Size: px
Start display at page:

Download ""

Transcription

1 This article was originally published in a journal published by Elsevier, and the attached copy is provided by Elsevier for the author s benefit and for the benefit of the author s institution, for non-coercial research and educational use including without liitation use in instruction at your institution, sending it to specific colleagues that you know, and providing a copy to your institution s adinistrator. All other uses, reproduction and distribution, including without liitation coercial reprints, selling or licensing copies or access, or posting on open internet sites, your personal or institution s website or repository, are prohibited. For exceptions, perission ay be sought for such use through Elsevier s perissions site at:

2 Journal of Cobinatorial Theory, Series A 114 (2007) The divisibility odulo 24 of Kloosteran sus on GF(2 ), odd Pascale Charpin a, Tor Helleseth b, Victor Zinoviev c a INRIA, Doaine de Voluceau-Rocquencourt, BP , Le Chesnay, France b Departent of Inforatics, University of Bergen, N-5020 Bergen, Norway c Institute for Probles of Inforation Transission, Russian Acadey of Sciences, Bol shoi Karetnyi per. 19, GSP-4, Moscow , Russia Received 18 October 2005 Available online 12 July 2006 Counicated by Vera Pless Abstract In a previous paper, we studied the cosets of weight 4 of binary extended 3-error-correcting BCH codes of length 2 (where is odd). We expressed the nuber of codewords of weight 4 in such cosets in ters of exponential sus of three types, including the Kloosteran sus K(a), a F. In this paper, we derive soe congruences which link Kloosteran sus and cubic sus. This allows us to study the divisibility of Kloosteran sus odulo 24. More precisely, if we know the traces of a and of a 1/3, we are able to evaluate K(a) odulo 24 and to copute the nuber of those a giving the sae value of K(a) odulo Elsevier Inc. All rights reserved. Keywords: 3-Error-correcting BCH code; Coset; Melas code; Irreducible code; Divisibility; Kloosteran su; Cubic su; Inverse-cubic su; Quadratic apping; Jacobi sybol 1. Introduction This paper is a natural continuation of our previous papers [4,5,9]. Here we exploit the connection between binary priitive (in narrow sense) extended BCH codes of length 2 ( odd) with inial distance 8 and Kloosteran sus over finite fields of order 2. In [4], the coset This work was supported by INRIA-Rocquencourt, by the Norwegian Research Council and also by the Russian fund of fundaental researches (project ). E-ail address: pascale.charpin@inria.fr (P. Charpin) /$ see front atter 2006 Elsevier Inc. All rights reserved. doi: /j.jcta

3 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) weight distributions of such BCH codes was described. It was proved that all these distributions are known as soon as they are known for cosets of weight 4. We indicated, for = 7, the surprising distribution of the nuber of leaders in each coset of weight 4. In [9], the coset weight distributions of the Z 4 -linear Goethals codes are considered. For the cosets of weight 4, the nuber of codewords of weight 4 was expressed in ters of Kloosteran sus. Using this last approach, and considering again the BCH codes, we found in [5] the exact expression of the nuber of codewords of weight 4 (in cosets of weight 4) in ters of exponential sus of three different types including Kloosteran sus. In this paper, we exploit the deep connection between cubic and Kloosteran sus which appeared in [5]. The paper is organized as follows. After soe preliinaries, we present in Section 3 our ain expression established in [5] as a congruence (Theore 1 and (8)). We derive soe properties, notably on the divisibility of the inverse-cubic sus (Lea 5). By Theore 2 we state the key congruences which will allow us to copute the divisibility of Kloosteran sus odulo 24. All the results are given by Theore 3 providing six different cases which depend each on the for of. In Section 5, we recall the connection between Kloosteran sus and the [2 + 1, 2] irreducible code and explain the consequences of our results on the weight distribution of this code. Finally, in the last section, we copute for each case provided by Theore 3 the nuber of ties this case occurs (Table 2). We then contribute to the knowledge of the spectru of Kloosteran sus which is, equivalently, the knowledge of the weight distribution of Melas codes or of the [2 + 1, 2] irreducible codes. A part of our results in this paper was presented in [6]. 2. Preliinaries In this paper, the appings are generally defined on F 2, the finite field of order 2, with odd and 5. 1 For any such apping f, we will consider the Boolean function x Tr(f (x)) where Tr is the trace-function fro F 2 to F 2. For siplicity, we will use this notation: e ( f(x) ) = ( 1) Tr(f (x)). Also #T will denote the cardinality of any set T Exponential sus Now, we need to define several exponential sus on F 2. Definition 1. The Kloosteran sus are: K(a) = ( ) 1 e x + ax, a F 2. x F 2 The cubic sus are: C(a,b) = x F 2 e ( ax 3 + bx ), a F 2,b F 2. 1 Note that for = 3 the Kloosteran sus are cubic sus and the 3-error-correcting BCH codes do not exist.

4 324 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) The inverse-cubic sus are: G(a, b) = ( ) a e x 3 + bx, a F 2,b F 2. x F 2 For siplicity, G(a,a) will be denoted by G(a) and C(1,b)by C(b). The Kloosteran sus and the inverse-cubic sus are generally defined on F 2,theultiplicative group of F 2. We extend the to 0, assuing that e(x 1 ) = e(x 3 ) = 1forx = 0. Actually, we consider the Boolean functions on F 2 : ( ) 1 Tr = Tr ( x ) ( ) 1 and Tr = Tr ( x ). x x 3 Note that, since the appings x x 2 1 1, x x and x x 3 are perutations on F 2 when is odd, we have (for any a): K(0) = G(a, 0) = C(a,0) = 0. The next lea is directly obtained fro the result of Lachaud and Wolfann [11, Theore 3.4] which is suitable for any (even or odd). We only replace the su on F 2, denoted K(a) in [11], by K(a) = K(a)+ 1. Lea 1. The set K(a), a F 2, is the set of all the integers s 0 (od 4) with s 1 in the range [ 2 (+2)/2, 2 (+2)/2 ]. Moreover, the following result is due to Helleseth and Zinoviev [9]. Lea 2. For any (odd or even) 4 (od 8) if Tr(a) = 1, K(a) 0 (od 8) if Tr(a) = Quadratic sus Let i>0and a F 2. The spectru of quadratic sus on F 2 of the for S(i,a,b) = e ( ax 2i +1 + bx ), b F 2 (1) x F 2 is well-known. It is obtained by coputing the rank of the syplectic for of the Boolean function x Tr(ax 2i +1 ). The values S(i,a,b), when b runs through F 2, and the nuber of ties they occur, only depend on this rank, usually denoted by r = 2h. That is: 0 occurs 2 2 2h ties; 2 h occurs h 1 ties; 2 h occurs 2 2 h 1 ties. (2) These properties are explained in [12, Chapter 15] and [10,13]. In this paper, is odd. We ainly need the sus S(1, 1,b), b F 2 (the cubic sus), and the su S(3, 1, 1) (see Proposition 5). For clarity, the spectru of the cubic su is recalled in

5 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Table 1 The spectru of C(b) (Definition 1) Value Nuber it occurs (+1)/ ( 3)/2 2 (+1)/ ( 3)/2 Table 1. It corresponds to the rank 1, i.e., h = ( 1)/2. When i = 3 in (1), and for odd, the corresponding rank is r = 3 if 3 divides and r = 1 otherwise (see [12, Fig. 15.2]). On the other hand, it is generally difficult to know the sign of S(i,a,b) for any fixed (i, a) and for a given b. Fori = 1 (and for odd ) this was specified by Carlitz in [3] by eans of the Jacobi sybol ( 2 ) (also called the quadratic character). Recall that the Jacobi sybol is a generalization of the Legendre sybol which was introduced for any odd prie p: ( ) 2 1, if 2 is a square odulo p, = (3) p 1, otherwise. We will need the exact expression of the Jacobi sybol. Proposition 1. Let be odd. Set = 1 s, where s 1 and each i is an odd prie. Then ( ) ( ) ( ) =. 1 s Moreover, ( ) 2 1 for ±1 (od 8), = ( 1) (2 1)/8 = (4) 1 for ±3 (od 8). In the next lea, we give a slightly different version of the result of Carlitz [3, Theore 2]. Lea 3. Let be odd. Recall that C(b) = x F 2 e(x3 + bx), b F 2 (Definition 1). Then we have: (i) C(1) = ( 2 )2(+1)/2, where ( 2 ) is the Jacobi sybol; (ii) if Tr(b) = 1(with b 1), then C(b) = e ( β 3)( ) 2 2 (+1)/2, where β is unique in F 2 satisfying b = β 4 + β + 1 with Tr(β) = 0; (iii) if Tr(b) = 0, then C(b) = 0. Proof. Coparing to the theore of Carlitz, only (ii) is slightly odified. In [3] the expression of C(b) is C(b) = e ( β 3 + β )( ) 2 2 (+1)/2, where b = β 4 + β + 1forsoeβ.

6 326 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) The apping g : x x 4 + x + 1 is two-to-one on F 2 and g(x) = g(x + 1). More precisely, for any b such that Tr(b) = 1 there are exactly two eleents β and β +1 such that b = β 4 +β +1. But Tr ( (β + 1) 3 + β + 1 ) = Tr ( β 3 + β 2) = Tr ( β 3 + β ). Thus we can define β as the unique eleent in the pair (β, β + 1) which satisfies Tr(β) = 0. Moreover, e(β 3 + β) = e(β 3 ) copleting the proof of (ii). In Section 6, we will need specific results on quadratic sus. It is first the next forula: C(1) = 2 e ( x 3) = 2 e ( x 3). (5) x F 2, Tr(x)=0 This forula holds because e ( x 3 + x ) = x F 2 x F 2, Tr(x)=0 x F 2, Tr(x)=1 e ( x 3) x F 2, Tr(x)=1 e ( x 3). But C(0) = 0 eaning that Tr(x)=0 e(x3 ) = Tr(x)=1 e(x3 ). We will need a basic property of quadratic functions. A proof of the next lea can be found in [2, Proposition II-5]. First recall that any Boolean function f on F 2 is said to be balanced if the nuber of those x such that f(x)= 1, i.e., the weight of f is equal to 2 1. In this case, we have obviously ( 1) f(x) = 0. x F 2 Lea 4. Let f be any quadratic Boolean function f on F 2. Then f is balanced if and only if there is u F 2 such that f(x)+ f(x+ u) = 1, x. In the next exaple, we point out the balanceness of a special class of quadratic Boolean functions. Exaple 1. Set f(x)= i I Tr(x2i +1 ) where I 0, 1,..., 1}, odd. Then we have for any x F : f(x)+ f(x+ 1) = Tr ( x 2i + x + 1 ) = Tr(1) i I i I #I (od 2). Thus, when is odd, such f is balanced if the cardinality of I is odd. 3. Cosets of the 3-error-correcting extended BCH code Let us denote by B the binary BCH code of length n = 2, odd and 5, with inial distance 8. Finding the nuber of words in a coset of weight 4 of B needs to solve the following syste of equations over F 2 : x + y + z + u = a, x 3 + y 3 + z 3 + u 3 = b, (6) x 5 + y 5 + z 5 + u 5 = c.

7 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Here x,y,z and u are pairwise distinct eleents of F 2 and a,b,c F 2 are fixed. Let μ(a,b,c) be the nuber of different such 4-tuples (x,y,z,u)which are solutions to the syste (6). Assue that a 0. Then there are ɛ 0, 1} and η F 2 such that μ(a, b, c) = μ(1,ɛ,η).tobeore precise ( ) b ɛ = Tr a 3 and η = c a 5 + b2 a 6 + b a 3 are uniquely defined, as explained in [5]. The condition a 0 eans that the corresponding coset is contained in the Reed Muller code of order 1 and not contained in the Reed Muller code of order 2, i.e., (x,y,z,u) is not a flat. The reader can refer to [4] for a coplete explanation of the types of cosets of 3-error-correcting extended BCH codes. In [5] we established that μ(1,ɛ,η)can be expressed in ters of exponential sus. Theore 1. Let μ(1,ɛ,η), ɛ 0, 1} and η F 2, as above defined. Then μ(1,ɛ,η)is even and can be expressed as follows: for η 1 24 μ(1,ɛ,η)= 2 8 ( 1 + ( 1) ɛ+1) + 3 G(η + 1) + ( 1) ɛ+1 2 (K(η + 1) + C ( (η + 1) 1/3)). (7) Furtherore, when η = 1 then μ(1,ɛ,1) = 0. Reark 1. The expression of μ(1,ɛ,η)in [5] is of the for G + ( 1) ɛ+1 2 (K + C ( (η + 1) 1/3) 3 ), where G = G(η + 1) 1 and K = K(η + 1) 1 (these sus were coputed on F 2, not on F 2 ). Fro now on μ(ɛ, η) = μ(1,ɛ,η)and G(a,a) is denoted G(a), for siplicity. There are several consequences of the previous theore. We deduce easily that for 9 there are solutions of (6) except for the (a,b,c) corresponding to (1,ɛ,1). This leads to the deterination of the nuber of cosets of weight 4, as we will explain in a forthcoing paper [7]. Corollary 1. When 9 then μ(ɛ, η) > 0 for any ɛ 0, 1} and for any η 1. Consequently, for any such (ɛ, η) and for 9: 2 8 ( 1 + ( 1) ɛ+1) + 3 G(η + 1) + ( 1) ɛ+1 2 (K(η + 1) + C ( (η + 1) 1/3)) 0 (od 48). (8) Proof. Fro Leas 1 and 3, we have: C ( (η + 1) 1/3) 0, ±2 (+1)/2} and K(η + 1) < 2 (/2)+1 + 1, where λ denotes the absolute value of λ. Moreover, we proved in [5] that G(η + 1) < 2 (/2) We consider the equality (7) and we have to prove that the ter on the right is strictly positive. We consider A = 3 G(η + 1) + ( 1) ɛ+1 2 (K(η + 1) + C ( (η + 1) 1/3)). Fro the previous bounds we get: A < 3 2 (/2) ( 2 (/2) (+1)/2) + 5

8 328 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) which iplies A < 4 2 (/2) (+3)/ We want to prove that 2 8(1 + ( 1) ɛ+1 ) + A > 0. Clearly this is true as soon as (/2) + 4 <, that is + 8 < 2 which is 8 <. Thus, we know that, for 9, μ(ɛ, η) is a nonzero positive even nuber. In accordance with (7) we directly obtain (8). Reark 2. Let B be the 3-error correcting extended BCH code. When = 5, B is in fact the self-dual Reed Muller code. The weight distribution of cosets of B is known [1]. When = 7, the weight distribution of cosets of B was coputed in [4]. Note that for <9 the values K(a) are easily coputed (see Tables 4 and 5). Moreover, we are able to deduce a property on the divisibility of inverse-cubic sus G(a). Note that it is suitable for odd only. Recall that G(a) = x F 2 e(a/x3 + ax). Lea 5. For any odd, 5, 8 (od 16), if Tr(a) = 1, G(a) 0 (od 16), if Tr(a) = 0. Proof. We use (7) with a = η + 1, a 0. Note that G(0) = 2 is a trivial case. The cubic su C(a 1/3 ) is congruent to 0 odulo 2 (+1)/2. Thus 2C(a 1/3 ) is congruent to 0 odulo 16 as soon as ( + 3)/2 4 which is 5. Since 2 8(1 + ( 1) ɛ+1 ) is 0 odulo 16 for any ɛ 0, 1}, we then deduce fro (7): ±2 K(a) + 3 G(a) 0 (od 16). Now we apply Lea 2. If Tr(a) = 1 then 2K(a) 8 odulo 16 iplying that G(a) 8 odulo 16 too. When Tr(a) = 0, 2K(a) 0 odulo 16 and then G(a) 0 odulo Divisibility of Kloosteran sus The following relations between cubic and Kloosteran sus are deduced fro (7) (with a = η + 1, a 0), Leas 2 and 3. Recall that 5. Theore 2 (The key congruences). For any a, a F 2, we have: If Tr(a) = 0 then else C ( a 1/3) + K(a) 16 (od 24) (9) C ( a 1/3) + K(a) 4 (od 24). (10) Proof. First note that for any integer r, r 1, we have: 2 r ( 1) r (od 3). Thus, since is odd, we deduce fro (7): 2 + ( 1 + ( 1) ɛ+1) + ( 1) ɛ+1 2 (K(a) + C ( a 1/3)) 0 (od 3).

9 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) This gives the sae congruence for ɛ = 0 and ɛ = 1: K(a) + C ( a 1/3) 1 (od 3). (11) Now C(a 1/3 ) 0 odulo 8 as soon as 5 (Lea 3). Hence K(a) + C ( a 1/3) K(a) (od 8). We apply Lea 2. Set L(a) = K(a) + C(a 1/3 ).IfTr(a) = 0 then L(a) = 8R, forsoeinteger R, which leads to L(a) 2R odulo 3. According to (11) we get R 2 odulo 3. Consequently L(a) 16 odulo 24. Siilarly, if Tr(a) = 1 then L(a) = 8R + 4 leads to L(a) 2R + 1 odulo 3. Then we get R 0 odulo 3 which iplies L(a) 4 odulo 24, copleting the proof. In accordance with the previous theore, it appears that the divisibility of the sus K(a) odulo 24 is strongly related with those of the cubic sus. This fact will be specified by proving the next three corollaries. Corollary 2. Assue that Tr(a 1/3 ) = 0, a F 2. Then 16 (od 24) if Tr(a) = 0, K(a) 4 (od 24) if Tr(a) = 1. Proof. Recall that C(a 1/3 ) = 0 if and only if Tr(a 1/3 ) = 0. Thus, one siply rewrites (9) and (10) with C(a 1/3 ) = 0. When C(b) 0, for soe b F 2, then C(b) =±2 ρ with ρ = ( + 1)/2. Since 2 ρ = 8(3 1) ρ 3, we get 16 (od 24) if ρ is even, 2 ρ (12) 8 (od 24) if ρ is odd. Set = 4h + τ with τ 1, 3}. Since 2ρ = 4h + τ + 1, we have clearly ρ is odd = 4h + 1 and ρ is even = 4h + 3. (13) The next proposition coes directly fro (12) and (13). Proposition 2. Let b F 2 such that C(b) 0. Thus C(b) =±2 (+1)/2 with: 16 (od 24) if = 4h + 3, 2 (+1)/2 8 (od 24) if = 4h + 1 and 8 (od 24) if = 4h + 3, 2 (+1)/2 16 (od 24) if = 4h + 1. Now we are able to treat (9) and (10) when C(a 1/3 ) 0. Aong the next corollaries, we will prove the first only. The proof of the other is syetrically obtained. Corollary 3. Assue that a F 2 is such that Tr(a 1/3 ) 0 with C(a 1/3 ) = 2 (+1)/2. Then 0 (od 24) if = 4h + 3, Tr(a) = 0 K(a) 8 (od 24) if = 4h + 1

10 330 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) and 12 (od 24) if = 4h + 3, Tr(a) = 1 K(a) 20 (od 24) if = 4h + 1. Proof. If Tr(a) = 0 then (9) is satisfied. According to Proposition 2, we get 16 + K(a) 16 when = 4h + 3 and 8 + K(a) 16 when = 4h + 1. If Tr(a) = 1 then (10) is satisfied. Thus we get respectively 16 + K(a) 4 and 8 + K(a) 4, copleting the proof. Corollary 4. Assue that a F 2 is such that Tr(a 1/3 ) 0 with C(a 1/3 ) = 2 (+1)/2. Then 8 (od 24) if = 4h + 3, Tr(a) = 0 K(a) 0 (od 24) if = 4h + 1 and 20 (od 24) if = 4h + 3, Tr(a) = 1 K(a) 12 (od 24) if = 4h + 1. Using the terinology of Lea 3, we suarize our results as follows. Theore 3. Let a be any nonzero eleent of F 2, where is odd and 5. Then we have (1) If Tr(a 1/3 ) = 0 then (a) if Tr(a) = 0 then K(a) 16 (od 24); (b) if Tr(a) = 1 then K(a) 4 (od 24). (2) When Tr(a 1/3 ) = 1 then there is a unique β such that Tr(β) = 0 and a 1/3 = β 4 + β + 1. Hence (a) if Tr(a) = 0 then (i) if = 4h + 3 then 0 (od 24) if e(β 3 )( 2 K(a) ) = 1, 8 (od 24) if e(β 3 )( 2 ) = 1; (ii) if = 4h + 1 then 8 (od 24) if e(β 3 )( 2 K(a) ) = 1, 0 (od 24) if e(β 3 )( 2 ) = 1; (b) if Tr(a) = 1 then (i) if = 4h + 3 then 12 (od 24) if e(β 3 )( 2 K(a) ) = 1, 20 (od 24) if e(β 3 )( 2 ) = 1; (ii) if = 4h + 1 then 20 (od 24) if e(β 3 )( 2 K(a) ) = 1, 12 (od 24) if e(β 3 )( 2 ) = 1. There is a surprising consequence of the previous theore concerning the cases where K(a) is zero which can be expressed as follows.

11 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Corollary 5. If a F 2 is such that K(a) = 0 then Tr(a) = 0 and Tr(a 1/3 ) = 1. Moreover, in this case, C(a 1/3 )>0 for = 4h + 3 and C(a 1/3 )<0 for = 4h On the [2 + 1, 2] irreducible binary code In this section, we will denote by Tl k the trace function fro F 2 k to F 2l, where l divides k. Also, we denote by γ a priitive (2 + 1)th root of unity in F 2 2 and by α a priitive root of F 2. For any Boolean function f, the weight of f is the Haing weight of the vector of its values. Let us denote by C the binary irreducible [2 +1, 2] code. The codewords of C are precisely the vectors: c u = T1 2 (u), T1 2 (uγ),...,t1 2 ( uγ 2 )}, u F2 2. (14) Since gcd(2 + 1, 2 1) = 1, each such u can be written u = α i γ j. Thus c u is a shift of c α i. Therefore, for studying the weights of C we only have to consider the weights of those c u with u F 2. It was first proved by Dillon in [8] that the weights of the code C are exactly those of the dual of the Melas code, say M. The code M is the cyclic binary [2 1, 2] code whose nonzeros are α and α 1 only. Since the words of M are described by the functions x T 1 (bx 1 + ax) on F 2, the connection between the weights of M and the Kloosteran sus is clear. The reader can see [11] for ore details and its generalization to any characteristic in [14]. We now present the result due to Dillon in our context. Note that the Haing weight of any vector v is denoted wt(v). Theore 4. [8] Let w u = wt(c u ), u F 2, where c u is defined by (14). Let us denote by λ u the weight of the function x T 1 (x 1 + ux) defined on F 2. Then w u = 2 λ u. Therefore the Kloosteran sus K(u) and the weights w u are related by: K(u) = ( 2 ) 2 2w u = ( 1) T 1 2 (uγ j ). (15) j=1 In other words, to copute the nonzero weights of C is exactly to copute the K(u), u F 2. Proof. Let us denote by G the cyclic subgroup of F 2 2 generated by γ. We have for any u F 2 and for any j [1, 2 ]: T1 2 ( uγ j ) = T1 T 2 ( uγ j ) = T1 ( ( u γ j + γ j )), since γ 2 +1 = 1. Set S =x F 2 T1 (x 1 ) = 1}. The function g fro G to F 2, defined by g(y) = y + y 1, is zero for y = 1 only and takes exactly twice each value in S. This is because, for any b, the equation y 2 + by + 1 = 0 has two solutions in the quadratic extension of F 2 if and only if T1 (1/b) = 1. Hence we have: w u = # j [ 1, 2 ] ( ( T 1 u γ j + γ j )) = 1 } = 2# x F 2 T 1 (ux) = 1 and T1 ( x 1 ) = 1 }.

12 332 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Table 2 This table is explained at the end of Section 6 = 4h + 3 = 8s + 7 = 8s + 3 N 1 [16] ( 3)/ ( 3)/2 1 N 2 [4] ( 3)/ ( 3)/2 N 3 [0] 2 3 E/ E/8 + 2 ( 3)/2 N 4 [8] E/8 2 ( 3)/2 2 3 E/8 N 5 [12] E/8 + 2 ( 3)/2 2 3 E/8 N 6 [20] 2 3 E/ E/8 2 ( 3)/2 = 4h + 1 = 8s + 5 = 8s + 1 N 1 [16] ( 3)/ ( 3)/2 1 N 2 [4] ( 3)/ ( 3)/2 N 3 [0] 2 3 E/ E/8 2 ( 3)/2 N 4 [8] E/8 + 2 ( 3)/2 2 3 E/8 N 5 [12] E/8 2 ( 3)/2 2 3 E/8 N 6 [20] 2 3 E/ E/8 + 2 ( 3)/2 Thus the weight of x T1 (x 1 + ux) on F 2 equals 2 w u which iplies w u = 2 λ u. Now K(u) = ( 1) T 1 (x 1 +ux) = 2 2λ u. x F 2 Thus K(u) = 2 + 2w u. The proof is copleted since ( 2 ) 2 2w u = ( 1) T 1 2 (uγ j ). j=1 The weights w u of C can be coputed by eans of H(u)= ( 1) T 1 2(yu), u F 2, y G\1} and we know fro (15) that H(u) = K(u). Consequently, Theore 3, as well as Table 2, provide soe properties of the weights of the code C. Corollary 6. For each t 0 odulo 4 in the range [0, 20] we have H(u) t (od 24) K(u) 24 t (od 24). Consequently, those u such that H(u) t are described by Theore 3 and the nuber of ties they occur ( for a fixed t) is given by Table On the spectru of Kloosteran sus Now we are going to copute for each case of Theore 3 the nuber of those a which occur. Proposition 3. Let a F 2. For any set T, recall that #T is the cardinality of T. Set N 1 = # a K(a) 16 (od 24) }

13 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) and N 2 = # a K(a) 4 (od 24) }. Then ( ) 2 N 1 = ( 3)/2 1 and N 2 = N 1, where ( 2 ) is the Jacobi sybol given by (4). Proof. Fro Theore 3: N 1 = #a Tr(a) = 0 and Tr(a 1/3 ) = 0}. By setting a = b 3 (with b 0), N 1 is exactly: N 1 = # b Tr ( b 3) = 0 and Tr(b) = 0 }. (16) Siilarly N 2 is the nuber of those b such that Tr(b 3 ) = 1 and Tr(b) = 0. Since N 1 + N 2 = # b F 2 Tr(b) = 0 } = 2 1 1, then N 2 = N 1.Letf be the Boolean function b Tr(b 3 ) and denote by w the nuber of ties f(b)= 1 when Tr(b) = 0. According to (16), N 1 = 2 1 w 1 (note that we do not take b = 0). According to (5), we have C(1) = 2(2 1 2w), so that 4w = 2 C(1). Thus, since C(1) = ( 2 )2(+1)/2, we get ( ) 2 N 1 = C(1)/4 = ( 3)/2 1 which copletes the proof. Now we are going to treat the case where Tr(a 1/3 ) = 1 which is ore coplicated. We want to copute the N i as follows stated: for a F 2, we define N 3 = # a } K(a) 0 (od 24) ; (17) N 4 = # a } K(a) 8 (od 24) ; (18) N 5 = # a } K(a) 12 (od 24) ; (19) N 6 = # a } K(a) 20 (od 24). (20) Proposition 4. For any odd, we have: ( ) 2 N 3 + N 4 = ( 3)/2, ( ) 2 N 5 + N 6 = ( 3)/2, where ( 2 ) is given by (4). Moreover, ( 3)/2 if = 4h + 3, N 3 + N 5 = ( 3)/2 if = 4h + 1.

14 334 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Proof. Notice that 6 i=3 N i = 2 1 since this su equals the cardinality of those a such that Tr(a 1/3 ) = 1. Recall that C(1) = ( 2 )2(+1)/2. Fro Theore 3, setting a = b 3 (with b 0), we have: N 3 + N 4 = # b Tr ( b 3) = 0 and Tr(b) = 1 }. Let f be the Boolean function x Tr(x 3 ) and denote by τ the nuber of x such that Tr(x) = 1 and f(x)= 1. Fro (5), we get: C(1) = 2 e ( x 3) = 2 ( 2 1 2τ ). Thus x F 2, Tr(x)=1 ( ) 2 N 3 + N 4 = 2 1 τ = C(1)/4 = ( 3)/2. Since the su of the N i is equal to 2 1, we directly deduce N 5 + N 6. Now, because C(b) 0 if and only if Tr(b) = 1, we have: } C(b) > 0if = 4h + 3 N 3 + N 5 = # b. C(b) < 0if = 4h + 1 Hence N 3 + N 5 is equal to the nuber of those b such that C(b) is positive (respectively negative). This nuber is given by Table 1, copleting the proof. Now, we are going to copute the N i defined by (17) (20). In accordance with Theore 3, each such N i depends on. We have to consider = 4h + 3 and = 4h + 1 for each i. These cases differ by the value of e(β 3 )( 2 ) which is the sign of C(a1/3 ). We will denote this sign by λ i. Thus we have, according to Theore 3(2), i 3, 5} if = 4h + 3 then λ i = 1elseλ i = 1, i 4, 6} if = 4h + 3 then λ i = 1elseλ i = 1. (21) Lea 6. For i 3, 4, 5, 6},letɛ i F 2 and λ i ±1}, where λ i is given by (21). Then N i = # β Tr(β) = 0, Tr( β 9 + β ) = ɛ i,e ( β 3)( ) } 2 = λ i, where if i 3, 4} then ɛ i = 0 else ɛ i = 1. Proof. With notation of Theore 3, we set b = a 1/3, a F 2. In accordance with the case (2) of this theore we have Tr(b) = 1 and for any i: N i = # b Tr(b) = 1, Tr( b 3) = ɛ i,e ( β 3)( ) } 2 = λ i, where β is the sole eleent such that Tr(β) = 0 and b = β 4 + β + 1; ɛ i equals 0 when i 3, 4} and 1 otherwise. Thus the value of N i, as stated above, is exactly the cardinality of the set of those β such that Tr(β) = 0, Tr((β 4 + β + 1) 3 ) = ɛ i and e(β 3 )( 2 ) = λ i. It reains to copute Tr(b 3 ):

15 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Tr (( β 4 + β + 1 ) 3) (( = Tr β 4 + β + 1 )( β 8 + β )) = Tr ( β 3 + β 9 + β + β 3 + β 3 + β + 1 ) = Tr ( β 9 + β ). Fro Proposition 4, we know that to copute the N i given by (17) (20) is reduced to copute N 3. So, we are going to copute N 3. Proposition 5. Set E = x F 2 e(x9 + x); s is soe nonzero integer. Then 2 3 E/8 if 8s + 7, 8s + 5}, N 3 = E/8 ( 2 )2( 3)/2 if 8s + 3, 8s + 1}, where ( 2 ) is given by (4) and ±2 (+1)/2 if 0 (od 3), E = ±2 (+3)/2 otherwise. Proof. To copute N 3, defined by (17), is to copute those a corresponding to the case of Theore 3 where Tr(a 1/3 ) = 1, Tr(a) = 0, C(a 1/3 )>0if = 4h + 3 and C(a 1/3 )<0if = 4h + 1. As before, set b = a 1/3 and b = β 4 + β + 1. Thus, according to Lea 6, N 3 = # β Tr(β) = 0, Tr( β 9 + β ) = 0, e ( β 3)( ) } 2 = λ 3, where λ 3 = 1if = 4h+3 and λ 3 = 1if = 4h+1. This eans that e(β 3 ) = ( 2 ) and ( 2 ), respectively. Using (4) we ust count precisely those β such that 1 if = 4h + 3 = 8s + 7, e ( β 3) 1 if = 4h + 3 = 8s + 3, = (22) 1 if = 4h + 1 = 8s + 5, 1 if = 4h + 1 = 8s + 1, where h = 2s + 1 and h = 2s, respectively, for each for of. Then N 3 = 1 ( )( ( 1 + e(β) 1 e β 9 + β 3))( λe ( β 3) + 1 ), 8 β F 2 where λ depends on only; it is the sign of e(β 3 ) given in (22). So 8N 3 = 2 + β e(β) + λ β e ( β 3) β e ( β 9 + β 3) β e ( β 9 + β 3 + β ) λ β e ( β 9) + λ β e ( β 3 + β ) λ β e ( β 9 + β ). Using Lea 4 and Exaple 1 the sus of e(β), e(β 3 ), e(β 9 ) and e(β 9 + β 3 + β) equal zero. On the other hand, the su of e(β 9 + β 3 ) is obviously equal to those of e(β 3 + β). Thus, we get 8N 3 = 2 + (λ 1)C(1) λ β e ( β 9 + β ).

16 336 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Table 3 Divisibility of K(a), a 0, coputed on F 2 9 K(a) (od 24) Nuber it occurs 0 N 3 = 48 4 N 2 = N 4 = N 5 = N 1 = N 6 = 64 Since C(1) = ( 2 )2(+1)/2 and replacing λ by its value given by (22), we obtain the expected expression of N 3. As recalled in Section 2.2, E = S(3, 1, 1). When b runs through F 2,wehave:S(3, 1,b) 0, ±2 (+3)/2 } if 3 divides and S(3, 1,b) 0, ±2 (+1)/2 } otherwise. Particularly S(3, 1, 1) cannot be zero. Indeed, let f be the Boolean function x Tr(x 9 + x) on F 2 and take any u F 2. Then f(x)+ f(x+ u) = Tr ( x 8 u + xu 8 + u 9 + u ) = Tr (( u u 8) x ) + Tr ( u 9 + u ). The function x f(x)+ f(x+ u) is constant if and only if u 26 + u = 0. This is possible if and only if gcd(, 6) = gcd(, 3) = 3. But in this case u 8 = u and then Tr(u 9 + u) = 0. We deduce that for any u the function x f(x)+ f(x+ u) cannot be equal to 1. Fro Lea 4, it cannot be balanced, i.e., E 0, copleting the proof. Explanation of Tables 2 and 3: The values of the N i are coputed in Table 2. This table includes the nuber of those a occurring in each case described by Theore 3. Recall that is odd and 5. The N i are precisely defined by Proposition 3, (17) (20). In Table 2, we use the next notation: N i [ν]=# a K(a) ν(od 24) }. Notation E is used for the su: E = x F 2 e(x9 + x). The knowledge of the sign of E for each kind of in Table 2 would give the precise values of the N i (see Proposition 5). As an exaple, we copute separately the N i for = 9. In this case E = x F 2 9 e(x9 +x) = 64. These results are given in Table 3 and can be checked by eans of Table 2. Note that = 8 + 1(s = 1inTable2). Acknowledgents The authors thank the anonyous reviewers who, by a nuber of coents and suggestions, contributed to iproving the anuscript. Appendix We copute here the Kloosteran sus for = 5 and = 7 but also the values of the exponential sus G and C, according to (7). For a F 2 with Tr(a 1/3 ) = 1, we denote by β one

17 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) Table 4 = 5; p(x) = x 5 + x a 1/3 Tr(a 1/3 ) a Tr(a) β g Tr(g) K C G α 0 α α 3 1 α 9 1 α 2 α α 5 1 α 15 0 α 14 α α 7 0 α α 11 1 α 2 0 α 3 α α 15 0 α Table 5 = 7; p(x) = x 7 + x a 1/3 Tr(a 1/3 ) a Tr(a) β g Tr(g) K C G α 0 α α 3 0 α α 5 0 α α 7 1 α 21 1 α 30 α α 9 0 α α 11 1 α 33 0 α 66 α α 13 0 α α 15 1 α 45 0 α 22 α α 19 1 α 57 1 α 51 α α 21 1 α 63 0 α 23 α α 23 1 α 69 1 α 38 α α 27 1 α 81 0 α 112 α α 29 0 α α 31 1 α 93 1 α 16 α α 43 0 α α 47 0 α α 55 1 α 38 1 α 52 α α 63 0 α of the two eleents in F 2 such that a 1/3 = β 4 + β + 1. In Tables 4 and 5, the results are given for a set of representatives of the cyclotoic cosets only (since it is the sae for all eleents fro such coset). The star * is given to separate the cases with Tr(a 1/3 ) = 0, i.e., when there is no β such that a 1/3 = β 4 + β + 1. For short, we use the following notation: g = β 3 + β, K = K(a), C = C(a 1/3 ) and G = G(a). The Jacobi sybol is equal to 1for = 5 and to 1 for = 7. We denote by p the priitive polynoial generating F 2. References [1] P. Caion, B. Courteau, A. Montpetit, The weight enuerators of the extreal self-dual binary codes of length 32, in: Proceedings of EUROCODE 92, in: CISM Courses and Lectures, vol. 339, Springer-Verlag, 1993, pp [2] A. Canteaut, C. Carlet, P. Charpin, C. Fontaine, On cryptographic properties of the cosets of R(1,), IEEE Trans. Infor. Theory 47 (4) (2001) [3] L. Carlitz, Explicit evaluation of certain exponential sus, Math. Scand. 44 (1979) 5 16.

18 338 P. Charpin et al. / Journal of Cobinatorial Theory, Series A 114 (2007) [4] P. Charpin, V.A. Zinoviev, On coset weight distributions of the 3-error-correcting BCH-codes, SIAM J. Discrete Math. 10 (1) (February 1997) [5] P. Charpin, T. Helleseth, V. Zinoviev, On cosets of weight 4 of binary BCH codes of length 2 ( odd), with inial distance 8, and exponential sus, Probl. Inf. Trans. 41 (4) (2005) [6] P. Charpin, T. Helleseth, V.A. Zinoviev, On binary BCH codes with inial distance 8 and Kloosteran sus, in: Proceedings of Ninth Int. Workshop on Algebraic and Cobinatorial Coding Theory, Kranevo, Bulgaria, June, 2004, pp [7] P. Charpin, T. Helleseth, V.A. Zinoviev, The coset distribution of triple-error-correcting binary priitive BCH codes, in: Proceedings 2005 IEEE International Syposiu on Inforation Theory, ISIT 05, Adelaide, Australie, Septeber [8] J.F. Dillon, Eleentary Hadaard difference sets, in: Proc. 6th S E Conf. Cobinatorics, Graph Theory, and Coputing, Congr. Nuer 14 (1975) [9] T. Helleseth, V.A. Zinoviev, On Z 4 -linear Goethals codes and Kloosteran sus, Des. Codes Cryptogr. 17 (1 3) (1999) [10] T. Helleseth, P.V. Kuar, Sequences with low correlation, in: V.S. Pless, W.C. Huffan (Eds.), Handbook of Coding Theory, Part 3: Applications, Elsevier, Asterda, 1998, R.A. Brualdi (assistant Ed.) (Chapter 21). [11] G. Lachaud, J. Wolfann, The weights of the orthogonals of the extended quadratic binary Goppa codes, IEEE Trans. Infor. Theory 36 (3) (May 1990) [12] F.J. MacWillias, N.J.A. Sloane, The Theory of Error Correcting Codes, North-Holland, [13] R.J. McEliece, Finite Fields for Coputer Scientists and Engineers, Kluwer, Boston, [14] J.C.C.M. Reijn, H.J. Tiersa, A duality theore for the weight distribution of soe cyclic codes, IEEE Trans. Infor. Theory 34 (5) (Septeber 1988)

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Construction of Some New Classes of Boolean Bent Functions and Their Duals

Construction of Some New Classes of Boolean Bent Functions and Their Duals International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

A Family of Reversible BCH Codes

A Family of Reversible BCH Codes 1 A Faily of Reversible BCH Codes Shuxing Li, Cunsheng Ding, and Hao Liu Abstract arxiv:1608.0169v1 [cs.it] 7 Aug 016 Cyclic codes are an interesting class of linear codes due to their efficient encoding

More information

Bernoulli numbers and generalized factorial sums

Bernoulli numbers and generalized factorial sums Bernoulli nubers and generalized factorial sus Paul Thoas Young Departent of Matheatics, College of Charleston Charleston, SC 29424 paul@ath.cofc.edu June 25, 2010 Abstract We prove a pair of identities

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS

ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS #A34 INTEGERS 17 (017) ORIGAMI CONSTRUCTIONS OF RINGS OF INTEGERS OF IMAGINARY QUADRATIC FIELDS Jürgen Kritschgau Departent of Matheatics, Iowa State University, Aes, Iowa jkritsch@iastateedu Adriana Salerno

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

On Certain C-Test Words for Free Groups

On Certain C-Test Words for Free Groups Journal of Algebra 247, 509 540 2002 doi:10.1006 jabr.2001.9001, available online at http: www.idealibrary.co on On Certain C-Test Words for Free Groups Donghi Lee Departent of Matheatics, Uni ersity of

More information

On Dillon s class H of Niho bent functions and o-polynomials

On Dillon s class H of Niho bent functions and o-polynomials On Dillon s class H of Niho bent functions and o-polynoials Claude Carlet and Sihe Mesnager LAGA, UMR 7539, CNRS, Departent of Matheatics, University of Paris XIII and University of Paris VIII, 2 rue de

More information

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS.

LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. i LATTICE POINT SOLUTION OF THE GENERALIZED PROBLEM OF TERQUEi. AND AN EXTENSION OF FIBONACCI NUMBERS. C. A. CHURCH, Jr. and H. W. GOULD, W. Virginia University, Morgantown, W. V a. In this paper we give

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin Guang Gong INRIA, B.P. 105, 78153 Le Chesnay Cedex, France, Pascale.Charpin@inria.fr Department of Electrical and Computer

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

Combinatorial Primality Test

Combinatorial Primality Test Cobinatorial Priality Test Maheswara Rao Valluri School of Matheatical and Coputing Sciences Fiji National University, Derrick Capus, Suva, Fiji E-ail: aheswara.valluri@fnu.ac.fj Abstract This paper provides

More information

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m)

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m) #A37 INTEGERS 8 (208) MODULAR HYPERBOLAS AND THE CONGRUENCE ax x 2 x k + bx k+ x k+2 x 2k c (od ) Anwar Ayyad Departent of Matheatics, Al Azhar University, Gaza Strip, Palestine anwarayyad@yahoo.co Todd

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus ACTA ARITHMETICA XCII1 (2000) Exponential sus and the distribution of inversive congruential pseudorando nubers with prie-power odulus by Harald Niederreiter (Vienna) and Igor E Shparlinski (Sydney) 1

More information

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials

Research Article Some Formulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynomials Discrete Dynaics in Nature and Society Volue 202, Article ID 927953, pages doi:055/202/927953 Research Article Soe Forulae of Products of the Apostol-Bernoulli and Apostol-Euler Polynoials Yuan He and

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

arxiv: v2 [math.nt] 5 Sep 2012

arxiv: v2 [math.nt] 5 Sep 2012 ON STRONGER CONJECTURES THAT IMPLY THE ERDŐS-MOSER CONJECTURE BERND C. KELLNER arxiv:1003.1646v2 [ath.nt] 5 Sep 2012 Abstract. The Erdős-Moser conjecture states that the Diophantine equation S k () = k,

More information

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 1, JANUARY 2001 421 [4] A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans.

More information

Poly-Bernoulli Numbers and Eulerian Numbers

Poly-Bernoulli Numbers and Eulerian Numbers 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 21 (2018, Article 18.6.1 Poly-Bernoulli Nubers and Eulerian Nubers Beáta Bényi Faculty of Water Sciences National University of Public Service H-1441

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a ournal published by Elsevier. The attached copy is furnished to the author for internal non-coercial research and education use, including for instruction at the authors institution

More information

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65

Math Reviews classifications (2000): Primary 54F05; Secondary 54D20, 54D65 The Monotone Lindelöf Property and Separability in Ordered Spaces by H. Bennett, Texas Tech University, Lubbock, TX 79409 D. Lutzer, College of Willia and Mary, Williasburg, VA 23187-8795 M. Matveev, Irvine,

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

A Quantum Observable for the Graph Isomorphism Problem

A Quantum Observable for the Graph Isomorphism Problem A Quantu Observable for the Graph Isoorphis Proble Mark Ettinger Los Alaos National Laboratory Peter Høyer BRICS Abstract Suppose we are given two graphs on n vertices. We define an observable in the Hilbert

More information

ON SOME PROBLEMS OF GYARMATI AND SÁRKÖZY. Le Anh Vinh Mathematics Department, Harvard University, Cambridge, Massachusetts

ON SOME PROBLEMS OF GYARMATI AND SÁRKÖZY. Le Anh Vinh Mathematics Department, Harvard University, Cambridge, Massachusetts #A42 INTEGERS 12 (2012) ON SOME PROLEMS OF GYARMATI AND SÁRKÖZY Le Anh Vinh Matheatics Departent, Harvard University, Cabridge, Massachusetts vinh@ath.harvard.edu Received: 12/3/08, Revised: 5/22/11, Accepted:

More information

RESULTANTS OF CYCLOTOMIC POLYNOMIALS TOM M. APOSTOL

RESULTANTS OF CYCLOTOMIC POLYNOMIALS TOM M. APOSTOL RESULTANTS OF CYCLOTOMIC POLYNOMIALS TOM M. APOSTOL 1. Introduction. The cyclotoic polynoial Fn(x) of order ras: 1 is the priary polynoial whose roots are the priitive rath roots of unity, (1.1) Fn(x)

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

MULTIPLAYER ROCK-PAPER-SCISSORS

MULTIPLAYER ROCK-PAPER-SCISSORS MULTIPLAYER ROCK-PAPER-SCISSORS CHARLOTTE ATEN Contents 1. Introduction 1 2. RPS Magas 3 3. Ites as a Function of Players and Vice Versa 5 4. Algebraic Properties of RPS Magas 6 References 6 1. Introduction

More information

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili,

Generalized AOR Method for Solving System of Linear Equations. Davod Khojasteh Salkuyeh. Department of Mathematics, University of Mohaghegh Ardabili, Australian Journal of Basic and Applied Sciences, 5(3): 35-358, 20 ISSN 99-878 Generalized AOR Method for Solving Syste of Linear Equations Davod Khojasteh Salkuyeh Departent of Matheatics, University

More information

4 = (0.02) 3 13, = 0.25 because = 25. Simi-

4 = (0.02) 3 13, = 0.25 because = 25. Simi- Theore. Let b and be integers greater than. If = (. a a 2 a i ) b,then for any t N, in base (b + t), the fraction has the digital representation = (. a a 2 a i ) b+t, where a i = a i + tk i with k i =

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

An EGZ generalization for 5 colors

An EGZ generalization for 5 colors An EGZ generalization for 5 colors David Grynkiewicz and Andrew Schultz July 6, 00 Abstract Let g zs(, k) (g zs(, k + 1)) be the inial integer such that any coloring of the integers fro U U k 1,..., g

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

Bernoulli Numbers. Junior Number Theory Seminar University of Texas at Austin September 6th, 2005 Matilde N. Lalín. m 1 ( ) m + 1 k. B m.

Bernoulli Numbers. Junior Number Theory Seminar University of Texas at Austin September 6th, 2005 Matilde N. Lalín. m 1 ( ) m + 1 k. B m. Bernoulli Nubers Junior Nuber Theory Seinar University of Texas at Austin Septeber 6th, 5 Matilde N. Lalín I will ostly follow []. Definition and soe identities Definition 1 Bernoulli nubers are defined

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

1. INTRODUCTION AND RESULTS

1. INTRODUCTION AND RESULTS SOME IDENTITIES INVOLVING THE FIBONACCI NUMBERS AND LUCAS NUMBERS Wenpeng Zhang Research Center for Basic Science, Xi an Jiaotong University Xi an Shaanxi, People s Republic of China (Subitted August 00

More information

Perturbation on Polynomials

Perturbation on Polynomials Perturbation on Polynoials Isaila Diouf 1, Babacar Diakhaté 1 & Abdoul O Watt 2 1 Départeent Maths-Infos, Université Cheikh Anta Diop, Dakar, Senegal Journal of Matheatics Research; Vol 5, No 3; 2013 ISSN

More information

A new type of lower bound for the largest eigenvalue of a symmetric matrix

A new type of lower bound for the largest eigenvalue of a symmetric matrix Linear Algebra and its Applications 47 7 9 9 www.elsevier.co/locate/laa A new type of lower bound for the largest eigenvalue of a syetric atrix Piet Van Mieghe Delft University of Technology, P.O. Box

More information

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1.

M ath. Res. Lett. 15 (2008), no. 2, c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS. Van H. Vu. 1. M ath. Res. Lett. 15 (2008), no. 2, 375 388 c International Press 2008 SUM-PRODUCT ESTIMATES VIA DIRECTED EXPANDERS Van H. Vu Abstract. Let F q be a finite field of order q and P be a polynoial in F q[x

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT

THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT THE AVERAGE NORM OF POLYNOMIALS OF FIXED HEIGHT PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. Let n be any integer and ( n ) X F n : a i z i : a i, ± i be the set of all polynoials of height and

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

arxiv: v2 [math.co] 8 Mar 2018

arxiv: v2 [math.co] 8 Mar 2018 Restricted lonesu atrices arxiv:1711.10178v2 [ath.co] 8 Mar 2018 Beáta Bényi Faculty of Water Sciences, National University of Public Service, Budapest beata.benyi@gail.co March 9, 2018 Keywords: enueration,

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Lecture 21 Principle of Inclusion and Exclusion

Lecture 21 Principle of Inclusion and Exclusion Lecture 21 Principle of Inclusion and Exclusion Holden Lee and Yoni Miller 5/6/11 1 Introduction and first exaples We start off with an exaple Exaple 11: At Sunnydale High School there are 28 students

More information

arxiv: v1 [math.co] 19 Apr 2017

arxiv: v1 [math.co] 19 Apr 2017 PROOF OF CHAPOTON S CONJECTURE ON NEWTON POLYTOPES OF q-ehrhart POLYNOMIALS arxiv:1704.0561v1 [ath.co] 19 Apr 017 JANG SOO KIM AND U-KEUN SONG Abstract. Recently, Chapoton found a q-analog of Ehrhart polynoials,

More information

The concavity and convexity of the Boros Moll sequences

The concavity and convexity of the Boros Moll sequences The concavity and convexity of the Boros Moll sequences Ernest X.W. Xia Departent of Matheatics Jiangsu University Zhenjiang, Jiangsu 1013, P.R. China ernestxwxia@163.co Subitted: Oct 1, 013; Accepted:

More information

Evaluation of various partial sums of Gaussian q-binomial sums

Evaluation of various partial sums of Gaussian q-binomial sums Arab J Math (018) 7:101 11 https://doiorg/101007/s40065-017-0191-3 Arabian Journal of Matheatics Erah Kılıç Evaluation of various partial sus of Gaussian -binoial sus Received: 3 February 016 / Accepted:

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Jacobi symbols. p 1. Note: The Jacobi symbol does not necessarily distinguish between quadratic residues and nonresidues. That is, we could have ( a

Jacobi symbols. p 1. Note: The Jacobi symbol does not necessarily distinguish between quadratic residues and nonresidues. That is, we could have ( a Jacobi sybols efiitio Let be a odd positive iteger If 1, the Jacobi sybol : Z C is the costat fuctio 1 1 If > 1, it has a decopositio ( as ) a product of (ot ecessarily distict) pries p 1 p r The Jacobi

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

The Fundamental Basis Theorem of Geometry from an algebraic point of view

The Fundamental Basis Theorem of Geometry from an algebraic point of view Journal of Physics: Conference Series PAPER OPEN ACCESS The Fundaental Basis Theore of Geoetry fro an algebraic point of view To cite this article: U Bekbaev 2017 J Phys: Conf Ser 819 012013 View the article

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

Open problems on cyclic codes

Open problems on cyclic codes Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 11 10/15/2008 ABSTRACT INTEGRATION I Contents 1. Preliinaries 2. The ain result 3. The Rieann integral 4. The integral of a nonnegative

More information

ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS

ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS ALGEBRAS AND MATRICES FOR ANNOTATED LOGICS R. A. Lewin, I. F. Mikenberg and M. G. Schwarze Pontificia Universidad Católica de Chile Abstract We study the atrices, reduced atrices and algebras associated

More information

AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587.

AN APPLICATION OF INCOMPLETE BLOCK DESIGNS. K. J. C. Smith University of North Carolina. Institute of Statistics Mimeo Series No. 587. AN APPLICATION OF INCOMPLETE BLOCK DESIGNS TO THE CONSTRUCTION OF ERROR-CORRECTING CODES by K. J. C. Sith University of North Carolina Institute of Statistics Mieo Series No. 587 August, 1968 This research

More information

Kloosterman sum identities and low-weight codewords in a cyclic code with two zeros

Kloosterman sum identities and low-weight codewords in a cyclic code with two zeros Finite Fields and Their Applications 13 2007) 922 935 http://www.elsevier.com/locate/ffa Kloosterman sum identities and low-weight codewords in a cyclic code with two zeros Marko Moisio a, Kalle Ranto

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany. New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing

More information

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE

ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE ADVANCES ON THE BESSIS- MOUSSA-VILLANI TRACE CONJECTURE CHRISTOPHER J. HILLAR Abstract. A long-standing conjecture asserts that the polynoial p(t = Tr(A + tb ] has nonnegative coefficients whenever is

More information

Partial traces and entropy inequalities

Partial traces and entropy inequalities Linear Algebra and its Applications 370 (2003) 125 132 www.elsevier.co/locate/laa Partial traces and entropy inequalities Rajendra Bhatia Indian Statistical Institute, 7, S.J.S. Sansanwal Marg, New Delhi

More information

MANY physical structures can conveniently be modelled

MANY physical structures can conveniently be modelled Proceedings of the World Congress on Engineering Coputer Science 2017 Vol II Roly r-orthogonal (g, f)-factorizations in Networks Sizhong Zhou Abstract Let G (V (G), E(G)) be a graph, where V (G) E(G) denote

More information

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)!

THE SUPER CATALAN NUMBERS S(m, m + s) FOR s 3 AND SOME INTEGER FACTORIAL RATIOS. 1. Introduction. = (2n)! THE SUPER CATALAN NUMBERS S(, + s FOR s 3 AND SOME INTEGER FACTORIAL RATIOS XIN CHEN AND JANE WANG Abstract. We give a cobinatorial interpretation for the super Catalan nuber S(, + s for s 3 using lattice

More information

Order Ideals in Weak Subposets of Young s Lattice and Associated Unimodality Conjectures

Order Ideals in Weak Subposets of Young s Lattice and Associated Unimodality Conjectures Annals of Cobinatorics 8 (2004) 1-0218-0006/04/020001-10 DOI ********************** c Birkhäuser Verlag, Basel, 2004 Annals of Cobinatorics Order Ideals in Weak Subposets of Young s Lattice and Associated

More information

Egyptian Mathematics Problem Set

Egyptian Mathematics Problem Set (Send corrections to cbruni@uwaterloo.ca) Egyptian Matheatics Proble Set (i) Use the Egyptian area of a circle A = (8d/9) 2 to copute the areas of the following circles with given diaeter. d = 2. d = 3

More information

Energy-Efficient Threshold Circuits Computing Mod Functions

Energy-Efficient Threshold Circuits Computing Mod Functions Energy-Efficient Threshold Circuits Coputing Mod Functions Akira Suzuki Kei Uchizawa Xiao Zhou Graduate School of Inforation Sciences, Tohoku University Araaki-aza Aoba 6-6-05, Aoba-ku, Sendai, 980-8579,

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

Importance of Sources using the Repeated Fusion Method and the Proportional Conflict Redistribution Rules #5 and #6

Importance of Sources using the Repeated Fusion Method and the Proportional Conflict Redistribution Rules #5 and #6 Iportance of Sources using the Repeated Fusion Method and the Proportional Conflict Redistribution Rules #5 and #6 Florentin Sarandache Math & Sciences Departent University of New Mexico, Gallup Capus,

More information

A Bernstein-Markov Theorem for Normed Spaces

A Bernstein-Markov Theorem for Normed Spaces A Bernstein-Markov Theore for Nored Spaces Lawrence A. Harris Departent of Matheatics, University of Kentucky Lexington, Kentucky 40506-0027 Abstract Let X and Y be real nored linear spaces and let φ :

More information

CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS. Nicholas Wage Appleton East High School, Appleton, WI 54915, USA.

CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS. Nicholas Wage Appleton East High School, Appleton, WI 54915, USA. INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 6 006, #A18 CHARACTER SUMS AND RAMSEY PROPERTIES OF GENERALIZED PALEY GRAPHS Nicholas Wage Appleton East High School, Appleton, WI 54915, USA

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint.

A := A i : {A i } S. is an algebra. The same object is obtained when the union in required to be disjoint. 59 6. ABSTRACT MEASURE THEORY Having developed the Lebesgue integral with respect to the general easures, we now have a general concept with few specific exaples to actually test it on. Indeed, so far

More information

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n

THE POLYNOMIAL REPRESENTATION OF THE TYPE A n 1 RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n THE POLYNOMIAL REPRESENTATION OF THE TYPE A n RATIONAL CHEREDNIK ALGEBRA IN CHARACTERISTIC p n SHEELA DEVADAS AND YI SUN Abstract. We study the polynoial representation of the rational Cherednik algebra

More information

NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS

NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volue 126, Nuber 3, March 1998, Pages 687 691 S 0002-9939(98)04229-4 NON-COMMUTATIVE GRÖBNER BASES FOR COMMUTATIVE ALGEBRAS DAVID EISENBUD, IRENA PEEVA,

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

VC Dimension and Sauer s Lemma

VC Dimension and Sauer s Lemma CMSC 35900 (Spring 2008) Learning Theory Lecture: VC Diension and Sauer s Lea Instructors: Sha Kakade and Abuj Tewari Radeacher Averages and Growth Function Theore Let F be a class of ±-valued functions

More information