barker arrays having more than two dimensions There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional

More information

Homework Set 2 Solutions

Homework Set 2 Solutions MATH 667-010 Introduction to Mathematical Finance Prof. D. A. Edards Due: Feb. 28, 2018 Homeork Set 2 Solutions 1. Consider the ruin problem. Suppose that a gambler starts ith ealth, and plays a game here

More information

A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate.

A shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate. ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6a (draft; 9/21/03. Linear codes. Weights, supports, ranks. http://.enee.umd.edu/ abarg/enee739c/course.html

More information

arxiv: v1 [math.co] 13 Jul 2017

arxiv: v1 [math.co] 13 Jul 2017 A GENERATING FUNCTION FOR THE DISTRIBUTION OF RUNS IN BINARY WORDS arxiv:1707.04351v1 [math.co] 13 Jul 2017 JAMES J. MADDEN Abstract. Let N(n, r, k) denote the number of binary words of length n that begin

More information

A note on hyper-bent functions via Dillon-like exponents

A note on hyper-bent functions via Dillon-like exponents A note on hyper-bent functions via Dillon-like exponents Sihem Mesnager Jean-Pierre Flori Monday 23 rd January, 2012 Abstract This note is devoted to hyper-bent functions with multiple trace terms including

More information

A LOWER BOUND FOR THE SIZE OF A MINKOWSKI SUM OF DILATES. 1. Introduction

A LOWER BOUND FOR THE SIZE OF A MINKOWSKI SUM OF DILATES. 1. Introduction A LOWER BOUND FOR THE SIZE OF A MINKOWSKI SUM OF DILATES Y. O. HAMIDOUNE AND J. RUÉ Abstract. Let A be a finite nonempty set of integers. An asymptotic estimate of several dilates sum size was obtained

More information

Visual cryptography schemes with optimal pixel expansion

Visual cryptography schemes with optimal pixel expansion Theoretical Computer Science 369 (2006) 69 82 wwwelseviercom/locate/tcs Visual cryptography schemes with optimal pixel expansion Carlo Blundo a,, Stelvio Cimato b, Alfredo De Santis a a Dipartimento di

More information

A proof of topological completeness for S4 in (0,1)

A proof of topological completeness for S4 in (0,1) A proof of topological completeness for S4 in (,) Grigori Mints and Ting Zhang 2 Philosophy Department, Stanford University mints@csli.stanford.edu 2 Computer Science Department, Stanford University tingz@cs.stanford.edu

More information

Combinatorial Interpretations of a Generalization of the Genocchi Numbers

Combinatorial Interpretations of a Generalization of the Genocchi Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 7 (2004), Article 04.3.6 Combinatorial Interpretations of a Generalization of the Genocchi Numbers Michael Domaratzki Jodrey School of Computer Science

More information

Bloom Filters and Locality-Sensitive Hashing

Bloom Filters and Locality-Sensitive Hashing Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,

More information

Perfect Algebraic Immune Functions

Perfect Algebraic Immune Functions Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,

More information

On Polynomial Pairs of Integers

On Polynomial Pairs of Integers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 18 (2015), Article 15.3.5 On Polynomial Pairs of Integers Martianus Frederic Ezerman Division of Mathematical Sciences School of Physical and Mathematical

More information

be a deterministic function that satisfies x( t) dt. Then its Fourier

be a deterministic function that satisfies x( t) dt. Then its Fourier Lecture Fourier ransforms and Applications Definition Let ( t) ; t (, ) be a deterministic function that satisfies ( t) dt hen its Fourier it ransform is defined as X ( ) ( t) e dt ( )( ) heorem he inverse

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Complete characterization of generalized bent and 2 k -bent Boolean functions

Complete characterization of generalized bent and 2 k -bent Boolean functions Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean

More information

On Newton-Raphson iteration for multiplicative inverses modulo prime powers

On Newton-Raphson iteration for multiplicative inverses modulo prime powers On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Introduction To Resonant. Circuits. Resonance in series & parallel RLC circuits

Introduction To Resonant. Circuits. Resonance in series & parallel RLC circuits Introduction To esonant Circuits esonance in series & parallel C circuits Basic Electrical Engineering (EE-0) esonance In Electric Circuits Any passive electric circuit ill resonate if it has an inductor

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

Chapter 3. Systems of Linear Equations: Geometry

Chapter 3. Systems of Linear Equations: Geometry Chapter 3 Systems of Linear Equations: Geometry Motiation We ant to think about the algebra in linear algebra (systems of equations and their solution sets) in terms of geometry (points, lines, planes,

More information

Modular Multiplication in GF (p k ) using Lagrange Representation

Modular Multiplication in GF (p k ) using Lagrange Representation Modular Multiplication in GF (p k ) using Lagrange Representation Jean-Claude Bajard, Laurent Imbert, and Christophe Nègre Laboratoire d Informatique, de Robotique et de Microélectronique de Montpellier

More information

Some properties of q-ary functions based on spectral analysis

Some properties of q-ary functions based on spectral analysis Some properties of q-ary functions based on spectral analysis Deep Singh and Maheshanand Bhaintwal Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667 INDIA deepsinghspn@gmail.com,mahesfma@iitr.ernet.in

More information

REPRESENTATIONS FOR A SPECIAL SEQUENCE

REPRESENTATIONS FOR A SPECIAL SEQUENCE REPRESENTATIONS FOR A SPECIAL SEQUENCE L. CARLITZ* RICHARD SCOVILLE Dyke University, Durham,!\!orth Carolina VERNERE.HOGGATTJR. San Jose State University, San Jose, California Consider the sequence defined

More information

On non-hamiltonian circulant digraphs of outdegree three

On non-hamiltonian circulant digraphs of outdegree three On non-hamiltonian circulant digraphs of outdegree three Stephen C. Locke DEPARTMENT OF MATHEMATICAL SCIENCES, FLORIDA ATLANTIC UNIVERSITY, BOCA RATON, FL 33431 Dave Witte DEPARTMENT OF MATHEMATICS, OKLAHOMA

More information

THE LINEAR BOUND FOR THE NATURAL WEIGHTED RESOLUTION OF THE HAAR SHIFT

THE LINEAR BOUND FOR THE NATURAL WEIGHTED RESOLUTION OF THE HAAR SHIFT THE INEAR BOUND FOR THE NATURA WEIGHTED RESOUTION OF THE HAAR SHIFT SANDRA POTT, MARIA CARMEN REGUERA, ERIC T SAWYER, AND BRETT D WIC 3 Abstract The Hilbert transform has a linear bound in the A characteristic

More information

N-bit Parity Neural Networks with minimum number of threshold neurons

N-bit Parity Neural Networks with minimum number of threshold neurons Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

Harvard CS 121 and CSCI E-207 Lecture 6: Regular Languages and Countability

Harvard CS 121 and CSCI E-207 Lecture 6: Regular Languages and Countability Harvard CS 121 and CSCI E-207 Lecture 6: Regular Languages and Countability Salil Vadhan September 20, 2012 Reading: Sipser, 1.3 and The Diagonalization Method, pages 174 178 (from just before Definition

More information

Benes and Butterfly schemes revisited

Benes and Butterfly schemes revisited Benes and Butterfly schemes revisited Jacques Patarin, Audrey Montreuil Université de Versailles 45 avenue des Etats-Unis 78035 Versailles Cedex - France Abstract In [1], W. Aiello and R. Venkatesan have

More information

Two Notions of Differential Equivalence on Sboxes

Two Notions of Differential Equivalence on Sboxes Two Notions of Differential Equivalence on Sboxes Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder To cite this version: Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder. Two Notions

More information

arithmetic properties of weighted catalan numbers

arithmetic properties of weighted catalan numbers arithmetic properties of weighted catalan numbers Jason Chen Mentor: Dmitry Kubrak May 20, 2017 MIT PRIMES Conference background: catalan numbers Definition The Catalan numbers are the sequence of integers

More information

Some Classes of Invertible Matrices in GF(2)

Some Classes of Invertible Matrices in GF(2) Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007

More information

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou 1, Huiting Han 1, Chunming Tang 1, and Maozhi Xu 1,2 1 LMAM, School of Mathematical Sciences, Peing

More information

A New Approach to Permutation Polynomials over Finite Fields

A New Approach to Permutation Polynomials over Finite Fields A New Approach to Permutation Polynomials over Finite Fields Xiang-dong Hou Department of Mathematics and Statistics University of South Florida Coding, Cryptology and Combinatorial Designs Singapore,

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

arxiv: v2 [cs.dm] 29 Mar 2013

arxiv: v2 [cs.dm] 29 Mar 2013 arxiv:1302.6346v2 [cs.dm] 29 Mar 2013 Fixed point theorems for Boolean networks expressed in terms of forbidden subnetworks Adrien Richard Laboratoire I3S, CNRS & Université de Nice-Sophia Antipolis, France.

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

The Indistinguishability of the XOR of k permutations

The Indistinguishability of the XOR of k permutations The Indistinguishability of the XOR of k permutations Benoit Cogliati, Rodolphe Lampe, Jacques Patarin University of Versailles, France Abstract. Given k independent pseudorandom permutations f 1,...,

More information

Minimax strategy for prediction with expert advice under stochastic assumptions

Minimax strategy for prediction with expert advice under stochastic assumptions Minimax strategy for prediction ith expert advice under stochastic assumptions Wojciech Kotłosi Poznań University of Technology, Poland otlosi@cs.put.poznan.pl Abstract We consider the setting of prediction

More information

Announcements Wednesday, September 06

Announcements Wednesday, September 06 Announcements Wednesday, September 06 WeBWorK due on Wednesday at 11:59pm. The quiz on Friday coers through 1.2 (last eek s material). My office is Skiles 244 and my office hours are Monday, 1 3pm and

More information

ON THE CONTINUED FRACTION EXPANSION OF THE UNIQUE ROOT IN F(p) OF THE EQUATION x 4 + x 2 T x 1/12 = 0 AND OTHER RELATED HYPERQUADRATIC EXPANSIONS

ON THE CONTINUED FRACTION EXPANSION OF THE UNIQUE ROOT IN F(p) OF THE EQUATION x 4 + x 2 T x 1/12 = 0 AND OTHER RELATED HYPERQUADRATIC EXPANSIONS ON THE CONTINUED FRACTION EXPANSION OF THE UNIQUE ROOT IN F(p) OF THE EQUATION x 4 + x 2 T x 1/12 = 0 AND OTHER RELATED HYPERQUADRATIC EXPANSIONS by A. Lasjaunias Abstract.In 1986, Mills and Robbins observed

More information

Comments on "Generating and Counting Binary Bent Sequences"

Comments on Generating and Counting Binary Bent Sequences University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1994 Comments on "Generating and Counting Binary Bent Sequences" Claude

More information

Semi-simple Splicing Systems

Semi-simple Splicing Systems Semi-simple Splicing Systems Elizabeth Goode CIS, University of Delaare Neark, DE 19706 goode@mail.eecis.udel.edu Dennis Pixton Mathematics, Binghamton University Binghamton, NY 13902-6000 dennis@math.binghamton.edu

More information

On the Existence and Constructions of Vectorial Boolean Bent Functions

On the Existence and Constructions of Vectorial Boolean Bent Functions On the Existence and Constructions of Vectorial Boolean Bent Functions Yuwei Xu 1, and ChuanKun Wu 1 1 State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy

More information

Monomial transformations of the projective space

Monomial transformations of the projective space Monomial transformations of the projective space Olivier Debarre and Bodo Lass Abstract We prove that, over any field, the dimension of the indeterminacy locus of a rational map f : P n P n defined by

More information

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets

Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Some results on the existence of t-all-or-nothing transforms over arbitrary alphabets Navid Nasr Esfahani, Ian Goldberg and Douglas R. Stinson David R. Cheriton School of Computer Science University of

More information

On Counting the Number of Tilings of a Rectangle with Squares of Size 1 and 2

On Counting the Number of Tilings of a Rectangle with Squares of Size 1 and 2 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 20 (2017), Article 17.2.2 On Counting the Number of Tilings of a Rectangle with Squares of Size 1 and 2 Johan Nilsson LIPN Université Paris 13 93430

More information

Extended 1-perfect additive codes

Extended 1-perfect additive codes Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code

More information

CS1800 Discrete Structures Final Version A

CS1800 Discrete Structures Final Version A CS1800 Discrete Structures Fall 2017 Profs. Aslam, Gold, & Pavlu December 11, 2017 CS1800 Discrete Structures Final Version A Instructions: 1. The exam is closed book and closed notes. You may not use

More information

MATH 802: ENUMERATIVE COMBINATORICS ASSIGNMENT 2

MATH 802: ENUMERATIVE COMBINATORICS ASSIGNMENT 2 MATH 80: ENUMERATIVE COMBINATORICS ASSIGNMENT KANNAPPAN SAMPATH Facts Recall that, the Stirling number S(, n of the second ind is defined as the number of partitions of a [] into n non-empty blocs. We

More information

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms

Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms Vladimir Bayev Abstract. Low degree annihilators for Boolean functions are of great interest in cryptology because of

More information

QUADRANT MARKED MESH PATTERNS IN 132-AVOIDING PERMUTATIONS III

QUADRANT MARKED MESH PATTERNS IN 132-AVOIDING PERMUTATIONS III #A39 INTEGERS 5 (05) QUADRANT MARKED MESH PATTERNS IN 3-AVOIDING PERMUTATIONS III Sergey Kitaev Department of Computer and Information Sciences, University of Strathclyde, Glasgow, United Kingdom sergey.kitaev@cis.strath.ac.uk

More information

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet 1 and Stjepan Picek 1, 2 1 LAGA, Department of Mathematics, University of Paris 8 (and Paris

More information

GAPS IN BINARY EXPANSIONS OF SOME ARITHMETIC FUNCTIONS, AND THE IRRATIONALITY OF THE EULER CONSTANT

GAPS IN BINARY EXPANSIONS OF SOME ARITHMETIC FUNCTIONS, AND THE IRRATIONALITY OF THE EULER CONSTANT Journal of Prime Research in Mathematics Vol. 8 202, 28-35 GAPS IN BINARY EXPANSIONS OF SOME ARITHMETIC FUNCTIONS, AND THE IRRATIONALITY OF THE EULER CONSTANT JORGE JIMÉNEZ URROZ, FLORIAN LUCA 2, MICHEL

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne

Well known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Fixed point theorems for Boolean networks expressed in terms of forbidden subnetworks

Fixed point theorems for Boolean networks expressed in terms of forbidden subnetworks Fixed point theorems for Boolean networks expressed in terms of forbidden subnetworks Adrien Richard To cite this version: Adrien Richard. Fixed point theorems for Boolean networks expressed in terms of

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Unit equations in characteristic p. Peter Koymans

Unit equations in characteristic p. Peter Koymans Unit equations in characteristic p Peter Koymans Universiteit Leiden XXX th Journées Arithmétiques Caen, France, July 2017 Introduction Let K be a number field with unit group OK. For fixed a, b, c K consider

More information

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Introduction: The general Hidden Subgroup Problem is as follos. Let G be

More information

On the Weight Distribution of N-th Root Codes

On the Weight Distribution of N-th Root Codes Fabrizio Caruso Marta Giorgetti June 10, 2009 The Recurrence Proof by Generating Functions A Computer-Generated Proof Computing Some Steps of the Recurrence A Computer-Provable Identity Proving the Guessed

More information