{"title":"Self dual and MHDR dual cyclic codes over finite chain rings","authors":"Monika Dalal, Disha Garg, Sucheta Dutt, Ranjeet Sehmi","doi":"10.1007/s12095-024-00731-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00731-0","url":null,"abstract":"<p>In this work, we establish a minimal set of generators for the dual code of a cyclic code having arbitrary length over a finite chain ring. It is observed that this set of generators forms a minimal strong Grobner basis for the dual code. Using this structure for the dual of a cyclic code, we obtain sufficient as well as necessary conditions for a cyclic code to be a self dual code over a finite chain ring. We enumerate the distinct non-trivial self dual cyclic codes over these rings. Further, we determine all MHDR dual cyclic codes. We provide a few examples of self dual and MHDR dual cyclic codes over various finite chain rings.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Dillon’s property of (n, m)-functions","authors":"Matteo Abbondati, Marco Calderini, Irene Villa","doi":"10.1007/s12095-024-00730-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00730-1","url":null,"abstract":"<p>Dillon observed that an APN function <i>F</i> over <span>({{mathbb {F}}_{2}^{n}})</span> with <i>n</i> greater than 2 must satisfy the condition <span>({F(x) + F(y) + F(z) + F(x + y + z) :, x,y,z in {mathbb {F}}_{2}^{n}}= {mathbb {F}}_{2}^{n})</span>. Recently, Taniguchi (Cryptogr. Commun. <b>15</b>, 627–647 2023) generalized this condition to functions defined from <span>({{mathbb {F}}_{2}^{n}})</span> to <span>({{mathbb {F}}_{2}^{m}})</span>, with <span>(m>n)</span>, calling it the D-property. Taniguchi gave some characterizations of APN functions satisfying the D-property and provided some families of APN functions from <span>({{mathbb {F}}_{2}^{n}})</span> to <span>({{mathbb {F}}_{2}^{n+1}})</span> satisfying this property. In this work, we further study the D-property for (<i>n</i>, <i>m</i>)-functions with <span>(mge n)</span>. We give some combinatorial bounds on the dimension <i>m</i> for the existence of such functions. Then, we characterize the D-property in terms of the Walsh transform and for quadratic functions we give a characterization of this property in terms of the ANF. We also give a simplification on checking the D-property for quadratic functions, which permits to extend some of the APN families provided by Taniguchi. We further focus on the class of the plateaued functions, providing conditions for the D-property. To conclude, we show a connection of some results obtained with the higher-order differentiability and the inverse Fourier transform.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"181 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Several classes of linear codes with AMDS duals and their subfield codes","authors":"Xingbin Qiao, Xiaoni Du, Wenping Yuan","doi":"10.1007/s12095-024-00729-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00729-8","url":null,"abstract":"<p>Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing, authentication codes and association schemes. In this paper, we first present a construction of 3-dimensional linear codes <span>(varvec{C}_{varvec{f}})</span> over finite field <span>({mathbb {F}_{varvec{2}}}^{varvec{m}})</span> parameterized by any Boolean function <span>(varvec{f})</span>. Then we determine explicitly the weight distributions of <span>(varvec{C}_{varvec{f}})</span>, the punctured code <span>(widetilde{varvec{C}}_{varvec{f}})</span>, as well as the corresponding subfield codes over <span>(mathbb {F}_{varvec{2}})</span> for several classes of Boolean functions <span>(varvec{f})</span>. In particular, we determine the weight distributions of subfield codes derived from <span>(varvec{r})</span>-plateaued functions. Moreover, the parameters of their dual codes are investigated, which contain length-optimal and dimension-optimal AMDS codes with respect to the sphere packing bound. We emphasize that the new codes are projective and contain binary self-complementary codes. As applications, some of the projective codes we present can be employed to construct <span>(varvec{s})</span>-sum sets for any odd integer <span>(varvec{s}>varvec{1})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"362 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymptotic bounds on the numbers of certain bent functions","authors":"Vladimir N. Potapov, Ferruh Özbudak","doi":"10.1007/s12095-024-00726-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00726-x","url":null,"abstract":"<p>Using recent results of Keevash et al. [10] and Eberhard et al. [8] together with further new detailed techniques in combinatorics, we present constructions of two concrete families of generalized Maiorana-McFarland bent functions. Our constructions improve the lower bounds on the number of bent functions in <i>n</i> variables over a finite field <span>({mathbb F}_p)</span> if <i>p</i> is odd and <i>n</i> is odd in the limit as <i>n</i> tends to infinity. Moreover we obtain the asymptotically exact number of two dimensional vectorial Maiorana-McFarland bent functions in <i>n</i> variables over <span>({mathbb F}_2)</span> as <i>n</i> tends to infinity.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone","authors":"Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi","doi":"10.1007/s12095-024-00727-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00727-w","url":null,"abstract":"<p>This paper presents a direct construction of type-II Z-complementary pair (ZCP) of <i>q</i>-ary (<i>q</i> is even) for all even lengths with a wide zero-correlation zone (ZCZ). The proposed construction provides type-II <span>(left( N_1times 2^m, N_1times 2^m-left( N_1-1right) /2right) )</span>-ZCP, where <span>(N_1)</span> is an odd positive integer greater than 1, and <span>(mge 1)</span>. For <span>(N_1=3)</span>, the result produces Z-optimal type-II ZCP of length <span>(3times 2^m)</span>. In this paper, we also present a construction of type-II <span>(left( N_2times 2^m, N_2times 2^m-left( N_2-2right) /2right) )</span>-ZCP, where <span>(N_2)</span> is an even positive integer greater than 1, and <span>(mge 1)</span>. For <span>(N_2=2)</span> and <span>(N_2=4)</span>, the result provides a Golay complementary pair (GCP) of length <span>(2^{m+1})</span> and Z-optimal type-II ZCP of length <span>(2^{m+2})</span>. Both the proposed constructions are compared with the existing state-of-the-art, and it has been observed that it produces a large ZCZ, which covers all existing work in terms of lengths.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enumeration formulae for self-orthogonal, self-dual and complementary-dual additive cyclic codes over finite commutative chain rings","authors":"Leijo Jose, Anuradha Sharma","doi":"10.1007/s12095-024-00728-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00728-9","url":null,"abstract":"<p>Let <i>R</i>, <i>S</i> be two finite commutative chain rings such that <i>R</i> is the Galois extension of <i>S</i> of degree <span>(r ge 2)</span> and has a self-dual basis over <i>S</i>. Let <i>q</i> be the order of the residue field of <i>S</i>, and let <i>N</i> be a positive integer with <span>(gcd (N,q)=1.)</span> An <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> is defined as an <i>S</i>-submodule of <span>(R^N,)</span> which is invariant under the cyclic shift operator on <span>(R^N.)</span> In this paper, we show that each <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> can be uniquely expressed as a direct sum of linear codes of length <i>r</i> over certain Galois extensions of the chain ring <i>S</i>, which are called its constituents. We further study the dual code of each <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> by placing the ordinary trace bilinear form on <span>(R^N)</span> and relating the constituents of the code with that of its dual code. With the help of these canonical form decompositions of <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> and their dual codes, we further characterize all self-orthogonal, self-dual and complementary-dual <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> in terms of their constituents. We also derive necessary and sufficient conditions for the existence of a self-dual <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> and count all self-dual and self-orthogonal <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> by considering the following two cases: (I) both <i>q</i>, <i>r</i> are odd, and (II) <i>q</i> is even and <span>(S=mathbb {F}_{q}[u]/langle u^e rangle .)</span> Besides this, we obtain the explicit enumeration formula for all complementary-dual <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i>. We also illustrate our main results with some examples.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"231 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Several families of q-ary cyclic codes with length $$q^m-1$$","authors":"Jin Li, Huan Zhu, Shan Huang","doi":"10.1007/s12095-024-00725-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00725-y","url":null,"abstract":"<p>It is very hard to construct an infinite family of cyclic codes of rate close to one half whose minimum distances have a good bound. Tang-Ding codes are very interesting, as their minimum distances have a square-root-like bound. Recently, a new generalization of Tang-Ding codes has been presented, Sun constructed several infinite families of binary cyclic codes with length <span>(2^{m}-1)</span> and dimension near <span>(2^{m-1})</span> whose minimum distances much exceed the square-root bound (Sun, Finite Fields Appl. <b>89</b>, 102200, 2023). In this paper, we construct several families of <i>q</i>-ary cyclic codes with length <span>(q^{m}-1)</span> and dimension near <span>(frac{q^{m}-1}{2})</span>, where <span>(qge 3)</span> is a prime power and <span>(m ge 3)</span> is an integer. The minimum distances of these codes and their dual codes much exceed the square-root bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandr Polujan, Enes Pasalic, Sadmir Kudin, Fengrong Zhang
{"title":"Bent functions satisfying the dual bent condition and permutations with the $$(mathcal {A}_m)$$ property","authors":"Alexandr Polujan, Enes Pasalic, Sadmir Kudin, Fengrong Zhang","doi":"10.1007/s12095-024-00724-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00724-z","url":null,"abstract":"<p>The concatenation of four Boolean bent functions <span>(f=f_1||f_2||f_3||f_4)</span> is bent if and only if the dual bent condition <span>(f_1^* + f_2^* + f_3^* + f_4^* =1)</span> is satisfied. However, to specify four bent functions satisfying this duality condition is in general quite a difficult task. Commonly, to simplify this problem, certain relations between <span>(f_i)</span> are assumed, as well as functions <span>(f_i)</span> of a special shape are considered, e.g., <span>(f_i(x,y)=xcdot pi _i(y)+h_i(y))</span> are Maiorana-McFarland bent functions. In the case when permutations <span>(pi _i)</span> of <span>(mathbb {F}_2^m)</span> have the <span>((mathcal {A}_m))</span> property and Maiorana-McFarland bent functions <span>(f_i)</span> satisfy the additional condition <span>(f_1+f_2+f_3+f_4=0)</span>, the dual bent condition is known to have a relatively simple shape allowing to specify the functions <span>(f_i)</span> explicitly. In this paper, we generalize this result for the case when Maiorana-McFarland bent functions <span>(f_i)</span> satisfy the condition <span>(f_1(x,y)+f_2(x,y)+f_3(x,y)+f_4(x,y)=s(y))</span> and provide a construction of new permutations with the <span>((mathcal {A}_m))</span> property from the old ones. Combining these two results, we obtain a recursive construction method of bent functions satisfying the dual bent condition. Moreover, we provide a generic condition on the Maiorana-McFarland bent functions <span>(f_1,f_2,f_3,f_4)</span> stemming from the permutations of <span>(mathbb {F}_2^m)</span> with the <span>((mathcal {A}_m))</span> property, such that the concatenation <span>(f=f_1||f_2||f_3||f_4)</span> does not belong, up to equivalence, to the Maiorana-McFarland class. Using monomial permutations <span>(pi _i)</span> of <span>(mathbb {F}_{2^m})</span> with the <span>((mathcal {A}_m))</span> property and monomial functions <span>(h_i)</span> on <span>(mathbb {F}_{2^m})</span>, we provide explicit constructions of such bent functions; a particular case of our result shows how one can construct bent functions from APN permutations, when <i>m</i> is odd. Finally, with our construction method, we explain how one can construct homogeneous cubic bent functions, noticing that only very few design methods of these objects are known.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Generalized Nega-Hadamard Transform and Nega-crosscorrelation","authors":"Deepmala Sharma, Mayasar Ahmad Dar","doi":"10.1007/s12095-024-00721-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00721-2","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"113 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}