
显示样式: 排序: IF: - GO 导出
-
A comparison of group algebras of dihedral and quaternion groups Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-19 Leo Creedon, Kieran Hughes, Steve Szabo
The group algebras of the generalised quaternion groups and the dihedral groups of order a power of 2 are compared. Their group algebras over a finite field of characteristic 2 are known to be non-isomorphic and several new proofs of this are given which may be of independent interest. However, the two group algebras are very similar and are shown to have many ring theoretic properties in common. Lastly
-
On the symbol-pair distance of some classes of repeated-root constacyclic codes over Galois ring Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-19 Hai Q. Dinh, Narendra Kumar, Abhay Kumar Singh, Manoj Kumar Singh, Indivar Gupta, Paravee Maneejuk
Let \(\gamma = 4z-1\) be an unit of Type \((*^{-})\) of the Galois ring \({{\,\mathrm{GR}\,}}(2^a, m)\). The \(\gamma\)-constacyclic codes of length \(2^s\) over the Galois ring \({{\,\mathrm{GR}\,}}(2^a, m)\) are precisely the ideals \(\langle (x +1)^i \rangle\), \(0 \le i \le 2^sa\) of the chain ring \(\mathfrak {R}(a,m, \gamma ) = \dfrac{{{\,\mathrm{GR}\,}}(2^a,m)[x]}{\langle {x^{2^s}} - \gamma
-
A new class of distance-optimal binary cyclic codes and their duals Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-17 Kaiqiang Liu, Wenli Ren, Feng Wang, Jianpeng Wang
Let \(m=8k\) and \(\alpha\) be a primitive element of the finite field \({{\mathbb {G}}{\mathbb {F}}}(2^m)\), where \(k\ge 2\) is an integer. In this paper, a class of binary cyclic codes \({{\mathcal {C}}}_{(u,v)}\) of length \(2^m-1\) with two nonzeros \(\alpha ^{-u}\) and \(\alpha ^{-v}\) is studied, where \((u,v)=(1,(2^{m}-1)/17)\). It turns out that \({{\mathcal {C}}}_{(u,v)}\) has parameters
-
On the number of $${{\mathbb {Z}}}_{2}{{\mathbb {Z}}}_{4}$$ Z 2 Z 4 and $${{\mathbb {Z}}}_{p}{{\mathbb {Z}}}_{p^{2}}$$ Z p Z p 2 -additive cyclic codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-10 Eda Yildiz, Taher Abualrub, Ismail Aydogdu
In this paper, we give the exact number of \({{\mathbb {Z}}}_{2}{{\mathbb {Z}}}_{4}\)-additive cyclic codes of length \(n=r+s,\) for any positive integer r and any positive odd integer s. We will provide a formula for the the number of separable \({{\mathbb {Z}}_{2}{{\mathbb {Z}}_{4}}}\)-additive cyclic codes of length n and then a formula for the number of non-separable \({{\mathbb {Z}} _{2}{{\mathbb
-
On max-flat and max-cotorsion modules Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-06 Yusuf Alagöz, Engin Büyükaşık
In this paper, we continue to study and investigate the homological objects related to s-pure and neat exact sequences of modules and module homomorphisms. A right module A is called max-flat if \({\text {Tor}}_{1}^{R}(A, R/I)= 0\) for any maximal left ideal I of R. A right module B is said to be max-cotorsion if \({\text {Ext}}^{1}_{R}(A,B)=0\) for any max-flat right module A. We characterize some
-
On the weights of dual codes arising from the GK curve Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-06 Edoardo Ballico, Matteo Bonini
In this paper we investigate some dual algebraic-geometric codes associated with the Giulietti–Korchmáros maximal curve. We compute the minimum distance and the minimum weight codewords of such codes and we investigate the generalized Hamming weights of such codes.
-
Note on rings which are sums of a subring and an additive subgroup Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-06 Marek Kȩpczyk
Let R be a ring such that \(R=R_1+R_2\), where \(R_1\) is a PI subring of R and \(R_2\) is an additive subgroup of R which satisfies a polynomial identity. We prove that if for some integer \(n\ge 1\) either \((R_1R_2)^n \subseteq R_1\) or \((R_2R_1)^n \subseteq R_1\), then R is a PI ring.
-
Minimal PD-sets for codes associated with the graphs $$Q^m_2$$ Q 2 m , m even Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2021-01-05 J. D. Key, B. G. Rodrigues
For \(m\ge 4\) even, the duals of p-ary codes, for any prime p, from adjacency matrices for the m-ary 2-cube \(Q^m_2\) are shown to have subcodes with parameters \([m^2,2m-2,m]\) for which minimal PD-sets of size \(\frac{m}{2}\) are constructed, hence attaining the full error-correction capabilities of the code, and, as such, the most efficient sets for full permutation decoding.
-
Effective homological computations on finite topological spaces Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-26 Julián Cuevas-Rozo, Laureano Lambán, Ana Romero, Humberto Sarria
The study of topological invariants of finite topological spaces is relevant because they can be used as models of a wide class of topological spaces, including regular CW-complexes. In this work, we present a new module for the Kenzo system that allows the computation of homology groups with generators of finite topological spaces in different situations. Our algorithms combine new constructive versions
-
A note on flag-transitive automorphism groups of 2-designs with $$\lambda \ge (r,\lambda )^2$$ λ ≥ ( r , λ ) 2 Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-25 Zhilin Zhang, Hongxue Liang, Shenglin Zhou
In this paper, we prove that flag-transitive automorphism groups of 2-designs with \(10^3\ge \lambda \ge (r,\lambda )^2\) are point-primitive of affine or almost simple type.
-
Division polynomials on the Hessian model of elliptic curves Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-24 Perez Broon Fouazou Lontouo, Emmanuel Fouotsa, Daniel Tieudjo
In this paper we derive formulas for the scalar multiplication by n map, denoted [n], on the Hessian model of elliptic curve. This enables to characterize n-torsion points on this curve. The computation involves three families of polynomials \(P_n\), \(Q_n\) and \(V_n\) and we show some properties on the coefficients and degrees of these polynomials. We also show some functional equations satisfied
-
On the index of the Diffie–Hellman mapping Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-23 Leyla Işık, Arne Winterhof
Let \(\gamma\) be a generator of a cyclic group G of order n. The least index of a self-mapping f of G is the index of the largest subgroup U of G such that \(f(x)x^{-r}\) is constant on each coset of U for some positive integer r. We determine the index of the univariate Diffie–Hellman mapping \(d(\gamma ^a)=\gamma ^{a^2}\), \(a=0,1,\ldots ,n-1\), and show that any mapping of small index coincides
-
Self-dual additive codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-20 Steven T. Dougherty, Adrian Korban, Serap Şahinkaya
We define a self-dual code over a finite abelian group in terms of an arbitrary duality on the ambient space. We determine when additive self-dual codes exist over abelian groups for any duality and describe various constructions for these codes. We prove that there must exist self-dual codes under any duality for codes over a finite abelian group \({\mathbb {Z}}_{p^e}\). They exist for all lengths
-
One-weight codes in some classes of group rings Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-20 Raul Antonio Ferraz, Ruth Nascimento Ferreira
Let \({\mathbb {F}}_q\) be a finite field with q elements and G be a finite abelian group. In this work we gave conditions to ensure that a code in \({\mathbb {F}}_qG\) is a one-weight code in the case when G is a cyclic group with n elements, such that \({\text {gcd}}(n,q) = 1\), and also when G is an abelian group.
-
Formal weight enumerators and Chebyshev polynomials Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-11-19 Masakazu Yamagishi
A formal weight enumerator is a homogeneous polynomial in two variables which behaves like the Hamming weight enumerator of a self-dual linear code except that the coefficients are not necessarily nonnegative integers. The notion of formal weight enumerator was first introduced by Ozeki in connection with modular forms, and a systematic investigation of formal weight enumerators has been conducted
-
On greedy algorithms for binary de Bruijn sequences Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-15 Zuling Chang, Martianus Frederic Ezerman, Adamas Aqsa Fahreza
We propose a general greedy algorithm for binary de Bruijn sequences, called Generalized Prefer-Opposite Algorithm, and its modifications. By identifying specific feedback functions and initial states, we demonstrate that most previously-known greedy algorithms that generate binary de Bruijn sequences are particular cases of our algorithm.
-
LDPC codes constructed from cubic symmetric graphs Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-13 Dean Crnković, Sanja Rukavina, Marina Šimac
Low-density parity-check (LDPC) codes have been the subject of much interest due to the fact that they can perform near the Shannon limit. In this paper we present a construction of LDPC codes from cubic symmetric graphs. The codes constructed are (3, 3)-regular and the vast majority of the corresponding Tanner graphs have girth greater than four. We analyse properties of the codes obtained and present
-
Two approaches to the extension problem for arbitrary weights over finite module alphabets Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-12 Jay A. Wood
The extension problem underlies notions of code equivalence. Two approaches to the extension problem are described. One is a matrix approach that reduces the general problem for weights to one for symmetrized weight compositions. The other is a monoid algebra approach that reframes the extension problem in terms of modules over the monoid algebra determined by the multiplicative monoid of a finite
-
On the stability of periodic binary sequences with zone restriction Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-11 Ming Su, Qiang Wang
Traditional global stability measure for sequences is hard to determine because of large search space. We propose the k-error linear complexity with a zone restriction for measuring the local stability of sequences. For several classes of sequences, we demonstrate that the k-error linear complexity is identical to the k-error linear complexity within a zone, while the length of a zone is much smaller
-
Peterson–Gorenstein–Zierler algorithm for differential convolutional codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-10 José Gómez-Torrecillas, F. J. Lobillo, Gabriel Navarro, José Patricio Sánchez-Hernández
Differential Convolutional Codes with designed Hamming distance are defined, and an algebraic decoding algorithm, inspired by Peterson–Gorenstein–Zierler’s algorithm, is designed for them.
-
Self-dual codes over a family of local rings Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-07 Steven T. Dougherty, Cristina Fernández-Córdoba, Roger Ten-Valls
We construct an infinite family of commutative rings \({R_{q,\varDelta }}\) and we study codes over these rings as well as the structure of the rings. We define a canonical Gray map from \({R_{q,\varDelta }}\) to vectors over the residue finite field of q elements and use it to relate codes over \({R_{q,\varDelta }}\) to codes over the finite field \({\mathbb {F}}_q\). Finally, we determine the parameters
-
Non-embeddable quasi-residual quasi-symmetric designs Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-10-01 Vedran Krčadinac
Quasi-symmetric (36, 16, 12) designs with intersection numbers \(x=6\), \(y=8\) that cannot be embedded in symmetric (64, 28, 12) designs as residuals are constructed.
-
Support posets of some monomial ideals Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-09-27 Patricia Pascual-Ortigosa, E. Sáenz-de-Cabezón
The support poset of a monomial ideal \(I\subseteq {{\mathbf {k}}}[x_1,\ldots ,x_n]\) encodes the relation between the variables \(x_1,\ldots ,x_n\) and the minimal monomial generators of I. It is known that not every poset is realizable as the support poset of some monomial ideal. We describe some posets P for which we can explicitly find at least one monomial ideal \(I_P\) such that P is the support
-
InfoMod: a visual and computational approach to Gauss’ binary quadratic forms Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-09-19 Ayberk Zeytin
InfoMod is a software devoted to the modular group, \(\mathrm {PSL}_2 (\mathbf {Z})\). It consists of algorithms that deal with the classical correspondences among geodesics on the modular surface, elements of the modular group and binary quadratic forms. In addition, the software implements the recently discovered representation of Gauss’ indefinite binary quadratic forms and their classes in terms
-
On some conjectures about optimal ternary cyclic codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-09-09 Qian Liu, Ximeng Liu
Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems and communication systems as they have efficient encoding and decoding algorithms. In this paper, by investigating the solutions of certain equations over finite fields, we make progress towards three conjectures about optimal ternary cyclic codes which were proposed by Ding and Helleseth
-
On Kostant’s weight q -multiplicity formula for $$\mathfrak {sl}_{4}(\mathbb {C})$$ sl 4 ( C ) Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-09-08 Rebecca E. Garcia, Pamela E. Harris, Marissa Loving, Lucy Martinez, David Melendez, Joseph Rennie, Gordon Rojas Kirby, Daniel Tinoco
The q-analog of Kostant’s weight multiplicity formula is an alternating sum over a finite group, known as the Weyl group, whose terms involve the q-analog of Kostant’s partition function. This formula, when evaluated at \(q=1\), gives the multiplicity of a weight in a highest weight representation of a simple Lie algebra. In this paper, we consider the Lie algebra \(\mathfrak {sl}_4(\mathbb {C})\)
-
Further results on permutation polynomials from trace functions Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-09-03 Danyao Wu, Pingzhi Yuan
For a prime p and positive integers m, n, let \({{\mathbb {F}}}_q\) be a finite field with \(q=p^m\) elements and \({{\mathbb {F}}}_{q^n}\) be an extension of \({{\mathbb {F}}}_q.\) Let h(x) be a polynomial over \({{\mathbb {F}}}_{q^n}\) satisfying the following conditions: (i) \({\mathrm{Tr}}_m^{nm}(x)\circ h(x)=\tau (x)\circ {\mathrm{Tr}}_m^{nm}(x)\); (ii) For any \(s \in {{\mathbb {F}}}_{q}\), h(x)
-
Computing the equisingularity type of a pseudo-irreducible polynomial Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-08-24 Adrien Poteaux, Martin Weimann
Germs of plane curve singularities can be classified accordingly to their equisingularity type. For singularities over \(\mathbb {C}\), this important data coincides with the topological class. In this paper, we characterise a family of singularities, containing irreducible ones, whose equisingularity type can be computed in an expected quasi-linear time with respect to the discriminant valuation of
-
Toward involutive bases over effective rings Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-08-14 Michela Ceria, Teo Mora
In this paper we extend the theory of involutive divisions to the case of monomials with coefficients over effective rings. Moreover, as regards involutive bases, we study the computation of weak involutive bases and sketch a conjecture on strong involutive bases.
-
On some binary symplectic self-orthogonal codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-08-14 Heqian Xu, Wei Du
Symplectic self-orthogonal codes over finite fields are an important class of linear codes in coding theory, which can be used to construct quantum codes. In this paper, characterizations of symplectic self-orthogonal codes over finite fields \(F_{q}\) are given. A necessary and sufficient condition for determining symplectic self-orthogonal codes is obtained. Several classes of symplectic self-orthogonal
-
Correction to: Some classes of permutation polynomials of the form $$b(x^q+ax+\delta )^{\frac{i(q^2-1)}{d}+1}+c(x^q+ax+\delta )^{\frac{j(q^2-1)}{d}+1}+L(x)$$ b ( x q + a x + δ ) i ( q 2 - 1 ) d + 1 + c ( x q + a x + δ ) j ( q 2 - 1 ) d + 1 + L ( x ) over $$ \mathbb{F}_{q^2}$$ F q 2 Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-30 Danyao Wu, Pingzhi Yuan
Let q be a prime power.
-
New binary associative memory model based on the XOR operation Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-23 Juan Luis Díaz de León, Arturo Gamino Carranza
An associative memory is a special type of artificial neural network that has the purpose of store input patterns with their corresponding output patterns and efficiently recall a pattern from a noise-distorted version. Presented in this article is a new framework for constructing a binary associative memory model based on two new autoinverse operations called extended XOR/XNOR; these new operations
-
Toric varieties and Gröbner bases: the complete $$\mathbb {Q}$$ Q -factorial case Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-22 Michele Rossi, Lea Terracini
We present two algorithms determining all the complete and simplicial fans admitting a fixed non-degenerate set of vectors V as generators of their 1-skeleton. The interplay of the two algorithms allows us to discerning if the associated toric varieties admit a projective embedding, in principle for any values of dimension and Picard number. The first algorithm is slower than the second one, but it
-
On the multihomogeneous Bézout bound on the number of embeddings of minimally rigid graphs Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-21 Evangelos Bartzos, Ioannis Z. Emiris, Josef Schicho
Rigid graph theory is an active area with many open problems, especially regarding embeddings in \({\mathbb R}^d\) or other manifolds, and tight upper bounds on their number for a given number of vertices. Our premise is to relate the number of embeddings to that of solutions of a well-constrained algebraic system and exploit progress in the latter domain. In particular, the system’s complex solutions
-
A dynamic F4 algorithm to compute Gröbner bases Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-18 John Perry
The F4 algorithm re-imagines Buchberger’s algorithm as the row reduction of a Macaulay matrix: each row corresponds to a polynomial; each reduction of one row by another corresponds to one step of reducing an S-polynomial; and any row that completes reduction with a new pivot position corresponds to a new element of the basis. On the other hand, each column corresponds to a term, so that while it is
-
Efficient hash maps to $${\mathbb {G}}_2$$ G 2 on BLS curves Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-14 Alessandro Budroni, Federico Pintore
When a pairing \(e: {\mathbb {G}}_1 \times {\mathbb {G}}_2 \rightarrow {\mathbb {G}}_{T}\), on an elliptic curve E defined over a finite field \({\mathbb {F}}_q\), is exploited for an identity-based protocol, there is often the need to hash binary strings into \({\mathbb {G}}_1\) and \({\mathbb {G}}_2\). Traditionally, if E admits a twist \({\tilde{E}}\) of order d, then \({\mathbb {G}}_1=E({\mathbb
-
A comparison of unrestricted dynamic Gröbner Basis algorithms Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-13 Gabriel Mattos Langeloh
Dynamic Gröbner Basis algorithms aim to obtain small reduced Gröbner Bases in terms of number of polynomials and monomials. Dynamic algorithms allowing previous leading monomials to change during the execution, called unrestricted algorithms, are underexplored in the literature and the only previous unrestricted algorithm was not implemented. In this paper, we introduce a definition of neighborhoods
-
On the existence and non-existence of some classes of bent–negabent functions Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-07-12 Bimal Mandal, Subhamoy Maitra, Pantelimon Stănică
In this paper we investigate different questions related to bent–negabent functions. We first take an expository look at the state-of-the-art research in this domain and point out some technical flaws in certain results and fix some of them. Further, we derive a necessary and sufficient condition for which the functions of the form \({\mathbf{x}}\cdot \pi ({\mathbf{y}})\oplus h({\mathbf{y}})\) [Maiorana–McFarland
-
Quantum BCH codes with maximum designed distance Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-27 Xinmei Huang, Qin Yue, Xiaoping Shi, Yiwei Huang
In this paper, we investigate all coset leaders of primitive BCH codes for \(\delta\) in the range \(1\le \delta \le q^\frac{m+7}{2}\), which extends Liu and Shi’s results. Besides, we also generalize Shi’s results by proposing the maximum designed distance of non-narrow-sense(\(b=k_2q^2+k_1q+k_0\)) primitive BCH codes which can contain their Euclidean dual. At the end, we calculate the dimension of
-
Infinite families of 2-designs from linear codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-24 Xiaoni Du, Rong Wang, Chunming Tang, Qi Wang
Interplay between coding theory and combinatorial t-designs has attracted a lot of attention. It is well known that the supports of all codewords of a fixed Hamming weight in a linear code may hold a t-design. In this paper, we first settle the weight distributions of two classes of linear codes, and then determine the parameters of infinite families of 2-designs held in these codes.
-
A new lower bound on the family complexity of Legendre sequences Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-22 Yağmur Çakıroğlu, Oğuz Yayla
In this paper we study a family of Legendre sequences and its pseudo-randomness in terms of their family complexity. We present an improved lower bound on the family complexity of a family based on the Legendre symbol of polynomials over a finite field. The new bound depends on the Lambert W function and the number of elements in a finite field belonging to its proper subfield. Moreover, we present
-
A recurrent construction of irreducible polynomials of fixed degree over finite fields Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-15 Gohar M. Kyureghyan, Melsik K. Kyureghyan
In this paper we consider in detail the composition of an irreducible polynomial with \(X^2\) and suggest a recurrent construction of irreducible polynomials of fixed degree over finite fields of odd characteristics. More precisely, given an irreducible polynomial of degree n and order \(2^rt\) with t odd, the construction produces \(ord_t(2)\) irreducible polynomials of degree n and order t. The construction
-
Colouring simplicial complexes via the Lechuga–Murillo’s model Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-12 David Méndez
Lechuga and Murillo showed that a non-oriented, simple, connected, finite graph G is k-colourable if and only if a certain pure Sullivan algebra associated to G and k is not elliptic. In this paper, we extend this result to simplicial complexes by means of several notions of colourings of these objects.
-
Some classes of permutation polynomials of the form $$b(x^q+ax+\delta )^{\frac{i(q^2-1)}{d}+1}+c(x^q+ax+\delta )^{\frac{j(q^2-1)}{d}+1}+L(x)$$b(xq+ax+δ)i(q2-1)d+1+c(xq+ax+δ)j(q2-1)d+1+L(x) over $$ {{{\mathbb {F}}}}_{q^2}$$Fq2 Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-11 Danyao Wu, Pingzhi Yuan
Let s be a prime power and \( {{{\mathbb {F}}}}_q\) be a finite field with s elements. In this paper, we employ the AGW criterion to investigate the permutation behavior of some polynomials of the form $$\begin{aligned} b(x^q+ax+\delta )^{1+\frac{i(q^2-1)}{d}}+c(x^q+ax+\delta )^{1+\frac{j(q^2-1)}{d}}+L(x) \end{aligned}$$ over \( {{{\mathbb {F}}}}_{q^2}\) with \(a^{1+q}=1, q\equiv \pm 1\pmod {d}\) and
-
Multiple-rate error-correcting coding scheme Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-06-02 R. S. Raja Durai, Meenakshi Devi, Ashwini Kumar
Error-correcting codes that can effectively encode and decode messages of distinct lengths while maintaining a constant blocklength are considered. It is known conventionally that a k-dimensional block code of length n defined over \(\texttt {GF}(q^{n})\) is designed to encode a k-symbol user data in to an n-length codeword, resulting in a fixed-rate coding. In contrast, considering \(q=p^{\lambda
-
Double quadratic residue codes and self-dual double cyclic codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-05-29 Arezoo Soufi Karbaski, Taher Abualrub, Steven T. Dougherty
In this paper, we introduce double Quadratic Residue Codes (QRC) of length \(n=p+q\) for prime numbers p and q in the ambient space \({{\mathbb {F}}} _{2}^{p}\times {{\mathbb {F}}}_{2}^{q}.\) We give the structure of separable and non-separable double QRC over this alphabet and we show that interesting double QR codes in this space exist only in the case when \(p=q.\) We give the main properties for
-
On Euclidean self-dual codes and isometry codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-05-06 Lin Sok
In this paper, we provide new methods and algorithms to construct Euclidean self-dual codes over large finite fields. With the existence of a dual basis, we study dual preserving linear maps, and as an application, we use them to construct self-orthogonal codes over small finite prime fields using the method of concatenation. Many new optimal self-orthogonal and self-dual codes are obtained.
-
Boomerang uniformity of normalized permutation polynomials of low degree Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-29 Yan-Ping Wang, Qiang Wang, Wei-Guo Zhang
Differential uniformity of permutation polynomials has been studied intensively in recent years due to the differential cryptanalysis of S-boxes. The boomerang attack is a variant of differential cryptanalysis which combines two differentials for the upper part and the lower part of the block cipher. The boomerang uniformity measures the resistance of block ciphers to the boomerang attack. In this
-
On the RLWE/PLWE equivalence for cyclotomic number fields Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-28 Iván Blanco-Chacón
We study the equivalence between the ring learning with errors and polynomial learning with errors problems for cyclotomic number fields, namely: we prove that both problems are equivalent via a polynomial noise increase as long as the number of distinct primes dividing the conductor is kept constant. We refine our bound in the case where the conductor is divisible by at most three primes and we give
-
Self-dual cyclic codes over $${\mathbb {Z}}_4$$Z4 of length 4 n Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-27 Yuan Cao, Yonglin Cao, Fang-Wei Fu, Guidong Wang
For any odd positive integer n, we express cyclic codes over \({\mathbb {Z}}_4\) of length 4n in a new way. Based on the expression of each cyclic code \({\mathcal {C}}\), we provide an efficient encoder and determine the type of \({\mathcal {C}}\). In particular, we give an explicit representation and enumeration for all distinct self-dual cyclic codes over \({\mathbb {Z}}_4\) of length 4n and correct
-
Hamming distance of repeated-root constacyclic codes of length $$2p^s$$2ps over $${\mathbb {F}}_{p^m}+u{\mathbb {F}}_{p^m}$$Fpm+uFpm Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-24 Hai Q. Dinh, A. Gaur, Indivar Gupta, Abhay K. Singh, Manoj Kumar Singh, Roengchai Tansuchat
Let p be an odd prime, and \(\delta\) be an arbitrary unit of the finite chain ring \({\mathbb {F}}_{p^m}+u{\mathbb {F}}_{p^m} \,\, (u^2=0)\). The Hamming distances of all \(\delta\)-constacyclic codes of length \(2p^s\) over \({\mathbb {F}}_{p^m}+u{\mathbb {F}}_{p^m}\) are completely determined. We provide some examples from which some codes have better parameters than the existing ones. As applications
-
HELP: a sparse error locator polynomial for BCH codes Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-18 Michela Ceria, Teo Mora, Massimiliano Sala
In 1990 Cooper suggested to use Groebner bases’ computations to decode cyclic codes and his idea gave rise to many research papers. In particular, as proved by Sala-Orsini, once defined the polynomial ring whose variables are the syndromes, the locations and the error values and considered the syndrome ideal, only one polynomial of a lexicographical Groebner basis for such ideal is necessary to decode
-
Skew constacyclic codes over a non-chain ring $${\mathbb {F}}_{q}[u,v]/\langle f(u),g(v), uv-vu\rangle $$Fq[u,v]/⟨f(u),g(v),uv-vu⟩ Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-18 Swati Bhardwaj, Madhu Raka
Let f(u) and g(v) be two polynomials, not both linear, which split into distinct linear factors over \({\mathbb {F}}_{q}\). Let \({\mathcal {R}}={\mathbb {F}}_{q}[u,v]/\langle f(u),g(v),uv-vu\rangle \) be a finite commutative non-chain ring. In this paper, we study general skew cyclic codes and \(\theta _t\)-skew constacyclic codes over the ring \({\mathcal {R}}\) where \(\theta _t\) is an automorphism
-
A partial characterization of Hilbert quasi-polynomials in the non-standard case Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-17 Massimo Caboara, Carla Mascia
In this paper, we present some work towards a complete characterization of Hilbert quasi-polynomials of graded polynomial rings. In this setting, a Hilbert quasi-polynomial splits in a polynomial F and a lower degree quasi-polynomial G. We completely describe the periodic structure of G. Moreover, we give an explicit formula for the \((n-1)\)th and \((n-2)\)th coefficient of F, where n denotes the
-
Why you cannot even hope to use Gröbner bases in cryptography: an eternal golden braid of failures Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-17 Boo Barkee, Michela Ceria, Theo Moriarty, Andrea Visconti
In 1994, Moss Sweedler’s dog proposed a cryptosystem, known as Barkee’s Cryptosystem, and the related cryptanalysis. Its explicit aim was to dispel the proposal of using the urban legend that “Gröbner bases are hard to compute”, in order to devise a public key cryptography scheme. Therefore he claimed that “no scheme using Gröbner bases will ever work”. Later, further variations of Barkee’s Cryptosystem
-
A nonexistence certificate for projective planes of order ten with weight 15 codewords Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-15 Curtis Bright, Kevin Cheung, Brett Stevens, Dominique Roy, Ilias Kotsireas, Vijay Ganesh
Using techniques from the fields of symbolic computation and satisfiability checking we verify one of the cases used in the landmark result that projective planes of order ten do not exist. In particular, we show that there exist no projective planes of order ten that generate codewords of weight fifteen, a result first shown in 1973 via an exhaustive computer search. We provide a simple satisfiability
-
A trigonometric approach for Dickson polynomials over fields of characteristic two Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-15 Juliano B. Lima, Daniel Panario
In this paper, we first introduce a trigonometric approach for Dickson polynomials of the first and the second kinds over fields of characteristic two. Employing the proposed concepts, we revisit known properties of such polynomials. Additionally, we derive new results regarding the fixed points and the involutive behavior of Dickson polynomials of the second kind over \({\mathbb {F}}_{2^n}\).
-
Optimal RS-like LRC codes of arbitrary length Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-04-15 Charul Rajput, Maheshanand Bhaintwal
RS-like locally recoverable (LRC) codes have construction based on the classical construction of Reed–Solomon (RS) codes, where codewords are obtained as evaluations of suitably chosen polynomials. These codes were introduced by Tamo and Barg (IEEE Trans Inf Theory 60(8):4661–4676, 2014) where they assumed that the length n of the code is divisible by \(r+1\), where r is the locality of the code. They
-
On the error-detecting capability of the linear quasigroup code Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-03-17 Natasha Ilievska
In this paper we consider an error-detecting code based on linear quasigroups. Namely, each input block \(a_0a_1\ldots a_{n-1}\) is extended into a block \(a_0a_1\ldots a_{n-1}d_0d_1\ldots d_{n-1}\), where the redundant characters \(d_0, d_1, \ldots , d_{n-1}\) are defined with \(d_i=a_i*a_{i+1}*a_{i+2}\), where \(*\) is a linear quasigroup operation and the operations in the indexes are modulo n.
-
Near approximations in rings Appl. Algebra Eng. Commun. Comput. (IF 0.6) Pub Date : 2020-03-09 Bijan Davvaz, Soleha, Dian Winda Setyawati, Imam Mukhlash, Rinurwati
This paper is a continuation of ideas presented by Bagirmaz (Appl Algebra Eng Commun Comput 30(4):285–297, 2019). Indeed, we introduce the notion of near approximations in a ring, which is an extended notion of a rough approximations in a ring. Then we define lower and upper near subrings based on ideals in a ring and give some properties of such subrings. Furthermore, we obtain a comparison between