2022
DOI: 10.1016/j.ffa.2021.101962
|View full text |Cite
|
Sign up to set email alerts
|

More classes of permutation quadrinomials from Niho exponents in characteristic two

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…Next we show that the sufficient conditions in [46,Thm. 1.3] are both necessary and sufficient, as was conjectured in [46, pp.…”
Section: Resolution Of Eight Conjectures and Open Problemsmentioning
confidence: 89%
“…Next we show that the sufficient conditions in [46,Thm. 1.3] are both necessary and sufficient, as was conjectured in [46, pp.…”
Section: Resolution Of Eight Conjectures and Open Problemsmentioning
confidence: 89%
“…Next, we show that the sufficient conditions in [54, Thm. 1.3] are both necessary and sufficient, as was conjectured in [54, pp.…”
Section: Resolution Of Eight Conjectures and Open Problemsmentioning
confidence: 99%
“…Next, we show that the sufficient conditions in [54, Thm. 1.3] are both necessary and sufficient, as was conjectured in [54, pp. 5 and 20]: Corollary Let k$k$ and $\ell$ be positive integers, and write m:=2ord2(gcdfalse(k,false))$m:=2^{\operatorname{ord}_2(\gcd (k,\ell ))}$.…”
Section: Resolution Of Eight Conjectures and Open Problemsmentioning
confidence: 99%
See 1 more Smart Citation
“…If the mapping f : c → f (c) is a bijection on F 2 n , then f (x) is called a permutation polynomial over F 2 n . Due to its important applications in cryptography, coding theory and combinatorial designs (see [8], [13], [14] for instance), permutation polynomials have been intensively studied in the past. The study can be generalized from the case of univariate to bivariate.…”
Section: Introductionmentioning
confidence: 99%