Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Jun Zhang, Keqin Feng Relative generalized Hamming weights (RGHWs) of a linear code with respect to a linear subcode determine the security of the linear ramp secret sharing scheme based on the linear codes. They can be used to express the information leakage of the secret when some keepers of shares are corrupted. Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems. In this paper, we investigate the RGHWs of cyclic codes of two nonzeros with respect to its irreducible cyclic subcodes. We give two formulae for RGHWs of the cyclic codes. As applications of the formulae, explicit examples are computed. Moreover, RGHWs of cyclic codes in the examples are very large, comparing with the generalized Plotkin bound of RGHWs. So it guarantees very high security for the secret sharing scheme based on the dual codes.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Lin Tan, Hong Xu, Wen-Feng Qi Modified de Bruijn sequences are created by removing a single zero from the longest run of zeros of de Bruijn sequences. There are few theoretical results on the minimal polynomial and linear complexity of modified de Bruijn sequences. Some preliminary results are presented in this paper. It shows that for the minimal polynomial of a modified de Bruijn sequence of order n there exists at least one irreducible factor of degree n. An equivalent condition on which a polynomial is the minimal polynomial of some modified de Bruijn sequence is derived, using the tool of rational fraction representation of periodic sequences. Based on the equivalent condition, the impossible linear complexity of modified de Bruijn sequences can be discussed.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Alexander Borisov We construct some examples of polynomial maps over finite fields that admit subvarieties with a peculiar property: every geometric point is mapped to a fixed point by some iteration of the map, while the whole subvariety is not. Several related open questions are stated and discussed.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Dieter Jungnickel, Vladimir D. Tonchev By a classical result of Bonisoli, the equidistant linear codes over GF ( q ) are, up to monomial equivalence, just the replications of some q-ary simplex code, possibly with added 0-coordinates. We prove an analogous result for the antipodal two-weight linear codes over GF ( q ) (that is, one of the two weights is the length of the code): up to monomial equivalence, any such code is ether a replication of a first order generalized Reed–Muller code, or a replication of a 3-dimensional projective code associated with some non-trivial maximal arc in the classical projective plane PG ( 2 , 2 s ) , s ≥ 1 . An equivalent geometric formulation of this result reads as follows: a multiset S of points spanning Π = PG ( m , q ) , m ≥ 2 , for which every hyperplane intersecting S does so in a constant number of points (counted with multiplicity), is either a multiple of a maximal arc in Π (for m = 2 ) or a multiple of the complement of some hyperplane of Π.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Cícero Carvalho, Victor G.L. Neumann In this paper we present several values for the next-to-minimal weights of projective Reed–Muller codes. We work over F q with q ≥ 3 since in [3] we have determined the complete values for the next-to-minimal weights of binary projective Reed–Muller codes. As in [3] here we also find examples of codewords with next-to-minimal weight whose set of zeros is not in a hyperplane arrangement.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Simone Costa, Tao Feng, Xiaomiao Wang Strong difference families will be used to get: seven 2-designs whose parameter sets were previously in doubt; a strong indication about the existence of 2- ( p q , p , 1 ) designs with p ∈ { 13 , 17 } and q a prime power; a better asymptotic bound on prime powers q for which there exists an ( F p × F q , F p × { 0 } , k , λ ) relative difference family with p a prime power and k ∈ { p , p + 1 } .

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Shudi Yang, Chuangqiang Hu In this paper, by employing some results on Kummer extensions, we give an arithmetic characterization of pure Weierstrass gaps at many totally ramified places on a quotient of the Hermitian curve, including the well-studied Hermitian curve as a special case. The cardinality of these pure gaps is explicitly investigated. In particular, the numbers of gaps and pure gaps at a pair of distinct places are determined precisely, which can be regarded as an extension of the previous work by Matthews (2001) considered Hermitian curves. Additionally, some concrete examples are provided to illustrate our results.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Hua Huang, Shanmeng Han, Wei Cao A normal basis of F q n over F q is a basis of the form { α , α q , … , α q n − 1 } . An irreducible polynomial in F q [ x ] is called an N-polynomial if its roots are linearly independent over F q . Let p be the characteristic of F q . Pelis et al. showed that every monic irreducible polynomial with degree n and nonzero trace is an N-polynomial provided that n is either a power of p or a prime different from p and q is a primitive root modulo n. Chang et al. proved that the converse is also true. By comparing the number of N-polynomials with that of irreducible polynomials with nonzero traces, we present an alternative treatment to this problem and show that all the results mentioned above can be easily deduced from our main theorem.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Lucas Reis Let q be a prime power and F q n be the finite field with q n elements, where n > 1 . We introduce the class of the linearized polynomials L ( X ) over F q n such that L ( t ) ( X ) : = L ∘ L ∘ ⋯ ∘ L ︸ t times ( X ) ≡ 0 ( mod X q n − X ) for some t ≥ 2 , called nilpotent linearized polynomials (NLP's). We discuss the existence and construction of NLP's and, as an application, we show how to obtain permutations of F q n from these polynomials. For some of those permutations, we can explicitly give the compositional inverse map and the cycle decomposition. This paper also contains a method for constructing involutions over binary fields with no fixed points, which are useful in block ciphers.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Kamil Otal, Ferruh Özbudak In this paper, a construction of maximum rank distance (MRD) codes as a generalization of generalized Gabidulin codes is given. The family of the resulting codes is not covered properly by additive generalized twisted Gabidulin codes, and does not cover all twisted Gabidulin codes. When the basis field has more than two elements, this family includes also non-affine MRD codes, and such codes exist for all parameters. Therefore, these codes are the first non-additive MRD codes for most of the parameters.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Ziran Tu, Xiangyong Zeng, Tor Helleseth In this paper, we propose a class of permutation polynomials over the finite field F 2 2 m for odd m. These permutations are generally quadrinomials, and some permutation trinomials can also be obtained.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Ioulia N. Baoulina We explicitly determine the values of reduced cyclotomic periods of order 2 m , m ≥ 4 , for finite fields of characteristic p ≡ 3 or 5 ( mod 8 ) . These evaluations are applied to obtain explicit factorizations of the corresponding reduced period polynomials. As another application, the weight distributions of certain irreducible cyclic codes are described.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Wei Zhao, Xilin Tang, Ze Gu Let F p m be a finite field with cardinality p m and R = F p m + u F p m with u 2 = 0 . We aim to determine all α + u β -constacyclic codes of length n p s over R, where α , β ∈ F p m ⁎ , n , s ∈ N + and gcd ( n , p ) = 1 . Let α 0 ∈ F p m ⁎ and α 0 p s = α . The residue ring R [ x ] / 〈 x n p s − α − u β 〉 is a chain ring with the maximal ideal 〈 x n − α 0 〉 in the case that x n − α 0 is irreducible in F p m [ x ] . If x n − α 0 is reducible in F p m [ x ] , we give the explicit expressions of the ideals of R [ x ] / 〈 x n p s − α − u β 〉 . Besides, the number of codewords and the dual code of every α + u β -constacyclic code are provided.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Martino Borello, Javier de la Cruz The existence of an extremal self-dual binary linear code of length 120 is a long-standing open problem. We continue the investigation of its automorphism group, proving that automorphisms of order 30 and 57 cannot occur. Supposing the involutions acting fixed point freely, we show that also automorphisms of order 8 cannot occur and the automorphism group is of order at most 120, with further restrictions. Finally, we present some necessary conditions for the existence of the code, based on shadow and design theory.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Domingo Gómez-Pérez, Alina Ostafe, Min Sha Motivated by a question of van der Poorten about the existence of an infinite chain of prime numbers (with respect to some base), in this paper we advance the study of sequences of consecutive polynomials whose coefficients are chosen consecutively from a sequence in a finite field of odd prime characteristic. We study the arithmetic of such sequences, including bounds for the largest degree of irreducible factors, the number of irreducible factors, as well as for the number of such sequences of fixed length in which all the polynomials are irreducible.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): José Gómez-Torrecillas, F.J. Lobillo, Gabriel Navarro, Alessando Neri The use of skew polynomial rings allows to endow linear codes with cyclic structures which are not cyclic in the classical (commutative) sense. Whenever these skew cyclic structures are carefully chosen, some control over the Hamming distance is gained, and it is possible to design efficient decoding algorithms. In this paper, we give a version of the Hartmann–Tzeng bound that works for a wide class of skew cyclic codes. We also provide a practical method for constructing them with designed distance. For skew BCH codes, which are covered by our constructions, we discuss decoding algorithms. Detailed examples illustrate both the theory as the constructive methods it supports.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Tathagata Basak We show that the octonions can be defined as the R -algebra with basis { e x : x ∈ F 8 } and multiplication given by e x e y = ( − 1 ) φ ( x , y ) e x + y , where φ ( x , y ) = tr ( y x 6 ) . While it is well known that the octonions can be described as a twisted group algebra, our purpose is to point out that this is a useful description. We show how the basic properties of the octonions follow easily from our definition. We give a uniform description of the sixteen orders of integral octonions containing the Gravesian integers, and a computation-free proof of their existence.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Zohreh Rajabi, Kazem Khashyarmanesh Let p be an odd prime. The main purpose of this paper is to establish and exploit the algebraic structure of some repeated-root two dimensional constacyclic codes of length 2 p s . 2 k over the finite field F p m . Moreover, we study all self-dual repeated-root two-dimensional ( λ , 1 ) -constacyclic codes of length 2 p s . 2 or 2 p s . 2 2 over F p m for λ ∈ { − 1 , 1 } .

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Lin Sok, Minjia Shi, Patrick Solé In this paper 1 , we prove existence of optimal complementary dual codes (LCD codes) over large finite fields. We also give methods to generate orthogonal matrices over finite fields and then apply them to construct LCD codes. Construction methods include random sampling in the orthogonal group, code extension, matrix product codes and projection over a self-dual basis.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Roswitha Hofer In this paper we investigate the distribution properties of hybrid sequences which are made by combining Halton sequences in the ring of polynomials and digital Kronecker sequences. We give a full criterion for the uniform distribution and prove results on the discrepancy of such hybrid sequences.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Ziran Tu, Xiangyong Zeng, Chunlei Li, Tor Helleseth In this paper, we characterize the coefficients of f ( x ) = x + a 1 x q ( q − 1 ) + 1 + a 2 x 2 ( q − 1 ) + 1 in F q 2 [ x ] for even q that lead f ( x ) to be a permutation of F q 2 . We transform the problem into studying some low-degree equations with variable in the unit circle, which are intensively investigated with some parameterization techniques. From the numerical results, the coefficients that lead f ( x ) to be a permutation appear to be completely characterized in this paper. It is also demonstrated that some permutations proposed in this paper are quasi-multiplicative (QM) inequivalent to the previously known permutation trinomials.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Rohit Gupta, R.K. Sharma Let F q denote the finite field of order q. In this paper, some new classes of permutation polynomials of the form ( x p m − x + δ ) s + x over F p 2 m are obtained by determining the number of solutions of certain equations.

Abstract: Publication date: March 2018 Source:Finite Fields and Their Applications, Volume 50 Author(s): Koji Momihara, Qing Xiang In this paper, we give a new lifting construction of “hyperbolic” type of strongly regular Cayley graphs. Also we give new constructions of strongly regular Cayley graphs over the additive groups of finite fields based on partitions of subdifference sets of the Singer difference sets. Our results unify some recent constructions of strongly regular Cayley graphs related to m-ovoids and i-tight sets in finite geometry. Furthermore, some of the strongly regular Cayley graphs obtained in this paper are new or nonisomorphic to known strongly regular graphs with the same parameters.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): F.E. Brochero Martínez, Lucas Reis Let f ( x ) ∈ F q [ x ] be an irreducible polynomial of degree m and exponent e. For each positive integer n, such that ν p ( q − 1 ) ≥ ν p ( e ) + ν p ( n ) for all prime divisors p of n, we show a fast algorithm to determine the irreducible factors of f ( x n ) . Using this algorithm, we give the complete factorization of x n − 1 into irreducible factors in the case where n = d p t , p is an odd prime, q is a generator of the group Z p 2 ⁎ and either d = 2 m with m ≤ ν 2 ( q − 1 ) or d = r a , where r is a prime dividing q − 1 but not p − 1 .

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Baokun Ding, Tao Zhang, Gennian Ge Recently, Yaakobi et al. introduced codes for b-symbol read channels, where the read operation is performed as a consecutive sequence of b > 2 symbols. In this paper, we establish a Singleton-type bound for b-symbol codes. Codes meeting the Singleton-type bound are called maximum distance separable (MDS) codes, and they are optimal in the sense they attain the maximal minimum b-distance. We introduce a construction method using projective geometry, and then construct several infinite families of linear MDS b-symbol codes over finite fields. The lengths of these codes have a large range. And in some sense, we completely determine the existence of linear MDS b-symbol codes over finite fields for certain parameters.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Dalma Görcsös, Gábor Horváth, Anett Mészáros Let PPol ( R ) denote the group of permutation polynomial functions over the finite, commutative, unital ring R under composition. We generalize numerous results about permutation polynomials over Z p n to local rings by treating them under a unified manner. In particular, we provide a natural wreath product decomposition of permutation polynomial functions over the maximal ideal M and over the finite field R / M . We characterize the group of permutation polynomial functions over M whenever the condition M R / M = { 0 } applies. Then we derive the size of PPol ( R ) , thereby generalizing the same size formulas for Z p n . Finally, we completely characterize when the group PPol ( R ) is solvable, nilpotent, or abelian.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Guangkui Xu, Xiwang Cao, Jingshui Ping Six classes of permutation pentanomials are constructed from fractional polynomials which permute the set of ( 2 m + 1 ) -th roots of unity. Based on an approach which is a generalization of the work of Zha, Hu and Fan, some permutation pentanomials and trinomials are also obtained from known permutations of the set of ( 2 m + 1 ) -th roots of unity.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Xiusheng Liu, Yun Fan, Hualu Liu In this paper, we generalize the linear complementary dual codes (LCD codes for short) to k-Galois LCD codes, and study them by a uniform method. A necessary and sufficient condition for linear codes to be k-Galois LCD codes is obtained, two classes of k-Galois LCD MDS codes are exhibited. Then, necessary and sufficient conditions for λ-constacyclic codes being k-Galois LCD codes are characterized. Some classes of k-Galois LCD λ-constacyclic MDS codes are constructed. Finally, we study Hermitian LCD λ-constacyclic codes, and present a class of Hermitian LCD λ-constacyclic MDS codes.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Leyla Işık, Arne Winterhof Carlitz rank and index are two important measures for the complexity of a permutation polynomial f ( x ) over the finite field F q . In particular, for cryptographic applications we need both, a high Carlitz rank and a high index. In this article we study the relationship between Carlitz rank C r k ( f ) and index I n d ( f ) . More precisely, if the permutation polynomial is neither close to a polynomial of the form ax nor a rational function of the form a x − 1 , then we show that C r k ( f ) > q − max { 3 I n d ( f ) , ( 3 q ) 1 / 2 } . Moreover we show that the permutation polynomial which represents the discrete logarithm guarantees both a large index and a large Carlitz rank.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Daniele Bartoli, Giovanni Zini We determine all permutation trinomials of type x 2 p s + r + x p s + r + λ x r over the finite field F p t when ( 2 p s + r ) 4 < p t . This partially extends a previous result by Bhattacharya and Sarkar in the case p = 2 , r = 1 .

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Nurdagül Anbar, Almasa Odz̆ak, Vandita Patel, Luciane Quoos, Anna Somoza, Alev Topuzoğlu The well-known Chowla and Zassenhaus conjecture, proved by Cohen in 1990, states that if p > ( d 2 − 3 d + 4 ) 2 , then there is no complete mapping polynomial f in F p [ x ] of degree d ≥ 2 . For arbitrary finite fields F q , a similar non-existence result was obtained recently by Işık, Topuzoğlu and Winterhof in terms of the Carlitz rank of f. Cohen, Mullen and Shiue generalized the Chowla–Zassenhaus–Cohen Theorem significantly in 1995, by considering differences of permutation polynomials. More precisely, they showed that if f and f + g are both permutation polynomials of degree d ≥ 2 over F p , with p > ( d 2 − 3 d + 4 ) 2 , then the degree k of g satisfies k ≥ 3 d / 5 , unless g is constant. In this article, assuming f and f + g are permutation polynomials in F q [ x ] , we give lower bounds for the Carlitz rank of f in terms of q and k. Our results generalize the above mentioned result of Işık et al. We also show for a special class of permutation polynomials f of Carlitz rank n ≥ 1 that if f + x k is a permutation over F q , with gcd ( k + 1 , q − 1 ) = 1 , then k ≥ ( q − n ) / ( n + 3 ) .

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Ron Evans, Mark Van Veen Let F q be a field of q elements, where q is a power of an odd prime p. The polynomial f ( y ) ∈ F q [ y ] defined by f ( y ) : = ( 1 + y ) ( q + 1 ) / 2 + ( 1 − y ) ( q + 1 ) / 2 has the property that f ( 1 − y ) = ρ ( 2 ) f ( y ) , where ρ is the quadratic character on F q . This univariate identity was applied to prove a recent theorem of N. Katz. We formulate and prove a bivariate extension, and give an application to quadratic residuacity.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Hiroaki Taniguchi We construct a bilinear dual hyperoval S c ( S 1 , S 2 , S 3 ) from binary commutative presemifields S 1 = ( G F ( q ) , + , ∘ ) and S 2 = ( G F ( q ) , + , ⁎ ) , a binary presemifield S 3 = ( G F ( q ) , + , ⋆ ) which may not be commutative, and a non-zero element c ∈ G F ( q ) which satisfies some conditions. We also determine the isomorphism problems under the conditions that S 1 and S 2 are not isotopic, and c ≠ 1 . We also investigate farther on the isomorphism problem on the case that S 1 and S 2 are the Kantor commutative presemifields and S 3 is the Albert presemifield.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Masaaki Homma, Seon Jeong Kim A basis of the ideal of the complement of a linear subspace in a projective space over a finite field is given. As an application, the second largest number of points of plane curves of degree d over the finite field of q elements is also given for d ≥ q + 1 .

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): E. Martínez-Moro, A. Piñera-Nicolás, I.F. Rúa We consider codes defined over an affine algebra A = R [ X 1 , … , X r ] / 〈 t 1 ( X 1 ) , … , t r ( X r ) 〉 , where t i ( X i ) is a monic univariate polynomial over a finite commutative chain ring R. Namely, we study the A − submodules of A l ( l ∈ N ). These codes generalize both the codes over finite quotients of polynomial rings and the multivariable codes over finite chain rings. Some codes over Frobenius local rings that are not chain rings are also of this type. A canonical generator matrix for these codes is introduced with the help of the Canonical Generating System. Duality of the codes is also considered.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Mireille Fouquet, Josep M. Miret, Javier Valera Volcanoes of ℓ-isogenies of elliptic curves are a special case of graphs with a cycle called crater. In this paper, given an elliptic curve E of a volcano of ℓ-isogenies, we present a condition over an endomorphism φ of E in order to determine which ℓ-isogenies of E are non-descending. The endomorphism φ is defined as the crater cycle of an m-volcano where E is located, with m ≠ ℓ . The condition is feasible when φ is a distortion map for a subgroup of order ℓ of E. We also provide some relationships among the crater sizes of volcanoes of m-isogenies whose elliptic curves belong to a volcano of ℓ-isogenies.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Sudhir R. Ghorpade, Prasant Singh We consider linear codes associated to Schubert varieties in Grassmannians. A formula for the minimum distance of these codes was conjectured in 2000 and after having been established in various special cases, it was proved in 2008 by Xiang. We give an alternative proof of this formula. Further, we propose a characterization of the minimum weight codewords of Schubert codes by introducing the notion of Schubert decomposable elements of certain exterior powers. It is shown that codewords corresponding to Schubert decomposable elements are of minimum weight and also that the converse is true in many cases. A lower bound, and in some cases, an exact formula, for the number of minimum weight codewords of Schubert codes is also given. From a geometric point of view, these results correspond to determining the maximum number of F q -rational points that can lie on a hyperplane section of a Schubert variety in a Grassmannian with its nondegenerate embedding in a projective subspace of the Plücker projective space, and also the number of hyperplanes for which the maximum is attained.

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Hao Zhang We study the L-function of the Airy exponential sum associated to the polynomial f ( X ) = X d + λ X using Dwork's dual theory on cohomology level. We get explicit formulas for all the roots of the L-function in the ordinary case in terms of p-adic GKZ-hypergeometric functions. Our method can also be used to give explicit formulas for all the roots of the L-function of the exponential sum associated to f ( X ) = X d + λ d − 1 X d − 1 + ⋯ + λ 0 .

Abstract: Publication date: January 2018 Source:Finite Fields and Their Applications, Volume 49 Author(s): Yoshinori Hamahata We use periodic functions to introduce the generalized Dedekind sums in finite fields to describe the transformation formula for a family of certain functions.

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): Ziling Heng, Qin Yue Linear codes with a few weights are very important in coding theory and have attracted a lot of attention. In this paper, we present a construction of q-ary linear codes from trace and norm functions over finite fields. The weight distributions of the linear codes are determined in some cases based on Gauss sums. It is interesting that our construction can produce optimal or almost optimal codes. Furthermore, we show that our codes can be used to construct secret sharing schemes with interesting access structures and strongly regular graphs with new parameters.

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): Adel Alahmadi, S.P. Glasby, Cheryl E. Praeger Given a field F, a scalar λ ∈ F and a matrix A ∈ F n × n , the twisted centralizer code C F ( A , λ ) : = { B ∈ F n × n A B − λ B A = 0 } is a linear code of length n 2 over F. When A is cyclic and λ ≠ 0 we prove that dim C F ( A , λ ) = deg ( gcd ( c A ( t ) , λ n c A ( λ − 1 t ) ) ) where c A ( t ) denotes the characteristic polynomial of A. We also show how C F ( A , λ ) decomposes, and we estimate the probability that C F ( A , λ ) is nonzero when F is finite. Finally, we prove dim C F ( A , λ ) ⩽ n 2 / 2 for λ ∉ { 0 , 1 } and ‘almost all’ n × n matrices A over F.

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): Kaloyan Slavov Let X be an absolutely irreducible hypersurface of degree d in A n , defined over a finite field F q . The Lang–Weil bound gives an interval that contains # X ( F q ) . We exhibit an explicit interval, which does not contain # X ( F q ) , and which overlaps with the Lang–Weil interval. In particular, we sharpen the best known nontrivial lower bound for # X ( F q ) . The proof uses a combinatorial probabilistic technique.

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): David Covert, Doowon Koh, Youngjin Pi We study the k-resultant modulus set problem in the d-dimensional vector space F q d over the finite field F q with q elements. Given E ⊂ F q d and an integer k ≥ 2 , the k-resultant modulus set, denoted by Δ k ( E ) , is defined as Δ k ( E ) = { ‖ x 1 ± x 2 ± ⋯ ± x k ‖ ∈ F q : x j ∈ E , j = 1 , 2 , … , k } , where ‖ α ‖ = α 1 2 + ⋯ + α d 2 for α = ( α 1 , … , α d ) ∈ F q d . In this setting, the k-resultant modulus set problem is to determine the minimal cardinality of E ⊂ F q d such that Δ k ( E ) = F q or F q ⁎ . This problem is an extension of the Erdős–Falconer distance problem. In particular, we investigate the k-resultant modulus set problem with the restriction that the set E ⊂ F q d is contained in a specific algebraic variety. Energy estimates play a crucial role in our proof.

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): Nazar Arakelian Let F be a plane singular curve defined over a finite field F q . Via results of [11] and [1], the linear system of plane curves of a given degree passing through the singularities of F provides potentially good bounds for the number of points on a non-singular model of F . In this note, the case of a curve with two singularities such that the sum of their multiplicities is precisely the degree of the curve is investigated in more depth. In particular, such plane models are completely characterized, and for p > 3 , a curve of this type attaining one of the obtained bounds is presented.

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): Robert W. Fitzgerald, Yasanthi Kottegoda We complete A. Klapper's work on the invariant of a one-term trace form over a finite field of odd characteristic. We apply this to computing the probability of a successful impersonation attack on an authentication code proposed by C. Ding et al. (2005).

Abstract: Publication date: November 2017 Source:Finite Fields and Their Applications, Volume 48 Author(s): José María Grau, Antonio M. Oller-Marcén In this paper we compute the sum of the k-th powers of all the elements of a finite commutative unital ring, thus generalizing known results for finite fields, the rings of integers modulo n or the ring of Gaussian integers modulo n. As an application, we focus on quotient rings of the form ( Z / n Z ) [ x ] / ( f ( x ) ) for a polynomial f ∈ Z [ x ] .