{"id":"https://openalex.org/W4394678164","doi":"https://doi.org/10.1007/s10623-024-01395-w","title":"Algebraic properties of the maps $$\\chi _n$$","display_name":"Algebraic properties of the maps $$\\chi _n$$","publication_year":2024,"publication_date":"2024-04-10","ids":{"openalex":"https://openalex.org/W4394678164","doi":"https://doi.org/10.1007/s10623-024-01395-w","pmid":"https://pubmed.ncbi.nlm.nih.gov/39070006"},"language":"lv","primary_location":{"id":"doi:10.1007/s10623-024-01395-w","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s10623-024-01395-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-024-01395-w.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-024-01395-w.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001889799","display_name":"Jan Schoone","orcid":"https://orcid.org/0000-0002-0751-291X"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Jan Schoone","raw_affiliation_strings":["Digital Security, Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security, Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055847285","display_name":"Joan Daemen","orcid":"https://orcid.org/0000-0002-4102-0775"},"institutions":[{"id":"https://openalex.org/I145872427","display_name":"Radboud University Nijmegen","ror":"https://ror.org/016xsfp80","country_code":"NL","type":"education","lineage":["https://openalex.org/I145872427"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Joan Daemen","raw_affiliation_strings":["Digital Security, Radboud University, Nijmegen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Digital Security, Radboud University, Nijmegen, The Netherlands","institution_ids":["https://openalex.org/I145872427"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001889799"],"corresponding_institution_ids":["https://openalex.org/I145872427"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":1.7376,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.86058667,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"92","issue":"8","first_page":"2341","last_page":"2365"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10061","display_name":"Algebraic Geometry and Number Theory","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.8565821647644043},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.5260111093521118},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.44348910450935364},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41704216599464417},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.4144879877567291},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.39425358176231384},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.39143434166908264},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14970865845680237},{"id":"https://openalex.org/keywords/mathematical-analysis","display_name":"Mathematical analysis","score":0.13705304265022278}],"concepts":[{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.8565821647644043},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.5260111093521118},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.44348910450935364},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41704216599464417},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.4144879877567291},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.39425358176231384},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.39143434166908264},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14970865845680237},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.13705304265022278}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10623-024-01395-w","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s10623-024-01395-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-024-01395-w.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmid:39070006","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/39070006","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, codes, and cryptography","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:11269509","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/11269509","pdf_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC11269509/pdf/10623_2024_Article_1395.pdf","source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Des Codes Cryptogr","raw_type":"Text"},{"id":"pmh:oai:repository.ubn.ru.nl:2066/312200","is_oa":true,"landing_page_url":"https://hdl.handle.net/2066/312200","pdf_url":"https://repository.ubn.ru.nl//bitstream/handle/2066/312200/312200.pdf","source":{"id":"https://openalex.org/S4306401067","display_name":"Radboud Repository (Radboud University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I145872427","host_organization_name":"Radboud University Nijmegen","host_organization_lineage":["https://openalex.org/I145872427"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article / Letter to editor"}],"best_oa_location":{"id":"doi:10.1007/s10623-024-01395-w","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1007/s10623-024-01395-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-024-01395-w.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6492424696","display_name":null,"funder_award_id":"ERC-2017-ADG Nr. 788980","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"}],"funders":[{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4394678164.pdf","grobid_xml":"https://content.openalex.org/works/W4394678164.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1471103927","https://openalex.org/W1587687098","https://openalex.org/W1629301835","https://openalex.org/W1964723977","https://openalex.org/W1967034742","https://openalex.org/W1984088659","https://openalex.org/W2033640124","https://openalex.org/W2162542560","https://openalex.org/W2164645101","https://openalex.org/W2794866029","https://openalex.org/W3009904134","https://openalex.org/W3037776991","https://openalex.org/W4210793868","https://openalex.org/W4213335922","https://openalex.org/W4220711203","https://openalex.org/W4234091732","https://openalex.org/W4240574532","https://openalex.org/W4252861292","https://openalex.org/W4253289064","https://openalex.org/W4301185346","https://openalex.org/W4390942746","https://openalex.org/W4394678164","https://openalex.org/W4402832267"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2980963558","https://openalex.org/W1882246857","https://openalex.org/W3103304230","https://openalex.org/W2185360082","https://openalex.org/W1992365905","https://openalex.org/W1976691234","https://openalex.org/W3212023493","https://openalex.org/W2090715877","https://openalex.org/W2572370460"],"abstract_inverted_index":{"The":[0],"Boolean":[1],"map":[2],"<mml:math":[3,23,48,98,121,163,179,194,226,268],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[4,24,195],"<mml:mrow><mml:msub><mml:mi>\u03c7</mml:mi>":[5],"<mml:mi>n</mml:mi></mml:msub>":[6,100,165,181],"<mml:mo>:</mml:mo>":[7],"<mml:msubsup><mml:mi>F</mml:mi>":[8,12],"<mml:mn>2</mml:mn>":[9,13],"<mml:mi>n</mml:mi></mml:msubsup>":[10,14],"<mml:mo>\u2192</mml:mo>":[11],"<mml:mo>,</mml:mo>":[15,125],"<mml:mspace></mml:mspace>":[16],"<mml:mi>x</mml:mi>":[17],"<mml:mo>\u21a6</mml:mo>":[18],"<mml:mi>y</mml:mi></mml:mrow>":[19],"</mml:math>":[20,46,55,101,127,166,182,217,229,271],"defined":[21],"by":[22,245],"<mml:mrow><mml:msub><mml:mi>y</mml:mi>":[25,196],"<mml:mi>i</mml:mi></mml:msub>":[26,29,197,200],"<mml:mo>=</mml:mo>":[27,123,198],"<mml:msub><mml:mi>x</mml:mi>":[28,32,40,199,203,211],"<mml:mo>+</mml:mo>":[30,34,37,42,201,205,208,213],"<mml:mrow><mml:mo>(</mml:mo>":[31,202],"<mml:mrow><mml:mi>i</mml:mi>":[33,41,204,212],"<mml:mn>1</mml:mn></mml:mrow>":[35,206],"</mml:msub>":[36,44,207,215],"<mml:mn>1</mml:mn>":[38,124,209],"<mml:mo>)</mml:mo></mml:mrow>":[39,210],"<mml:mn>2</mml:mn></mml:mrow>":[43,214],"</mml:mrow>":[45,216],"(where":[47],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:mrow><mml:mi>i</mml:mi>":[49],"<mml:mo>\u2208</mml:mo>":[50],"<mml:mi>Z</mml:mi>":[51],"<mml:mo>/</mml:mo>":[52],"<mml:mi>n</mml:mi>":[53],"<mml:mi>Z</mml:mi></mml:mrow>":[54],")":[56,218],"is":[57,113,235,243],"used":[58],"in":[59,159],"various":[60,90],"permutations":[61],"that":[62,111,233,255],"are":[63],"part":[64],"of":[65,75,93,138,145,154,156,162,225,267],"cryptographic":[66],"schemes,":[67],"e.g.,":[68],"Keccak-f":[69],"(the":[70,73],"SHA-3-permutation),":[71],"ASCON":[72],"winner":[74],"the":[76,134,143,152,160,190,237],"NIST":[77],"Lightweight":[78],"competition),":[79],"Xoodoo,":[80],"Rasta":[81],"and":[82,118,136,142],"Subterranean":[83],"(2.0).":[84],"In":[85],"this":[86,94,234,256],"paper,":[87],"we":[88,150,177,253],"study":[89,188],"algebraic":[91],"properties":[92],"map.":[95],"We":[96,109,129,231],"consider":[97,178],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>\u03c7</mml:mi>":[99,164,180],"(through":[102],"vectorial":[103],"isomorphism)":[104],"as":[105,183],"a":[106,114,184,220,261],"univariate":[107,140,147],"polynomial.":[108],"show":[110,232],"it":[112,168],"power":[115],"function":[116],"if":[117,120],"only":[119],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:mrow><mml:mi>n</mml:mi>":[122],"<mml:mn>3</mml:mn></mml:mrow>":[126],".":[128,230,272],"furthermore":[130],"compute":[131,151],"bounds":[132],"on":[133,222,250,263],"sparsity":[135],"degree":[137,158,242],"these":[139,251],"polynomials,":[141],"number":[144,153,171],"different":[146],"representations.":[148],"Secondly,":[149],"monomials":[155],"given":[157],"inverse":[161],"(if":[167],"exists).":[169],"This":[170],"coincides":[172],"with":[173],"binomial":[174],"coefficients.":[175],"Lastly,":[176],"polynomial":[185],"map,":[186],"to":[187],"whether":[189],"same":[191],"rule":[192,257],"(":[193],"gives":[219],"bijection":[221,262],"field":[223,266],"extensions":[224,240],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"><mml:msub><mml:mi>F</mml:mi>":[227,269],"<mml:mn>2</mml:mn></mml:msub>":[228,270],"not":[236,259],"case":[238],"for":[239],"whose":[241],"divisible":[244],"two":[246],"or":[247],"three.":[248],"Based":[249],"results,":[252],"conjecture":[254],"does":[258],"give":[260],"any":[264],"extension":[265]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2024-04-11T00:00:00"}
