Let F be a finite field. We apply a result of Thierry Berger (1996, Designs Codes Cryptography, 7, 215-221) to determine the structure of all groups of permutations on F generated by the permutations induced by the linear polynomials and any power map which induces a permutation on F.
Cryptological Applications of Permutation Polynomials
β Scribed by Indivar Gupta; Laxmi Narain; C.E. Veni Madhavan
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 76 KB
- Volume
- 15
- Category
- Article
- ISSN
- 1571-0653
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Let \(R\) be a commutative ring with 1 , let \(R\left[X_{1}, \ldots, X_{n}\right]\) be the polynomial ring in \(X_{1}, \ldots, X_{n}\) over \(R\) and let \(G\) be an arbitrary group of permutations of \(\left\{X_{1}, \ldots, X_{n}\right\}\). The paper presents an algorithm for computing a small fini
Garsia (1988) gives a remarkably simple expression for the major index enumerator for permutations of a fixed cycle type evaluated at a primitive root of unity. He asks for a direct combinatorial proof of this identity. Here we give such a combinatorial derivation.