minimal polynomial
Recently Published Documents


TOTAL DOCUMENTS

164
(FIVE YEARS 16)

H-INDEX

14
(FIVE YEARS 0)

Mathematics ◽  
2021 ◽  
Vol 9 (18) ◽  
pp. 2285
Author(s):  
Jiang Ma ◽  
Wei Zhao ◽  
Yanguo Jia ◽  
Xiumin Shen ◽  
Haiyang Jiang

Linear complexity is an important property to measure the unpredictability of pseudo-random sequences. Trace representation is helpful for analyzing cryptography properties of pseudo-random sequences. In this paper, a class of new Ding generalized cyclotomic binary sequences of order two with period pq is constructed based on the new segmentation of Ding Helleseth generalized cyclotomy. Firstly, the linear complexity and minimal polynomial of the sequences are investigated. Then, their trace representation is given. It is proved that the sequences have larger linear complexity and can resist the attack of the Berlekamp–Massey algorithm. This paper also confirms that generalized cyclotomic sequences with good randomness may be obtained by modifying the characteristic set of generalized cyclotomy.


Author(s):  
D. V. Koleda

Algebraic numbers are the roots of integer polynomials. Each algebraic number α is characterized by its minimal polynomial Pα that is a polynomial of minimal positive degree with integer coprime coefficients, α being its root. The degree of α is the degree of this polynomial, and the height of α is the maximum of the absolute values of the coefficients of this polynomial. In this paper we consider the distribution of algebraic numbers α whose degree is fixed and height bounded by a growing parameter Q, and the minimal polynomial Pα is such that the absolute value of its derivative P'α (α) is bounded by a given parameter X. We show that if this bounding parameter X is from a certain range, then as Q → +∞ these algebraic numbers are distributed uniformly in the segment [-1+√2/3.1-√2/3]


Author(s):  
Lorenzo Grassi ◽  
Christian Rechberger ◽  
Markus Schofnegger

Designing cryptographic permutations and block ciphers using a substitutionpermutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios.For word-oriented partial SPN (P-SPN) schemes with a fixed linear layer, our goal is to better understand how the details of the linear layer affect the security of the construction. In this paper, we derive conditions that allow us to either set up or prevent attacks based on infinitely long truncated differentials with probability 1. Our analysis is rather broad compared to earlier independent work on this problem since we consider (1) both invariant and non-invariant/iterative trails, and (2) trails with and without active S-boxes.For these cases, we provide rigorous sufficient and necessary conditions for the matrix that defines the linear layer to prevent the analyzed attacks. On the practical side, we present a tool that can determine whether a given linear layer is vulnerable based on these results. Furthermore, we propose a sufficient condition for the linear layer that, if satisfied, ensures that no infinitely long truncated differential exists. This condition is related to the degree and the irreducibility of the minimal polynomial of the matrix that defines the linear layer. Besides P-SPN schemes, our observations may also have a crucial impact on the Hades design strategy, which mixes rounds with full S-box layers and rounds with partial S-box layers.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Yan Wang ◽  
Liantao Yan ◽  
Qing Tian ◽  
Liping Ding

Ding constructed a new cyclotomic class V 0   , V 1 . Based on it, a construction of generalized cyclotomic binary sequences with period p q is described, and their autocorrelation value, linear complexity, and minimal polynomial are confirmed. The autocorrelation function C S w is 3-level if p ≡ 3 mod 4 , and C S w is 5-level if p ≡ 1 mod 4 . The linear complexity LC S > p q / 2 if p ≡ 1   mod   8 , p > q + 1 , or p ≡ 3 mod 4 or p ≡ − 3 mod 8 . The results show that these sequences have quite good cryptographic properties in the aspect of autocorrelation and linear complexity.


2021 ◽  
Vol 15 (1) ◽  
pp. 015-028
Author(s):  
Darlena Darlena ◽  
Ari Suparwanto

If the characteristic polynomial of a linear operator  is completely factored in scalar field of  then Jordan canonical form  of  can be converted to its rational canonical form  of , and vice versa. If the characteristic polynomial of linear operator  is not completely factored in the scalar field of  ,then the rational canonical form  of  can still be obtained but not its Jordan canonical form matrix . In this case, the rational canonical form  of  can be converted to its Jordan canonical form by extending the scalar field of  to Splitting Field of minimal polynomial   of , thus forming the Jordan canonical form of  over Splitting Field of  . Conversely, converting the Jordan canonical form  of  over Splitting Field of  to its rational canonical form uses symmetrization on the Jordan decomposition basis of  so as to form a cyclic decomposition basis of  which is then used to form the rational canonical matrix of


Mathematics ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 264
Author(s):  
Grzegorz Sroka ◽  
Mariusz Oszust

Markov-type inequalities are often used in numerical solutions of differential equations, and their constants improve error bounds. In this paper, the upper approximation of the constant in a Markov-type inequality on a simplex is considered. To determine the constant, the minimal polynomial and pluripotential theories were employed. They include a complex equilibrium measure that solves the extreme problem by minimizing the energy integral. Consequently, examples of polynomials of the second degree are introduced. Then, a challenging bilevel optimization problem that uses the polynomials for the approximation was formulated. Finally, three popular meta-heuristics were applied to the problem, and their results were investigated.


2020 ◽  
Vol 3 (3) ◽  
pp. 41-52
Author(s):  
Alexander Farrugia ◽  

A pseudo walk matrix \(\mathbf{W}_\mathbf{v}\) of a graph \(G\) having adjacency matrix \(\mathbf{A}\) is an \(n\times n\) matrix with columns \(\mathbf{v},\mathbf{A}\mathbf{v},\mathbf{A}^2\mathbf{v},\ldots,\mathbf{A}^{n-1}\mathbf{v}\) whose Gram matrix has constant skew diagonals, each containing walk enumerations in \(G\). We consider the factorization over \(\mathbb{Q}\) of the minimal polynomial \(m(G,x)\) of \(\mathbf{A}\). We prove that the rank of \(\mathbf{W}_\mathbf{v}\), for any walk vector \(\mathbf{v}\), is equal to the sum of the degrees of some, or all, of the polynomial factors of \(m(G,x)\). For some adjacency matrix \(\mathbf{A}\) and a walk vector \(\mathbf{v}\), the pair \((\mathbf{A},\mathbf{v})\) is controllable if \(\mathbf{W}_\mathbf{v}\) has full rank. We show that for graphs having an irreducible characteristic polynomial over \(\mathbb{Q}\), the pair \((\mathbf{A},\mathbf{v})\) is controllable for any walk vector \(\mathbf{v}\). We obtain the number of such graphs on up to ten vertices, revealing that they appear to be commonplace. It is also shown that, for all walk vectors \(\mathbf{v}\), the degree of the minimal polynomial of the largest eigenvalue of \(\mathbf{A}\) is a lower bound for the rank of \(\mathbf{W}_\mathbf{v}\). If the rank of \(\mathbf{W}_\mathbf{v}\) attains this lower bound, then \((\mathbf{A},\mathbf{v})\) is called a recalcitrant pair. We reveal results on recalcitrant pairs and present a graph having the property that \((\mathbf{A},\mathbf{v})\) is neither controllable nor recalcitrant for any walk vector \(\mathbf{v}\).


2020 ◽  
Vol 28 (3) ◽  
pp. 251-261
Author(s):  
Christoph Schwarzweller

Summary In [6], [7] we presented a formalization of Kronecker’s construction of a field extension of a field F in which a given polynomial p ∈ F [X]\F has a root [4], [5], [3]. As a consequence for every field F and every polynomial there exists a field extension E of F in which p splits into linear factors. It is well-known that one gets the smallest such field extension – the splitting field of p – by adjoining the roots of p to F. In this article we start the Mizar formalization [1], [2] towards splitting fields: we define ring and field adjunctions, algebraic elements and minimal polynomials and prove a number of facts necessary to develop the theory of splitting fields, in particular that for an algebraic element a over F a basis of the vector space F (a) over F is given by a 0 , . . ., an− 1, where n is the degree of the minimal polynomial of a over F .


2020 ◽  
Vol 81 (4) ◽  
Author(s):  
Stefano Fioravanti

AbstractWe investigate the finitary functions from a finite field $$\mathbb {F}_q$$ F q to the finite field $$\mathbb {F}_p$$ F p , where p and q are powers of different primes. An $$(\mathbb {F}_p,\mathbb {F}_q)$$ ( F p , F q ) -linearly closed clonoid is a subset of these functions which is closed under composition from the right and from the left with linear mappings. We give a characterization of these subsets of functions through the invariant subspaces of the vector space $$\mathbb {F}_p^{\mathbb {F}_q\backslash \{0\}}$$ F p F q \ { 0 } with respect to a certain linear transformation with minimal polynomial $$x^{q-1} - 1$$ x q - 1 - 1 . Furthermore we prove that each of these subsets of functions is generated by one unary function.


Sign in / Sign up

Export Citation Format

Share Document