Cryptography and Communications最新文献

筛选
英文 中文
Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem 基于中文余数定理构建具有严格最优部分汉明相关性的低命中区跳频序列集
Cryptography and Communications Pub Date : 2024-09-17 DOI: 10.1007/s12095-024-00738-7
Xinyu Tian, Hongyu Han, Udaya Parampalli
{"title":"Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem","authors":"Xinyu Tian, Hongyu Han, Udaya Parampalli","doi":"10.1007/s12095-024-00738-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00738-7","url":null,"abstract":"<p>The low-hit-zone (LHZ) frequency-hopping sequence (FHS) sets are commonly applied in quasi-synchronous (QS) frequency-hopping multiple access (FHMA) systems to reduce MA interference. In addition, due to the short synchronization time or sophisticated hardware, the correlation window is typically less than the period of the selected FHS set. In this paper, we construct a class of LHZ FHS sets with strictly optimal partial Hamming correlation (PHC) based on the Chinese Remainder Theorem (CRT) and analyze the PHC of our constructed LHZ FHS sets. It turns out that the new LHZ FHS sets are optimal with respect to the Niu-Peng-Fan bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142263833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the second-order zero differential spectra of some power functions over finite fields 论有限域上某些幂函数的二阶零微分谱
Cryptography and Communications Pub Date : 2024-09-04 DOI: 10.1007/s12095-024-00740-z
Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng
{"title":"On the second-order zero differential spectra of some power functions over finite fields","authors":"Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng","doi":"10.1007/s12095-024-00740-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00740-z","url":null,"abstract":"<p>Boukerrou et al. (IACR Trans. Symm. Cryptol. <b>2020</b>(1), 331–362, 2020) introduced the notion of the Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic fields). The FBCT is a crucial table for the analysis of the resistance of block ciphers to power attacks such as differential and boomerang attacks. It is worth noting that the coefficients of the FBCT are related to the second-order zero differential spectra of functions and the FBCT of functions can be extended as their second-order zero differential spectra. In this paper, by carrying out certain finer manipulations consisting of solving some specific equations over finite fields, we explicitly determine the second-order zero differential spectra of some power functions with low differential uniformity, and show that these functions also have low second-order zero differential uniformity. Our study further pushes previous investigations on second-order zero differential uniformity and Feistel boomerang uniformity for a power function <i>F</i>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orientable sequences over non-binary alphabets 非二进制字母上的可定向序列
Cryptography and Communications Pub Date : 2024-09-02 DOI: 10.1007/s12095-024-00742-x
Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild
{"title":"Orientable sequences over non-binary alphabets","authors":"Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild","doi":"10.1007/s12095-024-00742-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00742-x","url":null,"abstract":"<p>We describe new, simple, recursive methods of construction for <i>orientable sequences</i> over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of <i>n</i> consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previous work on the binary case. We also derive an upper bound on the period of an orientable sequence.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trace dual of additive cyclic codes over finite fields 有限域上可加循环码的迹对偶
Cryptography and Communications Pub Date : 2024-08-29 DOI: 10.1007/s12095-024-00741-y
Gyanendra K. Verma, R. K. Sharma
{"title":"Trace dual of additive cyclic codes over finite fields","authors":"Gyanendra K. Verma, R. K. Sharma","doi":"10.1007/s12095-024-00741-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00741-y","url":null,"abstract":"<p>In (Shi et al. <i>Finite Fields Appl.</i> <b>80</b>, 102087 2022) studied additive cyclic complementary dual codes with respect to trace Euclidean and trace Hermitian inner products over the finite field <span>(mathbb {F}_4)</span>. In this article, we extend their results over <span>(mathbb {F}_{q^2},)</span> where <i>q</i> is an odd prime power. We describe the algebraic structure of additive cyclic codes and obtain the dual of a class of these codes with respect to the trace inner products. We also use generating polynomials to construct several examples of additive cyclic codes over <span>(mathbb {F}_9.)</span> These codes are better than linear codes of the same length and size. Furthermore, we describe the subfield codes and the trace codes of these codes as linear cyclic codes over <span>(mathbb {F}_q)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of q-ary constacyclic BCH codes 两类 q-ary 常环 BCH 码
Cryptography and Communications Pub Date : 2024-08-27 DOI: 10.1007/s12095-024-00736-9
Jiayuan Zhang, Xiaoshan Kai, Ping Li
{"title":"Two classes of q-ary constacyclic BCH codes","authors":"Jiayuan Zhang, Xiaoshan Kai, Ping Li","doi":"10.1007/s12095-024-00736-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00736-9","url":null,"abstract":"<p>Constacyclic BCH codes are an interesting subclass of constacyclic codes because of their important theoretical and practical value. The purpose of this paper is to study the parameters of cyclic BCH codes of length <span>(varvec{n = q^{m} - 1})</span> and negacyclic BCH codes of length <span>(varvec{n = frac{q^{m} - 1}{2}})</span>. We settle completely their dimensions. We also determine the minimum distances of a class of cyclic BCH codes of length <span>(varvec{n = q^m - 1})</span> and give a lower bound on the minimum distances of other classes of constacyclic BCH codes. As seen by the code examples in this paper, the lower bound on the minimum distances of constacyclic BCH codes we gave is very close to the true minimum distances. These <span>(varvec{q})</span>-ary codes have good parameters in general.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On $$mathbb {Z}_{p^r} mathbb {Z}_{p^s} mathbb {Z}_{p^t}$$ -additive cyclic codes exhibit asymptotically good properties 关于 $$mathbb {Z}_{p^r}mathbb {Z}_{p^s}附加循环码表现出渐进的良好特性
Cryptography and Communications Pub Date : 2024-08-26 DOI: 10.1007/s12095-024-00737-8
Mousumi Ghosh, Sachin Pathak, Dipendu Maity
{"title":"On $$mathbb {Z}_{p^r} mathbb {Z}_{p^s} mathbb {Z}_{p^t}$$ -additive cyclic codes exhibit asymptotically good properties","authors":"Mousumi Ghosh, Sachin Pathak, Dipendu Maity","doi":"10.1007/s12095-024-00737-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00737-8","url":null,"abstract":"<p>In this paper, we construct a class of <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes generated by 3-tuples of polynomials, where <i>p</i> is a prime number and <span>(1 le r le s le t)</span>. We investigate the algebraic structure of these codes and establish that it is possible to determine generator matrices for a subfamily of codes within this class. We employ a probabilistic approach to analyze the asymptotic properties of these codes. For any positive real number <span>(delta )</span> satisfying <span>(0&lt; delta &lt; 1)</span> such that the asymptotic Gilbert-Varshamov bound at <span>(left( frac{k+l+n}{3p^{r-1}}delta right) )</span> is greater than <span>(frac{1}{2})</span>, we demonstrate that the relative distance of the random code converges to <span>(delta )</span>, while the rate of the random code converges to <span>(frac{1}{k+l+n})</span>. Finally, we conclude that the <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes exhibit asymptotically good properties.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the minimum weights of quaternary Hermitian LCD codes 论四元赫米提液晶编码的最小权重
Cryptography and Communications Pub Date : 2024-08-20 DOI: 10.1007/s12095-024-00733-y
Makoto Araya, Masaaki Harada
{"title":"On the minimum weights of quaternary Hermitian LCD codes","authors":"Makoto Araya, Masaaki Harada","doi":"10.1007/s12095-024-00733-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00733-y","url":null,"abstract":"<p>We study the largest minimum weights among quaternary Hermitian LCD codes. We determine the largest minimum weights among quaternary Hermitian LCD codes of length <i>n</i> and dimension <i>k</i> for <span>(k le n le 17)</span>. A quaternary Hermitian LCD [21, 5, 13] code and a quaternary Hermitian LCD [21, 9, 9] code are also constructed for the first time. An updated table of the largest minimum weights among quaternary Hermitian LCD [<i>n</i>, <i>k</i>] codes is also given for <span>(k le n le 30)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new construction of cyclic subspace codes 循环子空间码的新构造
Cryptography and Communications Pub Date : 2024-08-13 DOI: 10.1007/s12095-024-00735-w
Yuqing Han, Xiwang Cao
{"title":"A new construction of cyclic subspace codes","authors":"Yuqing Han, Xiwang Cao","doi":"10.1007/s12095-024-00735-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00735-w","url":null,"abstract":"<p>Subspace codes have attracted a lot of attention in the last few decades due to their applications in noncoherent linear network coding, in particular cyclic subspace codes can be encoded and decoded more efficiently because of their special algebraic structure. In this paper, we present a family of cyclic subspace codes with minimum distance <span>(varvec{2k-2})</span> and size <span>(varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}})</span>, where <span>(varvec{k|n})</span>, <span>(varvec{frac{n}{k}ge 2s+1})</span>, <span>(varvec{sge 1, e=lceil frac{n}{2sk} rceil -1})</span>. In the case of <span>(varvec{n=(2s+1)k})</span> with <span>(varvec{2le s &lt;q^k})</span>, our cyclic subspace codes have larger size than the known ones in the literature.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on nonlinear invariants of a power function over a binary field 二进制域上幂函数的非线性不变式研究
Cryptography and Communications Pub Date : 2024-08-12 DOI: 10.1007/s12095-024-00734-x
Zebin Wang, Chenhui Jin, Ting Cui
{"title":"Research on nonlinear invariants of a power function over a binary field","authors":"Zebin Wang, Chenhui Jin, Ting Cui","doi":"10.1007/s12095-024-00734-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00734-x","url":null,"abstract":"<p>The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an <span>(varvec{n})</span>-bit width function, the time complexity <span>(varvec{O}(textbf{2}^{varvec{3n}}))</span> is needed to find its all nonlinear invariants. In this paper, for the positive integer <span>(varvec{m})</span>, we consider the power function <span>(varvec{x}^{varvec{m}})</span> over the finite field <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span>, which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> is studied and we provide two mathematical toolboxes named <span>(varvec{sim }_{varvec{m}})</span> <i>periodical point</i> and <span>(varvec{sim }_{varvec{m}})</span> <i>equivalence class</i>. Second, we present an algorithm to get all the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> over <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span> at the cost of time complexity <span>(varvec{O}(frac{{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}}))</span>. If the growth of <i>n</i> exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span>. Finally, we consider the nonlinear invariants of <span>(varvec{x}^textbf{3})</span> over <span>(varvec{GF(2}^{varvec{129}}))</span> as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On quasi-twisted codes and generalized quasi-twisted codes over $$mathbb {Z}_{4} +umathbb {Z}_{4}$$ 关于 $$mathbb {Z}_{4} 上的准扭曲码和广义准扭曲码+umathbb {Z}_{4}$$
Cryptography and Communications Pub Date : 2024-08-05 DOI: 10.1007/s12095-024-00732-z
Ayoub Mounir, Abdelfattah Haily
{"title":"On quasi-twisted codes and generalized quasi-twisted codes over $$mathbb {Z}_{4} +umathbb {Z}_{4}$$","authors":"Ayoub Mounir, Abdelfattah Haily","doi":"10.1007/s12095-024-00732-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00732-z","url":null,"abstract":"<p>In this paper, our main objective is to examine the properties and characteristics of 1-generator <span>((2 + u))</span>-quasi-twisted (QT) codes and <span>((2 + u))</span>-generalized quasi-twisted (GQT) codes over the ring <span>(mathbb {Z}_4 +umathbb {Z}_4 )</span>, with <span>(u^2=1)</span>. We determine the structure of the generators and minimal generating sets for both 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes. Additionally, we establish a lower bound for the minimum distance of free 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes over <i>R</i>. Furthermore, we present some numerical examples that illustrate the construction of some optimal <span>(mathbb {Z}_4)</span>-linear codes using the Gray map.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信