Publication | Closed Access
On Two-to-One Mappings Over Finite Fields
41
Citations
20
References
2019
Year
Symmetric FunctionFinite GeometryEngineeringSymmetric CryptographyAlgebraic ComplexityFinite FieldSuch MappingsAlgebraic MethodAlgebraic CombinatoricsUniversal AlgebraCryptographyTwo-to-one Mappings
Two-to-one (2-to-1) mappings over finite fields play an important role in symmetric cryptography. In particular they allow to design APN functions, bent functions and semi-bent functions. In this paper we provide a systematic study of two-to-one mappings that are defined over finite fields. We characterize such mappings by means of the Walsh transforms. We also present several constructions, including an AGW-like criterion, constructions with the form of <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$x^{r}h(x^{(q-1)/d})$ </tex-math></inline-formula> , those from permutation polynomials, from linear translators and from APN functions. Then we present 2-to-1 polynomial mappings in classical classes of polynomials: linearized polynomials and monomials, low degree polynomials, Dickson polynomials and Muller-Cohen-Matthews polynomials, etc. Lastly, we show applications of 2-to-1 mappings over finite fields for constructions of bent Boolean and vectorial bent functions, semi-bent functions, planar functions and permutation polynomials. In all those respects, we shall review what is known and provide several new results.
| Year | Citations | |
|---|---|---|
Page 1
Page 1