{"title":"Best Paper Award in Memory of Jacques Calmet","authors":"","doi":"10.1007/s00200-025-00676-8","DOIUrl":"10.1007/s00200-025-00676-8","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 1","pages":"1 - 1"},"PeriodicalIF":0.6,"publicationDate":"2025-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Call for Papers: Special Issue of AAECC Dedicated to the Memory of Joos Heintz","authors":"","doi":"10.1007/s00200-024-00675-1","DOIUrl":"10.1007/s00200-024-00675-1","url":null,"abstract":"","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 1","pages":"3 - 4"},"PeriodicalIF":0.6,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142994789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security assessment of the LG cryptosystem","authors":"Étienne Burle, Hervé Talé Kalachi, Freddy Lende Metouke, Ayoub Otmani","doi":"10.1007/s00200-024-00671-5","DOIUrl":"10.1007/s00200-024-00671-5","url":null,"abstract":"<div><p>The LG cryptosystem is a public-key encryption scheme in the rank metric using the recent family of <span>(mathbf{mathrm {lambda }}-)</span>Gabidulin codes and introduced in 2019 by Lau and Tan. In this paper, we present a cryptanalysis showing that the security of several parameters of the scheme have been overestimated. We also show the existence of some weak keys allowing an attacker to find in polynomial time an alternative private key.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"187 - 198"},"PeriodicalIF":0.6,"publicationDate":"2024-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New extremal Type II ({mathbb {Z}}_4)-codes of length 64","authors":"Sara Ban Martinović, Sanja Rukavina","doi":"10.1007/s00200-024-00674-2","DOIUrl":"10.1007/s00200-024-00674-2","url":null,"abstract":"<div><p>Type II <span>({mathbb {Z}}_4)</span>-codes are a class of self-dual <span>({mathbb {Z}}_4)</span>-codes with Euclidean weights divisible by eight. A Type II <span>({mathbb {Z}}_4)</span>-code of length <i>n</i> is extremal if its minimum Euclidean weight is equal to <span>(8leftlfloor frac{n}{24}rightrfloor +8.)</span> A small number of such codes is known for lengths greater than or equal to 48. Based on the doubling method, in this paper we develop a method to construct new extremal Type II <span>({mathbb {Z}}_4)</span>-codes starting from a free extremal Type II <span>({mathbb {Z}}_4)</span>-code of length 48, 56 or 64. Using this method, we construct extremal Type II <span>({mathbb {Z}}_4)</span>-codes of length 64 and type <span>(4^{31}2^2)</span>. Extremal Type II <span>({mathbb {Z}}_4)</span>-codes of length 64 of this type were not known before. Moreover, the residue codes of the constructed extremal <span>({mathbb {Z}}_4)</span>-codes are best known [64, 31] binary codes and the supports of the minimum weight codewords of the residue code and the torsion code of one of these codes yields self-orthogonal 1-design.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"173 - 186"},"PeriodicalIF":0.6,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Plane curve germs and contact factorization","authors":"Joris van der Hoeven, Grégoire Lecerf","doi":"10.1007/s00200-024-00669-z","DOIUrl":"10.1007/s00200-024-00669-z","url":null,"abstract":"<div><p>Given an algebraic germ of a plane curve at the origin, in terms of a bivariate polynomial, we analyze the complexity of computing an irreducible decomposition up to any given truncation order. With a suitable representation of the irreducible components, and whenever the characteristic of the ground field is zero or larger than the degree of the germ, we design a new algorithm that involves a nearly linear number of arithmetic operations in the ground field plus a small amount of irreducible univariate polynomial factorizations.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"36 1","pages":"5 - 106"},"PeriodicalIF":0.6,"publicationDate":"2024-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142995792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"More constructions of permutation pentanomials and hexanomials over (mathbb {F}_{p^{2m}})","authors":"Ruihua Shen, Xianping Liu, Xiaofang Xu","doi":"10.1007/s00200-024-00673-3","DOIUrl":"10.1007/s00200-024-00673-3","url":null,"abstract":"<div><p>In this paper, two classes of permutation pentanomials over finite fields <span>(mathbb {F}_{p^{2m}})</span> are investigated by transforming the permutation property of polynomials to verifying that some low-degree equations has no solutions in the unit circle. Furthermore, based on the study of the algebraic curves for fractional polynomials, several classes of permutation pentanomials and hexanomials over <span>(mathbb {F}_{5^{2m}})</span> are discovered. Additionally, we obtain some new permutation pentanomials, quadrinomials and octonomials over <span>(mathbb {F}_{5^{2m}})</span> from known permutation polynomials in the unit circle.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"149 - 171"},"PeriodicalIF":0.6,"publicationDate":"2024-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ömür Deveci, Anthony G. Shannon, Özgür Erdağ, Güntaç Ceco
{"title":"The complex-type k-Padovan sequences and their applications","authors":"Ömür Deveci, Anthony G. Shannon, Özgür Erdağ, Güntaç Ceco","doi":"10.1007/s00200-024-00672-4","DOIUrl":"10.1007/s00200-024-00672-4","url":null,"abstract":"<div><p>In this paper, we define the complex-type <i>k</i>-Padovan numbers and then give the relationships between the <span>(left( 1,k-1right))</span>-bonacci numbers, the <i>k</i> -Padovan numbers and the complex-type <i>k</i>-Padovan numbers by matrix method. In addition, we study the complex-type <i>k</i>-Padovan sequence modulo <i>m</i> and then we show that for some <i>m</i> the periods of the complex type <i>k</i>-Padovan and <i>k</i>-Padovan sequences modulo <i>m</i> are related. Furthermore, we extend the complex-type <i>k</i>-Padovan sequences to groups. Finally, we obtain the periods of the complex-type 4, 5, 6-Padovan sequences in the semidihedral group <span>(SD_{2^{m}})</span>, <span>(left( mge 4right))</span> with respect to the generating pairs <span>(left( x,yright))</span> and <span>(left( y,xright))</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"131 - 147"},"PeriodicalIF":0.6,"publicationDate":"2024-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A degree bound for the c-boomerang uniformity of permutation monomials","authors":"Matthias Johann Steiner","doi":"10.1007/s00200-024-00670-6","DOIUrl":"10.1007/s00200-024-00670-6","url":null,"abstract":"<div><p>Let <span>(mathbb{F}_q)</span> be a finite field of characteristic <i>p</i>. In this paper we prove that the <i>c</i>-Boomerang Uniformity, <span>(c ne 0)</span>, for all permutation monomials <span>(x^d)</span>, where <span>(d > 1)</span> and <span>(p not mid d)</span>, is bounded by <span>(left{ begin{array}{ll} d^2, & c^2 ne 1, d cdot (d - 1), & c = - 1, d cdot (d - 2), & c = 1 end{array} right} .)</span> Further, we utilize this bound to estimate the <i>c</i>-boomerang uniformity of a large class of generalized triangular dynamical systems, a polynomial-based approach to describe cryptographic permutations of <span>(mathbb{F}_{q}^{n})</span>, including the well-known substitution–permutation network.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"95 - 130"},"PeriodicalIF":0.6,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-024-00670-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145915630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Double skew cyclic codes over (mathbb {F}_q+vmathbb {F}_q)","authors":"Ashutosh Singh, Tulay Yildirim, Om Prakash","doi":"10.1007/s00200-024-00668-0","DOIUrl":"10.1007/s00200-024-00668-0","url":null,"abstract":"<div><p>In order to get a better code rate, this study focuses on the construction of double skew cyclic codes over the ring <span>(textrm{R}= mathbb {F}_q+vmathbb {F}_q)</span> with <span>(v^2=v)</span>, where <i>q</i> is a prime power. We investigate the generator polynomials, minimal spanning sets, generator matrices, and the dual codes over the ring <span>(textrm{R})</span>. As an implementation, the obtained results are illustrated with some suitable examples. Here, we introduce a construction for new generator matrices and thus achieve codes with improved parameters compared to those available in the existing literature. Finally, we tabulate our obtained codes over the ring <span>(textrm{R})</span>.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"73 - 93"},"PeriodicalIF":0.6,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Álvarez-García, C. A. Castillo-Guillén, Mohamed Badaoui
{"title":"DNA codes over (GR(2^{3},d)[X]/langle X^{2},2X rangle)","authors":"C. Álvarez-García, C. A. Castillo-Guillén, Mohamed Badaoui","doi":"10.1007/s00200-024-00667-1","DOIUrl":"10.1007/s00200-024-00667-1","url":null,"abstract":"<div><p>The main results of this paper are in two directions. First, the family of finite local rings of length 4 whose annihilator of their maximal ideals have length 2 is determined. Second, the structure of constacyclic, reversible and DNA codes over those rings are described, the length of the code is relatively prime to the characteristic of the residue field of the ring.</p></div>","PeriodicalId":50742,"journal":{"name":"Applicable Algebra in Engineering Communication and Computing","volume":"37 1","pages":"47 - 71"},"PeriodicalIF":0.6,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00200-024-00667-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}