arxiv: v1 [math.co] 6 Jan 2019

Size: px
Start display at page:

Download "arxiv: v1 [math.co] 6 Jan 2019"

Transcription

1 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS arxiv: v1 [math.co] 6 Jan 2019 DANIELE BARTOLI, MARIA MONTANUCCI, AND GIOVANNI ZINI Abstract. We provide constructions of bent functions using triples of permutations. This approach is due to Mesnager. In general, involutions have been mostly considered in such a machinery; we provide some other suitable triples of permutations, using monomials, binomials, trinomials, and quadrinomials. Keywords: Permutation; Boolean function; bent function; monomial, binomial, trinomial. 1. Introduction Bent functions are Boolean functions with an even number of variables which achieves the maximum possible nonlinearity. They have been introduced by Rothaus [21] and Dillon [11] in the Seventies and they have interesting applications in Combinatorics and Design Theory difference sets and symmetric designs), Coding Theory several types of codes such as Reed-Muller codes [9] and two-weight codes [1]), Cryptography [3], Sequence Theory [19], Graph Theory [20]. A complete classification of bent functions seems to be hopeless, although in the last years explicit constructions of such functions have been provided, using different techniques. For a more detailed introduction on this topic we refer to [2,4 6,12,16] and the references therein. Some recent constructions of bent functions rely on an approach due to Mesnager [14], where triples of permutations satisfying particular constraints are needed; see Definition 2.2. In general, involutions have been mostly considered in such a machinery; see [8,10,18]. In this paper, we provide some other families of permutations which can be used to construct bent functions. In particular, we use triples of monomials which are not all involutions see Theorem 3.1), monomials and binomials see Theorem 3.3), monomials and trinomials see Theorem 3.6), binomials of order four see Theorem 3.3). 2. Bent functions and permutations Let q = 2 n, n N, and denote by F q the finite field with q elements. A boolean function on F q is a map from F q to F 2. On the one hand each boolean function can be represented as a polynomial fx) = q 1 j=0 a jx j F q [x]. On the other hand a polynomial fx) of this shape corresponds to a boolean function if and only if a 0,a q 2 F 2 and a 2j mod q 1) = a 2 j for all j 0,q 1. In this case fx) is the polynomial form of the boolean function; see [3]. In the case n even, boolean functions can be described by a bivariate representation. Let n = 2m and identify F q with F 2 m F 2 m. Each element of F q can be uniquely described by a pair x,y) F 2 2 m. Then, each polynomial function f over F q can be determined, by Lagrange interpolation, by a unique 1

2 bivariate polynomial BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 2 0 i, j 2 m 1 a i,j x i y j F 2 m[x,y]. Each Boolean function can be written non-uniquely) in the form fx,y) = Tr1 m Px,y)), where Px,y) F 2 m[x,y] and Tr1 m denotes the trace function from F 2 m to F 2 defined by Tr1 mx) = + x2m 1 x 2m 2 + +x 2 +x. For a boolean function f on F 2 n, its Walsh-Hadamard transform χ f : F 2 n Z is defined as follows: χ f z) = 1) fx)+trn 1 zx). x F 2 n Definition 2.1. Let n N be even. A Boolean function f on F 2 n is called bent if its Walsh-Hadamard transform satisfies χ f z) = ±2 n/2 for all z F 2 n. Bent functions of the bilinear) form Tr m Φy)x) + gy), where x,y) F 2 m F 2 m, m 1, Φ is a permutation of F 2 m and g is any Boolean function over F 2 m, are called Maiorana-McFarland bent functions; see [13]. In this paper we construct bent functions following the approach used in [10, 18]. The ingredients are permutations of F 2 n satisfying the following property A n ). Definition 2.2. [10,15] Let n be a positive integer and q = 2 n. Three permutations Φ 1, Φ 2 and Φ 3 of F q are said to satisfy A n ) if the following two conditions hold: 1) their sum Ψ = Φ 1 +Φ 2 +Φ 3 is a permutation of F q ; 2) Ψ 1 = Φ 1 1 +Φ 1 2 +Φ 1 3. In Section 3 we will construct triples of permutations satisfying property A n ). The key result to construct bent functions from such triples is the following theorem. Theorem 2.3. [14] Let n be a positive integer and q = 2 n. Consider three permutations Φ 1, Φ 2, Φ 3 of F q. Then the Boolean function gx,y) = Tr n 1 xφ 1y))Tr n 1 xφ 2y)) +Tr n 1 xφ 2y))Tr n 1 xφ 3y)) +Tr n 1xΦ 1 y))tr n 1xΦ 3 y)) is bent over F q if and only if Φ 1, Φ 2, Φ 3 satisfy property A n ). The above theorem has been used to construct bent functions starting from monomial permutations [14], involutions [10,17], or other families of permutations satisfying property A n ) [15]. In this paper we construct bent functions starting from triples of permutations which are monomials see Theorem 3.1), binomials and monomials see Theorem 3.3), monomials and trinomials see Theorem 3.6), binomials and quadrinomials see Theorem 3.8), monomials and quadrinomials see Theorem 3.9). A general problem, when dealing with bent functions, is the equivalence issue. For many bent functions so far constructed, the equivalence question is still open. Also, if an answer is given, the most common result is a proof that they are Extended Affine equivalent to a Maiorana-McFarland bent

3 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 3 function. The authors in [10] give an easy criterion to decide wether a triple Φ 1,Φ 2,Φ 3 ) satisfying property A n ) is a Maiorana-McFarland bent function; see [10, Theorem 5]. For each pair i,j), 1 i < j 3, let us define 1) E i,j = {x F q : Φ i x) = Φ j x)}, E = i j E ij. By [10, Theorem 5], if the permutations Φ i i = 1,2,3) are such that E = F q, then the construction of Theorem 2.3 gives rise to a Maiorana-McFarland bent function. 3. Bent functions from triples of permutations satisfying property A m ) In this section we present our main results concerning the construction of bent functions via triples of permutations which are monomials see Theorem 3.1), binomials and monomials see Theorem 3.3), monomials and trinomials see Theorem 3.6), binomials and quadrinomials see Theorem 3.8), monomials and quadrinomials see Theorem 3.9). We show that such triples satisfy the hypothesis of Theorem 2.3, which can then be applied to obtain bent functions over F 2 4m Theorems 3.1, 3.3, 3.8, 3.9) or over F 2 6m Theorem 3.6). We start we a construction involving monomials. Theorem 3.1. Let m be a positive integer and λ F 2 4m be such that λ 2m +1 = 1. The triple 2) Φ 1,Φ 2,Φ 3 ) = x 22m,λx 2m,λx 23m ) satisfies A 4m ) and E F 2 4m. Proof. Clearly Φ i, i = 1,2,3, is a permutation of F 2 4m. It is easily seen that Φ 1 1,Φ 1 2,Φ 1 3 ) = Φ 1,Φ 3,Φ 2 ) and therefore Ψ = Φ 1 + Φ 2 + Φ 3 = Φ Φ Φ 1 3. Also, Ψ is a permutation of F 2 4m since it is linearized and Ψx) = 0 with x F 2 4m if and only if x = 0. In fact, we have 1 λx 2m +x 22m +λx 23m = ) 2m = 0 x+λx λ x+x2m λ x22m 2m +x 22m = 0. Consider now x F 2 4m such that x+λx 2m +x 22m = 0. Then x+λx ) ) x = x 24m 2 = m 2 m 2 m = x 2m + 1λ ) 2 m = x22m from which we get x 22m = 0, that is x = 0. Also, for any x F 2 4m, ΨΨx)) = λ λx 2m +x 22m +λx 23m) 2 m + λx 2m +x 22m +λx 23m) 2 2m = x 22m +λx 23m +x+λx 23m +x+λx 2m +x+λx 2m +x 22m = x, ) 2 m 1 λ x = λx 2m, +λ λx 2m +x 22m +λx 23m) 2 3m that is Ψ = Φ 1 +Φ 2 +Φ 3 = Φ 1 1 +Φ 1 2 +Φ 1 3 = Ψ 1 and property A 4m ) holds. Finally, E = {x F 2 4m : x 22m = λx 2m or x 22m = λx 23m or λx 2m = λx 23m } and E 2 2m +2 m < 2 4m = F 2 4m. = {x F 2 4m : λx 2m = x or x = x 22m }

4 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 4 When using binomials, the following proposition is a key result. Proposition 3.2. Suppose Φx) = αx 2i +βx 2j is a permutation of F 2 n with i < j < n. If Φ 1 x) is a linearized binomial then n = 2m and j = m+i for a positive integer m, and Φ 1 x) = γx 2m i +δx 22m i, where 3) γ = β 2m α 2m +1 +β 2m +1 ) 2 m i, δ = α α 2m +1 +β 2m +1 ) 2 m i Also, if n = 2m, i < m, j = m+i and α,β F 2 n satisfy α 2m +1 β 2m +1, then Φx) is a permutation of F 2 n with Φx) 1 = γx 2m i +δx 22m i, where γ and δ are given in Equation 3). Proof. Let Φ 1 x) = γx 2k +δx 2l with γ,δ F 2 n and k < l < n. Then Φ Φ 1 x) = αγ 2i x 2k+i +αδ 2i x 2l+i +βγ 2j x 2k+j +βδ 2j x 2j+l x mod x 2n x) only if k+i l+j mod n) and l+i k+j mod n). This implies that n is even, say n = 2m; also, j = m+i, l = k +m. Then one between k +i and k +j vanishes modulo n. If k+i 0 mod n), then either k or i is at least m, so that either l or j is at least n, a contradiction to the assumptions. Hence, k +j 0 mod 2m), that is k +i m mod 2m). This forces k = m i and l = 2m i. Then Φ Φ 1 x) = αγ 2i +βδ 2m+i) x m + αδ 2i +βγ 2m+i) x equals x mod x 2n x) if and only if 4) αγ 2i +βδ 2m+i = 0, αδ 2i +βγ 2m+i = 1. From Φ 1 Φx) x mod x 2n x) it follows also 5) γα 2m i +δβ 22m i = 0, γβ 2m i +δα 22m i = 1. By the uniqueness of Φ 1 x), we have that α 2m +1 β 2m +1 and γ,δ are as in Equation 3) and satisfy both Equations 4) and 5). If n = 2m, i < m, j = m+i, α,β F 2 n satisfy α 2m +1 β 2m +1, and γ,δ as in Equation 3), then it is readily seen that Φx) is a permutation and Φ 1 x) = γx 2m i +δx 22m i. As an application, we produce triples of permutation polynomials satisfying property A n ) using binomials. Theorem 3.3. Let m be a positive integer, α F 2 m. The triple 6) Φ 1,Φ 2,Φ 3 ) = x 22m,αx 2m +α+1)x 23m,α+1)x 2m +αx 23m ) satisfies A 4m ) and E F 2 4m..

5 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 5 Proof. It is easily seen that Φ 2 and Φ 3 are bijections and Φ 1 2 = Φ 3, by Proposition 3.2. Also, is an involution and Ψx) = Φ 1 x)+φ 2 x)+φ 3 x) = x 2m +x 22m +x 23m Φ 1 1 x)+φ 1 2 x)+φ 1 3 x) = Φ 1 x)+φ 2 x)+φ 3 x) = Ψx) = Ψ 1 x). Therefore, Φ 1,Φ 2,Φ 3 ) satisfies A 4m ). Arguing as in Proposition 3.1 it is easily seen that E 2 2m +2 m < 2 4m = F 2 4m and the claim follows. Remark 3.4. It is worth noting that binomials have been already used in [10, Theorem 7], where the authors use the classification given in [7, Proposition 5] of the linear binomial involutions of F 2 m. In Theorem 3.3 we do not use involutions. Trinomials are investigated in the next proposition. Proposition 3.5. Let m be a positive integer. Two trinomials Φx) = αx 2m +βx 23m +γx 25m F 2 6m[x], Ψx) = αx 2m +βx 23m +γx 25m F 2 6m[x] satisfy Φ Ψx) = Ψ Φx) = x for each x F 2 6m if and only if αγ 2m +ββ 23m +γα 25m = 1 7) αα 2m +βγ 23m +γβ 25m = 0 αβ 2m +βα 23m +γγ 25m = 0 and 8) det Proof. By direct checking Ψ Φx) equals αγ 2m +ββ 23m +γα 25m) x+ γ 2m β 23m α 25m α 2m γ 23m β 25m β 2m α 23m γ 25m 0. αα 2m +βγ 23m +γβ 25m) x 22m + αβ 2m +βα 23m +γγ 25m) x 24m. So, if Ψ = Φ 1, then Ψ Φx) = x for all x F 2 6m, and 7) holds. Thus, 7) has a unique solution α,β,γ) and 8) holds. On the other hand, if α,β,γ) is a solution of 7) and 8) holds, Φ Ψx) = x for each x F 2 6m and Ψ = Φ 1. Particular choices of permutation trinomials give rise to the following triples of functions satisfying property A n ). Theorem 3.6. Let m be a positive, α,β F 2 2m be such that either i) α = β, α 2m +α 2m 1 +1 = 0, or ii) β = α+1, α 2m +1 = 1, α 1.

6 The triple BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 6 9) Φ 1,Φ 2,Φ 3 ) = x 2m,αx 2m +βx 23m +α+1)x 25m,α+1)x 2m +βx 23m +αx 25m ) satisfies A 6m ) and E F 2 6m. Proof. By direct checking the 6-tuple α,β,γ,α,β,γ) = α,β,α+1,α+1,β,α), where α and β are as in i) or ii), satisfies Conditions 7) and 8) therefore Φ 1 2 = Φ 3. Also, Ψx) = Φ 1 x)+φ 2 x)+φ 3 x) = x 2m +x 2m +x 25m = x 25m is a bijection and Φ 1 1 x)+φ 1 2 x)+φ 1 3 x) = = Ψ 1 x) x2m over F 2 6m. Hence, Φ 1,Φ 2,Φ 3 ) satisfies A m ). Arguing as in Proposition, 3.1 E 2 4m +2 4m +2 4m < 2 6m = F 2 6m and the claim follows. The last part of this section involves permutation quadrinomials. Lemma 3.7. Let q be a power of 2, C F q, D F q 2. Then the polynomial fx) = Cx+Dx q +C + 1)x q2 +Dx q3 is an involution over F q 4. Proof. By direct computation, f 2 x) = C Cx+Dx q +C +1)x q2 +Dx q3) +D ) Cx q +D q x q2 +C +1)x q3 +D q x ) +C +1) Cx q2 +Dx q3 C +1)x+Dx q +D Cx q3 +D q x+c +1)x q +D q x q2). Since q is even, this implies f 2 x) = x. Theorem 3.8. Let α F 2 m and β F 2 2m be such that β 2m +1 = α Then the triple Φ 1,Φ 2,Φ 3 ) = αx+βx 2m,α 2 x+β 2m +1 x 22m,α 3 x+α 2 βx 2m +αβ 2m +1 x 22m +β 2m +2 x 23m) satisfies A 4m ) and E F 2 4m. Proof. By direct checking, Φ i x) = Φ i 1 x) for all x F 2 4m, i = 2,3, and Φ 2x) is an involution over F 2 4m by Lemma 3.7, so that Φ 3 x) = Φ 1 1 x) over F 2 4m. Also, for all x F 2 4m, we have Ψx) = Φ 1 x)+φ 2 x)+φ 3 x) = α+α 2 +α 3 )x+α 2 +1)βx 2m +1+α+α 2 +α 3 )x 22m +α 2 +1)βx 23m and Φ 1 1 x)+φ 1 2 x)+φ 1 3 x) = Ψx) = Ψ 1 x). Thus, Φ 1,Φ 2,Φ 3 ) satisfies A 4m ) and E 2 m +2 2m +2 3m < 2 4m = F 2 4m. The claim follows. Theorem 3.9. Let C F 2 m, D F 2 2m, and λ F 2 2m be such that λ 2m +1 = 1. Then the triple Φ 1,Φ 2,Φ 3 ) = λx 2m,λx 23m,Cx+Dx 2m +C +1)x 22m +Dx 23m) satisfies A 4m ) and E F 2 4m.

7 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 7 Proof. From λ 2m +1 = 1 follows Φ 2 x) = Φ 1 1 x) for all x F 2 4m. Also, Φ 3x) is an involution over F 2 4m by Lemma 3.7. Then Ψx) = Φ 1 x)+φ 2 x)+φ 3 x) = Cx+D +λ)x 2m +C +1)x 22m +D+λ)x 23m is an involution over F 2 4m by Lemma 3.7, and Ψ 1 x) = Φ 1 1 x)+φ 1 2 x)+φ 1 3 x) = Ψx). Thus, Φ 1,Φ 2,Φ 3 ) satisfies A 4m ). If m 2, then E 2 m +2 3m +2 3m < 2 4m = F 2 4m. Suppose m = 1. Then E 1,2 = {0,1,λ,λ 2 } has sizeatmost4. Also, theelementsofe 1,3 aretherootsinf 16 offt) = DT 8 +C+1)T 4 +D+λ)T 2 +CT. By direct checking, gcdft),t 16 + T) has order at most 4. Since {0,λ 2 } E 1,2 E 1,3, the size of E 1,2 E 1,3 is at most 6. Thus, E has size at most 6+8 < 16 and the claim follows. 4. Acknowledgments The research of D. Bartoli, M. Montanucci, G. Zini was partially supported by the Italian National Group for Algebraic and Geometric Structures and their Applications GNSAGA - INdAM). References [1] R. Calderbank and W. M. Kantor, The geometry of two-weight codes, Bull. London Math. Soc., vol. 18, no. 2, pp , [2] C. Carlet, On bent and highly nonlinear balanced/resilient functions and their algebraic immunities, in: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Berlin, Germany: Springer, 2006, pp [3] C. Carlet, Boolean functions for cryptography and error correcting codes, in Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Y. Crama and P. L. Hammer, Eds. Cambridge, U.K.: Cambridge Univ. Press, 2010, pp [4] C. Carlet, Open problems on binary bent functions, in Open Problems in Mathematics and Computational Science, Cham, Switzerland: Springer, 2014, pp [5] C. Carlet and S. Mesnager, On Dillon s class H of bent functions, Niho bent functions and O-polynomials, J. Combinat. Theory A, vol. 118, no. 8, pp , [6] C. Carlet and S. Mesnager, Four decades of research on bent functions, Des. Codes Cryptograph., vol. 78, no. 1, pp. 5 50, [7] P. Charpin, S. Mesnager, and S. Sarkar, On involutions of finite fields, in Proc. IEEE Int. Symp. Inf. Theory ISIT), 2015, pp [8] P. Charpin, S. Mesnager, and S. Sarkar, Involutions over the Galois field F 2 n, IEEE Trans. Inf. Theory, vol. 62, no. 4, pp , [9] G. Cohen, I. Honkala, S. Litsyn, and A. Lobstein, Covering Codes Amsterdam, The Netherlands: North Holland, [10] R.S. Coulter and S. Mesnager, Bent Functions From Involutions Over F 2 n, IEEE Trans. Inf. Theory, vol. 64, no. 4, pp , [11] J.F. Dillon, Elementary Hadamard difference sets, Ph.D. disseration, Univ. Maryland, College Park, MD, USA, [12] G.M. Kyureghyan, Constructing permutations of finite fields via linear translators, J. Combinat. Theory A, vol. 118, no. 3, pp , [13] R.L. McFarland, A family of difference sets in non-cyclic groups, J. Combinat. Theory A, vol. 15, no 1, pp. 1 10, 1973.

8 BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS 8 [14] S. Mesnager, Several new infinite families of bent functions and their duals, IEEE Trans. Inf. Theory, vol. 60, no 7, pp , [15] S. Mesnager, Further constructions of infinite families of bent functions from new permutations and their duals, Cryptograph. Commun., vol. 8, no. 2, pp , [16] S. Mesnager, Bent Functions: Fundamentals and Results, New York, NY, USA: Springer-Verlag, [17] S. Mesnager, On constructions of bent functions from involutions, in Proc. ISIT, Jul. 2016, pp [18] S. Mesnager, G. Cohen, and D. Madore, On existence based on an arithmetical problem) and constructions of bent functions, in Proc. 15th Int. Conf. Cryptograph. Coding, 2015, pp [19] J. D. Olsen, R. A. Scholtz, and L. R. Welch, Bent-function sequences, IEEE Trans. Inf. Theory, vol. 28, no. 6, pp , Nov [20] A. Pott, Y. Tan, and T. Feng, Strongly regular graphs associated with ternary bent functions, J. Combinat. Theory, Ser. A, vol. 117, no. 6, pp , [21] O.S. Rothaus, On bent functions, J. Combinat. Theory A, vol. 20, no. 3, pp , Dipartimento di Matematica e Informatica, Università degli Studi di Perugia, Perugia, Italy address: daniele.bartoli@unipg.it Dipartimento di Tecnica e Gestione dei Sistemi Industriali, Università degli Studi di Padova, Vicenza, Italy address: mariamontanucci@gmail.com Dipartimento di Matematica e Applicazioni, Università degli Studi di Milano-Bicocca, Milano, Italy address: giovanni.zini@unimib.it

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Complete characterization of generalized bent and 2 k -bent Boolean functions

Complete characterization of generalized bent and 2 k -bent Boolean functions Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012 6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

FOR a positive integer n and a prime p, let F p n be

FOR a positive integer n and a prime p, let F p n be 1 Several new classes of Boolean functions with few Walsh transform values Guangkui Xu, Xiwang Cao, Shangding Xu arxiv:1506.0886v1 [cs.it] Jun 2015 Abstract In this paper, several new classes of Boolean

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

Hyper-bent Functions

Hyper-bent Functions Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca

More information

Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree

Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree 1 Wei Su Alexander Pott and Xiaohu Tang arxiv:105.6568v1 [cs.it] 30 May 01 Abstract We present

More information

Minimal 1-saturating sets in PG(2,q), q 16

Minimal 1-saturating sets in PG(2,q), q 16 AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 28 (2003), Pages 161 169 Minimal 1-saturating sets in PG(2,q), q 16 S. Marcugini F. Pambianco Dipartimento di Matematica e Informatica, Università degli Studi

More information

On Boolean functions which are bent and negabent

On Boolean functions which are bent and negabent On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

Multiple coverings of the farthest-off points and multiple saturating sets in projective spaces

Multiple coverings of the farthest-off points and multiple saturating sets in projective spaces Thirteenth International Workshop on Algebraic and Combinatorial Coding Theory June 15-21, 2012, Pomorie, Bulgaria pp. 53 59 Multiple coverings of the farthest-off points and multiple saturating sets in

More information

ON POSITIVE, LINEAR AND QUADRATIC BOOLEAN FUNCTIONS

ON POSITIVE, LINEAR AND QUADRATIC BOOLEAN FUNCTIONS Kragujevac Journal of Mathematics Volume 36 Number 2 (2012), Pages 177 187. ON POSITIVE, LINEAR AND QUADRATIC BOOLEAN FUNCTIONS SERGIU RUDEANU Abstract. In [1], [2] it was proved that a function f : {0,

More information

Dickson Polynomials that are Involutions

Dickson Polynomials that are Involutions Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.

More information

Some results concerning global avalanche characteristics of two q-ary functions

Some results concerning global avalanche characteristics of two q-ary functions Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand)

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

arxiv: v5 [cs.it] 4 Nov 2009

arxiv: v5 [cs.it] 4 Nov 2009 1 Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables WeiGuo ZHANG and GuoZhen XIAO ISN Lab, Xidian University, Xi an 710071, P.R.China arxiv:0905.0794v5 [cs.it]

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin Guang Gong INRIA, B.P. 105, 78153 Le Chesnay Cedex, France, Pascale.Charpin@inria.fr Department of Electrical and Computer

More information

New Constructions for Resilient and Highly Nonlinear Boolean Functions

New Constructions for Resilient and Highly Nonlinear Boolean Functions New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,

More information

Non-Separable Cryptographic Functions

Non-Separable Cryptographic Functions International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Lecture 2 Some Sources of Lie Algebras

Lecture 2 Some Sources of Lie Algebras 18.745 Introduction to Lie Algebras September 14, 2010 Lecture 2 Some Sources of Lie Algebras Prof. Victor Kac Scribe: Michael Donovan From Associative Algebras We saw in the previous lecture that we can

More information

On the normality of p-ary bent functions

On the normality of p-ary bent functions Noname manuscrit No. (will be inserted by the editor) On the normality of -ary bent functions Ayça Çeşmelioğlu Wilfried Meidl Alexander Pott Received: date / Acceted: date Abstract In this work, the normality

More information

Some properties of q-ary functions based on spectral analysis

Some properties of q-ary functions based on spectral analysis Some properties of q-ary functions based on spectral analysis Deep Singh and Maheshanand Bhaintwal Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667 INDIA deepsinghspn@gmail.com,mahesfma@iitr.ernet.in

More information

Nonlinear Functions A topic in Designs, Codes and Cryptography

Nonlinear Functions A topic in Designs, Codes and Cryptography Nonlinear Functions A topic in Designs, Codes and Cryptography Alexander Pott Otto-von-Guericke-Universität Magdeburg September 21, 2007 Alexander Pott (Magdeburg) Nonlinear Functions September 21, 2007

More information

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced

More information

On the Existence and Constructions of Vectorial Boolean Bent Functions

On the Existence and Constructions of Vectorial Boolean Bent Functions On the Existence and Constructions of Vectorial Boolean Bent Functions Yuwei Xu 1, and ChuanKun Wu 1 1 State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

Vectorial Boolean Functions for Cryptography

Vectorial Boolean Functions for Cryptography Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter

More information

A matrix approach for constructing quadratic APN functions

A matrix approach for constructing quadratic APN functions Noname manuscript No (will be inserted by the editor) A matrix approach for constructing quadratic APN functions Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract We find a

More information

Maiorana McFarland Functions with High Second Order Nonlinearity

Maiorana McFarland Functions with High Second Order Nonlinearity Maiorana McFarland Functions with High Second Order Nonlinearity Nicholas Kolokotronis 1 and Konstantinos Limniotis 2,3 1 Department of Computer Science and Technology University of Peloponnese End of

More information

Complete permutation polynomials of monomial type

Complete permutation polynomials of monomial type Complete permutation polynomials of monomial type Giovanni Zini (joint works with D. Bartoli, M. Giulietti and L. Quoos) (based on the work of thesis of E. Franzè) Università di Perugia Workshop BunnyTN

More information

Some Results on the Known Classes of Quadratic APN Functions

Some Results on the Known Classes of Quadratic APN Functions Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no

More information

BENT POLYNOMIALS OVER FINITE FIELDS

BENT POLYNOMIALS OVER FINITE FIELDS BENT POLYNOMIALS OVER FINITE FIELDS ROBERT S COULTER AND REX W MATTHEWS Abstract. The definition of bent is redefined for any finite field. Our main result is a complete description of the relationship

More information

ABELIAN HOPF GALOIS STRUCTURES ON PRIME-POWER GALOIS FIELD EXTENSIONS

ABELIAN HOPF GALOIS STRUCTURES ON PRIME-POWER GALOIS FIELD EXTENSIONS ABELIAN HOPF GALOIS STRUCTURES ON PRIME-POWER GALOIS FIELD EXTENSIONS S. C. FEATHERSTONHAUGH, A. CARANTI, AND L. N. CHILDS Abstract. The main theorem of this paper is that if (N, +) is a finite abelian

More information

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity

Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4

More information

STRICTLY ORDER PRIMAL ALGEBRAS

STRICTLY ORDER PRIMAL ALGEBRAS Acta Math. Univ. Comenianae Vol. LXIII, 2(1994), pp. 275 284 275 STRICTLY ORDER PRIMAL ALGEBRAS O. LÜDERS and D. SCHWEIGERT Partial orders and the clones of functions preserving them have been thoroughly

More information

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori arxiv:608.05008v2 [math.nt] 9 Aug 206 Abstract In this note, the polar decomposition of binary fields of even

More information

On the Arithmetic Walsh Coefficients of Boolean Functions

On the Arithmetic Walsh Coefficients of Boolean Functions Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract

More information

FINITE GROUPS IN WHICH SOME PROPERTY OF TWO-GENERATOR SUBGROUPS IS TRANSITIVE

FINITE GROUPS IN WHICH SOME PROPERTY OF TWO-GENERATOR SUBGROUPS IS TRANSITIVE FINITE GROUPS IN WHICH SOME PROPERTY OF TWO-GENERATOR SUBGROUPS IS TRANSITIVE COSTANTINO DELIZIA, PRIMOŽ MORAVEC, AND CHIARA NICOTERA Abstract. Finite groups in which a given property of two-generator

More information

An analysis of the C class of bent functions

An analysis of the C class of bent functions An analysis of the C class of bent functions Bimal Mandal 1 Pantelimon Stănică 2 Sugata Gangopadhyay 3 Enes Pasalic 4 1 Department of Mathematics Indian Institute of Technology Roorkee, INDIA bimalmandal90@gmail.com

More information

Maths Extension 2 - Polynomials. Polynomials

Maths Extension 2 - Polynomials. Polynomials Maths Extension - Polynomials Polynomials! Definitions and properties of polynomials! Factors & Roots! Fields ~ Q Rational ~ R Real ~ C Complex! Finding zeros over the complex field! Factorization & Division

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

SELF DUAL BENT FUNCTIONS

SELF DUAL BENT FUNCTIONS Boolean Functions: Cryptography and Applications Fonctions Booléennes : Cryptographie & Applications BFCA 08 SELF DUAL BENT FUNCTIONS Claude Carlet 1, Lars Eirik Danielsen 2, Matthew Geoffrey Parker 2

More information

On more bent functions from Dillon exponents

On more bent functions from Dillon exponents AAECC DOI 10.1007/s0000-015-058-3 ORIGINAL PAPER On more bent functions from Dillon exponents Long Yu 1 Hongwei Liu 1 Dabin Zheng Receive: 14 April 014 / Revise: 14 March 015 / Accepte: 4 March 015 Springer-Verlag

More information

A note on hyper-bent functions via Dillon-like exponents

A note on hyper-bent functions via Dillon-like exponents A note on hyper-bent functions via Dillon-like exponents Sihem Mesnager Jean-Pierre Flori Monday 23 rd January, 2012 Abstract This note is devoted to hyper-bent functions with multiple trace terms including

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

On Existence and Invariant of Algebraic Attacks

On Existence and Invariant of Algebraic Attacks On Existence and Invariant of Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 ROBERT S. COULTER AND PAMELA KOSICK Abstract. This note summarises a recent search for commutative semifields of order 243 and 3125. For each of these two orders,

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

APN Power Functions Over GF(2 n ) for Infinitely Many n

APN Power Functions Over GF(2 n ) for Infinitely Many n APN Power Functions Over GF( n ) for Infinitely Many n David Jedlicka University of Texas at Austin Department of Mathematics Austin, TX 7871 USA jedlicka@math.utexas.edu July 11, 005 Abstract I present

More information

Symmetric configurations for bipartite-graph codes

Symmetric configurations for bipartite-graph codes Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 2008, Pamporovo, Bulgaria pp. 63-69 Symmetric configurations for bipartite-graph codes Alexander Davydov adav@iitp.ru

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Haar Spectrum of Bent Boolean Functions

Haar Spectrum of Bent Boolean Functions Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS

COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS COMMUTATIVE PRESEMIFIELDS AND SEMIFIELDS ROBERT S. COULTER AND MARIE HENDERSON Abstract. Strong conditions are derived for when two commutative presemifields are isotopic. It is then shown that any commutative

More information

Journal of Algebra 226, (2000) doi: /jabr , available online at on. Artin Level Modules.

Journal of Algebra 226, (2000) doi: /jabr , available online at   on. Artin Level Modules. Journal of Algebra 226, 361 374 (2000) doi:10.1006/jabr.1999.8185, available online at http://www.idealibrary.com on Artin Level Modules Mats Boij Department of Mathematics, KTH, S 100 44 Stockholm, Sweden

More information

On finite Steiner surfaces

On finite Steiner surfaces See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220187353 On finite Steiner surfaces Article in Discrete Mathematics February 2012 Impact Factor:

More information

B.Sc. MATHEMATICS I YEAR

B.Sc. MATHEMATICS I YEAR B.Sc. MATHEMATICS I YEAR DJMB : ALGEBRA AND SEQUENCES AND SERIES SYLLABUS Unit I: Theory of equation: Every equation f(x) = 0 of n th degree has n roots, Symmetric functions of the roots in terms of the

More information

The Klein quartic, the Fano plane and curves representing designs

The Klein quartic, the Fano plane and curves representing designs The Klein quartic, the Fano plane and curves representing designs Ruud Pellikaan Dedicated to the 60-th birthday of Richard E. Blahut, in Codes, Curves and Signals: Common Threads in Communications, (A.

More information

A NOTE ON C-ANALYTIC SETS. Alessandro Tancredi

A NOTE ON C-ANALYTIC SETS. Alessandro Tancredi NEW ZEALAND JOURNAL OF MATHEMATICS Volume 36 (2007), 35 40 A NOTE ON C-ANALYTIC SETS Alessandro Tancredi (Received August 2005) Abstract. It is proved that every C-analytic and C-irreducible set which

More information

Generalized Correlation Analysis of Vectorial Boolean Functions

Generalized Correlation Analysis of Vectorial Boolean Functions Generalized Correlation Analysis of Vectorial Boolean Functions Claude Carlet 1, Khoongming Khoo 2, Chu-Wee Lim 2, and Chuan-Wen Loe 2 1 University of Paris 8 (MAATICAH) also with INRIA, Projet CODES,

More information

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights

Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used

More information

On Hardware Implementation of Tang-Maitra Boolean Functions

On Hardware Implementation of Tang-Maitra Boolean Functions On Hardware Implementation of Tang-Maitra Boolean Functions Mustafa Khairallah 1, Anupam Chattopadhyay 1, Bimal Mandal 2, and Subhamoy Maitra 2 1 Nanyang Technological University, Singapore. mustafam001@e.ntu.edu.sg,

More information

arxiv: v1 [math.co] 3 Nov 2014

arxiv: v1 [math.co] 3 Nov 2014 SPARSE MATRICES DESCRIBING ITERATIONS OF INTEGER-VALUED FUNCTIONS BERND C. KELLNER arxiv:1411.0590v1 [math.co] 3 Nov 014 Abstract. We consider iterations of integer-valued functions φ, which have no fixed

More information

) k ( 1 λ ) n k. ) n n e. k!(n k)! n

) k ( 1 λ ) n k. ) n n e. k!(n k)! n k ) λ ) k λ ) λk k! e λ ) π/!. e α + α) /α e k ) λ ) k λ )! λ k! k)! ) λ k λ k! λk e λ k! λk e λ. k! ) k λ ) k k + k k k ) k ) k e k λ e k ) k EX EX V arx) X Nα, σ ) Bp) Eα) Πλ) U, θ) X Nα, σ ) E ) X α

More information

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials Claude Carlet 1 and Stjepan Picek 1, 2 1 LAGA, Department of Mathematics, University of Paris 8 (and Paris

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

Counting Three-Line Latin Rectangles

Counting Three-Line Latin Rectangles Counting Three-Line Latin Rectangles Ira M Gessel* Department of Mathematics Brandeis University Waltham, MA 02254 A k n Latin rectangle is a k n array of numbers such that (i) each row is a permutation

More information

Primitive 2-factorizations of the complete graph

Primitive 2-factorizations of the complete graph Discrete Mathematics 308 (2008) 175 179 www.elsevier.com/locate/disc Primitive 2-factorizations of the complete graph Giuseppe Mazzuoccolo,1 Dipartimento di Matematica, Università di Modena e Reggio Emilia,

More information

arxiv: v1 [math.nt] 4 Mar 2014

arxiv: v1 [math.nt] 4 Mar 2014 VARIATIONS ON A GENERATINGFUNCTIONAL THEME: ENUMERATING COMPOSITIONS WITH PARTS AVOIDING AN ARITHMETIC SEQUENCE arxiv:403.0665v [math.nt] 4 Mar 204 MATTHIAS BECK AND NEVILLE ROBBINS Abstract. A composition

More information

Ma/CS 6a Class 18: Groups

Ma/CS 6a Class 18: Groups Ma/CS 6a Class 18: Groups = Rotation 90 Vertical flip Diagonal flip 2 By Adam Sheffer A Group A group consists of a set G and a binary operation, satisfying the following. Closure. For every x, y G, we

More information

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function

Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions

More information

DUALITY AND INSCRIBED ELLIPSES

DUALITY AND INSCRIBED ELLIPSES DUALITY AND INSCRIBED ELLIPSES MAHESH AGARWAL, JOHN CLIFFORD, AND MICHAEL LACHANCE Abstract. We give a constructive proof for the existence of inscribed family of ellipses in convex n-gons for 3 n 5 using

More information

A note on the Isomorphism Problem for Monomial Digraphs

A note on the Isomorphism Problem for Monomial Digraphs A note on the Isomorphism Problem for Monomial Digraphs Aleksandr Kodess Department of Mathematics University of Rhode Island kodess@uri.edu Felix Lazebnik Department of Mathematical Sciences University

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial

More information

Constructing new APN functions from known ones

Constructing new APN functions from known ones Constructing new APN functions from known ones Lilya Budaghyan a, Claude Carlet b, and Gregor Leander c a Department of Mathematics University of Trento ITALY b Department of Mathematics University of

More information

be a sequence of positive integers with a n+1 a n lim inf n > 2. [α a n] α a n

be a sequence of positive integers with a n+1 a n lim inf n > 2. [α a n] α a n Rend. Lincei Mat. Appl. 8 (2007), 295 303 Number theory. A transcendence criterion for infinite products, by PIETRO CORVAJA and JAROSLAV HANČL, communicated on May 2007. ABSTRACT. We prove a transcendence

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

Projective Schemes with Degenerate General Hyperplane Section II

Projective Schemes with Degenerate General Hyperplane Section II Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 44 (2003), No. 1, 111-126. Projective Schemes with Degenerate General Hyperplane Section II E. Ballico N. Chiarli S. Greco

More information

New York Journal of Mathematics. A Refinement of Ball s Theorem on Young Measures

New York Journal of Mathematics. A Refinement of Ball s Theorem on Young Measures New York Journal of Mathematics New York J. Math. 3 (1997) 48 53. A Refinement of Ball s Theorem on Young Measures Norbert Hungerbühler Abstract. For a sequence u j : R n R m generating the Young measure

More information

If a Generalised Butterfly is APN then it Operates on 6 Bits

If a Generalised Butterfly is APN then it Operates on 6 Bits If a Generalised Butterfly is APN then it Operates on 6 Bits Anne Canteaut 1, Léo Perrin 1, Shizhu Tian 1,2,3 1 Inria, Paris, France. 2 State Key Laboratory of Information Security, Institute of Information

More information

On one class of permutation polynomials over finite fields of characteristic two *

On one class of permutation polynomials over finite fields of characteristic two * On one class of permutation polynomials over finite fields of characteristic two * Leonid Bassalygo, Victor A. Zinoviev To cite this version: Leonid Bassalygo, Victor A. Zinoviev. On one class of permutation

More information

Extended Criterion for Absence of Fixed Points

Extended Criterion for Absence of Fixed Points Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova Abstract One of the criteria for substitutions used in block ciphers is the absence of fixed points. In this paper

More information

FOR a prime power q, let F q denote the finite field with q

FOR a prime power q, let F q denote the finite field with q PREPRINT SUBMITTED TO IEEE 1 On Inverses of Permutation Polynomials of Small Degree over Finite Fields Yanbin Zheng, Qiang Wang, and Wenhong Wei arxiv:181.06768v1 [math.co] 17 Dec 018 Abstract Permutation

More information