Cryptography and Communications最新文献

筛选
英文 中文
$$mathcal {S}_0$$ -equivalence classes, a new direction to find better weightwise perfectly balanced functions, and more $$mathcal {S}_0$$ -等价类,寻找更好的加权完全平衡函数的新方向,以及更多内容
Cryptography and Communications Pub Date : 2024-05-14 DOI: 10.1007/s12095-024-00719-w
Agnese Gini, Pierrick Méaux
{"title":"$$mathcal {S}_0$$ -equivalence classes, a new direction to find better weightwise perfectly balanced functions, and more","authors":"Agnese Gini, Pierrick Méaux","doi":"10.1007/s12095-024-00719-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00719-w","url":null,"abstract":"<p>This article introduces the concept of <span>(mathcal {S}_0)</span>-equivalence class, <i>i.e.</i> , <i>n</i>-variable Boolean functions up to the addition of a symmetric function null in <span>(0_n)</span> and <span>(1_n)</span>, and investigates its application to study weightwise perfectly balanced functions. On the one hand, we show that weightwise properties, such as being weightwise perfectly balanced, the weightwise nonlinearity and weightwise algebraic immunity, are invariants of these equivalence classes. On the other hand, we analyze the variation of global parameters inside the same class, and prove, for example, that there is always a function with high degree, algebraic immunity, or nonlinearity in the <span>(mathcal {S}_0)</span>-equivalence class of a function. Finally, we discuss how these results can be extended to other equivalence relations and their applications in cryptography.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of DNA codes with multiple constrained properties 构建具有多重约束特性的 DNA 代码
Cryptography and Communications Pub Date : 2024-05-14 DOI: 10.1007/s12095-024-00718-x
Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh
{"title":"Construction of DNA codes with multiple constrained properties","authors":"Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh","doi":"10.1007/s12095-024-00718-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00718-x","url":null,"abstract":"<p>DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The formation of large stem-length secondary structures makes the sequences chemically inactive towards synthesis and sequencing processes. Furthermore, in DNA computing, other constraints like homopolymer run length also introduce complications. In this paper, our goal is to tackle the problems due to the creation of secondary structures in DNA sequences along with constraints such as not having a large homopolymer run length. This paper presents families of DNA codes with secondary structures of stem length at most two and homopolymer run length at most four. We identified <span>(mathbb {Z}_{11})</span> as an ideal structure to construct DNA codes to avoid the above problems. By mapping the error-correcting codes over <span>(mathbb {Z}_{11})</span> to DNA nucleotides, we obtained DNA codes with rates 0.5765 times the corresponding code rate over <span>(mathbb {Z}_{11})</span>, including some new secondary structure-free and better-performing codes for DNA-based data storage and DNA computing purposes.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"304 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integer syndrome decoding in the presence of noise 存在噪声时的整数综合征解码
Cryptography and Communications Pub Date : 2024-05-10 DOI: 10.1007/s12095-024-00712-3
Vlad-Florin Drăgoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso
{"title":"Integer syndrome decoding in the presence of noise","authors":"Vlad-Florin Drăgoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso","doi":"10.1007/s12095-024-00712-3","DOIUrl":"https://doi.org/10.1007/s12095-024-00712-3","url":null,"abstract":"<p>Code-based cryptography received attention after the NIST started the post-quantum cryptography standardization process in 2016. A central NP-hard problem is the binary syndrome decoding problem, on which the security of many code-based cryptosystems lies. The best known methods to solve this problem all stem from the information-set decoding strategy, first introduced by Prange in 1962. A recent line of work considers augmented versions of this strategy, with hints typically provided by side-channel information. In this work, we consider the integer syndrome decoding problem, where the integer syndrome is available but might be noisy. We study how the performance of the decoder is affected by the noise. First we identify the noise model as being close to a centered in zero binomial distribution. Second we model the probability of success of the ISD-score decoder in presence of a binomial noise. Third, we demonstrate that with high probability our algorithm finds the solution as long as the noise parameter <i>d</i> is linear in <i>t</i> (the Hamming weight of the solution) and <i>t</i> is sub-linear in the code-length. We provide experimental results on cryptographic parameters for the BIKE and <i>Classic McEliece</i> cryptosystems, which are both candidates for the fourth round of the NIST standardization process.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"191 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additive codes with few weights 权重少的加法代码
Cryptography and Communications Pub Date : 2024-05-09 DOI: 10.1007/s12095-024-00720-3
Daniel Panario, Murat Sahin, Qiang Wang
{"title":"Additive codes with few weights","authors":"Daniel Panario, Murat Sahin, Qiang Wang","doi":"10.1007/s12095-024-00720-3","DOIUrl":"https://doi.org/10.1007/s12095-024-00720-3","url":null,"abstract":"<p>Additive codes have a wide range of applications. A classical nice and generic way to construct linear codes is via trace functions. In this paper, first, we generalize this method to construct additive codes. Then, we use this method to get some explicit additive codes. Computing Weil-like sums, we obtain parameters of these codes such as the length and weight distribution. We show that our codes have few weights.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support 构建具有灵活支持的谱空约束零相关区序列
Cryptography and Communications Pub Date : 2024-05-02 DOI: 10.1007/s12095-024-00715-0
Nishant Kumar, Palash Sarkar, Sudhan Majhi
{"title":"Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support","authors":"Nishant Kumar, Palash Sarkar, Sudhan Majhi","doi":"10.1007/s12095-024-00715-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00715-0","url":null,"abstract":"<p>In recent years, zero-correlation zone (ZCZ) sequences have been studied due to their significant applications in quasi-synchronous code division multiple access (QS-CDMA) systems and other wireless communication domains. However, in a cognitive radio (CR) network, it is desirable to design ZCZ sequences having spectrally-null-constrained (SNC) property to achieve a low spectral density profile. This paper focuses on the construction of SNC-ZCZ sequences having flexible support, where support refers to a collection of indices corresponding to non-zero entries in the sequence. The proposed SNC-ZCZ sequences are reduced to traditional ZCZ sequences when the support size is equal to the length of the sequence. To obtain ZCZ sequences, we first propose a construction of traditional/SNC-complete complementary codes (SNC-CCCs) using a class of extended Boolean functions (EBFs). With the help of this class, we propose another class of EBFs that generates asymptotically optimal traditional/SNC-ZCZ sequences of prime-power lengths with respect to Tang-Fan-Matsufuzi bound. Furthermore, a relation between the second-order cosets of first-order generalized Reed-Muller (GRM) code and the proposed traditional ZCZ sequences is also established. The enumeration of traditional ZCZ sequences within a GRM code is also established. This enumeration is achieved by tallying the distinct second-order cosets of the first-order GRM code and quantifying the number of ZCZ sequences residing within a particular coset. Moreover, the Hamming distance of the proposed traditional ZCZ sequences is also computed.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The sequence reconstruction problem for permutations with the Hamming distance 具有汉明距离的排列序列重构问题
Cryptography and Communications Pub Date : 2024-05-02 DOI: 10.1007/s12095-024-00717-y
Xiang Wang, Elena V. Konstantinova
{"title":"The sequence reconstruction problem for permutations with the Hamming distance","authors":"Xiang Wang, Elena V. Konstantinova","doi":"10.1007/s12095-024-00717-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00717-y","url":null,"abstract":"<p>V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over multiple channels, and the decoder receives the different outputs. Assume that the transmitted sequence is at distance <i>d</i> from some code and there are at most <i>r</i> errors in every channel. Then the sequence reconstruction problem is to find the minimum number of channels required to recover exactly the transmitted sequence that has to be greater than the maximum intersection between two metric balls of radius <i>r</i>, where the distance between their centers is at least <i>d</i>. In this paper, we study the sequence reconstruction problem of permutations under the Hamming distance. In this model we define a Cayley graph over the symmetric group, study its properties and find the exact value of the largest intersection of its two metric balls for <span>(d=2r)</span>. Moreover, we give a lower bound on the largest intersection of two metric balls for <span>(d=2r-1)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140839938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACD codes over skew-symmetric dualities 倾斜对称对偶上的 ACD 编码
Cryptography and Communications Pub Date : 2024-04-29 DOI: 10.1007/s12095-024-00709-y
Astha Agrawal, R. K. Sharma
{"title":"ACD codes over skew-symmetric dualities","authors":"Astha Agrawal, R. K. Sharma","doi":"10.1007/s12095-024-00709-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00709-y","url":null,"abstract":"<p>Additive codes have gained importance in algebraic coding theory due to their applications in quantum error correction and quantum computing. The article begins by developing some properties of Additive Complementary Dual (ACD) codes with respect to arbitrary dualities over finite abelian groups. Further, we introduce a subclass of non-symmetric dualities referred to as the skew-symmetric dualities. Then, we precisely count symmetric and skew-symmetric dualities over finite fields. Two conditions have been obtained: one is a necessary and sufficient condition, and the other is a necessary condition. The necessary and sufficient condition is for an additive code to be an ACD code over arbitrary dualities. The necessary condition is on a generator matrix of an ACD code over skew-symmetric dualities. We provide bounds for the highest possible minimum distance of ACD codes over skew-symmetric dualities. Finally, we find some new quaternary ACD codes over non-symmetric dualities with better parameters than the symmetric ones.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140812952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Propagation properties of a non-linear mapping based on squaring in odd characteristic 基于奇数特征平方的非线性映射的传播特性
Cryptography and Communications Pub Date : 2024-04-26 DOI: 10.1007/s12095-024-00711-4
Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel
{"title":"Propagation properties of a non-linear mapping based on squaring in odd characteristic","authors":"Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel","doi":"10.1007/s12095-024-00711-4","DOIUrl":"https://doi.org/10.1007/s12095-024-00711-4","url":null,"abstract":"<p>Many modern cryptographic primitives for hashing and (authenticated) encryption make use of constructions that are instantiated with an iterated cryptographic permutation that operates on a fixed-width state consisting of an array of bits. Often, such permutations are the repeated application of a relatively simple round function consisting of a linear layer and a non-linear layer. These constructions do not require that the underlying function is a permutation and they can plausibly be based on a non-invertible transformation. Recently, Grassi proposed the use of non-invertible mappings operating on arrays of digits that are elements of a finite field of odd characteristic for so-called MPC-/FHE-/ZK-friendly symmetric cryptographic primitives. In this work, we consider a mapping that we call <span>(gamma )</span> that has a simple expression and is based on squaring. We discuss, for the first time, the differential and linear propagation properties of <span>(gamma )</span> and observe that these follow the same rules up to a relabeling of the digits. This is an intriguing property that, as far as we know, only exists for <span>(gamma )</span> and the binary mapping <span>(chi _{_{3}})</span> that is used in the cryptographic permutation <span>Xoodoo</span>. Moreover, we study the implications of its non-invertibility on differentials with zero output difference and on biases at the output of the <span>(gamma )</span> mapping and show that they are as small as they can possibly be.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Equitable [[2, 10], [6, 6]]-partitions of the 12-cube 12 立方体的等分 [[2,10],[6,6]]分区
Cryptography and Communications Pub Date : 2024-04-26 DOI: 10.1007/s12095-024-00716-z
Denis S. Krotov
{"title":"Equitable [[2, 10], [6, 6]]-partitions of the 12-cube","authors":"Denis S. Krotov","doi":"10.1007/s12095-024-00716-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00716-z","url":null,"abstract":"<p>We describe the computer-aided classification of equitable partitions of the 12-cube with quotient matrix [[2, 10], [6, 6]], or, equivalently, simple orthogonal arrays OA(1536, 12, 2, 7), or order-7 correlation-immune Boolean functions in 12 arguments with 1536 ones (which completes the classification of unbalanced order-7 correlation-immune Boolean functions in 12 arguments and, as derived objects, unbalanced order-6 correlation-immune Boolean functions in 11 arguments). We find that there are 103 equivalence classes of the considered objects, and there are only two almost-OA(1536, 12, 2, 8) among them. Additionally, we find that there are 40 equivalence classes of pairs of disjoint simple OA(1536, 12, 2, 7) (equivalently, equitable partitions of the 12-cube with quotient matrix [[2, 6, 4], [6, 2, 4], [6, 6, 0]]) and discuss the existence of a non-simple OA(1536, 12, 2, 7).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140799499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integer codes correcting burst errors within one byte and single errors within two bytes 整数码纠正一个字节内的突发错误和两个字节内的单个错误
Cryptography and Communications Pub Date : 2024-04-19 DOI: 10.1007/s12095-023-00687-7
Aleksandar Radonjic, Pankaj Kumar Das, Vladimir Vujicic
{"title":"Integer codes correcting burst errors within one byte and single errors within two bytes","authors":"Aleksandar Radonjic, Pankaj Kumar Das, Vladimir Vujicic","doi":"10.1007/s12095-023-00687-7","DOIUrl":"https://doi.org/10.1007/s12095-023-00687-7","url":null,"abstract":"<p>This paper presents a class of integer codes that are suitable for use in various optical networks. The presented codes are generated with the help of a computer and have the ability to correct <i>l</i>-bit burst errors corrupting one <i>b</i>-bit byte (1 ≤ <i>l</i> &lt; <i>b</i>) and single errors corrupting two <i>b</i>-bit bytes. To evaluate the performance of the presented codes, we analyze their probabilities of incorrect decoding for two types of channels. In addition, the paper shows that the proposed codes can be interleaved without using an interleaver, which allows the decoder to correct all <i>l</i>-bit burst errors as well as many random errors.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"87 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140627638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信