Home Group polynomials over rings
Article
Licensed
Unlicensed Requires Authentication

Group polynomials over rings

  • Aleksandr V. Akishin EMAIL logo
Published/Copyright: December 11, 2020

Abstract

We consider polynomials over rings such that the polynomials represent Latin squares and define a group operation over the ring. We introduce the notion of a group polynomial, describe a number of properties of these polynomials and the groups generated. For the case of residue ringsrn,where r is a prime number, we give a description of groups specified by polynomials and identify a class of group polynomials that can be used to construct controlled cryptographic transformations.


Note: Originally published in Diskretnaya Matematika (2019) 31,№2, 3–13 (in Russian).


References

[1] Glukhov M.M., Remizov A.B., Shaposhnikov V.A., The review of k-valued functions theory. Part 1 Reference book, M.: m/u 33965, 1988 (in Russian), 153 pp.Search in Google Scholar

[2] Kurosh A. G., Lectures in General Algebra Chelsea Pub Co, 1963, 335 pp.Search in Google Scholar

[3] Lambek J., Lectures on rings and modules Blaisdell Pub. Co., New York, 1966.Search in Google Scholar

[4] Larin M. V., “Transitive polynomial transformations of residue class rings”, Discrete Math. Appl. 12:2 (2002), 127–140.10.1515/dma-2002-0204Search in Google Scholar

[5] Lidl R., Niederreiter H., Finite Fields Addison-Wesley Publ. Inc., 1983.Search in Google Scholar

[6] Karpov A.V., “Commutative polynomials over prime rings”, Prikladnaya diskretnaya matematika 22:4 (2013), 16–21 (in Russian).10.17223/20710410/22/2Search in Google Scholar

[7] Hazewinkel M., Formal Groups and Applications N.-Y.: Academic Press, 1978.Search in Google Scholar

[8] Lai X., Massey J.A., “Proposal for a new block encryption standard”, EUROCRYPT’90, Lect. Notes Comput. Sci., 473, 389–404.10.1007/3-540-46877-3_35Search in Google Scholar

[9] Lee R.B., Shi Z.J., Rivest R.L., Robshaw V.J.B., “On permutation operations in cipher design”, ITCC’04, 2 (2004), 569–577.10.1109/ITCC.2004.1286714Search in Google Scholar

[10] Li S., Null polynomials modulo n, http://arxiv.org/abs/math/0510217v2Search in Google Scholar

[11] Mullen G.L., “Local polynomials over ℤp”, Fibonacci Quart. 18:2 (1980), 104–107.Search in Google Scholar

[12] Mullen G.L., Stevens H., “Polynomial functions (mod m)”, Acta Math. Hungar. 44 (1984), 237–241.10.1007/BF01950276Search in Google Scholar

[13] Rivest R.L., “Permutation polynomials modulo 2w”, Finite Fields and Their Applications 7 (2001), 287–292.10.1006/ffta.2000.0282Search in Google Scholar

[14] Schnorr C.P., Vaudenay S., “Black box cryptanalysis of hash networks based on multipermutations”, EUROCRYPT’94, Lect. Notes Comput. Sci., 950, 47–57.10.1007/BFb0053423Search in Google Scholar

[15] GOST 28147-89. Information processing systems. Cryptographic protection. Cryptographic transformation algorithm Standart-inform, Moscow, 1990 (in Russian), 26 pp.Search in Google Scholar

[16] Announcing the ADVANCES ENCRYPTION STANDARD (AES), FIPS 197, 2001, https://doi.org/10.6028/NIST.FIPS.19710.6028/NIST.FIPS.197Search in Google Scholar

Received: 2019-02-05
Published Online: 2020-12-11
Published in Print: 2020-12-16

© 2020 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 24.9.2025 from https://www.degruyterbrill.com/document/doi/10.1515/dma-2020-0033/html?lang=en
Scroll to top button