{"title":"Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem","authors":"Xinyu Tian, Hongyu Han, Udaya Parampalli","doi":"10.1007/s12095-024-00738-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00738-7","url":null,"abstract":"<p>The low-hit-zone (LHZ) frequency-hopping sequence (FHS) sets are commonly applied in quasi-synchronous (QS) frequency-hopping multiple access (FHMA) systems to reduce MA interference. In addition, due to the short synchronization time or sophisticated hardware, the correlation window is typically less than the period of the selected FHS set. In this paper, we construct a class of LHZ FHS sets with strictly optimal partial Hamming correlation (PHC) based on the Chinese Remainder Theorem (CRT) and analyze the PHC of our constructed LHZ FHS sets. It turns out that the new LHZ FHS sets are optimal with respect to the Niu-Peng-Fan bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142263833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the second-order zero differential spectra of some power functions over finite fields","authors":"Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng","doi":"10.1007/s12095-024-00740-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00740-z","url":null,"abstract":"<p>Boukerrou et al. (IACR Trans. Symm. Cryptol. <b>2020</b>(1), 331–362, 2020) introduced the notion of the Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic fields). The FBCT is a crucial table for the analysis of the resistance of block ciphers to power attacks such as differential and boomerang attacks. It is worth noting that the coefficients of the FBCT are related to the second-order zero differential spectra of functions and the FBCT of functions can be extended as their second-order zero differential spectra. In this paper, by carrying out certain finer manipulations consisting of solving some specific equations over finite fields, we explicitly determine the second-order zero differential spectra of some power functions with low differential uniformity, and show that these functions also have low second-order zero differential uniformity. Our study further pushes previous investigations on second-order zero differential uniformity and Feistel boomerang uniformity for a power function <i>F</i>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild
{"title":"Orientable sequences over non-binary alphabets","authors":"Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild","doi":"10.1007/s12095-024-00742-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00742-x","url":null,"abstract":"<p>We describe new, simple, recursive methods of construction for <i>orientable sequences</i> over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of <i>n</i> consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previous work on the binary case. We also derive an upper bound on the period of an orientable sequence.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trace dual of additive cyclic codes over finite fields","authors":"Gyanendra K. Verma, R. K. Sharma","doi":"10.1007/s12095-024-00741-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00741-y","url":null,"abstract":"<p>In (Shi et al. <i>Finite Fields Appl.</i> <b>80</b>, 102087 2022) studied additive cyclic complementary dual codes with respect to trace Euclidean and trace Hermitian inner products over the finite field <span>(mathbb {F}_4)</span>. In this article, we extend their results over <span>(mathbb {F}_{q^2},)</span> where <i>q</i> is an odd prime power. We describe the algebraic structure of additive cyclic codes and obtain the dual of a class of these codes with respect to the trace inner products. We also use generating polynomials to construct several examples of additive cyclic codes over <span>(mathbb {F}_9.)</span> These codes are better than linear codes of the same length and size. Furthermore, we describe the subfield codes and the trace codes of these codes as linear cyclic codes over <span>(mathbb {F}_q)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two classes of q-ary constacyclic BCH codes","authors":"Jiayuan Zhang, Xiaoshan Kai, Ping Li","doi":"10.1007/s12095-024-00736-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00736-9","url":null,"abstract":"<p>Constacyclic BCH codes are an interesting subclass of constacyclic codes because of their important theoretical and practical value. The purpose of this paper is to study the parameters of cyclic BCH codes of length <span>(varvec{n = q^{m} - 1})</span> and negacyclic BCH codes of length <span>(varvec{n = frac{q^{m} - 1}{2}})</span>. We settle completely their dimensions. We also determine the minimum distances of a class of cyclic BCH codes of length <span>(varvec{n = q^m - 1})</span> and give a lower bound on the minimum distances of other classes of constacyclic BCH codes. As seen by the code examples in this paper, the lower bound on the minimum distances of constacyclic BCH codes we gave is very close to the true minimum distances. These <span>(varvec{q})</span>-ary codes have good parameters in general.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On $$mathbb {Z}_{p^r} mathbb {Z}_{p^s} mathbb {Z}_{p^t}$$ -additive cyclic codes exhibit asymptotically good properties","authors":"Mousumi Ghosh, Sachin Pathak, Dipendu Maity","doi":"10.1007/s12095-024-00737-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00737-8","url":null,"abstract":"<p>In this paper, we construct a class of <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes generated by 3-tuples of polynomials, where <i>p</i> is a prime number and <span>(1 le r le s le t)</span>. We investigate the algebraic structure of these codes and establish that it is possible to determine generator matrices for a subfamily of codes within this class. We employ a probabilistic approach to analyze the asymptotic properties of these codes. For any positive real number <span>(delta )</span> satisfying <span>(0< delta < 1)</span> such that the asymptotic Gilbert-Varshamov bound at <span>(left( frac{k+l+n}{3p^{r-1}}delta right) )</span> is greater than <span>(frac{1}{2})</span>, we demonstrate that the relative distance of the random code converges to <span>(delta )</span>, while the rate of the random code converges to <span>(frac{1}{k+l+n})</span>. Finally, we conclude that the <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes exhibit asymptotically good properties.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the minimum weights of quaternary Hermitian LCD codes","authors":"Makoto Araya, Masaaki Harada","doi":"10.1007/s12095-024-00733-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00733-y","url":null,"abstract":"<p>We study the largest minimum weights among quaternary Hermitian LCD codes. We determine the largest minimum weights among quaternary Hermitian LCD codes of length <i>n</i> and dimension <i>k</i> for <span>(k le n le 17)</span>. A quaternary Hermitian LCD [21, 5, 13] code and a quaternary Hermitian LCD [21, 9, 9] code are also constructed for the first time. An updated table of the largest minimum weights among quaternary Hermitian LCD [<i>n</i>, <i>k</i>] codes is also given for <span>(k le n le 30)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new construction of cyclic subspace codes","authors":"Yuqing Han, Xiwang Cao","doi":"10.1007/s12095-024-00735-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00735-w","url":null,"abstract":"<p>Subspace codes have attracted a lot of attention in the last few decades due to their applications in noncoherent linear network coding, in particular cyclic subspace codes can be encoded and decoded more efficiently because of their special algebraic structure. In this paper, we present a family of cyclic subspace codes with minimum distance <span>(varvec{2k-2})</span> and size <span>(varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}})</span>, where <span>(varvec{k|n})</span>, <span>(varvec{frac{n}{k}ge 2s+1})</span>, <span>(varvec{sge 1, e=lceil frac{n}{2sk} rceil -1})</span>. In the case of <span>(varvec{n=(2s+1)k})</span> with <span>(varvec{2le s <q^k})</span>, our cyclic subspace codes have larger size than the known ones in the literature.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on nonlinear invariants of a power function over a binary field","authors":"Zebin Wang, Chenhui Jin, Ting Cui","doi":"10.1007/s12095-024-00734-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00734-x","url":null,"abstract":"<p>The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an <span>(varvec{n})</span>-bit width function, the time complexity <span>(varvec{O}(textbf{2}^{varvec{3n}}))</span> is needed to find its all nonlinear invariants. In this paper, for the positive integer <span>(varvec{m})</span>, we consider the power function <span>(varvec{x}^{varvec{m}})</span> over the finite field <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span>, which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> is studied and we provide two mathematical toolboxes named <span>(varvec{sim }_{varvec{m}})</span> <i>periodical point</i> and <span>(varvec{sim }_{varvec{m}})</span> <i>equivalence class</i>. Second, we present an algorithm to get all the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> over <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span> at the cost of time complexity <span>(varvec{O}(frac{{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}}))</span>. If the growth of <i>n</i> exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span>. Finally, we consider the nonlinear invariants of <span>(varvec{x}^textbf{3})</span> over <span>(varvec{GF(2}^{varvec{129}}))</span> as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On quasi-twisted codes and generalized quasi-twisted codes over $$mathbb {Z}_{4} +umathbb {Z}_{4}$$","authors":"Ayoub Mounir, Abdelfattah Haily","doi":"10.1007/s12095-024-00732-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00732-z","url":null,"abstract":"<p>In this paper, our main objective is to examine the properties and characteristics of 1-generator <span>((2 + u))</span>-quasi-twisted (QT) codes and <span>((2 + u))</span>-generalized quasi-twisted (GQT) codes over the ring <span>(mathbb {Z}_4 +umathbb {Z}_4 )</span>, with <span>(u^2=1)</span>. We determine the structure of the generators and minimal generating sets for both 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes. Additionally, we establish a lower bound for the minimum distance of free 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes over <i>R</i>. Furthermore, we present some numerical examples that illustrate the construction of some optimal <span>(mathbb {Z}_4)</span>-linear codes using the Gray map.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}