{"title":"On hyperelliptic Jacobians with complex multiplication by Q(−2+2)","authors":"Tomasz Jędrzejak","doi":"10.1016/j.ffa.2024.102512","DOIUrl":"10.1016/j.ffa.2024.102512","url":null,"abstract":"<div><div>Consider a one-parameter family of hyperelliptic curves <span><math><msub><mrow><mi>C</mi></mrow><mrow><mi>a</mi></mrow></msub><mo>:</mo><msup><mrow><mi>y</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>=</mo><msup><mrow><mi>x</mi></mrow><mrow><mn>5</mn></mrow></msup><mo>+</mo><mn>3</mn><mi>a</mi><msup><mrow><mi>x</mi></mrow><mrow><mn>4</mn></mrow></msup><mo>−</mo><mn>2</mn><msup><mrow><mi>a</mi></mrow><mrow><mn>2</mn></mrow></msup><msup><mrow><mi>x</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>−</mo><mn>6</mn><msup><mrow><mi>a</mi></mrow><mrow><mn>3</mn></mrow></msup><msup><mrow><mi>x</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>+</mo><mn>3</mn><msup><mrow><mi>a</mi></mrow><mrow><mn>4</mn></mrow></msup><mi>x</mi><mo>+</mo><msup><mrow><mi>a</mi></mrow><mrow><mn>5</mn></mrow></msup></math></span> defined over <span><math><mi>Q</mi></math></span>, and their Jacobians <span><math><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub></math></span> where without loss of generality <em>a</em> is a non-zero squarefree integer. Clearly, the curve <span><math><msub><mrow><mi>C</mi></mrow><mrow><mi>a</mi></mrow></msub></math></span> is a quadratic twist by <em>a</em> of <span><math><msub><mrow><mi>C</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>. Note that <span><math><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub></math></span> has complex multiplication by the quartic field <span><math><mi>Q</mi><mrow><mo>(</mo><msqrt><mrow><mo>−</mo><mn>2</mn><mo>+</mo><msqrt><mrow><mn>2</mn></mrow></msqrt></mrow></msqrt><mo>)</mo></mrow></math></span>. For a prime <span><math><mi>p</mi><mo>∤</mo><mn>2</mn><mi>a</mi></math></span> we obtain types of reduction (supersingular, superspecial, ordinary) of <span><math><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub></math></span> at <em>p</em> in terms of congruences modulo 16 and the exact formulas for the zeta function of <span><math><msub><mrow><mi>C</mi></mrow><mrow><mi>a</mi></mrow></msub></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><mi>p</mi></mrow></msub></math></span> for <span><math><mi>p</mi><mo>≢</mo><mn>1</mn><mo>,</mo><mn>7</mn><mrow><mo>(</mo><mi>mod</mi><mspace></mspace><mn>16</mn><mo>)</mo></mrow></math></span>. We deduce as conclusions the complete characterization of torsion subgroups of <span><math><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub><mrow><mo>(</mo><mi>Q</mi><mo>)</mo></mrow></math></span>, namely <span><math><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub><msub><mrow><mo>(</mo><mi>Q</mi><mo>)</mo></mrow><mrow><mi>tors</mi></mrow></msub><mo>=</mo><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub><mrow><mo>(</mo><mi>Q</mi><mo>)</mo></mrow><mrow><mo>[</mo><mn>2</mn><mo>]</mo></mrow><mo>≃</mo><mi>Z</mi><mo>/</mo><mn>2</mn><mi>Z</mi></math></span>, and some information about <span><math><mi>rank</mi><mspace></mspace><msub><mrow><mi>J</mi></mrow><mrow><mi>a</mi></mrow></msub><mrow><mo>(</mo><mi>Q</mi><m","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142427820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Erasure list-decodable codes and Turán hypercube problems","authors":"Noga Alon","doi":"10.1016/j.ffa.2024.102513","DOIUrl":"10.1016/j.ffa.2024.102513","url":null,"abstract":"<div><div>We observe that several vertex Turán type problems for the hypercube that received a considerable amount of attention in the combinatorial community are equivalent to questions about erasure list-decodable codes. Analyzing a recent construction of Ellis, Ivan and Leader, and determining the Turán density of certain hypergraph augmentations we obtain improved bounds for some of these problems.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142427819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear codes with few weights over finite fields","authors":"Yan Wang , Jiayi Fan , Nian Li , Fangyuan Liu","doi":"10.1016/j.ffa.2024.102509","DOIUrl":"10.1016/j.ffa.2024.102509","url":null,"abstract":"<div><div>Linear codes with a few weights have wide applications in digital signatures, authentication codes, secret sharing protocols and some other fields. Using definition sets to construct linear codes is an effective method. In this paper, we investigate a new defining set and obtain linear codes with four weights, five weights and six weights over <span><math><msub><mrow><mi>F</mi></mrow><mrow><mi>p</mi></mrow></msub></math></span>, where <em>p</em> is an odd prime number. The parameters and weight distribution of the constructed linear code are completely determined by accurately calculating the exponential sum over the finite field.</div></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142328070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The explicit values of the UBCT, the LBCT and the DBCT of the inverse function","authors":"Yuying Man , Nian Li , Zhen Liu , Xiangyong Zeng","doi":"10.1016/j.ffa.2024.102508","DOIUrl":"10.1016/j.ffa.2024.102508","url":null,"abstract":"<div><p>Substitution boxes (S-boxes) play a significant role in ensuring the resistance of block ciphers against various attacks. The Upper Boomerang Connectivity Table (UBCT), the Lower Boomerang Connectivity Table (LBCT) and the Double Boomerang Connectivity Table (DBCT) of a given S-box are crucial tools to analyze its security concerning specific attacks. However, there are currently no research results on determining these tables of a function. The inverse function is crucial for constructing S-boxes of block ciphers with good cryptographic properties in symmetric cryptography. Therefore, extensive research has been conducted on the inverse function, exploring various properties related to standard attacks. Thanks to the recent advances in boomerang cryptanalysis, particularly the introduction of concepts such as UBCT, LBCT, and DBCT, this paper aims to further investigate the properties of the inverse function <span><math><mi>F</mi><mo>(</mo><mi>x</mi><mo>)</mo><mo>=</mo><msup><mrow><mi>x</mi></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup><mo>−</mo><mn>2</mn></mrow></msup></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span> for arbitrary <em>n</em>. As a consequence, by carrying out certain finer manipulations of solving specific equations over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span>, we give all entries of the UBCT, LBCT of <span><math><mi>F</mi><mo>(</mo><mi>x</mi><mo>)</mo></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span> for arbitrary <em>n</em>. Besides, based on the results of the UBCT and LBCT for the inverse function, we determine that <span><math><mi>F</mi><mo>(</mo><mi>x</mi><mo>)</mo></math></span> is hard when <em>n</em> is odd. Furthermore, we completely compute all entries of the DBCT of <span><math><mi>F</mi><mo>(</mo><mi>x</mi><mo>)</mo></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span> for arbitrary <em>n</em>. Additionally, we provide the precise number of elements with a given entry by means of the values of some Kloosterman sums. Further, we determine the double boomerang uniformity of <span><math><mi>F</mi><mo>(</mo><mi>x</mi><mo>)</mo></math></span> over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>n</mi></mrow></msup></mrow></msub></math></span> for arbitrary <em>n</em>. Our in-depth analysis of the DBCT of <span><math><mi>F</mi><mo>(</mo><mi>x</mi><mo>)</mo></math></span> contributes to a better evaluation of the S-box's resistance against boomerang attacks.</p></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Oriented supersingular elliptic curves and Eichler orders of prime level","authors":"Guanju Xiao , Zijian Zhou , Longjiang Qu","doi":"10.1016/j.ffa.2024.102501","DOIUrl":"10.1016/j.ffa.2024.102501","url":null,"abstract":"<div><p>Let <span><math><mi>p</mi><mo>></mo><mn>3</mn></math></span> be a prime and <em>E</em> be a supersingular elliptic curve defined over <span><math><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>p</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></msub></math></span>. Let <em>c</em> be a prime with <span><math><mi>c</mi><mo><</mo><mn>3</mn><mi>p</mi><mo>/</mo><mn>16</mn></math></span> and <em>G</em> be a subgroup of <span><math><mi>E</mi><mo>[</mo><mi>c</mi><mo>]</mo></math></span> of order <em>c</em>. The pair <span><math><mo>(</mo><mi>E</mi><mo>,</mo><mi>G</mi><mo>)</mo></math></span> is called a supersingular elliptic curve with level-<em>c</em> structure, and the endomorphism ring <span><math><mtext>End</mtext><mo>(</mo><mi>E</mi><mo>,</mo><mi>G</mi><mo>)</mo></math></span> is isomorphic to an Eichler order with level <em>c</em>. We construct two kinds of Eichler orders <span><math><msub><mrow><mi>O</mi></mrow><mrow><mi>c</mi></mrow></msub><mo>(</mo><mi>q</mi><mo>,</mo><mi>r</mi><mo>)</mo></math></span> and <span><math><msubsup><mrow><mi>O</mi></mrow><mrow><mi>c</mi></mrow><mrow><mo>′</mo></mrow></msubsup><mo>(</mo><mi>q</mi><mo>,</mo><msup><mrow><mi>r</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>)</mo></math></span> with level <em>c</em>. Interestingly, we prove that each <span><math><msub><mrow><mi>O</mi></mrow><mrow><mi>c</mi></mrow></msub><mo>(</mo><mi>q</mi><mo>,</mo><mi>r</mi><mo>)</mo></math></span> or <span><math><msubsup><mrow><mi>O</mi></mrow><mrow><mi>c</mi></mrow><mrow><mo>′</mo></mrow></msubsup><mo>(</mo><mi>q</mi><mo>,</mo><msup><mrow><mi>r</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>)</mo></math></span> can represent a primitive reduced binary quadratic form with discriminant <span><math><mo>−</mo><mn>16</mn><mi>c</mi><mi>p</mi></math></span> or <span><math><mo>−</mo><mi>c</mi><mi>p</mi></math></span> respectively. If a curve <em>E</em> is <span><math><mi>Z</mi><mo>[</mo><msqrt><mrow><mo>−</mo><mi>c</mi><mi>p</mi></mrow></msqrt><mo>]</mo></math></span>-oriented or <span><math><mi>Z</mi><mo>[</mo><mfrac><mrow><mn>1</mn><mo>+</mo><msqrt><mrow><mo>−</mo><mi>c</mi><mi>p</mi></mrow></msqrt></mrow><mrow><mn>2</mn></mrow></mfrac><mo>]</mo></math></span>-oriented, then we prove that <span><math><mtext>End</mtext><mo>(</mo><mi>E</mi><mo>,</mo><mi>G</mi><mo>)</mo></math></span> is isomorphic to <span><math><msub><mrow><mi>O</mi></mrow><mrow><mi>c</mi></mrow></msub><mo>(</mo><mi>q</mi><mo>,</mo><mi>r</mi><mo>)</mo></math></span> or <span><math><msubsup><mrow><mi>O</mi></mrow><mrow><mi>c</mi></mrow><mrow><mo>′</mo></mrow></msubsup><mo>(</mo><mi>q</mi><mo>,</mo><msup><mrow><mi>r</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>)</mo></math></span> respectively. Due to the fact that <span><math><mi>Z</mi><mo>[</mo><msqrt><mrow><mo>−</mo><mi>c</mi><mi>p</mi></mrow></msqrt><mo>]</mo></math></span>-oriented isogenies between <span><math><mi>Z</mi><mo>[</mo><msqrt><mrow><mo>−</mo><mi>c</mi><mi>p</mi></mrow></msqrt><mo>]</mo></math></","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142240734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the duality of cyclic codes of length ps over Fpm[u]〈u3〉","authors":"Ahmad Erfanian , Roghaye Mohammadi Hesari","doi":"10.1016/j.ffa.2024.102500","DOIUrl":"10.1016/j.ffa.2024.102500","url":null,"abstract":"<div><p>In this paper, we determine the dual codes of cyclic codes of length <span><math><msup><mrow><mi>p</mi></mrow><mrow><mi>s</mi></mrow></msup></math></span> over <span><math><msub><mrow><mi>R</mi></mrow><mrow><mn>3</mn></mrow></msub><mo>=</mo><mfrac><mrow><msub><mrow><mi>F</mi></mrow><mrow><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi></mrow></msup></mrow></msub><mo>[</mo><mi>u</mi><mo>]</mo></mrow><mrow><mo>〈</mo><msup><mrow><mi>u</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>〉</mo></mrow></mfrac></math></span>, where <em>p</em> is a prime number and <span><math><msup><mrow><mi>u</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>=</mo><mn>0</mn></math></span>. Also, we improve and give correction of the results stated by B. Kim and J. Lee (2020) in <span><span>[11]</span></span>. Finally, we provide some examples of optimal and near-MDS cyclic codes of length <span><math><msup><mrow><mi>p</mi></mrow><mrow><mi>s</mi></mrow></msup></math></span> over <span><math><msub><mrow><mi>R</mi></mrow><mrow><mn>3</mn></mrow></msub></math></span> and compute dual of them.</p></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James A. Davis , Sophie Huczynska , Laura Johnson , John Polhill
{"title":"Denniston partial difference sets exist in the odd prime case","authors":"James A. Davis , Sophie Huczynska , Laura Johnson , John Polhill","doi":"10.1016/j.ffa.2024.102499","DOIUrl":"10.1016/j.ffa.2024.102499","url":null,"abstract":"<div><p>Denniston constructed partial difference sets (PDSs) with the parameters <span><math><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mn>3</mn><mi>m</mi></mrow></msup><mo>,</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>r</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup><mo>+</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup><mo>)</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup><mo>−</mo><mn>1</mn><mo>)</mo><mo>,</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup><mo>+</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>r</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup><mo>+</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup><mo>)</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup><mo>−</mo><mn>2</mn><mo>)</mo><mo>,</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi><mo>+</mo><mi>r</mi></mrow></msup><mo>−</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup><mo>+</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup><mo>)</mo><mo>(</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup><mo>−</mo><mn>1</mn><mo>)</mo><mo>)</mo></math></span> in elementary abelian groups of order <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>3</mn><mi>m</mi></mrow></msup></math></span> for all <span><math><mi>m</mi><mo>≥</mo><mn>2</mn><mo>,</mo><mn>1</mn><mo>≤</mo><mi>r</mi><mo><</mo><mi>m</mi></math></span>. These correspond to maximal arcs in Desarguesian projective planes of even order. In this paper, we show that - although maximal arcs do not exist in Desarguesian projective planes of odd order - PDSs with the Denniston parameters <span><math><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mn>3</mn><mi>m</mi></mrow></msup><mo>,</mo><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi><mo>+</mo><mi>r</mi></mrow></msup><mo>−</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi></mrow></msup><mo>+</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><mo>)</mo><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi></mrow></msup><mo>−</mo><mn>1</mn><mo>)</mo><mo>,</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi></mrow></msup><mo>−</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><mo>+</mo><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi><mo>+</mo><mi>r</mi></mrow></msup><mo>−</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi></mrow></msup><mo>+</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><mo>)</mo><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><mo>−</mo><mn>2</mn><mo>)</mo><mo>,</mo><mo>(</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi><mo>+</mo><mi>r</mi></mrow></msup><mo>−</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>m</mi></mrow></msup><mo>+</mo><msup><mrow><mi>p</mi></mrow><mrow","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1071579724001382/pdfft?md5=03b1e738d3c4bc750b4b0f4af02289e1&pid=1-s2.0-S1071579724001382-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142129238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The resultant method in higher dimensions","authors":"N. Harrach , L. Storme , P. Sziklai , M. Takáts","doi":"10.1016/j.ffa.2024.102493","DOIUrl":"10.1016/j.ffa.2024.102493","url":null,"abstract":"<div><p>Stability results play an important role in Galois geometries. The famous resultant method, developed by Szőnyi and Weiner <span><span>[12]</span></span>, <span><span>[11]</span></span>, became very fruitful and resulted in many stability theorems in the last two decades. This method is based on some bivariate polynomials associated to point sets. In this paper we generalize the method for the multidimensional case and show some new applications. We build up the multivariate polynomial machinery and apply it for <em>Rédei polynomials</em>. We can prove a high dimensional analogue of the result of Szőnyi-Weiner <span><span>[9]</span></span>, concerning the number of hyperplanes being skew to a point set of the space. We prove general results on “partial blocking sets”, using the tools we have developed.</p></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142097573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A note on (2,2)-isogenies via theta coordinates","authors":"Jianming Lin , Saiyu Wang , Chang-An Zhao","doi":"10.1016/j.ffa.2024.102496","DOIUrl":"10.1016/j.ffa.2024.102496","url":null,"abstract":"<div><p>In this paper, we revisit the algorithm for computing chains of <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-isogenies between products of elliptic curves via theta coordinates proposed by Dartois et al. For each fundamental block of this algorithm, we provide an explicit inversion-free version. Besides, we exploit the technique of <em>x</em>-only ladder to speed up the computation of gluing isogeny. Finally, we present a mixed optimal strategy, which combines the inversion-elimination tool with the original methods together to execute a chain of <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-isogenies.</p><p>We make a cost analysis and present a concrete comparison between ours and the previously known methods for inversion elimination. Furthermore, we implement the mixed optimal strategy for benchmark. The results show that when computing <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-isogeny chains with lengths of 126, 208 and 632, compared to Dartois, Maino, Pope and Robert's latest implementation, utilizing our techniques can reduce 9.7%, 9.5% and 9.6% multiplications over the base field <span><math><msub><mrow><mi>F</mi></mrow><mrow><mi>p</mi></mrow></msub></math></span>, respectively. Therefore, even for the updated version that employs their inversion-free algorithms, our tools still possess an advantage.</p></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142097567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Achromatic colorings of polarity graphs","authors":"Vladislav Taranchuk , Craig Timmons","doi":"10.1016/j.ffa.2024.102497","DOIUrl":"10.1016/j.ffa.2024.102497","url":null,"abstract":"<div><p>A complete partition of a graph <em>G</em> is a partition of the vertex set such that there is at least one edge between any two parts. The largest <em>r</em> such that <em>G</em> has a complete partition into <em>r</em> parts, each of which is an independent set, is the achromatic number of <em>G</em>. We determine the achromatic number of polarity graphs of biaffine planes coming from generalized polygons. Our colorings of a family of unitary polarity graphs are used to solve a problem of Axenovich and Martin on complete partitions of <span><math><msub><mrow><mi>C</mi></mrow><mrow><mn>4</mn></mrow></msub></math></span>-free graphs. Furthermore, these colorings prove that there are sequences of graphs which are optimally complete and have unbounded degree, a problem that had been studied for the sequence of hypercubes independently by Roichman, and Ahlswede, Bezrukov, Blokhuis, Metsch, and Moorhouse.</p></div>","PeriodicalId":50446,"journal":{"name":"Finite Fields and Their Applications","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142097574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}