Javascript must be enabled to continue!
Further results on permutation polynomials and complete permutation polynomials over finite fields
View through CrossRef
<abstract><p>In this paper, by employing the AGW criterion and determining the number of solutions to some equations over finite fields, we further investigate nine classes of permutation polynomials over $ \mathbb{F}_{p^n} $ with the form $ (x^{p^m}-x+\delta)^{s_1}+(x^{p^m}-x+\delta)^{s_2}+x $ and propose five classes of complete permutation polynomials over $ \mathbb{F}_{p^{2m}} $ with the form $ ax^{p^m}+bx+h(x^{p^m}-x) $.</p></abstract>
American Institute of Mathematical Sciences (AIMS)
Title: Further results on permutation polynomials and complete permutation polynomials over finite fields
Description:
<abstract><p>In this paper, by employing the AGW criterion and determining the number of solutions to some equations over finite fields, we further investigate nine classes of permutation polynomials over $ \mathbb{F}_{p^n} $ with the form $ (x^{p^m}-x+\delta)^{s_1}+(x^{p^m}-x+\delta)^{s_2}+x $ and propose five classes of complete permutation polynomials over $ \mathbb{F}_{p^{2m}} $ with the form $ ax^{p^m}+bx+h(x^{p^m}-x) $.
</p></abstract>.
Related Results
Image encryption based on permutation polynomials over finite fields
Image encryption based on permutation polynomials over finite fields
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists...
On the Study of Families of Linearized Polynomials over Finite Fields
On the Study of Families of Linearized Polynomials over Finite Fields
Linearized polynomials are gaining attention from many researchers because of their applications in the field of coding theory, cryptography and finite geometry. The linearized pol...
Exploring Large Language Models Integration in the Histopathologic Diagnosis of Skin Diseases: A Comparative Study
Exploring Large Language Models Integration in the Histopathologic Diagnosis of Skin Diseases: A Comparative Study
Abstract
Introduction
The exact manner in which large language models (LLMs) will be integrated into pathology is not yet fully comprehended. This study examines the accuracy, bene...
Truncated-Exponential-Based Appell-Type Changhee Polynomials
Truncated-Exponential-Based Appell-Type Changhee Polynomials
The truncated exponential polynomials em(x) (1), their extensions, and certain newly-introduced polynomials which combine the truncated exponential polynomials with other known pol...
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
Abstract
To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper. This algorit...
[RETRACTED] Keto Complete | Keto Complete Reviews | What Is Keto Complete? v1
[RETRACTED] Keto Complete | Keto Complete Reviews | What Is Keto Complete? v1
[RETRACTED]Keto Complete - Individuals need to become fit and large numbers of them need to lessen their fat to become solid. Weight has become one of the significant justification...
[RETRACTED] Keto Complete | Keto Complete Reviews | What Is Keto Complete? v1
[RETRACTED] Keto Complete | Keto Complete Reviews | What Is Keto Complete? v1
[RETRACTED]Keto Complete - Individuals need to become fit and large numbers of them need to lessen their fat to become solid. Weight has become one of the significant justification...

