p-ary Weight problems in designs, coding, and cryptography (preceded by a brief research overview)
|
|
- Beatrice Warren
- 6 years ago
- Views:
Transcription
1 p-ary Weight problems in designs, coding, and cryptography (preceded by a brief research overview) Henk Hollmann Singapore, Nanyang Technological University, 29 Sept (mostly joint work with Qing Xiang and others)
2 Contents 1. Introduction of the speaker 2. Brief research overview 3. p-ary weight problems I: Difference sets and their p-ranks Difference sets in abelian groups Gauss and Jacoby sums Stickelberger s theorem Modular p-ary add-with-carry Examples 4. p-ary weight problems II: Few-weight codes Cyclic codes, m-sequences Pless power moments Counting low-weight codewords McEliece s Theorem Examples 5. p-ary weight problems III: Algebraic immunity
3 Introduction Background: Masters (Association schemes) & Ph.D. (Modulation codes) both from Eindhoven Technical University, the Netherlands, supervisor Jack van Lint (and Paul Siegel) : CNET (Centre National d Études des Télécommunications), Issy-les-Moulineaux (Paris), France Main research: FFT (Fast Fourier Transforms) and NTT (Number Theoretic Transforms) Hardware design, patent convolver prototype Factorisation of x N q over Q. Co-inventor (with Pierre Duhamel) of split-radix FFT.
4 : Philips Research Laboratories, Eindhoven, the Netherlands ( : Principal Scientist) Responsible for Discrete Mathematics within Philips Research Consultancy and research in Discrete Mathematics, Coding Theory, Cryptography, Information Theory, and Digital Signal Processing : Eindhoven University of Technology, the Netherlands Own math consultancy firm
5 More applied research topics: published on Fourier Transforms (FFT, NTT) Finite fields (arithmetic) Signal processing algorithms (filtering, write-equalization) Testing of IC s (Integrated Circuits) Switching networks (self-routing optical switching) LFSR s (Linear Feedback Shift Registers), m-sequences Block-designs and various design-like stuff Optimization, and algorithms [Pascal, Fortran, C, C++,...] Constrained (modulation) codes (Magnetic recording, CD) Error-correcting codes, decoding (RS, iterative erasure) Video-on-demand Cryptography (timing attacks, visual crypto, whitebox crypto) 9 US patents (algorithms, arithmetic, constrained codes, crypto)
6 More pure research topics: published on Association schemes (schemes related to conic in PG(2, q), q even, and PSL(2, q), fusion schemes, finite geometry, Metz/Wilbrink SR graphs, pseudocyclic association schemes) Permutation polynomials Kloosterman sum identities Cryptography - IPP (Codes with Identifiable Parent Property) p-rank problems in difference sets, bent functions, sequences Coding theory - many topics (with Qing Xiang: proof of Welch and Niho conjectures)
7 Research interests: very broad, with emphasis on Algebraic combinatorics Finite fields and their applications Linear algebra and its applications I like to collaborate: about 80% of my publications with co-authors Co-authors include: Aart Blokhuis, Gary Ebert (Geometry) Janós Körner, Simon Lytsyn, Jack van Lint [7x] (Combinatorics) Tor Helleseth, Qing Xiang [13x] (Algebraic combinatorics) Ludo Tolhuizen [14x] (Coding theory/cryptography/combinatorics) Pierre Duhamel [7x] (FFT/NTT) Kees Schouhamer Immink [5x] (constrained coding)
8 p-ary weight problems and applications I: Difference sets and their p-ranks (G, ) abelian group, G = v. D G is a (v, k, λ)-difference set in G if D = k and a 1 G # (d 1, d 2 ) in D 2 for which d 1 d 1 2 = a equals λ. ( d D )( d d D ) d 1 = (k λ)1 G + λ g. g G Consequence: k(k 1) = λ(v 1). G cyclic, then D cyclic difference set.
9 (Complex) character χ : (G, ) (C, ), homomorphism χ 0 : g 1 (g G): trivial character. Theorem (Character characterization) Let G = v, and let k, λ satisfy λ(v 1) = k(k 1). Then a k-subset D G is (v, k, λ)-difference set iff χ(d)χ(d) = k λ for every nontrivial ( 1) complex multiplicative character χ. Here χ(d) = d D χ(d). Proof by Fourier inversion.
10 Proof? Example Classical parameters: Singer difference sets. H := {x F qm Tr(x) = 0}, Tr(x) = Tr Fq m /F q (x) = x + x q + + x qm 1. Tr(ax) = atr(x) (a F q), so H F q m/f q. Theorem H is a ((q m 1)/(q 1), (q m 1 1)/(q 1), (q m 2 1)/(q 1)) (cyclic) difference set in F q m/f q.
11 Gauss and Jacoby sums q = p s, p prime, F q = GF(q), finite field with q elements, F = F \ {0} Tr(x) = Tr Fq/Fp = x p + x p2 + + x ps 1, trace function. ξ n complex n-th root of unity ψ : F q C, ψ(x) = ξ Tr(x) p is (nontrivial) additive character of F q χ : F q C multiplicative character of F q; define χ(0) = 0. χ q 1 = 1, the trivial character.
12 Gauss sum g(χ) = a F q χ(a)ψ(a). Elementary property: g(1) = 1, g(χ)g(χ) = q, χ 1. Note that g(χ) lives in Z[ξ q 1, ξ p ]. Jacoby sum J(χ 1, χ 2 ) = a F q χ 1 (a)χ 2 (1 a). χ 1, χ 2, χ 1 χ 2 1, then J(χ 1, χ 2 ) = g(χ 1 )g(χ 2 )/g(χ 1 χ 2 ), and so J(χ 1, χ 2 )J(χ 1, χ 2 ) = q, χ 1.
13 Character characterization theorem can be used to prove that D is difference set by expressing χ(d) in terms of Gauss and Jacoby sums! Example (Singer) χ non-trivial, then g(χ) = q χ(h ), hence χ(h )χ(h ) = q m 2 = k λ.
14 Maschietti difference sets: q = 2 m, k integer, (k, q 1) = 1. Theorem If τ : x x + x k two-to-one on F q then D k,m = Imτ \ {0} is a (2 m 1, 2 m 1 1, 2 m 2 1)-difference set in F q Proof: (k 1, q 1) = 1, so χ non-trivial, then φ : χ = φ k 1 ; now χ(d k,m ) = 1 2 J(φ, χ) (χ = φk ).
15 Possible parameters: (regular) k = 2 (translation) k = 2 r, (m, r) = 1, 1 < r < m/2 (Segre) k = 6 (Glynn type I) k = 2 2r + 2 r, m 7 odd, 4r 1 mod m (Glynn type II) k = 3 2 r + 4, m 11 odd, 2r 1 mod m Nonisomorphic? Compute p-ranks!
16 p-rank of D is F p -rank of incidence matrix A g,h = δ gh 1 D of associated (symmetric) design. Only interesting if p k λ [or p k] (det=0) Distinct p-ranks then distinct designs! p-rank = complexity of associated 0, 1-sequence char D. Theorem If char(f) v, F contains all v th roots of 1 (v = exp(g)), then p-rank of D equals # F-characters χ : G F with χ(d) 0 Proof: Fourier inversion. X χ,g = χ(g), then X 1 g,χ = v 1 χ( g), and if A g,h = δ gh 1 D, then XAX 1 = v diag(χ(d)) χ.
17 Stickelberger s theorem q = p s, α primitive in F q, f (x) minimal polynomial of α over F p p = (f (ξ q 1 ), p) prime ideal in Z[ξ q 1 ] lying over p: Z[ξ q 1 ]/p = F p [x] mod f (x) = F q, isomorphism: ω p : α ξ q 1 ω p : F q C Teichmüller character. If χ : F q Z[ξ v ] C complex multiplicative character, then χ mod p multiplicative F q -character F q F q (p = char(f q ) F q ).
18 Consequence: p-rank of D is # complex characters χ for which χ(d) mod p 0. Let P = (f (ξ q 1 ), ξ p 1, p) be the prime ideal in Z[ξ q 1, ξ p ] above p. (x 1) p 1 x p 1 + x p x + 1 mod p, so (ξ p 1) p 1 = 0 mod p and P p 1 = p, v P (p) = p 1 (v P is P-adic valuation).
19 q = p s, p prime. If a a 0 + a 1 p + + a p 1 p s 1 0 mod q 1, 0 a i p 1, then the p-ary weight of a. Theorem (Stickelberger) w(a) = w p (a) = a 0 + a 1 + a s 1, v P (g(ωp a )) = w p (a). So P wp(a) g(ωp a ) and p (p 1)wp(a) g(ωp a )
20 Example: Singer difference sets, q = p s. χ character on F q m/f q; χ = ω a(q 1) p, χ 1 iff (q 1)a 0 mod q m 1. Now g(ωp a(q 1 ) = q ωp a(q 1) (H ), v P (g(ω a(q 1) p )) = w p (a(q 1)), v P (q) = (p 1)s, and χ 0 = 1 gives χ 0 (H) = H 0 mod p. Conclusion: p-rank = 1+ # a, 0 < a < (q m 1)/(q 1), with w p ((q 1)a) = (p 1)s.
21 Answer: Hadama s formulae (q = p s ) ( ) p + m 1 s 1 +. m 2 Similar, but more complicated, for GMW difference sets (work with Arasu, Player, Xiang)
22 Example: Maschietti difference sets D k,m in F 2 m, (k, q 1) = (k 1, q 1) = 1 χ(d k,m ) = 1 2 J(φ, χ) (χ = φk ) = 2 1 g(χ k 1 )g(χ)/g(χ k ). χ = ω a p need # a in Z 2 m 1 \ {0} for which 1 + w 2 ((k 1)a) + w 2 (a) w 2 (ka) = 0.
23 s, a (1),..., a (k) Z p m 1; t 1, t 2,..., t k Z \ {0}, s t 1 a (1) + t 2 a (2) + + t k a (k) mod p m 1. t + = i, t i >0 t i, t = i, t i <0 t i. Theorem (Molular p-ary add-with-carry algorithm) unique γ = (γ i ) i Zm, indices mod m, so γ 1 = γ m 1, for which γ satisfies k j=1 t j a (j) i + γ i 1 = s i + pγ i, 0 i m 1. (1) (p 1)w(γ) = k t j w(a (j) ) w(s); (2) j=0 if j : a (j) 0 mod p m 1. c i modular carries for computation t γ i t + 1 (3)
24 Exampe: Segre case k = 6 Count a in Z 2 m 1 \ {0} for which w(a) + w(5a) = w(6a) + 1. Method: add-with-carry algorithms. Example: b = 5a = 4a + a, a i + a i 2 + γ i 1 = b i + 2γ i, indices in Z m, with γ i = 0, 1 for all i. Similar, s = 6a = a + b, a i + b i + δ i 1 = s i + 2δ i, indices in Z m, with δ i = 0, 1 for all i. [2w(a) = w(b) + w(γ)], w(a) + w(b) = w(s) + w(δ), so we want w(a) + w(b) w(s) = w(δ) = 1.
25 Think of computation as (a i 2, a i 1, γ i 1, δ i 1 ) a i (a i 1, a i, γ i, δ i ). Labelled digraph: states (vertices) and arcs whenever (a, a, γ, δ ) (a, a, γ, δ) a + a + γ 2γ = b {0, 1}, a + b + δ 2δ = s {0, 1}, so initial state + a determines b, γ, s, δ, hence terminal state of arc. V δ : states (a, a, γ, δ) (δ = 0, 1) Count B m = # closed directed paths of length m starting in v V 1, through V 0 only, then returning to v. Counting: tranfer matrix method, B m = Tr(A 10 A m 2 00 A 01 )
26 Minimal polynomial A 00 = f (X ) = X 6 X 5 X 4 + X 3 X 2 + X = X (X 1)(X 4 X 2 1), so In fact A 5 A 4 A 3 + A 2 A + I = O. B m = B m 2 + B m 4. Typically recursive relations for these p-ranks. Glynn I&II similar but much more complicated, especially Glynn I.
27 p-ary weight problems and applications II: Few-weight codes q = p s, p prime, m, t positive integers, (t, m) = 1. C 1,t cyclic code over F q, length n = q m 1, defining zero s α, α t, α primitive in F q m. (Usually dimension k = 2m.) c = (c 0, c 1,..., c n 1 ) C 1,t iff where c(α) = c(α t ) = 0, c(x) = c 0 + c 1 x + + c m 1 x m 1 F q [x] mod x n 1.
28 A 0 = 1, A 1,..., A n weights of C 1,t, where A w = {c C 1,t wt(c) = w}. C 1,t is dual code, weights B 0 = 1, B 1,..., B n. Sometimes C1,t few-weight code.
29 Relation with sequences: m-sequence a = a 0, a 1,..., a n 1 : codeword from simplex code C1. decimation by a factor t: b = a 0, a t, a 2t,..., a nt Ct. Cross-correlation n 1 θ a,b (τ) = ( 1) a i +b i+τ = n dist(a, b). i=0 is weight in C1,t! Preferred pair of m-sequences: θ a,b takes only values 1, 1 ± 2 (m+2)/2 ; equivalently, non-zero weights in C1,t are 2 m 1, 2 m 1 ± 2 (m+2)/2 1.
30 Not possible if m 0 mod 4; four known cases with m 2 mod 4 (character theory proofs for the two difficult ones) Known cases: with m odd: t = 2 r + 1, if (r, m) = 1 (Gold, 1968) t = 2 2r 2 r + 1, if (r, m) = 1 (Welch, 1969; Kasami, 1971) t = 2 r + 3, 2r 1 mod m (conjectured by Welch, 1972) t = 2 2r + 2 r 1, 4r 1 mod m (conjectured by Niho, 1972) More three-weight cases (bigger gaps/cc values) in Gold-Kasami cases with m/(r, m) = 1.
31 Uniform method to prove few-weight results Step 1: Pless power moment identities MacWilliams transforms relating weights and dual weights n v w=0 ( n w (v = 0, 1,..., n) gives P i = v ) B w = q k v v w=0 ( ) n w A w v w n w i B w = expr(n, k, A 0,..., A i ) w=1
32 0 < w 1 w 2 w 3 w 4 < n, n E = (w w 1 )(w w 2 )(w w 3 )(w w 4 )B w = expr(n, k, A 3, A 4 ) w=1 (A 0 = 1, A 1 = A 2 = 0 ) C no weights in (w 1, w 2 ) (w 3, w 4 ) then E 0, equality iff C has only nonzero weights w 1, w 2, w 1, w 4. In our case: take w 2 = w 3 = 2 m 1, w 1, w 4 = 2 m 1 ± 2 m 1 M
33 Step 2: Compute low weights of C Compute A 3, A 4, or show min dist(c) 5. Often difficult! Breakthrough result by Hans Dobbertin: both Welch and Niho codes have minimum distance 5. If few-weight assumption correct, then now E = 0.
34 Step 3: Find restrictions on weights of C = C1,t : McEliece s lemma Theorem (McEliece) C binary cyclic code, B w weight enumerator, l smallest positive number for which l nonzero s of C (repetitions allowed, not all 1) have product 1. Then 2 l 1 B w (w > 0), w : 2 l B w. Some proof method involve Gauss-sums and Stickelberger s theorem!
35 Example: C = C 1,t. Now C = C 1,t has zero s α i for i one of 1, 2, 4,..., 2 m 1 ; t, 2t, 4t,..., 2 m 1 t. nonzero s of C = C 1,t are (Fourier inversion) αj for j one of 1, 2, 4,..., 2 m 1 ; t, 2t, 4t,..., 2 m 1 t. product is 1 iff b a b ta 0 mod 2 m 1, b ta mod 2 m 1; # is w(b) + w(a) = m w( b) + w(a) = m (w(ta) w(a) ( ) l = m M(m; t), M(m; t) = max w(ta) w(a). a Z 2 m 1 \{0}
36 Gold case: Proof: M(m; 2 r + 1) = M(m; 2 r + 1) = s = (2 r + 1)a = 2 r a + a, with γ i = 0, 1. { m/2, m/(r, m) even; (m (r, m))/2, m/(r, m) odd. ( ) max w((2 r + 1)a) w(a). a Z 2 m 1 \{0} a i + a i r + γ i 1 = s i + 2γ i, i Z m, 2w(a) = w(s) + w(γ). Put ω = a i γ i = w(s) w(a) = w(ω). ω i = 1 = a i = 1, γ i = 0 = a i r = 0 = ω i r 0.
37 Partition ω 0,..., ω m 1 into groups (ω i, ω i r,..., ω i+r ). # groups e = (r, m), each size L = m/(r, m). Weight per group L/2 Kasami case similar. Welch and especially Niho cases much more complicated! Niho digraph (after trick) has 1296 vertices.
38 p-ary weight problem III: Algebraic immunity Boolean functions on m variables: Algebraic immunity f : F 2 m F 2, f = x a = x a 0 0 x a 1 1 x a m 1 m 1, a Z 2 m 1 f a x a, deg(x a ) = w(a), a = a 0 + a a m 1 2 m 1. AI m (f ) = min{deg(g) g 0, f g = 0 or (f + 1) g = 0}. AI m (f ) m 2 (Courtois)
39 α primitive in F 2 m. = {α 0 = 1, α, α 2,..., α 2m 1 }, Define g : F 2 m F 2, supp(g) = ; f : F 2 m F 2 m F 2, f (x, y) = g(xy 2m 2 ). Ψ = supp(f ) = {(γy, y) γ, y F 2 m} f is bent (Dillon) Conjecture (Tu, Deng) AI 2m (f ) = m, maximal.
40 Conjecture (Tu, Deng) h(x, y) = a,b Z 2 m 1 h a,b x a y b zero on Ψ, then deg(h) m. If not, then h a,b = 0, w(a) + w(b) m. h a,b γ a = 0 (γ ) a,b Z a+b=s for all s Z 2 m 1 \ {0}. h (s) = (h 0,s, h 1,s 1,..., h s,0, h s+1,2 m 2,..., h 2 m 2,s+1) BCH( ), so 0, or weight 2 m Conjecture (Tu,Deng) # (a, b) with a, b Z 2 m 1 \ {0} and a + b s for which w(a) + w(b) m 1 is at most 2 m 1. Almost solved using modular 2-ary add-with-carry techniques
41 Conclusions weight (in)equalities mostly derived by deep and powerful algebraic methods (character theory, p-adic methods,... ) Leads to interesting mathematics. p-ary weight techniques are a valuable tool in algebraic combinatorics.
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture
More informationCyclotomic schemes and related problems
momihara@educkumamoto-uacjp 16-06-2014 Definition Definition: Cayley graph G: a finite abelian group D: an inverse-closed subset of G (0 D and D = D) E := {(x, y) x, y G, x y D} (G, E) is called a Cayley
More informationThe critical group of a graph
The critical group of a graph Peter Sin Texas State U., San Marcos, March th, 4. Critical groups of graphs Outline Laplacian matrix of a graph Chip-firing game Smith normal form Some families of graphs
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationCongruent Number Problem and Elliptic curves
Congruent Number Problem and Elliptic curves December 12, 2010 Contents 1 Congruent Number problem 2 1.1 1 is not a congruent number.................................. 2 2 Certain Elliptic Curves 4 3 Using
More informationDivisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves
Divisibility Properties of Kloosterman Sums and Division Polynomials for Edwards Curves by Richard Moloney A dissertation presented to University College Dublin in partial fulfillment of the requirements
More informationTight Sets and m-ovoids of Quadrics 1
Tight Sets and m-ovoids of Quadrics 1 Qing Xiang Department of Mathematical Sciences University of Delaware Newark, DE 19716 USA xiang@mathudeledu Joint work with Tao Feng and Koji Momihara 1 T Feng, K
More informationOn the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin
On the Binary Sequences of Period 2047 with Ideal Autocorrelation Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering On the Binary Sequences of Period
More information50 Years of Crosscorrelation of m-sequences
50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation
More informationarxiv: v3 [math.nt] 19 Nov 2018
arxiv:1805.10452v3 [math.nt] 19 Nov 2018 WEIL SUMS OF BINOMIALS: PROPERTIES, APPLICATIONS, AND OPEN PROBLEMS DANIEL J. KATZ Abstract. We present a survey on Weil sums in which an additive character of
More informationGauss periods and related Combinatorics
momihara@educkumamoto-uacjp 23-01-2015 Fundamentals of characters of abelian groups A character ψ of G is a homomorphism from G to C Ĝ: the set of all characters of G e: the exponent of G Remark The image
More informationSequences, DFT and Resistance against Fast Algebraic Attacks
Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationNew Families of Triple Error Correcting Codes with BCH Parameters
New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract
More informationOn a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code
680 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 [13] B. R. McDonald, Finite Rings with Identity. New York: Marcel Dekker, 1974. [14] F. J. MacWilliams and N. J. A. Sloane, The Theory
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationSinger and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few
New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More information(This is a sample cover image for this issue. The actual cover is not yet available at this time.)
This is a sample cover image for this issue. The actual cover is not yet available at this time.) This article appeared in a journal published by Elsevier. The attached copy is furnished to the author
More informationDifference Sets Corresponding to a Class of Symmetric Designs
Designs, Codes and Cryptography, 10, 223 236 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Difference Sets Corresponding to a Class of Symmetric Designs SIU LUN MA
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationOpen Questions in Coding Theory
Open Questions in Coding Theory Steven T. Dougherty July 4, 2013 Open Questions The following questions were posed by: S.T. Dougherty J.L. Kim P. Solé J. Wood Hilbert Style Problems Hilbert Style Problems
More informationCharacters (definition)
Characters (definition) Let p be a prime. A character on F p is a group homomorphism F p C. Example The map a 1 a F p denoted by ɛ. is called the trivial character, henceforth Example If g is a generator
More informationInteger Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform
Integer Valued Sequences with 2-Level Autocorrelation from Iterative Decimation Hadamard Transform Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA
More information1-Resilient Boolean Function with Optimal Algebraic Immunity
1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn
More informationNew Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups
New Negative Latin Square Type Partial Difference Sets in Nonelementary Abelian 2-groups and 3-groups John Polhill Department of Mathematics, Computer Science, and Statistics Bloomsburg University Bloomsburg,
More informationOn GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena,
On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing iang Dept. of Mathematics, California Institute of Technology, Pasadena, CA 91125 June 24, 1998 Abstract We show that a family
More informationHyperbent functions, Kloosterman sums and Dickson polynomials
Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department
More informationDickson Polynomials that are Involutions
Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.
More informationTopic 3. Design of Sequences with Low Correlation
Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4
More informationSome results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences
Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences A joint work with Chunlei Li, Xiangyong Zeng, and Tor Helleseth Selmer Center, University of Bergen
More informationOn the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,
More informationProof of a Conjecture of De Caen and Van Dam
Europ. J. Combinatorics (2002) 23, 201 206 doi:10.1006/eujc.2001.0523 Available online at http://www.idealibrary.com on Proof of a Conjecture of De Caen and Van Dam GARY L. EBERT, SEBASTIAN EGNER, HENK
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationDIFFERENTIAL cryptanalysis is the first statistical attack
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of
More informationOpen problems on cyclic codes
Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6
More informationCyclic codes: overview
Cyclic codes: overview EE 387, Notes 14, Handout #22 A linear block code is cyclic if the cyclic shift of a codeword is a codeword. Cyclic codes have many advantages. Elegant algebraic descriptions: c(x)
More informationBinary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs
Binary Sequence Pairs with Ideal Correlation and Cyclic Difference Pairs Seok-Yong Jin The Graduate School Yonsei University Department of Electrical and Electronic Engineering Binary Sequence Pairs with
More informationTHE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1
J. Appl. Math. & Informatics Vol. 31(2013), No. 1-2, pp. 179-188 Website: http://www.kcam.biz THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 JI-MI YIM, SUNG-JIN CHO, HAN-DOO KIM, UN-SOOK CHOI
More informationGroup-theoretic approach to Fast Matrix Multiplication
Jenya Kirshtein 1 Group-theoretic approach to Fast Matrix Multiplication Jenya Kirshtein Department of Mathematics University of Denver Jenya Kirshtein 2 References 1. H. Cohn, C. Umans. Group-theoretic
More informationSelf-Complementary Arc-Transitive Graphs and Their Imposters
Self-Complementary Arc-Transitive Graphs and Their Imposters by Natalie Mullin A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics
More informationON THE SEMIPRIMITIVITY OF CYCLIC CODES
ON THE SEMIPRIMITIVITY OF CYCLIC CODES YVES AUBRY AND PHILIPPE LANGEVIN Abstract. We prove, without assuming the Generalized Riemann Hypothesis, but with at most one exception, that an irreducible cyclic
More informationOn The Nonlinearity of Maximum-length NFSR Feedbacks
On The Nonlinearity of Maximum-length NFSR Feedbacks Meltem Sönmez Turan National Institute of Standards and Technology meltem.turan@nist.gov Abstract. Linear Feedback Shift Registers (LFSRs) are the main
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationwith Good Cross Correlation for Communications and Cryptography
m-sequences with Good Cross Correlation for Communications and Cryptography Tor Helleseth and Alexander Kholosha 9th Central European Conference on Cryptography: Trebíc, June 26, 2009 1/25 Outline m-sequences
More informationFourier Analysis. 1 Fourier basics. 1.1 Examples. 1.2 Characters form an orthonormal basis
Fourier Analysis Topics in Finite Fields (Fall 203) Rutgers University Swastik Kopparty Last modified: Friday 8 th October, 203 Fourier basics Let G be a finite abelian group. A character of G is simply
More informationSmith Normal Forms of Strongly Regular graphs
Smith Normal Forms of Strongly Regular graphs Peter Sin, U. of Florida UD Discrete Math. Seminar, May 7th, 2018. Smith normal forms Smith normal form Smith normal forms associated with graphs Smith and
More informationRings in Coding Theory
Rings in Coding Theory Steven T. Dougherty July 3, 2013 Cyclic Codes Cyclic Codes were first studied by Prange in 1957. Prange, E. Cyclic error-correcting codes in two symbols. Technical Note TN-57-103,
More informationSequences and Linear Codes from Highly Nonlinear Functions
Sequences and Linear Codes from Highly Nonlinear Functions Chunlei Li Dissertation for the degree of philosophiae doctor(phd) at the University of Bergen 2014 Dissertation date: June 16th A C K N O W
More informationA PROOF OF BURNSIDE S p a q b THEOREM
A PROOF OF BURNSIDE S p a q b THEOREM OBOB Abstract. We prove that if p and q are prime, then any group of order p a q b is solvable. Throughout this note, denote by A the set of algebraic numbers. We
More informationNonlinear Shi, Registers: A Survey and Open Problems. Tor Helleseth University of Bergen NORWAY
Nonlinear Shi, Registers: A Survey and Open Problems Tor Helleseth University of Bergen NORWAY Outline ntroduc9on Nonlinear Shi> Registers (NLFSRs) Some basic theory De Bruijn Graph De Bruijn graph Golomb
More informationGalois fields/1. (M3) There is an element 1 (not equal to 0) such that a 1 = a for all a.
Galois fields 1 Fields A field is an algebraic structure in which the operations of addition, subtraction, multiplication, and division (except by zero) can be performed, and satisfy the usual rules. More
More informationNonlinear Functions A topic in Designs, Codes and Cryptography
Nonlinear Functions A topic in Designs, Codes and Cryptography Alexander Pott Otto-von-Guericke-Universität Magdeburg September 21, 2007 Alexander Pott (Magdeburg) Nonlinear Functions September 21, 2007
More informationCombinatorics of p-ary Bent Functions
Combinatorics of p-ary Bent Functions MIDN 1/C Steven Walsh United States Naval Academy 25 April 2014 Objectives Introduction/Motivation Definitions Important Theorems Main Results: Connecting Bent Functions
More informationInformation Theory. Lecture 7
Information Theory Lecture 7 Finite fields continued: R3 and R7 the field GF(p m ),... Cyclic Codes Intro. to cyclic codes: R8.1 3 Mikael Skoglund, Information Theory 1/17 The Field GF(p m ) π(x) irreducible
More informationSelf-Dual Cyclic Codes
Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace
More informationSTRONGLY REGULAR GRAPHS, ASSOCIATION SCHEMES AND GAUSS SUMS. Fan Wu
STRONGLY REGULAR GRAPHS, ASSOCIATION SCHEMES AND GAUSS SUMS by Fan Wu A dissertation submitted to the Faculty of the University of Delaware in partial fulfillment of the requirements for the degree of
More informationPseudorandom Sequences II: Exponential Sums and Uniform Distribution
Pseudorandom Sequences II: Exponential Sums and Uniform Distribution Arne Winterhof Austrian Academy of Sciences Johann Radon Institute for Computational and Applied Mathematics Linz Carleton University
More informationBalanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced
More informationGalois groups with restricted ramification
Galois groups with restricted ramification Romyar Sharifi Harvard University 1 Unique factorization: Let K be a number field, a finite extension of the rational numbers Q. The ring of integers O K of K
More informationQuadratic Almost Perfect Nonlinear Functions With Many Terms
Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce
More informationCYCLIC SIEVING FOR CYCLIC CODES
CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show
More informationFIELD THEORY. Contents
FIELD THEORY MATH 552 Contents 1. Algebraic Extensions 1 1.1. Finite and Algebraic Extensions 1 1.2. Algebraic Closure 5 1.3. Splitting Fields 7 1.4. Separable Extensions 8 1.5. Inseparable Extensions
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationMathematics for Cryptography
Mathematics for Cryptography Douglas R. Stinson David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario, N2L 3G1, Canada March 15, 2016 1 Groups and Modular Arithmetic 1.1
More informationSpectra of Semidirect Products of Cyclic Groups
Spectra of Semidirect Products of Cyclic Groups Nathan Fox 1 University of Minnesota-Twin Cities Abstract The spectrum of a graph is the set of eigenvalues of its adjacency matrix A group, together with
More informationarxiv: v1 [cs.dm] 20 Jul 2009
New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University
More informationAlgebra Qualifying Exam August 2001 Do all 5 problems. 1. Let G be afinite group of order 504 = 23 32 7. a. Show that G cannot be isomorphic to a subgroup of the alternating group Alt 7. (5 points) b.
More informationMINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev
Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator
More informationCHARACTERS OF FINITE GROUPS.
CHARACTERS OF FINITE GROUPS. ANDREI YAFAEV As usual we consider a finite group G and the ground field F = C. Let U be a C[G]-module and let g G. Then g is represented by a matrix [g] in a certain basis.
More informationOn the Correlation Distribution of Delsarte Goethals Sequences
On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set
More informationConstructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date
More informationCameron-Liebler line classes and partial difference sets
University of Richmond UR Scholarship Repository Honors Theses Student Research 016 Cameron-Liebler line classes and partial difference sets Uthaipon Tantipongipat Follow this and additional works at:
More informationGRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory.
GRE Subject test preparation Spring 2016 Topic: Abstract Algebra, Linear Algebra, Number Theory. Linear Algebra Standard matrix manipulation to compute the kernel, intersection of subspaces, column spaces,
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More information1 The Algebraic Normal Form
1 The Algebraic Normal Form Boolean maps can be expressed by polynomials this is the algebraic normal form (ANF). The degree as a polynomial is a first obvious measure of nonlinearity linear (or affine)
More informationThree-Bit Monomial Hyperovals
Timothy Vis Timothy.Vis@ucdenver.edu University of Colorado Denver Rocky Mountain Discrete Math Days 2008 Definition of a Hyperoval Definition In a projective plane of order n, a set of n + 1-points, no
More informationThe Radicans. James B. Wilson. April 13, 2002
The Radicans James B. Wilson April 13, 2002 1 Radices of Integers Computational mathematics has brought awareness to the use of various bases in representing integers. The standard for most number systems
More informationDifferential properties of power functions
Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France
More informationMath 429/581 (Advanced) Group Theory. Summary of Definitions, Examples, and Theorems by Stefan Gille
Math 429/581 (Advanced) Group Theory Summary of Definitions, Examples, and Theorems by Stefan Gille 1 2 0. Group Operations 0.1. Definition. Let G be a group and X a set. A (left) operation of G on X is
More informationInteresting Examples on Maximal Irreducible Goppa Codes
Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical
More informationArc-chromatic number of digraphs in which every vertex has bounded outdegree or bounded indegree
Arc-chromatic number of digraphs in which every vertex has bounded outdegree or bounded indegree S. Bessy and F. Havet, Projet Mascotte, CNRS/INRIA/UNSA, INRIA Sophia-Antipolis, 2004 route des Lucioles
More information: Coding Theory. Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, upattane
2301532 : Coding Theory Notes by Assoc. Prof. Dr. Patanee Udomkavanich October 30, 2006 http://pioneer.chula.ac.th/ upattane Chapter 1 Error detection, correction and decoding 1.1 Basic definitions and
More informationModularity of Galois representations. imaginary quadratic fields
over imaginary quadratic fields Krzysztof Klosin (joint with T. Berger) City University of New York December 3, 2011 Notation F =im. quadr. field, p # Cl F d K, fix p p Notation F =im. quadr. field, p
More informationA conjecture about Gauss sums and bentness of binomial Boolean functions. 1 Introduction. Jean-Pierre Flori
A conjecture about Gauss sums and bentness of binomial Boolean functions Jean-Pierre Flori arxiv:608.05008v2 [math.nt] 9 Aug 206 Abstract In this note, the polar decomposition of binary fields of even
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationDifference sets and Hadamard matrices
Difference sets and Hadamard matrices Padraig Ó Catháin National University of Ireland, Galway 14 March 2012 Outline 1 (Finite) Projective planes 2 Symmetric Designs 3 Difference sets 4 Doubly transitive
More informationDefinitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations
Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of
More informationx n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)
Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every
More informationGraduate Preliminary Examination
Graduate Preliminary Examination Algebra II 18.2.2005: 3 hours Problem 1. Prove or give a counter-example to the following statement: If M/L and L/K are algebraic extensions of fields, then M/K is algebraic.
More informationOn Welch-Gong Transformation Sequence Generators
On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario
More informationThe Dimension and Minimum Distance of Two Classes of Primitive BCH Codes
1 The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes Cunsheng Ding, Cuiling Fan, Zhengchun Zhou Abstract arxiv:1603.07007v1 [cs.it] Mar 016 Reed-Solomon codes, a type of BCH codes,
More informationQuadratic Equations from APN Power Functions
IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon
More informationNick Gill. 13th July Joint with Hunt (USW) and Spiga (Milano Bicocca).
13th July 2016 Joint with Hunt and Spiga (Milano Bicocca). Overview Beautiful sets From here on, G is a group acting on a set Ω, and Λ is a subset of Ω. Write G Λ for the set-wise stabilizer of Λ. Write
More informationFour classes of permutation polynomials of F 2 m
Finite Fields and Their Applications 1 2007) 869 876 http://www.elsevier.com/locate/ffa Four classes of permutation polynomials of F 2 m Jin Yuan,1, Cunsheng Ding 1 Department of Computer Science, The
More informationEvgeniy V. Martyushev RESEARCH STATEMENT
Evgeniy V. Martyushev RESEARCH STATEMENT My research interests lie in the fields of topology of manifolds, algebraic topology, representation theory, and geometry. Specifically, my work explores various
More informationOn the generation of the coefficient field of a newform by a single Hecke eigenvalue
On the generation of the coefficient field of a newform by a single Hecke eigenvalue Koopa Tak-Lun Koo and William Stein and Gabor Wiese November 2, 27 Abstract Let f be a non-cm newform of weight k 2
More informationCharacter Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity
Character Sums and Polyphase Sequence Families with Low Correlation, DFT and Ambiguity Guang Gong Department of Electrical and Computer Engineering University of Waterloo, Waterloo, Ontario, Canada Email:
More informationAn Approach to Hensel s Lemma
Irish Math. Soc. Bulletin 47 (2001), 15 21 15 An Approach to Hensel s Lemma gary mcguire Abstract. Hensel s Lemma is an important tool in many ways. One application is in factoring polynomials over Z.
More informationARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions
ARCS IN FINITE PROJECTIVE SPACES SIMEON BALL Abstract. These notes are an outline of a course on arcs given at the Finite Geometry Summer School, University of Sussex, June 26-30, 2017. Let K denote an
More information