p-ary Weight problems in designs, coding, and cryptography (preceded by a brief research overview)

Size: px
Start display at page:

Download "p-ary Weight problems in designs, coding, and cryptography (preceded by a brief research overview)"

Transcription

1 p-ary Weight problems in designs, coding, and cryptography (preceded by a brief research overview) Henk Hollmann Singapore, Nanyang Technological University, 29 Sept (mostly joint work with Qing Xiang and others)

2 Contents 1. Introduction of the speaker 2. Brief research overview 3. p-ary weight problems I: Difference sets and their p-ranks Difference sets in abelian groups Gauss and Jacoby sums Stickelberger s theorem Modular p-ary add-with-carry Examples 4. p-ary weight problems II: Few-weight codes Cyclic codes, m-sequences Pless power moments Counting low-weight codewords McEliece s Theorem Examples 5. p-ary weight problems III: Algebraic immunity

3 Introduction Background: Masters (Association schemes) & Ph.D. (Modulation codes) both from Eindhoven Technical University, the Netherlands, supervisor Jack van Lint (and Paul Siegel) : CNET (Centre National d Études des Télécommunications), Issy-les-Moulineaux (Paris), France Main research: FFT (Fast Fourier Transforms) and NTT (Number Theoretic Transforms) Hardware design, patent convolver prototype Factorisation of x N q over Q. Co-inventor (with Pierre Duhamel) of split-radix FFT.

4 : Philips Research Laboratories, Eindhoven, the Netherlands ( : Principal Scientist) Responsible for Discrete Mathematics within Philips Research Consultancy and research in Discrete Mathematics, Coding Theory, Cryptography, Information Theory, and Digital Signal Processing : Eindhoven University of Technology, the Netherlands Own math consultancy firm

5 More applied research topics: published on Fourier Transforms (FFT, NTT) Finite fields (arithmetic) Signal processing algorithms (filtering, write-equalization) Testing of IC s (Integrated Circuits) Switching networks (self-routing optical switching) LFSR s (Linear Feedback Shift Registers), m-sequences Block-designs and various design-like stuff Optimization, and algorithms [Pascal, Fortran, C, C++,...] Constrained (modulation) codes (Magnetic recording, CD) Error-correcting codes, decoding (RS, iterative erasure) Video-on-demand Cryptography (timing attacks, visual crypto, whitebox crypto) 9 US patents (algorithms, arithmetic, constrained codes, crypto)

6 More pure research topics: published on Association schemes (schemes related to conic in PG(2, q), q even, and PSL(2, q), fusion schemes, finite geometry, Metz/Wilbrink SR graphs, pseudocyclic association schemes) Permutation polynomials Kloosterman sum identities Cryptography - IPP (Codes with Identifiable Parent Property) p-rank problems in difference sets, bent functions, sequences Coding theory - many topics (with Qing Xiang: proof of Welch and Niho conjectures)

7 Research interests: very broad, with emphasis on Algebraic combinatorics Finite fields and their applications Linear algebra and its applications I like to collaborate: about 80% of my publications with co-authors Co-authors include: Aart Blokhuis, Gary Ebert (Geometry) Janós Körner, Simon Lytsyn, Jack van Lint [7x] (Combinatorics) Tor Helleseth, Qing Xiang [13x] (Algebraic combinatorics) Ludo Tolhuizen [14x] (Coding theory/cryptography/combinatorics) Pierre Duhamel [7x] (FFT/NTT) Kees Schouhamer Immink [5x] (constrained coding)

8 p-ary weight problems and applications I: Difference sets and their p-ranks (G, ) abelian group, G = v. D G is a (v, k, λ)-difference set in G if D = k and a 1 G # (d 1, d 2 ) in D 2 for which d 1 d 1 2 = a equals λ. ( d D )( d d D ) d 1 = (k λ)1 G + λ g. g G Consequence: k(k 1) = λ(v 1). G cyclic, then D cyclic difference set.

9 (Complex) character χ : (G, ) (C, ), homomorphism χ 0 : g 1 (g G): trivial character. Theorem (Character characterization) Let G = v, and let k, λ satisfy λ(v 1) = k(k 1). Then a k-subset D G is (v, k, λ)-difference set iff χ(d)χ(d) = k λ for every nontrivial ( 1) complex multiplicative character χ. Here χ(d) = d D χ(d). Proof by Fourier inversion.

10 Proof? Example Classical parameters: Singer difference sets. H := {x F qm Tr(x) = 0}, Tr(x) = Tr Fq m /F q (x) = x + x q + + x qm 1. Tr(ax) = atr(x) (a F q), so H F q m/f q. Theorem H is a ((q m 1)/(q 1), (q m 1 1)/(q 1), (q m 2 1)/(q 1)) (cyclic) difference set in F q m/f q.

11 Gauss and Jacoby sums q = p s, p prime, F q = GF(q), finite field with q elements, F = F \ {0} Tr(x) = Tr Fq/Fp = x p + x p2 + + x ps 1, trace function. ξ n complex n-th root of unity ψ : F q C, ψ(x) = ξ Tr(x) p is (nontrivial) additive character of F q χ : F q C multiplicative character of F q; define χ(0) = 0. χ q 1 = 1, the trivial character.

12 Gauss sum g(χ) = a F q χ(a)ψ(a). Elementary property: g(1) = 1, g(χ)g(χ) = q, χ 1. Note that g(χ) lives in Z[ξ q 1, ξ p ]. Jacoby sum J(χ 1, χ 2 ) = a F q χ 1 (a)χ 2 (1 a). χ 1, χ 2, χ 1 χ 2 1, then J(χ 1, χ 2 ) = g(χ 1 )g(χ 2 )/g(χ 1 χ 2 ), and so J(χ 1, χ 2 )J(χ 1, χ 2 ) = q, χ 1.

13 Character characterization theorem can be used to prove that D is difference set by expressing χ(d) in terms of Gauss and Jacoby sums! Example (Singer) χ non-trivial, then g(χ) = q χ(h ), hence χ(h )χ(h ) = q m 2 = k λ.

14 Maschietti difference sets: q = 2 m, k integer, (k, q 1) = 1. Theorem If τ : x x + x k two-to-one on F q then D k,m = Imτ \ {0} is a (2 m 1, 2 m 1 1, 2 m 2 1)-difference set in F q Proof: (k 1, q 1) = 1, so χ non-trivial, then φ : χ = φ k 1 ; now χ(d k,m ) = 1 2 J(φ, χ) (χ = φk ).

15 Possible parameters: (regular) k = 2 (translation) k = 2 r, (m, r) = 1, 1 < r < m/2 (Segre) k = 6 (Glynn type I) k = 2 2r + 2 r, m 7 odd, 4r 1 mod m (Glynn type II) k = 3 2 r + 4, m 11 odd, 2r 1 mod m Nonisomorphic? Compute p-ranks!

16 p-rank of D is F p -rank of incidence matrix A g,h = δ gh 1 D of associated (symmetric) design. Only interesting if p k λ [or p k] (det=0) Distinct p-ranks then distinct designs! p-rank = complexity of associated 0, 1-sequence char D. Theorem If char(f) v, F contains all v th roots of 1 (v = exp(g)), then p-rank of D equals # F-characters χ : G F with χ(d) 0 Proof: Fourier inversion. X χ,g = χ(g), then X 1 g,χ = v 1 χ( g), and if A g,h = δ gh 1 D, then XAX 1 = v diag(χ(d)) χ.

17 Stickelberger s theorem q = p s, α primitive in F q, f (x) minimal polynomial of α over F p p = (f (ξ q 1 ), p) prime ideal in Z[ξ q 1 ] lying over p: Z[ξ q 1 ]/p = F p [x] mod f (x) = F q, isomorphism: ω p : α ξ q 1 ω p : F q C Teichmüller character. If χ : F q Z[ξ v ] C complex multiplicative character, then χ mod p multiplicative F q -character F q F q (p = char(f q ) F q ).

18 Consequence: p-rank of D is # complex characters χ for which χ(d) mod p 0. Let P = (f (ξ q 1 ), ξ p 1, p) be the prime ideal in Z[ξ q 1, ξ p ] above p. (x 1) p 1 x p 1 + x p x + 1 mod p, so (ξ p 1) p 1 = 0 mod p and P p 1 = p, v P (p) = p 1 (v P is P-adic valuation).

19 q = p s, p prime. If a a 0 + a 1 p + + a p 1 p s 1 0 mod q 1, 0 a i p 1, then the p-ary weight of a. Theorem (Stickelberger) w(a) = w p (a) = a 0 + a 1 + a s 1, v P (g(ωp a )) = w p (a). So P wp(a) g(ωp a ) and p (p 1)wp(a) g(ωp a )

20 Example: Singer difference sets, q = p s. χ character on F q m/f q; χ = ω a(q 1) p, χ 1 iff (q 1)a 0 mod q m 1. Now g(ωp a(q 1 ) = q ωp a(q 1) (H ), v P (g(ω a(q 1) p )) = w p (a(q 1)), v P (q) = (p 1)s, and χ 0 = 1 gives χ 0 (H) = H 0 mod p. Conclusion: p-rank = 1+ # a, 0 < a < (q m 1)/(q 1), with w p ((q 1)a) = (p 1)s.

21 Answer: Hadama s formulae (q = p s ) ( ) p + m 1 s 1 +. m 2 Similar, but more complicated, for GMW difference sets (work with Arasu, Player, Xiang)

22 Example: Maschietti difference sets D k,m in F 2 m, (k, q 1) = (k 1, q 1) = 1 χ(d k,m ) = 1 2 J(φ, χ) (χ = φk ) = 2 1 g(χ k 1 )g(χ)/g(χ k ). χ = ω a p need # a in Z 2 m 1 \ {0} for which 1 + w 2 ((k 1)a) + w 2 (a) w 2 (ka) = 0.

23 s, a (1),..., a (k) Z p m 1; t 1, t 2,..., t k Z \ {0}, s t 1 a (1) + t 2 a (2) + + t k a (k) mod p m 1. t + = i, t i >0 t i, t = i, t i <0 t i. Theorem (Molular p-ary add-with-carry algorithm) unique γ = (γ i ) i Zm, indices mod m, so γ 1 = γ m 1, for which γ satisfies k j=1 t j a (j) i + γ i 1 = s i + pγ i, 0 i m 1. (1) (p 1)w(γ) = k t j w(a (j) ) w(s); (2) j=0 if j : a (j) 0 mod p m 1. c i modular carries for computation t γ i t + 1 (3)

24 Exampe: Segre case k = 6 Count a in Z 2 m 1 \ {0} for which w(a) + w(5a) = w(6a) + 1. Method: add-with-carry algorithms. Example: b = 5a = 4a + a, a i + a i 2 + γ i 1 = b i + 2γ i, indices in Z m, with γ i = 0, 1 for all i. Similar, s = 6a = a + b, a i + b i + δ i 1 = s i + 2δ i, indices in Z m, with δ i = 0, 1 for all i. [2w(a) = w(b) + w(γ)], w(a) + w(b) = w(s) + w(δ), so we want w(a) + w(b) w(s) = w(δ) = 1.

25 Think of computation as (a i 2, a i 1, γ i 1, δ i 1 ) a i (a i 1, a i, γ i, δ i ). Labelled digraph: states (vertices) and arcs whenever (a, a, γ, δ ) (a, a, γ, δ) a + a + γ 2γ = b {0, 1}, a + b + δ 2δ = s {0, 1}, so initial state + a determines b, γ, s, δ, hence terminal state of arc. V δ : states (a, a, γ, δ) (δ = 0, 1) Count B m = # closed directed paths of length m starting in v V 1, through V 0 only, then returning to v. Counting: tranfer matrix method, B m = Tr(A 10 A m 2 00 A 01 )

26 Minimal polynomial A 00 = f (X ) = X 6 X 5 X 4 + X 3 X 2 + X = X (X 1)(X 4 X 2 1), so In fact A 5 A 4 A 3 + A 2 A + I = O. B m = B m 2 + B m 4. Typically recursive relations for these p-ranks. Glynn I&II similar but much more complicated, especially Glynn I.

27 p-ary weight problems and applications II: Few-weight codes q = p s, p prime, m, t positive integers, (t, m) = 1. C 1,t cyclic code over F q, length n = q m 1, defining zero s α, α t, α primitive in F q m. (Usually dimension k = 2m.) c = (c 0, c 1,..., c n 1 ) C 1,t iff where c(α) = c(α t ) = 0, c(x) = c 0 + c 1 x + + c m 1 x m 1 F q [x] mod x n 1.

28 A 0 = 1, A 1,..., A n weights of C 1,t, where A w = {c C 1,t wt(c) = w}. C 1,t is dual code, weights B 0 = 1, B 1,..., B n. Sometimes C1,t few-weight code.

29 Relation with sequences: m-sequence a = a 0, a 1,..., a n 1 : codeword from simplex code C1. decimation by a factor t: b = a 0, a t, a 2t,..., a nt Ct. Cross-correlation n 1 θ a,b (τ) = ( 1) a i +b i+τ = n dist(a, b). i=0 is weight in C1,t! Preferred pair of m-sequences: θ a,b takes only values 1, 1 ± 2 (m+2)/2 ; equivalently, non-zero weights in C1,t are 2 m 1, 2 m 1 ± 2 (m+2)/2 1.

30 Not possible if m 0 mod 4; four known cases with m 2 mod 4 (character theory proofs for the two difficult ones) Known cases: with m odd: t = 2 r + 1, if (r, m) = 1 (Gold, 1968) t = 2 2r 2 r + 1, if (r, m) = 1 (Welch, 1969; Kasami, 1971) t = 2 r + 3, 2r 1 mod m (conjectured by Welch, 1972) t = 2 2r + 2 r 1, 4r 1 mod m (conjectured by Niho, 1972) More three-weight cases (bigger gaps/cc values) in Gold-Kasami cases with m/(r, m) = 1.

31 Uniform method to prove few-weight results Step 1: Pless power moment identities MacWilliams transforms relating weights and dual weights n v w=0 ( n w (v = 0, 1,..., n) gives P i = v ) B w = q k v v w=0 ( ) n w A w v w n w i B w = expr(n, k, A 0,..., A i ) w=1

32 0 < w 1 w 2 w 3 w 4 < n, n E = (w w 1 )(w w 2 )(w w 3 )(w w 4 )B w = expr(n, k, A 3, A 4 ) w=1 (A 0 = 1, A 1 = A 2 = 0 ) C no weights in (w 1, w 2 ) (w 3, w 4 ) then E 0, equality iff C has only nonzero weights w 1, w 2, w 1, w 4. In our case: take w 2 = w 3 = 2 m 1, w 1, w 4 = 2 m 1 ± 2 m 1 M

33 Step 2: Compute low weights of C Compute A 3, A 4, or show min dist(c) 5. Often difficult! Breakthrough result by Hans Dobbertin: both Welch and Niho codes have minimum distance 5. If few-weight assumption correct, then now E = 0.

34 Step 3: Find restrictions on weights of C = C1,t : McEliece s lemma Theorem (McEliece) C binary cyclic code, B w weight enumerator, l smallest positive number for which l nonzero s of C (repetitions allowed, not all 1) have product 1. Then 2 l 1 B w (w > 0), w : 2 l B w. Some proof method involve Gauss-sums and Stickelberger s theorem!

35 Example: C = C 1,t. Now C = C 1,t has zero s α i for i one of 1, 2, 4,..., 2 m 1 ; t, 2t, 4t,..., 2 m 1 t. nonzero s of C = C 1,t are (Fourier inversion) αj for j one of 1, 2, 4,..., 2 m 1 ; t, 2t, 4t,..., 2 m 1 t. product is 1 iff b a b ta 0 mod 2 m 1, b ta mod 2 m 1; # is w(b) + w(a) = m w( b) + w(a) = m (w(ta) w(a) ( ) l = m M(m; t), M(m; t) = max w(ta) w(a). a Z 2 m 1 \{0}

36 Gold case: Proof: M(m; 2 r + 1) = M(m; 2 r + 1) = s = (2 r + 1)a = 2 r a + a, with γ i = 0, 1. { m/2, m/(r, m) even; (m (r, m))/2, m/(r, m) odd. ( ) max w((2 r + 1)a) w(a). a Z 2 m 1 \{0} a i + a i r + γ i 1 = s i + 2γ i, i Z m, 2w(a) = w(s) + w(γ). Put ω = a i γ i = w(s) w(a) = w(ω). ω i = 1 = a i = 1, γ i = 0 = a i r = 0 = ω i r 0.

37 Partition ω 0,..., ω m 1 into groups (ω i, ω i r,..., ω i+r ). # groups e = (r, m), each size L = m/(r, m). Weight per group L/2 Kasami case similar. Welch and especially Niho cases much more complicated! Niho digraph (after trick) has 1296 vertices.

38 p-ary weight problem III: Algebraic immunity Boolean functions on m variables: Algebraic immunity f : F 2 m F 2, f = x a = x a 0 0 x a 1 1 x a m 1 m 1, a Z 2 m 1 f a x a, deg(x a ) = w(a), a = a 0 + a a m 1 2 m 1. AI m (f ) = min{deg(g) g 0, f g = 0 or (f + 1) g = 0}. AI m (f ) m 2 (Courtois)

39 α primitive in F 2 m. = {α 0 = 1, α, α 2,..., α 2m 1 }, Define g : F 2 m F 2, supp(g) = ; f : F 2 m F 2 m F 2, f (x, y) = g(xy 2m 2 ). Ψ = supp(f ) = {(γy, y) γ, y F 2 m} f is bent (Dillon) Conjecture (Tu, Deng) AI 2m (f ) = m, maximal.

40 Conjecture (Tu, Deng) h(x, y) = a,b Z 2 m 1 h a,b x a y b zero on Ψ, then deg(h) m. If not, then h a,b = 0, w(a) + w(b) m. h a,b γ a = 0 (γ ) a,b Z a+b=s for all s Z 2 m 1 \ {0}. h (s) = (h 0,s, h 1,s 1,..., h s,0, h s+1,2 m 2,..., h 2 m 2,s+1) BCH( ), so 0, or weight 2 m Conjecture (Tu,Deng) # (a, b) with a, b Z 2 m 1 \ {0} and a + b s for which w(a) + w(b) m 1 is at most 2 m 1. Almost solved using modular 2-ary add-with-carry techniques

41 Conclusions weight (in)equalities mostly derived by deep and powerful algebraic methods (character theory, p-adic methods,... ) Leads to interesting mathematics. p-ary weight techniques are a valuable tool in algebraic combinatorics.

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity

A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture

More information

Cyclotomic schemes and related problems

Cyclotomic schemes and related problems momihara@educkumamoto-uacjp 16-06-2014 Definition Definition: Cayley graph G: a finite abelian group D: an inverse-closed subset of G (0 D and D = D) E := {(x, y) x, y G, x y D} (G, E) is called a Cayley

More information

The critical group of a graph

The critical group of a graph The critical group of a graph Peter Sin Texas State U., San Marcos, March th, 4. Critical groups of graphs Outline Laplacian matrix of a graph Chip-firing game Smith normal form Some families of graphs

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Congruent Number Problem and Elliptic curves

Congruent Number Problem and Elliptic curves Congruent Number Problem and Elliptic curves December 12, 2010 Contents 1 Congruent Number problem 2 1.1 1 is not a congruent number.................................. 2 2 Certain Elliptic Curves 4 3 Using

More information

Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves

Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves by Richard Moloney A dissertation presented to University College Dublin in partial fulfillment of the requirements

More information

Tight Sets and m-ovoids of Quadrics 1

Tight Sets and m-ovoids of Quadrics 1 Tight Sets and m-ovoids of Quadrics 1 Qing Xiang Department of Mathematical Sciences University of Delaware Newark, DE 19716 USA xiang@mathudeledu Joint work with Tao Feng and Koji Momihara 1 T Feng, K

More information

On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin

On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering On the Binary Sequences of Period

More information

50 Years of Crosscorrelation of m-sequences

50 Years of Crosscorrelation of m-sequences 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation

More information

arxiv: v3 [math.nt] 19 Nov 2018

arxiv: v3 [math.nt] 19 Nov 2018 arxiv:1805.10452v3 [math.nt] 19 Nov 2018 WEIL SUMS OF BINOMIALS: PROPERTIES, APPLICATIONS, AND OPEN PROBLEMS DANIEL J. KATZ Abstract. We present a survey on Weil sums in which an additive character of

More information

Gauss periods and related Combinatorics

Gauss periods and related Combinatorics momihara@educkumamoto-uacjp 23-01-2015 Fundamentals of characters of abelian groups A character ψ of G is a homomorphism from G to C Ĝ: the set of all characters of G e: the exponent of G Remark The image

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

On a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code

On a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code 680 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 [13] B. R. McDonald, Finite Rings with Identity. New York: Marcel Dekker, 1974. [14] F. J. MacWilliams and N. J. A. Sloane, The Theory

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) This is a sample cover image for this issue. The actual cover is not yet available at this time.) This article appeared in a journal published by Elsevier. The attached copy is furnished to the author

More information

Difference Sets Corresponding to a Class of Symmetric Designs

Difference Sets Corresponding to a Class of Symmetric Designs Designs, Codes and Cryptography, 10, 223 236 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Difference Sets Corresponding to a Class of Symmetric Designs SIU LUN MA

More information

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM

More information

Open Questions in Coding Theory

Open Questions in Coding Theory Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems

More information

Characters (definition)

Characters (definition) Characters (definition) Let p be a prime. A character on F p is a group homomorphism F p C. Example The map a 1 a F p denoted by ɛ. is called the trivial character, henceforth Example If g is a generator

More information

Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform

Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA

More information

1-Resilient Boolean Function with Optimal Algebraic Immunity

1-Resilient Boolean Function with Optimal Algebraic Immunity 1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn

More information

New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups

New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups John Polhill Department of Mathematics, Computer Science, and Statistics Bloomsburg University Bloomsburg,

More information

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena,

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena, On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing iang Dept. of Mathematics, California Institute of Technology, Pasadena, CA 91125 June 24, 1998 Abstract We show that a family

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

Dickson Polynomials that are Involutions

Dickson Polynomials that are Involutions Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.

More information

Topic 3. Design of Sequences with Low Correlation

Topic 3. Design of Sequences with Low Correlation Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4

More information

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences A joint work with Chunlei Li, Xiangyong Zeng, and Tor Helleseth Selmer Center, University of Bergen

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

Proof of a Conjecture of De Caen and Van Dam

Proof of a Conjecture of De Caen and Van Dam Europ. J. Combinatorics (2002) 23, 201 206 doi:10.1006/eujc.2001.0523 Available online at http://www.idealibrary.com on Proof of a Conjecture of De Caen and Van Dam GARY L. EBERT, SEBASTIAN EGNER, HENK

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Open problems on cyclic codes

Open problems on cyclic codes Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6

More information

Cyclic codes: overview

Cyclic codes: overview Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)

More information

Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs

Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering Binary Sequence Pairs with

More information

THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1

THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 J. Appl. Math. & Informatics Vol. 31(2013), No. 1-2, pp. 179-188 Website: http://www.kcam.biz THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 JI-MI YIM, SUNG-JIN CHO, HAN-DOO KIM, UN-SOOK CHOI

More information

Group-theoretic approach to Fast Matrix Multiplication

Group-theoretic approach to Fast Matrix Multiplication Jenya Kirshtein 1 Group-theoretic approach to Fast Matrix Multiplication Jenya Kirshtein Department of Mathematics University of Denver Jenya Kirshtein 2 References 1. H. Cohn, C. Umans. Group-theoretic

More information

Self-Complementary Arc-Transitive Graphs and Their Imposters

Self-Complementary Arc-Transitive Graphs and Their Imposters Self-Complementary Arc-Transitive Graphs and Their Imposters by Natalie Mullin A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics

More information

ON THE SEMIPRIMITIVITY OF CYCLIC CODES

ON THE SEMIPRIMITIVITY OF CYCLIC CODES ON THE SEMIPRIMITIVITY OF CYCLIC CODES YVES AUBRY AND PHILIPPE LANGEVIN Abstract. We prove, without assuming the Generalized Riemann Hypothesis, but with at most one exception, that an irreducible cyclic

More information

On The Nonlinearity of Maximum-length NFSR Feedbacks

On The Nonlinearity of Maximum-length NFSR Feedbacks On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

with Good Cross Correlation for Communications and Cryptography

with Good Cross Correlation for Communications and Cryptography m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences

More information

Fourier Analysis. 1 Fourier basics. 1.1 Examples. 1.2 Characters form an orthonormal basis

Fourier Analysis. 1 Fourier basics. 1.1 Examples. 1.2 Characters form an orthonormal basis Fourier Analysis Topics in Finite Fields (Fall 203) Rutgers University Swastik Kopparty Last modified: Friday 8 th October, 203 Fourier basics Let G be a finite abelian group. A character of G is simply

More information

Smith Normal Forms of Strongly Regular graphs

Smith Normal Forms of Strongly Regular graphs Smith Normal Forms of Strongly Regular graphs Peter Sin, U. of Florida UD Discrete Math. Seminar, May 7th, 2018. Smith normal forms Smith normal form Smith normal forms associated with graphs Smith and

More information

Rings in Coding Theory

Rings in Coding Theory Rings in Coding Theory Steven T. Dougherty July 3, 2013 Cyclic Codes Cyclic Codes were first studied by Prange in 1957. Prange, E. Cyclic error-correcting codes in two symbols. Technical Note TN-57-103,

More information

Sequences and Linear Codes from Highly Nonlinear Functions

Sequences and Linear Codes from Highly Nonlinear Functions Sequences and Linear Codes from Highly Nonlinear Functions Chunlei Li Dissertation for the degree of philosophiae doctor(phd) at the University of Bergen 2014 Dissertation date: June 16th A C K N O W

More information

A PROOF OF BURNSIDE S p a q b THEOREM

A PROOF OF BURNSIDE S p a q b THEOREM A PROOF OF BURNSIDE S p a q b THEOREM OBOB Abstract. We prove that if p and q are prime, then any group of order p a q b is solvable. Throughout this note, denote by A the set of algebraic numbers. We

More information

Nonlinear Shi, Registers: A Survey and Open Problems. Tor Helleseth University of Bergen NORWAY

Nonlinear Shi, Registers: A Survey and Open Problems. Tor Helleseth University of Bergen NORWAY Nonlinear Shi, Registers: A Survey and Open Problems Tor Helleseth University of Bergen NORWAY Outline ntroduc9on Nonlinear Shi> Registers (NLFSRs) Some basic theory De Bruijn Graph De Bruijn graph Golomb

More information

Galois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a.

Galois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a. Galois fields 1 Fields A field is an algebraic structure in which the operations of addition, subtraction, multiplication, and division (except by zero) can be performed, and satisfy the usual rules. More

More information

Nonlinear Functions A topic in Designs, Codes and Cryptography

Nonlinear Functions A topic in Designs, Codes and Cryptography Nonlinear Functions A topic in Designs, Codes and Cryptography Alexander Pott Otto-von-Guericke-Universität Magdeburg September 21, 2007 Alexander Pott (Magdeburg) Nonlinear Functions September 21, 2007

More information

Combinatorics of p-ary Bent Functions

Combinatorics of p-ary Bent Functions Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions

More information

Information Theory. Lecture 7

Information Theory. Lecture 7 Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible

More information

Self-Dual Cyclic Codes

Self-Dual Cyclic Codes Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace

More information

STRONGLY REGULAR GRAPHS, ASSOCIATION SCHEMES AND GAUSS SUMS. Fan Wu

STRONGLY REGULAR GRAPHS, ASSOCIATION SCHEMES AND GAUSS SUMS. Fan Wu STRONGLY REGULAR GRAPHS, ASSOCIATION SCHEMES AND GAUSS SUMS by Fan Wu A dissertation submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of

More information

Pseudorandom Sequences II: Exponential Sums and Uniform Distribution

Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University

More information

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity

Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced

More information

Galois groups with restricted ramification

Galois groups with restricted ramification Galois groups with restricted ramification Romyar Sharifi Harvard University 1 Unique factorization: Let K be a number field, a finite extension of the rational numbers Q. The ring of integers O K of K

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

CYCLIC SIEVING FOR CYCLIC CODES

CYCLIC SIEVING FOR CYCLIC CODES CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show

More information

FIELD THEORY. Contents

FIELD THEORY. Contents FIELD THEORY MATH 552 Contents 1. Algebraic Extensions 1 1.1. Finite and Algebraic Extensions 1 1.2. Algebraic Closure 5 1.3. Splitting Fields 7 1.4. Separable Extensions 8 1.5. Inseparable Extensions

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Mathematics for Cryptography

Mathematics for Cryptography Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1

More information

Spectra of Semidirect Products of Cyclic Groups

Spectra of Semidirect Products of Cyclic Groups Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

Algebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.

More information

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev

MINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator

More information

CHARACTERS OF FINITE GROUPS.

CHARACTERS OF FINITE GROUPS. CHARACTERS OF FINITE GROUPS. ANDREI YAFAEV As usual we consider a finite group G and the ground field F = C. Let U be a C[G]-module and let g G. Then g is represented by a matrix [g] in a certain basis.

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

Cameron-Liebler line classes and partial difference sets

Cameron-Liebler line classes and partial difference sets University of Richmond UR Scholarship Repository Honors Theses Student Research 016 Cameron-Liebler line classes and partial difference sets Uthaipon Tantipongipat Follow this and additional works at:

More information

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory.

GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. Linear Algebra Standard matrix manipulation to compute the kernel, intersection of subspaces, column spaces,

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

1 The Algebraic Normal Form

1 The Algebraic Normal Form 1 The Algebraic Normal Form Boolean maps can be expressed by polynomials this is the algebraic normal form (ANF). The degree as a polynomial is a first obvious measure of nonlinearity linear (or affine)

More information

Three-Bit Monomial Hyperovals

Three-Bit Monomial Hyperovals Timothy Vis Timothy.Vis@ucdenver.edu University of Colorado Denver Rocky Mountain Discrete Math Days 2008 Definition of a Hyperoval Definition In a projective plane of order n, a set of n + 1-points, no

More information

The Radicans. James B. Wilson. April 13, 2002

The Radicans. James B. Wilson. April 13, 2002 The Radicans James B. Wilson April 13, 2002 1 Radices of Integers Computational mathematics has brought awareness to the use of various bases in representing integers. The standard for most number systems

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille

Math 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is

More information

Interesting Examples on Maximal Irreducible Goppa Codes

Interesting Examples on Maximal Irreducible Goppa Codes Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical

More information

Arc-chromatic number of digraphs in which every vertex has bounded outdegree or bounded indegree

Arc-chromatic number of digraphs in which every vertex has bounded outdegree or bounded indegree Arc-chromatic number of digraphs in which every vertex has bounded outdegree or bounded indegree S. Bessy and F. Havet, Projet Mascotte, CNRS/INRIA/UNSA, INRIA Sophia-Antipolis, 2004 route des Lucioles

More information

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane

: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane 2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and

More information

Modularity of Galois representations. imaginary quadratic fields

Modularity of Galois representations. imaginary quadratic fields over imaginary quadratic fields Krzysztof Klosin (joint with T. Berger) City University of New York December 3, 2011 Notation F =im. quadr. field, p # Cl F d K, fix p p Notation F =im. quadr. field, p

More information

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori

A conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori arxiv:608.05008v2 [math.nt] 9 Aug 206 Abstract In this note, the polar decomposition of binary fields of even

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

Difference sets and Hadamard matrices

Difference sets and Hadamard matrices Difference sets and Hadamard matrices Padraig Ó Catháin National University of Ireland, Galway 14 March 2012 Outline 1 (Finite) Projective planes 2 Symmetric Designs 3 Difference sets 4 Doubly transitive

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information

Graduate Preliminary Examination

Graduate Preliminary Examination Graduate Preliminary Examination Algebra II 18.2.2005: 3 hours Problem 1. Prove or give a counter-example to the following statement: If M/L and L/K are algebraic extensions of fields, then M/K is algebraic.

More information

On Welch-Gong Transformation Sequence Generators

On Welch-Gong Transformation Sequence Generators On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario

More information

The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes

The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes 1 The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes Cunsheng Ding, Cuiling Fan, Zhengchun Zhou Abstract arxiv:1603.07007v1 [cs.it] Mar 016 Reed-Solomon codes, a type of BCH codes,

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Nick Gill. 13th July Joint with Hunt (USW) and Spiga (Milano Bicocca).

Nick Gill. 13th July Joint with Hunt (USW) and Spiga (Milano Bicocca). 13th July 2016 Joint with Hunt and Spiga (Milano Bicocca). Overview Beautiful sets From here on, G is a group acting on a set Ω, and Λ is a subset of Ω. Write G Λ for the set-wise stabilizer of Λ. Write

More information

Four classes of permutation polynomials of F 2 m

Four classes of permutation polynomials of F 2 m Finite Fields and Their Applications 1 2007) 869 876 http://www.elsevier.com/locate/ffa Four classes of permutation polynomials of F 2 m Jin Yuan,1, Cunsheng Ding 1 Department of Computer Science, The

More information

Evgeniy V. Martyushev RESEARCH STATEMENT

Evgeniy V. Martyushev RESEARCH STATEMENT Evgeniy V. Martyushev RESEARCH STATEMENT My research interests lie in the fields of topology of manifolds, algebraic topology, representation theory, and geometry. Specifically, my work explores various

More information

On the generation of the coefficient field of a newform by a single Hecke eigenvalue

On the generation of the coefficient field of a newform by a single Hecke eigenvalue On the generation of the coefficient field of a newform by a single Hecke eigenvalue Koopa Tak-Lun Koo and William Stein and Gabor Wiese November 2, 27 Abstract Let f be a non-cm newform of weight k 2

More information

Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity

Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Guang Gong Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada Email:

More information

An Approach to Hensel s Lemma

An Approach to Hensel s Lemma Irish Math. Soc. Bulletin 47 (2001), 15 21 15 An Approach to Hensel s Lemma gary mcguire Abstract. Hensel s Lemma is an important tool in many ways. One application is in factoring polynomials over Z.

More information

ARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions

ARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions ARCS IN FINITE PROJECTIVE SPACES SIMEON BALL Abstract. These notes are an outline of a course on arcs given at the Finite Geometry Summer School, University of Sussex, June 26-30, 2017. Let K denote an

More information