{"id":"https://openalex.org/W4413477316","doi":"https://doi.org/10.1007/s12095-025-00820-8","title":"Further existence results of decompositions of permutation polynomials","display_name":"Further existence results of decompositions of permutation polynomials","publication_year":2025,"publication_date":"2025-08-23","ids":{"openalex":"https://openalex.org/W4413477316","doi":"https://doi.org/10.1007/s12095-025-00820-8"},"language":"en","primary_location":{"id":"doi:10.1007/s12095-025-00820-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12095-025-00820-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12095-025-00820-8.pdf","source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s12095-025-00820-8.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092204880","display_name":"Samuele Andreoli","orcid":"https://orcid.org/0000-0002-1822-6636"},"institutions":[{"id":"https://openalex.org/I4432739","display_name":"University of Bergen","ror":"https://ror.org/03zga2b32","country_code":"NO","type":"education","lineage":["https://openalex.org/I4432739"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Samuele Andreoli","raw_affiliation_strings":["University of Bergen, Bergen, Norway"],"affiliations":[{"raw_affiliation_string":"University of Bergen, Bergen, Norway","institution_ids":["https://openalex.org/I4432739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033457649","display_name":"George Petrides","orcid":"https://orcid.org/0000-0002-1125-4343"},"institutions":[{"id":"https://openalex.org/I34771391","display_name":"University of Cyprus","ror":"https://ror.org/02qjrjx09","country_code":"CY","type":"education","lineage":["https://openalex.org/I34771391"]}],"countries":["CY"],"is_corresponding":false,"raw_author_name":"George Petrides","raw_affiliation_strings":["University of Cyprus, Nicosia, Cyprus"],"affiliations":[{"raw_affiliation_string":"University of Cyprus, Nicosia, Cyprus","institution_ids":["https://openalex.org/I34771391"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5092204880"],"corresponding_institution_ids":["https://openalex.org/I4432739"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11893754,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"17","issue":"6","first_page":"1721","last_page":"1737"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11797","display_name":"graph theory and CDMA systems","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.6994138360023499},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4756062626838684},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.4322808086872101},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.36513829231262207},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.34366971254348755},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.18304020166397095}],"concepts":[{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.6994138360023499},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4756062626838684},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.4322808086872101},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.36513829231262207},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.34366971254348755},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.18304020166397095},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s12095-025-00820-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12095-025-00820-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12095-025-00820-8.pdf","source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s12095-025-00820-8","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12095-025-00820-8","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12095-025-00820-8.pdf","source":{"id":"https://openalex.org/S129219326","display_name":"Cryptography and Communications","issn_l":"1936-2447","issn":["1936-2447","1936-2455"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography and Communications","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4413477316.pdf","grobid_xml":"https://content.openalex.org/works/W4413477316.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W1541795511","https://openalex.org/W1820473293","https://openalex.org/W1873852107","https://openalex.org/W2038614964","https://openalex.org/W2062606040","https://openalex.org/W2166531223","https://openalex.org/W2810911985","https://openalex.org/W3093954335","https://openalex.org/W3193239283","https://openalex.org/W4285727314","https://openalex.org/W4392614966","https://openalex.org/W4393258222","https://openalex.org/W4410947769","https://openalex.org/W6949413082"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W1979597421","https://openalex.org/W2007980826","https://openalex.org/W2061531152","https://openalex.org/W3002753104","https://openalex.org/W2077600819","https://openalex.org/W2142036596","https://openalex.org/W2072657027","https://openalex.org/W2962838298","https://openalex.org/W2600246793"],"abstract_inverted_index":{"Abstract":[0],"When":[1],"permutation":[2,34],"polynomials":[3,35],"over":[4],"finite":[5,73],"fields":[6,74],"are":[7],"used":[8],"as":[9,30],"core":[10],"components":[11],"of":[12,22,33,36,50,53,55,68,169,182],"cryptographic":[13],"algorithms,":[14],"one":[15],"step":[16],"in":[17,71,185],"reducing":[18],"the":[19,48,56,66,72,133,167,180,186],"hardware":[20],"area":[21],"their":[23],"secure":[24],"implementation":[25],"is":[26,123],"to":[27,64,177],"represent":[28],"them":[29],"a":[31,45,51,128],"composition":[32],"lower":[37],"algebraic":[38],"degree.":[39],"In":[40],"this":[41,62],"work,":[42],"we":[43,174],"present":[44,127],"criterion":[46,63,134],"for":[47,140],"existence":[49,67],"class":[52],"decompositions":[54,70,139],"inverse":[57],"power":[58,183],"function.":[59],"We":[60,125],"use":[61],"show":[65],"such":[69],"with":[75],"$$\\varvec{2}^{\\varvec{n}}$$":[76],"<mml:math":[77,90,106,143,151,159],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[78,91,107,144,152,160],"<mml:msup>":[79,92,109],"<mml:mrow>":[80,83,93,96,108,110,113,117,145,153,161],"<mml:mn>2</mml:mn>":[81,94,97,111],"</mml:mrow>":[82,85,95,99,112,115,120,121,147,155,163],"<mml:mi>n</mml:mi>":[84,98,114,146],"</mml:msup>":[86,100,116],"</mml:math>":[87,101,122,148,156,164],"and":[88,157,165],"$$\\varvec{2}^{\\varvec{2n}}$$":[89],"elements":[102],"when":[103],"$$\\varvec{2}^{\\varvec{n}}":[104],"\\varvec{-1}$$":[105],"<mml:mo>-</mml:mo>":[118],"<mml:mn>1</mml:mn>":[119],"prime.":[124],"further":[126,178],"search":[129],"algorithm":[130],"based":[131],"on":[132],"that":[135],"can":[136],"produce":[137],"novel":[138],"some":[141,170],"$$\\varvec{n}$$":[142],"between":[149],"$$\\varvec{32}$$":[150],"<mml:mn>32</mml:mn>":[154],"$$\\varvec{500}$$":[158],"<mml:mn>500</mml:mn>":[162],"improve":[166],"length":[168],"known":[171],"decompositions.":[172],"Finally,":[173],"discuss":[175],"how":[176],"reduce":[179],"number":[181],"functions":[184],"decomposition.":[187]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
