• Title/Summary/Keyword: permutation polynomials

Search Result 13, Processing Time 0.038 seconds

A Historical Note on Permutation Polynomials over Finite Fields (유한체상의 치환다항식에 관한 역사적 고찰)

  • Park Hong Goo
    • Journal for History of Mathematics
    • /
    • v.18 no.2
    • /
    • pp.117-126
    • /
    • 2005
  • In this paper, we analyze the basic concepts of permutation polynomials over finite fields, and the historical background through the use of the major classes of permutation polynomials over the fields. And also, we find a method of the polynomial representation with respect to cycles on the fields.

  • PDF

Construction of Block-LDPC Codes based on Quadratic Permutation Polynomials

  • Guan, Wu;Liang, Liping
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.157-161
    • /
    • 2015
  • A new block low-density parity-check (Block-LDPC) code based on quadratic permutation polynomials (QPPs) is proposed. The parity-check matrix of the Block-LDPC code is composed of a group of permutation submatrices that correspond to QPPs. The scheme provides a large range of implementable LDPC codes. Indeed, the most popular quasi-cyclic LDPC (QC-LDPC) codes are just a subset of this scheme. Simulation results indicate that the proposed scheme can offer similar error performance and implementation complexity as the popular QC-LDPC codes.

ON CERTAIN BINOMIALS OVER A FINITE FIELD

  • PARK HONG GOO
    • Journal of applied mathematics & informatics
    • /
    • v.18 no.1_2
    • /
    • pp.679-684
    • /
    • 2005
  • In this paper, we characterize a permutation property of a certain type of binomials over the field through the use of Hermite's criterion.

The design of a secure hash function using Dickson polynomial

  • Nyang, Dae-Hun;Park, Seung-Joon;Song, Joo-Seok
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.200-210
    • /
    • 1995
  • Almost all hash functions suggested up till now provide security by using complicated operations on fixed size blocks, but still the security isn't guaranteed mathematically. The difficulty of making a secure hash function lies in the collision freeness, and this can be obtained from permutation polynomials. If a permutation polynomial has the property of one-wayness, it is suitable for a hash function. We have chosen Dickson polynomial for our hash algorithm, which is a kind of permutation polynomials. When certain conditions are satisfied, a Dickson polynomial has the property of one-wayness, which makes the resulting hash code mathematically secure. In this paper, a message digest algorithm will be designed using Dickson polynomial.

  • PDF

LOCAL PERMUTATION POLYNOMIALS OVER FINITE FIELDS

  • Lee, Jung-Bok;Ko, Hyoung-June
    • Communications of the Korean Mathematical Society
    • /
    • v.9 no.3
    • /
    • pp.539-545
    • /
    • 1994
  • Let $q = p^r$, where p is a prime. A polynomial $f(x) \in GF(q)[x]$ is called a permutation polynomial (PP) over GF(q) if the numbers f(a) where $a \in GF(Q)$ are a permutation of the a's. In other words, the equation f(x) = a has a unique solution in GF(q) for each $a \in GF(q)$. More generally, $f(x_1, \cdots, x_n)$ is a PP in n variables if $f(x_1,\cdots,x_n) = \alpha$ has exactly $q^{n-1}$ solutions in $GF(q)^n$ for each $\alpha \in GF(q)$. Mullen ([3], [4], [5]) has studied the concepts of local permutation polynomials (LPP's) over finite fields. A polynomial $f(x_i, x_2, \cdots, x_n) \in GF(q)[x_i, \codts,x_n]$ is called a LPP if for each i = 1,\cdots, n, f(a_i,\cdots,x_n]$ is a PP in $x_i$ for all $a_j \in GF(q), j \neq 1$.Mullen ([3],[4]) found a set of necessary and three variables over GF(q) in order that f be a LPP. As examples, there are 12 LPP's over GF(3) in two indeterminates ; $f(x_1, x_2) = a_{10}x_1 + a_{10}x_2 + a_{00}$ where $a_{10} = 1$ or 2, $a_{01} = 1$ or x, $a_{00} = 0,1$, or 2. There are 24 LPP's over GF(3) of three indeterminates ; $F(x_1, x_2, x_3) = ax_1 + bx_2 +cx_3 +d$ where a,b and c = 1 or 2, d = 0,1, or 2.

  • PDF

PERMUTATION POLYNOMIALS OF THE TYPE $1 + X + CDOTS + X^K$

  • Kim, Kyung-Hee;Lee, June-Bok;Park, Young-H
    • Journal of the Korean Mathematical Society
    • /
    • v.33 no.1
    • /
    • pp.81-87
    • /
    • 1996
  • Let $F_q$ denote the finite field of order $q = p^n$, p a prime. A polynomial $f \in F_q[x]$ is called a permutation polynomial over $F_q$ if f induces a 1-1 map of $F_q$ onto itself.

  • PDF

PERMUTAON POLYNOMIALS OF THE TYPE 1+frac{q-1}{m}} + ax$

  • Kim, Seog-Young;Lee, June-Bok
    • Communications of the Korean Mathematical Society
    • /
    • v.10 no.4
    • /
    • pp.823-829
    • /
    • 1995
  • In this paper, we prove that $x^{1+\frac{q-1}{5}} + ax (a \neq 0)$ is not a permutation polynomial over $F_{q^r} (r \geq 2)$ and we show some properties of $x^{1+\frac{q-1}{m}} + ax (a \neq 0)$ over $F_{q^r} (r \geq 2)$.

  • PDF

The Proposition of the New Parameters to Improve Gutman's Model Reduction Method (Gutman의 모델 간략화법을 개선하기 위한 새로운 파라미터의 제안)

  • Eun, Sung-Soo;Choi, Tae-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1987.07a
    • /
    • pp.195-197
    • /
    • 1987
  • A new method of model reduction, based on the differentiation of polynomials, is Introduced by Gutman(1982). Without the reciprocal transformation, and the differentiation of the numerator and denominator polynomials of the transfer function, used by Gutman, the lower-order system can be obtained by the permutation of the order of numerator and denominator and the number of differentiation.

  • PDF