Complete characterization of generalized bent and 2 k -bent Boolean functions
|
|
- Eunice Houston
- 5 years ago
- Views:
Transcription
1 Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean functions and k -bent (i.e., negabent, octabent, hexadecabent, et al.) Boolean functions in a uniform framework. We generalize the work of Stǎnicǎ et al., present necessary and sufficient conditions for generalized bent Boolean functions and k -bent Boolean functions in terms of classical bent functions, and completely characterize these functions in a combinatorial form. The result of this paper further shows that all generalized bent Boolean functions are regular. Index Terms Boolean functions, Walsh-Hadamard transforms, k -bent functions, generalized bent functions, cyclotomic fields I. INTRODUCTION Throughout this paper, let Z k be the ring of integers modulo k, Z n be the n-dimensional vector space over Z, and C the field of complex numbers, where k, n are positive integers. If x = (x 1,, x n ) and y = (y 1,, y n ) are two vectors in Z n, we define the scalar (or inner) product by x y = x 1 y x n y n. For a complex z = a + b 1, the absolute value of z is z = a + b and z = a b 1 denotes the complex conjugate of z, where a and b are real numbers. A function from Z n to Z k is called a generalized Boolean function on n variables [11], whose set is denote by GB k n. If k, a function in GB 1 n is a classical Boolean function on n variables. An important tool in the analysis of generalized Boolean function is the (generalized) Walsh-Hadamard transform, which is the function H g : Z n C, defined by H g (u) = n u x g(x), (1) k where g GB k n, u Z n, and k of such g is x Z n = e π 1 k is the complex k -primitive root of unity. The inverse Walsh-Hadamard transform g(x) k = n H g (u) u x. () u Z n The function g is said to be a generalized bent function if H g (u) for any u Z n. A generalized bent function g is regular if there exists some generalized Boolean function g satisfying H g (u) = g (u) for any u Z n k. Such function g is called the dual of g. From Equation (), the dual g of a regular generalized bent function g is also regular. When k, the generalized bent function g is just classical Boolean bent functions which have been introduced by Rothaus [8]. These bent functions only exist for n even. If n is odd, a function g GB 1 n is said to be a semibent function if and only if H g (u) 0, } for any u Z n. Such Boolean functions have been extensively studied, as they have important applications in cryptograph(stream ciphers [1]), sequences [6] and coding theory (Reed-Muller codes [3]). We refer to [], [4], [5], [16] for more on cryptographic Boolean function and bent functions. When k =, generalized Boolean functions in GB n were studied by Schmidt [10]. Solé and Tokareva [11] discussed the connection between generalized bent functions in GB n and bent functions in GB 1 n. Stǎnicǎ et al. [13] characterized generalized bent Boolean functions in GB n and GB 3 n. For Boolean functions f GB 1 n, the authors in [9], [7], [14], [15] introduced and investigated another transform which was called nega-hadamard transform. Later, Stǎnicǎ [1] generalized their results and proposed the k -Hadamard transform of f defined by H (k ) f (u) = n f(x)+u x wt(x), (3) k x Z n This work was supported by the National Natural Science Foundation of China (Grant No , ). C. Tang also acknowledges support from 14E013 and CXTD014-4 of China West Normal University. Y. Qi also acknowledges support from KSY of Hangzhou Dianzi University. The research of K. Feng was supported by NSFC No , and the Tsinghua National Lab. for Information Science and Technology. C. Tang is with School of Mathematics and Information, China West Normal University, Nanchong, Sichuan, 63700, China. tangchunmingmath@163.com C. Xiang is with the College of Mathematics and Information Science, Guangzhou University, Guangzhou , China. cxiangcxiang@hotmail.com Y. Qi is with School of Science, Hangzhou Dianzi University, Hangzhou, Zhejiang, , China. qiyanfeng07@163.com. K. Feng is with the Department of Mathematical Sciences, Tsinghua University, Beijing, , China. kfeng@math.tsinghua.edu.cn.
2 where u Z n and wt(x) = #i : 1 i n, x i 0} is the Hamming weight of x. A function f is called a k -bent function if the k -Hadamard transform are flat in absolute value, that is, H (k ) f (u), for any u Z n. We call a function f a strong k -bent function if and only if f is a l -bent function for any l k. Stǎnicǎ [1] completely characterized the octabent ( 3 -bent) and hexadecabent ( 4 -bent) functions in terms of bent functions. In this paper, we consider generalized bent Boolean functions in GB k n and k -bent functions in GB 1 n. Firstly, from the theory of cyclotomic fields we prove that all generalized bent Boolean functions are regular, i.e., their dual exist. Secondly, we completely characterize the generalized bent Boolean functions in GB k n (k 3) in terms of bent functions and also describe these functions by a combinatorial form. Finally, we associate every function in GB 1 n with a function in GB k n. Consequently, we completely characterize the k (k 3) bent Boolean functions in GB 1 n in terms of bent functions and also describe these functions by a combinatorial form. II. SOME RESULTS ON CYCLOTOMIC FIELDS AND THE REGULARITY OF GENERALIZED BENT BOOLEAN FUNCTIONS In this section we will give some results on cyclotomic fields, which will be used in the following sections. We also prove that any generalized bent Boolean function in GB k n (k 3) is always regular. Firstly, we state some basic facts on the cyclotomic field K = Q( k), which can be found in any book on algebraic number theory, such as [17] for example. Let O K be the ring of integers of K = Q( k). Any nonzero ideal A of O K can be uniquely(up to the order) expressed as A = P a1 1 P as s, where P 1,, P s are distinct(nonzero) prime ideals of O K and a i 1(1 i s). In other words, the set S(K) of all nonzero ideals of O K is a free multiplicative commutative semigroup with a basis B(K), the set of all nonzero prime ideals of O K. Such semigroup S(K) can be extended to the commutative group I(K), called the group of fractional ideals of K. Each element of I(K), called a fractional ideal, has the form AB 1, where A, B are ideals of O K. For each α K = K\0}, αo K is a fractional ideal, called a principal fractional ideal. And we have (αo K )(βo K ) = αβo K and (αo K ) 1 = (α 1 )O K. Therefore, the set P (K) of all principal fractional ideals is a subgroup of I(K). Some results on K are given in the following lemmas. Lemma.1: Let k and K = Q( k), then (i) The field extension K/Q is Galois of degree and the Galois group Gal(K/Q) = σ j : j Z, j 1 mod }, where the automorphism σ j of K is defined by k j. Moreover, σ k 1 (α) = α for any α K. (ii) The ring of integers in K is O K = Z[ k] and j : 0 j 1} is an integral basis of O k K. The group of roots of unity in O K is W K = j : 0 j k 1}. k (iii) Let ε OK (the units of O K). Then ε W K if and only if ε. (iv) The principal ideal (1 k)o K is a prime ideal of O K and the rational prime is totally ramified in O K, i.e., O K = ((1 k)o K ). Lemma.: Let n be a positive integer, k 3, α O K, and α α. Then W K. n n Proof: From the condition (i) of Lemma.1 and α, we have n From the condition (iv) of Lemma.1, we have ασ 1 (α) = αα = n. (αo K )σ 1 (αo K ) = ((1 k)o K ) n. According to the uniqueness of the decomposition of (αo K )σ 1 (αo K ) and the condition (iv) of Lemma.1, we have Note that k 3 and 1 We immediately have and αo K = σ 1 (αo K ) = ((1 k)o K ) n k. = O K. From the condition (iv) of Lemma.1, we have ( n OK ) = (O K ) n = ((1 k)o K ) n. αo K = n OK = ((1 k)o K ) n k α n O K. From the condition (iii) of Lemma.1, this lemma follows. Theorem.3: Let k 3. Then every generalized bent Boolean function in GB k n is always regular. Proof: From the definition of generalized bent Boolean functions and Lemma., this lemma follows.
3 3 Lemma.4: Let γ a = v Z a v j=1 vj j, where a Z k and v = (v 1, v,, v ). Then e k a Z u a γ a, where e = j=1 u j j, u = (u 1, u,, u ), and u j Z. Further, γ a : a Z } is a basis of K = Q( k) over Q. Proof: For simplicity, denote A u a γ a. Then we have Since a Z a (u+v) = This completes the proof. Lemma.5: Let γ a = v Z A a Z v Z u a 0, v u. This leads to, v = u a Z v Z j=1 vj j k v a j=1 vj j k a Z a (u+v). A j=1 uj j = e k k. a v j=1 vj j, where a Z k and v = (v 1, v,, v ).Then e + k e+k k k u a γ a, a Z,a 1=u 1 where e = j=1 u j j, u = (u 1, u,, u ), and u j Z. Proof: When u 1 = 0, from Lemma.4 we have e + k e+k k ( u a + a1+u a )γ a a Z a Z k (1 + a1 ) u a γ a a Z,a 1=u 1 When u 1, from e+k = e k and Lemma.4 we have u a γ a. e + k e+k = e k e k k k ( u a u a a1 )γ a a Z a Z k (1 a1 ) u a γ a a Z,a 1=u 1 u a γ a. This completes the proof. Lemma.6: Let a Z and γ a = v Z a v j=1 vj j. Then k γ a = (1 + aj j+1). j=1
4 4 Proof: For simplicity, denote Then we have This completes the proof. A = (1 + aj j+1). j=1 A = ( ajvj vj j j=1 v j Z = a v v Z k ) j=1 vj j. k III. COMPLETE CHARACTERIZATION OF GENERALIZED BENT BOOLEAN FUNCTIONS In this section, we present the complete characterization of generalized bent Boolean functions in terms classical Boolean bent functions. Let g : Z n Z k be a generalized Boolean function. It turns out that the generalized Walsh-Hadamard spectrum of g can be described (albeit, in a comlicated manner) in terms of the Walsh-Hadamard spectrum of its Boolean components g i. Theorem 3.1: Let g(x) = i=0 g i(x) i, where g GB k n and g i GB 1 n. Then H g (u) where γ a = v Z a v j=1 vj j. k Proof: According to the definition of H g (u), we have Note that Therefore, we have n Hg (u) = x Z n = x Z n = x Z n = x Z n = x Z n g(x) k u x a Z i=0 gi(x) i u x k i=0 gi(x) i u x k u x i=0 gi(x) i+1 g0(x)+u x x Z n x Z n gi(x) i+1 g0(x)+u x g0(x)+u x (1 + ai i+1) aigi(x) = n Hg (u) x Z n a Z g0(x)+u x H g0+ aigi(u)γ a, ((1 + gi(x) ) + (1 gi(x) ) i+1) ((1 + i+1) + (1 i+1) gi(x) ). 1 + i+1 if a i = 0, (1 i+1) gi(x) if a i. a Z (1 + ai i+1) x Z n aigi(x) (1 + ai i+1) g0(x)+u x+ aigi(x).
5 5 According to the definition of H g0+ aigi(u), we have H g (u) a Z H g0+ aigi(u) (1 + ai i+1). From Lemma.6, this theorem follows. Theorem 3.: Let k 3 and g(x) = i=0 g i(x) i, where g GB k n and g i GB 1 n. Then g is generalized bent if and only if condition (i), for n even, respectively, (ii), for n odd hold, where: (i) For any u Z n, there exist some v Z and some b 0 Z such that H g0+ aigi(u) = v a+b0, for all a Z. (ii) For any u Z n, there exist some v Z and some b 0 Z such that H g a1+v1 aigi(u) = ṽ ã+b0, for all a Z, where ṽ = (v,, v ) and ã = (a,, a ). Proof: If g is generalized bent, then for any u, H g (u). From Lemma., one has H g (u) W K. Thus, H g (u) = or e, where e = k e k When n is even, suppose H g (u) = e k j=1 v j j and v j Z. and e = j=1 v j j. According to Theorem 3.1 and Lemma.4, we have H g (u) a Z a Z H g0+ aigi(u)γ a v a γ a. From the uniqueness of the expansion of H g (u) by the basis γ a : a Z }, we have where v only depends on g and u. Suppose H g (u) = e k e = j=1 v j j, it can be verified that H g0+ aigi(u) = v a, for any a Z, and e = j=1 v j j, by the same technique used in the case H g0+ aigi(u) = v a+1, for any a Z. When n is odd, suppose H g (u) = e. Note that e k = e k ( k ) = + (e k 3 )+ k. If H e k 3 k k g (u) = e k 3 k and e k 3 = j=1 v j j, by Theorem 3.1 and Lemma.5, we have Hg (u) ( H g0+ aigi(u))γ a a Z a Z,a 1=v 1 From the uniqueness of the expansion of H g (u) by the basis γ a : a Z } and H g0+ aigi(u) Q, we have v a H g0+ aigi(u) =, a 1 = v 1, 0, a 1 v 1. Hence, we obtain H g0+ aigi(u) = v a γ a. ṽ ã+v 1, a 1 = v 1, 0, a 1 v 1, where ṽ = (v,, v ) and ã = (a,, a ). If H g (u) = e k 3 and e k 3 = k j=1 v j j, by the same technique used in the case H g (u) = e k 3 and k e k 3 = j=1 v j j, it can be verified that ṽ ã+v 1+1 H g0+ aigi(u) =, a 1 = v 1, 0, a 1 v 1,
6 6 where ṽ = (v,, v ) and ã = (a,, a ). If the condition (i) or (ii) in this theorem holds, then from the definition of generalized bent functions a simple computation shows that g is generalized bent. Hence, the theorem follows. Remark The cases k = and k = 3 in Theorem 3. are investigated by Stǎnicǎ, et al. in [13]. Corollary 3.3: Let k 3 and g(x) = i=0 g i(x) i be generalized bent, where g GB k n and g i GB 1 n. Then, conditions (i), for n even, respectively, (ii), for n odd hold, where (i) g 0 + a ig i is bent for all a Z ; (ii) g 0 + a ig i is semibent, for all a Z. Proof: From Theorem 3., this corollary follows. Corollary 3.4: Let k 3 and g(x) = i=0 g i(x) i be generalized bent, where g GB k n and g i GB 1 n. Then, g π is always generalized bent, where g π is defined as (i), for n even, respectively, (ii), for n odd, where (i) g π (x) = g 0 (x) + g π(i)(x) i for any permutation π of 1,,, k 1}; (ii) g π (x) = g 0 (x) + g 1 (x) k + i= g π(i)(x) i for any permutation π of, 3,, k 1}. Proof: From Theorem 3., this corollary follows. Corollary 3.5: Let k 3, l k, and g(x) = i=0 g i(x) i be generalized bent, where g GB k n and g i GB 1 n. Then, g I is always generalized bent in GB l n, where g I is defined as (i), for n even, respectively, (ii), for n odd, where (i) g I (x) = g 0 (x) l 1 + l 1 j=1 g i j (x) l 1 j for any subset I = i 1,, i l 1 } of 1,,, k 1}, where #I = l 1; (ii) g I (x) = g 0 (x) l 1 + g 1 (x) l + l 1 j= g i j (x) l 1 j for any subset I = i,, i l 1 } of, 3,, k 1}, where #I = l. Proof: From Theorem 3., this corollary follows. Theorem 3.6: Let k 3 and g(x) = i=0 g i(x) i, where g GB k n and g i GB 1 n. For any w Z, we define the set Γ w = x Z n : (g 1 (x),, g (x)) = w}. Then g is generalized bent if and only if conditions (i), for n even, respectively, (ii), for n odd hold, where (i) For any u Z n, there exist some v Z and some b 0 Z such that g0(x)+u x b0 n, w = v, = 0, otherwise. (ii) For any u Z n, there exist some v Z and some b 0 Z such that b 0 n, w = (0, ṽ), g0(x)+u x = b 0 +v 1 n, w = (1, ṽ), 0, otherwise, where v = (v 1, ṽ). Proof: Let A = n H g0+ aigi(u). According to the definition of H g 0+ aigi(u), one obtains A = g0(x)+u x+ gi(x)ai x Z n = x Z n = w Z g0(x)+u x gi(x)ai ( g0(x)+u x ) w a. Suppose g is generalized bent. When n is even, from Theorem 3., we have A = ( g0(x)+u x ) w a w Z = n b 0 v a, where a Z. Since w a (w Z ) as functions from Z to C (a w a ) are linear independent over C. Hence, we obtain g0(x)+u x b0 n, w = v, = 0, otherwise.
7 7 When n is odd, from Theorem 3. we have A = = n w Z ( g0(x)+u x ) w a 1 + a1+v1 ṽ ã+b0. where a Z, v = (v 1, ṽ), and a = (a 1, ã). Let c w = g0(x)+u x. Then one gets A = c w w a = w Z w 1 Z, w Z k = = n w Z k c w w1 a1 w ã (c (0, w) + c (1, w) a1 ) w ã 1 + a1+v1 b0 ṽ ã. Since w ã ( w Z k ) as functions from Z k to C (ã w ã ) are linear independent over C. Hence, we obtain 1+ a 1 +v 1 c (0, w) + c (1, w) a1 = b0 n, w = ṽ, 0, otherwise, where a 1 Z. This implies that 0 n, w = (0, ṽ), g0(x)+u x = b 0 +v 1 n, w = (1, ṽ), 0, otherwise. If the condition (i) or (ii) holds, from the definition of generalized bent functions, g is generalized bent. Hence, this theorem follows. IV. COMPLETE CHARACTERIZATION OF k -BENT BOOLEAN FUNCTIONS In this section, we consider the characterization of k -bent Boolean functions, connect k -bent Boolean functions with generalized bent functions, and characterize k -bent Boolean functions in terms of bent Boolean functions. For any f GB 1 n, we give a unique generalized boolean function g GB k n such that g(x) = f(x) + wt(x). (4) Suppose g(x) = i=0 g i(x) i, where g i GB 1 n. From Lemma 5 of [1], we have f(x) + s g i (x) = (x), i = 0, s i(x), 1 i k 1, where s i(x) are the elementary symmetric polynomials of degree i (we use the convention that s i(x) = 0, if x Z n, and i > n). The following theorem gives the relationship between f and g. Theorem 4.1: Let f and g defined as Equation (4). Then Further, f is k -bent if and only if g is generalized bent. Proof: According to the definition of H g (u), we have H g (u) = n = n = n H (k ) f (u) = H g (u). x Z n x Z n x Z n =H (k ) f (u). u x g(x) k u x f(x) +wt(x) k f(x)+u x wt(x) k (5)
8 8 Then f is k -bent if and only if g is generalized bent. Hence, this theorem follows. Theorem 4.: Let k 3 and f GB 1 n. Then f is k -bent if and only if conditions (i), for n even, respectively, (ii), for n odd hold, where (i) For any u Z n, there exist some v Z and some b 0 Z such that H f+s + ais i (u) = v a+b0, for any a Z. (ii) For any u Z n, there exist some v Z and some b 0 Z such that 1 + H f+s + a1+v1 ais (u) = ṽ ã+b0, i for any a Z, where ṽ = (v,, v ), and ã = (a,, a ). Proof: From Theorem 4.1, Theorem 3., and Equation (5), this theorem follows. Remark The case k = in Theorem 4. was considered by Stǎnicǎ et al. [14]. Stǎnicǎ [1] investegated cases k = 3, 4 in Theorem 4.. Corollary 4.3: Let k 3 and f GB 1 n be k -bent. Then, conditions (i), for n even, respectively, (ii), for n odd hold, where (i) f + s + k i=0 a is i is bent for all a Z ; (ii) f + s + k i=0 a is i is semibent for all a Z,. Proof: From Theorem 4., this corollary follows. Corollary 4.4: Let k 3 and f GB 1 n be a strong k -bent function. Then, conditions (i), for n even, respectively, (ii), for n odd hold, where (i) f + i=0 a is i is bent for all a Z k ; (ii) f + i=0 a is i is semibent for all a Z k. Proof: The conclusion follows from Corollary 4.3. Theorem 4.5: Let k 3 and f GB 1 n. For any w Z, denote the following set Γ w = x Z n : (s k (x),, s 0(x)) = w}. Then, f is k -bent if and only if conditions (i), for n even, respectively, (ii), for n odd hold, where (i) For any u Z n, there exist some v Z and some b 0 Z such that f(x)+s (x)+u x b0 n, w = v, = 0, otherwise. (ii) For any u Z n, there exist some v Z and some b 0 Z such that b 0 n, w = (0, ṽ), f(x)+s (x)+u x = b 0 +v 1 n, w = (1, ṽ), 0, otherwise, where v = (v 1, ṽ). Proof: From Theorem 4., this theorem follows. Corollary 4.6: Let n 3 and f GB 1 n be k -bent. Then k log n + 1. Proof: Suppose k > log n + 1. Then n = k i=0 w i i and w i 0, 1}. By the definition of Γ w, we have From Theorem 4.5 and n 3, we have This leads to a contradiction and completes the proof. Γ w = (1, 1,, 1)}. }} n 1 = #Γ w 0 mod. V. CONCLUDING REMARKS This paper generalized the work of Stǎnicǎ et al. on generalized Boolean bent functions and k -bent Boolean functions[1], [13], [14]. We showed that every generalized bent Boolean function was regular. A complete characterization for generalized Boolean bent functions and k -bent Boolean functions was presented in terms of bent functions. And we also completely characterized these functions in a combinatoric form. It would be interesting to characterize generalized p-ary bent functions.
9 9 REFERENCES [1] C. Carlet, Boolean functions for cryptography and error correcting codes, in Boolean Models and Methods in Mathematics, Computer Science, and Engineering, Y. Crama and P. L. Hammer, Eds. Cambridge, U.K.: Cambridge Univ. Press, 010, pp [] C. Carlet, Vectorial boolean functions for cryptography, in: Boolean Methods and Models, Cambridge University Press, Cambridge (010), [3] C. Charnes, M. Rotteler, T. Beth, Homogeneous bent functions, invariants, and designs, designs, codes and cryptography, 6(1-3), , 00 [4] T. W. Cusick, P. Stǎnicǎ, Cryptographic Boolean functions and Applications, Elsevier-Academic Press, 009. [5] S. Mesnager, Bent functions: fundamentals and results, Springer Verlag, New York, to appear. [6] J. D. Olsen, R. A. Scholtz, and L. R. Welch, Bent-function sequences, IEEE Trans. Inf. Theory, vol. 8, no. 6, pp , Nov [7] M. G. Parker, A. Pott, On Boolean functions which are bent and negabent. In: S.W. Golomb, G. Gong, T. Helleseth, H.-Y. Song (eds.), SSC 007, LNCS 4893 (007), Springer, Heidelberg, 9-3 [8] O. Rothaus, On bent functions, J. Combin. Theory, Ser. A V. 0. N 3. P [9] C. Riera, M. G. Parker, Generalized bent criteria for Boolean functions, IEEE Trans. Inf. Theory 5:9 (006), [10] K-U. Schmidt, Quaternary Constant-Amplitude Codes for Multicode CDMA, IEEE International Symposium on Information Theory-ISIT 007. (Nice, France. June 4-9, 007). Proc P Available at [11] P. Solé, N. Tokareva, Connections Between Quaternary and Binary Bent Functions /544.pdf; see also, Prikl. Diskr. Mat. 1, (009). [1] P. Stǎnicǎ, On weak and strong k -bent Boolean functions, DOI /TIT , IEEE Transactions on Information Theory. [13] P. Stǎnicǎ, T.Martinsen, S. Gangopadhyay, B.K. Singh, Bent and generalized bent Boolean functions, Des. Codes Cryptogr.69(1), (013). [14] P. Stǎnicǎ, S. Gangopadhyay, A. Chaturvedi, A. K. Gangopadhyay, S. Maitra, Investigations on bent and negabent functions via the negahadamard transform, IEEE Trans. Inf. Theory 58 (01), [15] W. Su, A. Pott, X. Tang, Characterization of Negabent Functions and Construction of Bent-Negabent Functions With Maximum Algebraic Degree, IEEE Trans. Inf. Theory 59:6 (013), [16] N. Tokareva, Bent Functions-Results and Applications to Cryptography, Elsevier-Academic Press, 015. [17] L.C. Washington, Introduction to Cyclotomic Fields, GTM 83. Springer, New York (1997).
A New Class of Bent Negabent Boolean Functions
A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com
More informationConstructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice
Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationOn Boolean functions which are bent and negabent
On Boolean functions which are bent and negabent Matthew G. Parker 1 and Alexander Pott 2 1 The Selmer Center, Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Institute for Algebra
More informationCharacterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree
Characterization of Negabent Functions and Construction of Bent-Negabent Functions with Maximum Algebraic Degree 1 Wei Su Alexander Pott and Xiaohu Tang arxiv:105.6568v1 [cs.it] 30 May 01 Abstract We present
More informationSome properties of q-ary functions based on spectral analysis
Some properties of q-ary functions based on spectral analysis Deep Singh and Maheshanand Bhaintwal Department of Mathematics, Indian Institute of Technology Roorkee, Roorkee 247667 INDIA deepsinghspn@gmail.com,mahesfma@iitr.ernet.in
More informationFast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function
Fast Algebraic Immunity of 2 m + 2 & 2 m + 3 variables Majority Function Yindong Chen a,, Fei Guo a, Liu Zhang a a College of Engineering, Shantou University, Shantou 515063, China Abstract Boolean functions
More information1-Resilient Boolean Function with Optimal Algebraic Immunity
1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn
More informationSome results concerning global avalanche characteristics of two q-ary functions
Some results concerning global avalanche characteristics of two -ary functions Brajesh Kumar Singh Department of Mathematics, School of Allied Sciences, Graphic Era Hill University, Dehradun-4800 (Uttarakhand)
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More information6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012
6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,
More informationOn values of vectorial Boolean functions and related problems in APN functions
On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:
More informationarxiv: v1 [math.co] 6 Jan 2019
BENT FUNCTIONS FROM TRIPLES OF PERMUTATION POLYNOMIALS arxiv:1901.02359v1 [math.co] 6 Jan 2019 DANIELE BARTOLI, MARIA MONTANUCCI, AND GIOVANNI ZINI Abstract. We provide constructions of bent functions
More informationA Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity Ziran Tu and Yingpu deng Abstract In this paper, we propose a combinatoric conjecture
More informationQuadratic Almost Perfect Nonlinear Functions With Many Terms
Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce
More informationConstructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition
Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition Yu Lou 1, Huiting Han 1, Chunming Tang 1, and Maozhi Xu 1,2 1 LMAM, School of Mathematical Sciences, Peing
More informationarxiv: v1 [cs.it] 31 May 2013
Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date
More informationBalanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity Xiaohu Tang 1, Deng Tang 1, Xiangyong Zeng and Lei Hu 3 In this paper, we present a class of k-variable balanced
More informationA construction of Boolean functions with good cryptographic properties
A construction of Boolean functions with good cryptographic properties Jong H. Chung 1, Pantelimon Stănică 1, Chik-How Tan, and Qichun Wang 1 Department of Applied Mathematics, Naval Postgraduate School,
More informationCOUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS
italian journal of pure and applied mathematics n. 37 2017 (173 182) 173 COUNT AND CRYPTOGRAPHIC PROPERTIES OF GENERALIZED SYMMETRIC BOOLEAN FUNCTIONS Shashi Kant Pandey Department of Mathematics University
More informationGENERALIZED WALSH TRANSFORMS OF SYMMETRIC AND ROTATION SYMMETRIC BOOLEAN FUNCTIONS ARE LINEAR RECURRENT
GENERALIZED WALSH TRANSFORMS OF SYMMETRIC AND ROTATION SYMMETRIC BOOLEAN FUNCTIONS ARE LINEAR RECURRENT FRANCIS N. CASTRO, LUIS A. MEDINA, AND PANTELIMON STĂNICĂ Abstract. Exponential sums of symmetric
More informationCONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent
Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial
More informationCorrelation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields
Correlation of Binary Sequence Families Derived from Multiplicative Character of Finite Fields Zilong Wang and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo,
More informationHadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights
Hadamard Matrices, d-linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights Qichun Wang Abstract It is known that correlation-immune (CI) Boolean functions used
More informationHaar Spectrum of Bent Boolean Functions
Malaysian Journal of Mathematical Sciences 1(S) February: 9 21 (216) Special Issue: The 3 rd International Conference on Mathematical Applications in Engineering 21 (ICMAE 1) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationConstruction of Some New Classes of Boolean Bent Functions and Their Duals
International Journal of Algebra, Vol. 11, 2017, no. 2, 53-64 HIKARI Ltd, www.-hikari.co https://doi.org/10.12988/ija.2017.61168 Construction of Soe New Classes of Boolean Bent Functions and Their Duals
More informationEven Periodic and Odd Periodic Complementary Sequence Pairs from Generalized Boolean Functions
Even Periodic and Odd Periodic Complementary Sequence Pairs from Generalized Boolean Functions Yang Yang 1,2,3 Xiaohu Tang 1 and Guang Gong 2 1 Institute of Mobile Communications, Southwest Jiaotong University
More informationBoolean Functions Whose Restrictions are Highly Nonlinear
Boolean Functions Whose Restrictions are Highly Nonlinear Constanza Riera Høgskolen i Bergen Nygårdsgt. Bergen 58, Norway Email: csr@hib.no Matthew G. Parker Selmer Centre, nst. for nformatikk University
More informationAlmost Difference Sets and Their Sequences With Optimal Autocorrelation
2934 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001 Almost Difference Sets Their Sequences With Optimal Autocorrelation K. T. Arasu, Cunsheng Ding, Member, IEEE, Tor Helleseth,
More informationNew quaternary sequences of even length with optimal auto-correlation
. RESEARCH PAPER. SCIENCE CHINA Information Sciences February 2018, Vol. 61 022308:1 022308:13 doi: 10.1007/s11432-016-9087-2 New quaternary sequences of even length with optimal auto-correlation Wei SU
More informationFourier Spectra of Binomial APN Functions
Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra
More informationHyperbent functions, Kloosterman sums and Dickson polynomials
Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department
More information1. Group Theory Permutations.
1.1. Permutations. 1. Group Theory Problem 1.1. Let G be a subgroup of S n of index 2. Show that G = A n. Problem 1.2. Find two elements of S 7 that have the same order but are not conjugate. Let π S 7
More informationA New Characterization of Semi-bent and Bent Functions on Finite Fields
A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The
More informationConstructing differential 4-uniform permutations from know ones
Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is
More informationFOR a positive integer n and a prime p, let F p n be
1 Several new classes of Boolean functions with few Walsh transform values Guangkui Xu, Xiwang Cao, Shangding Xu arxiv:1506.0886v1 [cs.it] Jun 2015 Abstract In this paper, several new classes of Boolean
More informationarxiv: v2 [cs.it] 12 Jul 2018
MDS codes with arbitrary dimensional hull and their applications Gaojun Luo 1, Xiwang Cao 1, arxiv:1807.03166v [cs.it] 1 Jul 018 Friday 13 th July, 018 Abstract The hull of linear codes have promising
More informationCharacterizations on Algebraic Immunity for Multi-Output Boolean Functions
Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School
More informationLarge Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences
Large Zero Autocorrelation Zone of Golay Sequences and 4 q -QAM Golay Complementary Sequences Guang Gong 1 Fei Huo 1 and Yang Yang 2,3 1 Department of Electrical and Computer Engineering University of
More informationWell known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne
Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,
More informationhas the two-level autocorrelation function for (2) otherwise, where the periodic unnormalized autocorrelation function of the sequence is defined as
1530 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 3, MARCH 2011 Trace Representation Linear Complexity of Binary eth Power Residue Sequences of Period p Zongduo Dai, Guang Gong, Hong-Yeop Song,
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationPerfect Algebraic Immune Functions
Perfect Algebraic Immune Functions Meicheng Liu, Yin Zhang, and Dongdai Lin SKLOIS, Institute of Information Engineering, CAS, Beijing 100195, P. R. China meicheng.liu@gmail.com, zhangy@is.iscas.ac.cn,
More informationHyper-bent Functions
Hyper-bent Functions Amr M. Youssef 1 and Guang Gong 2 1 Center for Applied Cryptographic Research Department of Combinatorics & Optimization University of Waterloo, Waterloo, Ontario N2L3G1, CANADA a2youssef@cacr.math.uwaterloo.ca
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationSELF DUAL BENT FUNCTIONS
Boolean Functions: Cryptography and Applications Fonctions Booléennes : Cryptographie & Applications BFCA 08 SELF DUAL BENT FUNCTIONS Claude Carlet 1, Lars Eirik Danielsen 2, Matthew Geoffrey Parker 2
More informationOn the k-error linear complexity for p n -periodic binary sequences via hypercube theory
1 On the k-error linear complexity for p n -periodic binary sequences via hypercube theory Jianqin Zhou Department of Computing, Curtin University, Perth, WA 6102 Australia Computer Science School, Anhui
More informationConstructions of bent functions and difference sets KAISA NYBERG. University of Helsinki and Finnish Defence Forces
Constructions of bent functions and difference sets KAISA NYBERG University of Helsinki and Finnish Defence Forces 1. Introduction. Based on the work of Rothaus 1121, Olsen, Scholtz and Welch suggested
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationOn the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,
More informationCCZ-equivalence and Boolean functions
CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationThe Array Structure of Modified Jacobi Sequences
Journal of Mathematics Research; Vol. 6, No. 1; 2014 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education The Array Structure of Modified Jacobi Sequences Shenghua Li 1,
More informationSecret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring
Journal of Computational Information Systems 9: 7 (2013) 2777 2784 Available at http://www.jofcis.com Secret Sharing Schemes from a Class of Linear Codes over Finite Chain Ring Jianzhang CHEN, Yuanyuan
More information9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class
9-variable Boolean Functions with Nonlinearity 242 in the Generalized Rotation Class Selçuk Kavut and Melek Diker Yücel arxiv:0808.0684v1 [cs.cr] 5 Aug 2008 Abstract In 2006, 9-variable Boolean functions
More informationarxiv: v1 [cs.dm] 20 Jul 2009
New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University
More informationSelf-Dual Cyclic Codes
Self-Dual Cyclic Codes Bas Heijne November 29, 2007 Definitions Definition Let F be the finite field with two elements and n a positive integer. An [n, k] (block)-code C is a k dimensional linear subspace
More informationConstruction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity
Pan SS, Fu XT, Zhang WG. Construction of 1-resilient Boolean functions with optimal algebraic immunity and good nonlinearity. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(2): 269 275 Mar. 2011. DOI 10.1007/s11390-011-1129-4
More informationSome Results on the Arithmetic Correlation of Sequences
Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are
More informationDesign of Pseudo-Random Spreading Sequences for CDMA Systems
Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,
More informationA matrix approach for constructing quadratic APN functions
Noname manuscript No (will be inserted by the editor) A matrix approach for constructing quadratic APN functions Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract We find a
More informationLIFTED CODES OVER FINITE CHAIN RINGS
Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We
More informationCryptographic Properties of the Hidden Weighted Bit Function
Cryptographic Properties of the Hidden Weighted Bit Function Qichun Wang a, Claude Carlet b, Pantelimon Stănică c, Chik How Tan a a Temasek Laboratories, National University of Singapore, 117411, Singapore.
More informationOn Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 1, JANUARY 2001 421 [4] A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans.
More informationComments on "Generating and Counting Binary Bent Sequences"
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 1994 Comments on "Generating and Counting Binary Bent Sequences" Claude
More informationMaiorana McFarland Functions with High Second Order Nonlinearity
Maiorana McFarland Functions with High Second Order Nonlinearity Nicholas Kolokotronis 1 and Konstantinos Limniotis 2,3 1 Department of Computer Science and Technology University of Peloponnese End of
More informationThe Dimension and Minimum Distance of Two Classes of Primitive BCH Codes
1 The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes Cunsheng Ding, Cuiling Fan, Zhengchun Zhou Abstract arxiv:1603.07007v1 [cs.it] Mar 016 Reed-Solomon codes, a type of BCH codes,
More informationSmart Hill Climbing Finds Better Boolean Functions
Smart Hill Climbing Finds Better Boolean Functions William Millan, Andrew Clark and Ed Dawson Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane, Queensland,
More informationThere are no Barker arrays having more than two dimensions
There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional
More informationConstructive proof of deficiency theorem of (g, f)-factor
SCIENCE CHINA Mathematics. ARTICLES. doi: 10.1007/s11425-010-0079-6 Constructive proof of deficiency theorem of (g, f)-factor LU HongLiang 1, & YU QingLin 2 1 Center for Combinatorics, LPMC, Nankai University,
More informationNew Constructions for Resilient and Highly Nonlinear Boolean Functions
New Constructions for Resilient and Highly Nonlinear Boolean Functions Khoongming Khoo 1 and Guang Gong 2 1 Department of Combinatorics and Optimization, 2 Department of Electrical and Computer Engineering,
More informationOn more bent functions from Dillon exponents
AAECC DOI 10.1007/s0000-015-058-3 ORIGINAL PAPER On more bent functions from Dillon exponents Long Yu 1 Hongwei Liu 1 Dabin Zheng Receive: 14 April 014 / Revise: 14 March 015 / Accepte: 4 March 015 Springer-Verlag
More informationCRYPTOGRAPHIC PROPERTIES OF ADDITION MODULO 2 n
CRYPTOGRAPHIC PROPERTIES OF ADDITION MODULO 2 n S. M. DEHNAVI, A. MAHMOODI RISHAKANI, M. R. MIRZAEE SHAMSABAD, HAMIDREZA MAIMANI, EINOLLAH PASHA Abstract. The operation of modular addition modulo a power
More informationFORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS
Sairaiji, F. Osaka J. Math. 39 (00), 3 43 FORMAL GROUPS OF CERTAIN Q-CURVES OVER QUADRATIC FIELDS FUMIO SAIRAIJI (Received March 4, 000) 1. Introduction Let be an elliptic curve over Q. We denote by ˆ
More informationOn Welch-Gong Transformation Sequence Generators
On Welch-Gong Transformation Sequence Generators G. Gong and A.M. Youssef Center for Applied Cryptographic Research, Department of Combinatorics and Optimization, University of Waterloo, Waterloo, Ontario
More informationOn the Arithmetic Walsh Coefficients of Boolean Functions
Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract
More informationCharacterizations of the differential uniformity of vectorial functions by the Walsh transform
Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis
More informationDIFFERENTIAL cryptanalysis is the first statistical attack
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of
More informationVectorial Boolean Functions for Cryptography
Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter
More informationOn A Special Case Of A Conjecture Of Ryser About Hadamard Circulant Matrices
Applied Mathematics E-Notes, 1(01), 18-188 c ISSN 1607-510 Available free at mirror sites of http://www.math.nthu.edu.tw/amen/ On A Special Case Of A Conjecture Of Ryser About Hadamard Circulant Matrices
More informationDe Bruijn Sequences from Nonlinear Feedback Shift Registers
De Bruijn Sequences from Nonlinear Feedback Shift Registers Ming Li and Dongdai Lin State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing
More informationStatistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study
International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute
More informationFunctions on Finite Fields, Boolean Functions, and S-Boxes
Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function
More informationarxiv: v1 [cs.it] 12 Jun 2016
New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials
More informationI. INTRODUCTION. A. Definitions and Notations
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 7, JULY 2010 3605 Optimal Sets of Frequency Hopping Sequences From Linear Cyclic Codes Cunsheng Ding, Senior Member, IEEE, Yang Yang, Student Member,
More informationSimple 3-(q + 1, 5, 3) designs admitting an automorphism group PSL(2, q) with q 1 (mod 4)
Simple -(q + 5 ) designs admitting an automorphism group PSL( q) with q (mod 4) Weixia Li School of Mathematical Sciences Qingdao University Qingdao 667 China Dameng Deng Department of Mathematics Shanghai
More informationRepeated-Root Self-Dual Negacyclic Codes over Finite Fields
Journal of Mathematical Research with Applications May, 2016, Vol. 36, No. 3, pp. 275 284 DOI:10.3770/j.issn:2095-2651.2016.03.004 Http://jmre.dlut.edu.cn Repeated-Root Self-Dual Negacyclic Codes over
More informationFour classes of permutation polynomials of F 2 m
Finite Fields and Their Applications 1 2007) 869 876 http://www.elsevier.com/locate/ffa Four classes of permutation polynomials of F 2 m Jin Yuan,1, Cunsheng Ding 1 Department of Computer Science, The
More informationSome Results on the Known Classes of Quadratic APN Functions
Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no
More informationON THE EQUATION X n 1 = BZ n. 1. Introduction
ON THE EQUATION X n 1 = BZ n PREDA MIHĂILESCU Abstract. We consider the Diophantine equation X n 1 = BZ n ; here B Z is understood as a parameter. We give new conditions for existence of solutions to this
More informationBalanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound
Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata
More informationA trace representation of binary Jacobi sequences
Discrete Mathematics 309 009) 1517 157 www.elsevier.com/locate/disc A trace representation of binary Jacobi sequences Zongduo Dai a, Guang Gong b, Hong-Yeop Song c, a State Key Laboratory of Information
More informationSinger and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few
New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More informationarxiv: v1 [math.nt] 2 Jul 2009
About certain prime numbers Diana Savin Ovidius University, Constanţa, Romania arxiv:0907.0315v1 [math.nt] 2 Jul 2009 ABSTRACT We give a necessary condition for the existence of solutions of the Diophantine
More informationDickson Polynomials that are Involutions
Dickson Polynomials that are Involutions Pascale Charpin Sihem Mesnager Sumanta Sarkar May 6, 2015 Abstract Dickson polynomials which are permutations are interesting combinatorial objects and well studied.
More informationCOMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125
COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 ROBERT S. COULTER AND PAMELA KOSICK Abstract. This note summarises a recent search for commutative semifields of order 243 and 3125. For each of these two orders,
More informationSome approaches to construct MDS matrices over a finite field
2017 6 Å 31 Å 2 ¹ June 2017 Communication on Applied Mathematics and Computation Vol.31 No.2 DOI 10.3969/j.issn.1006-6330.2017.02.001 Some approaches to construct MDS matrices over a finite field BELOV
More information