Cryptography and Communications最新文献

筛选
英文 中文
Self dual and MHDR dual cyclic codes over finite chain rings 有限链环上的自对偶和 MHDR 对偶循环码
Cryptography and Communications Pub Date : 2024-08-03 DOI: 10.1007/s12095-024-00731-0
Monika Dalal, Disha Garg, Sucheta Dutt, Ranjeet Sehmi
{"title":"Self dual and MHDR dual cyclic codes over finite chain rings","authors":"Monika Dalal, Disha Garg, Sucheta Dutt, Ranjeet Sehmi","doi":"10.1007/s12095-024-00731-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00731-0","url":null,"abstract":"<p>In this work, we establish a minimal set of generators for the dual code of a cyclic code having arbitrary length over a finite chain ring. It is observed that this set of generators forms a minimal strong Grobner basis for the dual code. Using this structure for the dual of a cyclic code, we obtain sufficient as well as necessary conditions for a cyclic code to be a self dual code over a finite chain ring. We enumerate the distinct non-trivial self dual cyclic codes over these rings. Further, we determine all MHDR dual cyclic codes. We provide a few examples of self dual and MHDR dual cyclic codes over various finite chain rings.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Dillon’s property of (n, m)-functions 关于(n,m)函数的狄龙属性
Cryptography and Communications Pub Date : 2024-08-01 DOI: 10.1007/s12095-024-00730-1
Matteo Abbondati, Marco Calderini, Irene Villa
{"title":"On Dillon’s property of (n, m)-functions","authors":"Matteo Abbondati, Marco Calderini, Irene Villa","doi":"10.1007/s12095-024-00730-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00730-1","url":null,"abstract":"<p>Dillon observed that an APN function <i>F</i> over <span>({{mathbb {F}}_{2}^{n}})</span> with <i>n</i> greater than 2 must satisfy the condition <span>({F(x) + F(y) + F(z) + F(x + y + z) :, x,y,z in {mathbb {F}}_{2}^{n}}= {mathbb {F}}_{2}^{n})</span>. Recently, Taniguchi (Cryptogr. Commun. <b>15</b>, 627–647 2023) generalized this condition to functions defined from <span>({{mathbb {F}}_{2}^{n}})</span> to <span>({{mathbb {F}}_{2}^{m}})</span>, with <span>(m&gt;n)</span>, calling it the D-property. Taniguchi gave some characterizations of APN functions satisfying the D-property and provided some families of APN functions from <span>({{mathbb {F}}_{2}^{n}})</span> to <span>({{mathbb {F}}_{2}^{n+1}})</span> satisfying this property. In this work, we further study the D-property for (<i>n</i>, <i>m</i>)-functions with <span>(mge n)</span>. We give some combinatorial bounds on the dimension <i>m</i> for the existence of such functions. Then, we characterize the D-property in terms of the Walsh transform and for quadratic functions we give a characterization of this property in terms of the ANF. We also give a simplification on checking the D-property for quadratic functions, which permits to extend some of the APN families provided by Taniguchi. We further focus on the class of the plateaued functions, providing conditions for the D-property. To conclude, we show a connection of some results obtained with the higher-order differentiability and the inverse Fourier transform.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"181 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Several classes of linear codes with AMDS duals and their subfield codes 具有 AMDS 对偶的几类线性码及其子字段码
Cryptography and Communications Pub Date : 2024-07-31 DOI: 10.1007/s12095-024-00729-8
Xingbin Qiao, Xiaoni Du, Wenping Yuan
{"title":"Several classes of linear codes with AMDS duals and their subfield codes","authors":"Xingbin Qiao, Xiaoni Du, Wenping Yuan","doi":"10.1007/s12095-024-00729-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00729-8","url":null,"abstract":"<p>Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing, authentication codes and association schemes. In this paper, we first present a construction of 3-dimensional linear codes <span>(varvec{C}_{varvec{f}})</span> over finite field <span>({mathbb {F}_{varvec{2}}}^{varvec{m}})</span> parameterized by any Boolean function <span>(varvec{f})</span>. Then we determine explicitly the weight distributions of <span>(varvec{C}_{varvec{f}})</span>, the punctured code <span>(widetilde{varvec{C}}_{varvec{f}})</span>, as well as the corresponding subfield codes over <span>(mathbb {F}_{varvec{2}})</span> for several classes of Boolean functions <span>(varvec{f})</span>. In particular, we determine the weight distributions of subfield codes derived from <span>(varvec{r})</span>-plateaued functions. Moreover, the parameters of their dual codes are investigated, which contain length-optimal and dimension-optimal AMDS codes with respect to the sphere packing bound. We emphasize that the new codes are projective and contain binary self-complementary codes. As applications, some of the projective codes we present can be employed to construct <span>(varvec{s})</span>-sum sets for any odd integer <span>(varvec{s}&gt;varvec{1})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"362 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymptotic bounds on the numbers of certain bent functions 某些弯曲函数数的渐近界限
Cryptography and Communications Pub Date : 2024-07-19 DOI: 10.1007/s12095-024-00726-x
Vladimir N. Potapov, Ferruh Özbudak
{"title":"Asymptotic bounds on the numbers of certain bent functions","authors":"Vladimir N. Potapov, Ferruh Özbudak","doi":"10.1007/s12095-024-00726-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00726-x","url":null,"abstract":"<p>Using recent results of Keevash et al. [10] and Eberhard et al. [8] together with further new detailed techniques in combinatorics, we present constructions of two concrete families of generalized Maiorana-McFarland bent functions. Our constructions improve the lower bounds on the number of bent functions in <i>n</i> variables over a finite field <span>({mathbb F}_p)</span> if <i>p</i> is odd and <i>n</i> is odd in the limit as <i>n</i> tends to infinity. Moreover we obtain the asymptotically exact number of two dimensional vectorial Maiorana-McFarland bent functions in <i>n</i> variables over <span>({mathbb F}_2)</span> as <i>n</i> tends to infinity.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uni/multi variate polynomial embeddings for zkSNARKs zkSNARK 的单变量/多变量多项式嵌入
Cryptography and Communications Pub Date : 2024-07-16 DOI: 10.1007/s12095-024-00723-0
Guang Gong
{"title":"Uni/multi variate polynomial embeddings for zkSNARKs","authors":"Guang Gong","doi":"10.1007/s12095-024-00723-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00723-0","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141642276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone 构建具有大零相关区的所有偶数长度 II 型 Z 互补对
Cryptography and Communications Pub Date : 2024-07-12 DOI: 10.1007/s12095-024-00727-w
Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi
{"title":"Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone","authors":"Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi","doi":"10.1007/s12095-024-00727-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00727-w","url":null,"abstract":"<p>This paper presents a direct construction of type-II Z-complementary pair (ZCP) of <i>q</i>-ary (<i>q</i> is even) for all even lengths with a wide zero-correlation zone (ZCZ). The proposed construction provides type-II <span>(left( N_1times 2^m, N_1times 2^m-left( N_1-1right) /2right) )</span>-ZCP, where <span>(N_1)</span> is an odd positive integer greater than 1, and <span>(mge 1)</span>. For <span>(N_1=3)</span>, the result produces Z-optimal type-II ZCP of length <span>(3times 2^m)</span>. In this paper, we also present a construction of type-II <span>(left( N_2times 2^m, N_2times 2^m-left( N_2-2right) /2right) )</span>-ZCP, where <span>(N_2)</span> is an even positive integer greater than 1, and <span>(mge 1)</span>. For <span>(N_2=2)</span> and <span>(N_2=4)</span>, the result provides a Golay complementary pair (GCP) of length <span>(2^{m+1})</span> and Z-optimal type-II ZCP of length <span>(2^{m+2})</span>. Both the proposed constructions are compared with the existing state-of-the-art, and it has been observed that it produces a large ZCZ, which covers all existing work in terms of lengths.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enumeration formulae for self-orthogonal, self-dual and complementary-dual additive cyclic codes over finite commutative chain rings 有限交换链环上自正交、自偶和互补偶加循环码的枚举公式
Cryptography and Communications Pub Date : 2024-07-10 DOI: 10.1007/s12095-024-00728-9
Leijo Jose, Anuradha Sharma
{"title":"Enumeration formulae for self-orthogonal, self-dual and complementary-dual additive cyclic codes over finite commutative chain rings","authors":"Leijo Jose, Anuradha Sharma","doi":"10.1007/s12095-024-00728-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00728-9","url":null,"abstract":"<p>Let <i>R</i>, <i>S</i> be two finite commutative chain rings such that <i>R</i> is the Galois extension of <i>S</i> of degree <span>(r ge 2)</span> and has a self-dual basis over <i>S</i>. Let <i>q</i> be the order of the residue field of <i>S</i>, and let <i>N</i> be a positive integer with <span>(gcd (N,q)=1.)</span> An <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> is defined as an <i>S</i>-submodule of <span>(R^N,)</span> which is invariant under the cyclic shift operator on <span>(R^N.)</span> In this paper, we show that each <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> can be uniquely expressed as a direct sum of linear codes of length <i>r</i> over certain Galois extensions of the chain ring <i>S</i>, which are called its constituents. We further study the dual code of each <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> by placing the ordinary trace bilinear form on <span>(R^N)</span> and relating the constituents of the code with that of its dual code. With the help of these canonical form decompositions of <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> and their dual codes, we further characterize all self-orthogonal, self-dual and complementary-dual <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> in terms of their constituents. We also derive necessary and sufficient conditions for the existence of a self-dual <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> and count all self-dual and self-orthogonal <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> by considering the following two cases: (I) both <i>q</i>, <i>r</i> are odd, and (II) <i>q</i> is even and <span>(S=mathbb {F}_{q}[u]/langle u^e rangle .)</span> Besides this, we obtain the explicit enumeration formula for all complementary-dual <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i>. We also illustrate our main results with some examples.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"231 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Several families of q-ary cyclic codes with length $$q^m-1$$ 长度为 $$q^m-1$ 的 q-ary 循环码的几个系列
Cryptography and Communications Pub Date : 2024-07-01 DOI: 10.1007/s12095-024-00725-y
Jin Li, Huan Zhu, Shan Huang
{"title":"Several families of q-ary cyclic codes with length $$q^m-1$$","authors":"Jin Li, Huan Zhu, Shan Huang","doi":"10.1007/s12095-024-00725-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00725-y","url":null,"abstract":"<p>It is very hard to construct an infinite family of cyclic codes of rate close to one half whose minimum distances have a good bound. Tang-Ding codes are very interesting, as their minimum distances have a square-root-like bound. Recently, a new generalization of Tang-Ding codes has been presented, Sun constructed several infinite families of binary cyclic codes with length <span>(2^{m}-1)</span> and dimension near <span>(2^{m-1})</span> whose minimum distances much exceed the square-root bound (Sun, Finite Fields Appl. <b>89</b>, 102200, 2023). In this paper, we construct several families of <i>q</i>-ary cyclic codes with length <span>(q^{m}-1)</span> and dimension near <span>(frac{q^{m}-1}{2})</span>, where <span>(qge 3)</span> is a prime power and <span>(m ge 3)</span> is an integer. The minimum distances of these codes and their dual codes much exceed the square-root bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bent functions satisfying the dual bent condition and permutations with the $$(mathcal {A}_m)$$ property 满足对偶弯曲条件的弯曲函数和具有 $$(mathcal {A}_m)$$ 属性的排列组合
Cryptography and Communications Pub Date : 2024-06-18 DOI: 10.1007/s12095-024-00724-z
Alexandr Polujan, Enes Pasalic, Sadmir Kudin, Fengrong Zhang
{"title":"Bent functions satisfying the dual bent condition and permutations with the $$(mathcal {A}_m)$$ property","authors":"Alexandr Polujan, Enes Pasalic, Sadmir Kudin, Fengrong Zhang","doi":"10.1007/s12095-024-00724-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00724-z","url":null,"abstract":"<p>The concatenation of four Boolean bent functions <span>(f=f_1||f_2||f_3||f_4)</span> is bent if and only if the dual bent condition <span>(f_1^* + f_2^* + f_3^* + f_4^* =1)</span> is satisfied. However, to specify four bent functions satisfying this duality condition is in general quite a difficult task. Commonly, to simplify this problem, certain relations between <span>(f_i)</span> are assumed, as well as functions <span>(f_i)</span> of a special shape are considered, e.g., <span>(f_i(x,y)=xcdot pi _i(y)+h_i(y))</span> are Maiorana-McFarland bent functions. In the case when permutations <span>(pi _i)</span> of <span>(mathbb {F}_2^m)</span> have the <span>((mathcal {A}_m))</span> property and Maiorana-McFarland bent functions <span>(f_i)</span> satisfy the additional condition <span>(f_1+f_2+f_3+f_4=0)</span>, the dual bent condition is known to have a relatively simple shape allowing to specify the functions <span>(f_i)</span> explicitly. In this paper, we generalize this result for the case when Maiorana-McFarland bent functions <span>(f_i)</span> satisfy the condition <span>(f_1(x,y)+f_2(x,y)+f_3(x,y)+f_4(x,y)=s(y))</span> and provide a construction of new permutations with the <span>((mathcal {A}_m))</span> property from the old ones. Combining these two results, we obtain a recursive construction method of bent functions satisfying the dual bent condition. Moreover, we provide a generic condition on the Maiorana-McFarland bent functions <span>(f_1,f_2,f_3,f_4)</span> stemming from the permutations of <span>(mathbb {F}_2^m)</span> with the <span>((mathcal {A}_m))</span> property, such that the concatenation <span>(f=f_1||f_2||f_3||f_4)</span> does not belong, up to equivalence, to the Maiorana-McFarland class. Using monomial permutations <span>(pi _i)</span> of <span>(mathbb {F}_{2^m})</span> with the <span>((mathcal {A}_m))</span> property and monomial functions <span>(h_i)</span> on <span>(mathbb {F}_{2^m})</span>, we provide explicit constructions of such bent functions; a particular case of our result shows how one can construct bent functions from APN permutations, when <i>m</i> is odd. Finally, with our construction method, we explain how one can construct homogeneous cubic bent functions, noticing that only very few design methods of these objects are known.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Generalized Nega-Hadamard Transform and Nega-crosscorrelation 论广义负相关-哈达玛德变换和负相关-交叉相关
Cryptography and Communications Pub Date : 2024-05-16 DOI: 10.1007/s12095-024-00721-2
Deepmala Sharma, Mayasar Ahmad Dar
{"title":"On Generalized Nega-Hadamard Transform and Nega-crosscorrelation","authors":"Deepmala Sharma, Mayasar Ahmad Dar","doi":"10.1007/s12095-024-00721-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00721-2","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"113 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信