Designs, Codes and Cryptography最新文献

筛选
英文 中文
On the coding capacity of reverse-complement and palindromic duplication-correcting codes 反向补码和回文重复纠错码的编码容量研究
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-10 DOI: 10.1007/s10623-025-01627-7
Lev Yohananov, Moshe Schwartz
{"title":"On the coding capacity of reverse-complement and palindromic duplication-correcting codes","authors":"Lev Yohananov, Moshe Schwartz","doi":"10.1007/s10623-025-01627-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01627-7","url":null,"abstract":"<p>We derive the coding capacity for duplication-correcting codes capable of correcting any number of duplications. We do so both for reverse-complement duplications, as well as palindromic (reverse) duplications. We show that except for duplication-length 1, the coding capacity is 0. When the duplication length is 1, the coding capacity depends on the alphabet size, and we construct optimal codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143931125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Commutative cryptanalysis as a generalization of differential cryptanalysis 微分密码分析的推广——交换密码分析
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-10 DOI: 10.1007/s10623-025-01625-9
Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes
{"title":"Commutative cryptanalysis as a generalization of differential cryptanalysis","authors":"Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann, Léo Perrin, Lukas Stennes","doi":"10.1007/s10623-025-01625-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01625-9","url":null,"abstract":"<p>Recently, Baudrin et al. analyzed a special case of Wagner’s commutative diagram cryptanalysis, referred to as <i>commutative cryptanalysis</i>. For a family <span>((E_k)_k)</span> of permutations on a finite vector space <i>G</i>, commutative cryptanalysis exploits the existence of affine permutations <span>(A,B :G rightarrow G)</span>, <span>(I notin {A,B})</span> such that <span>(E_k circ A (x) = B circ E_k(x))</span> holds with high probability, taken over inputs <i>x</i>, for a significantly large set of <i>weak keys</i> <i>k</i>. Several attacks against symmetric cryptographic primitives can be formulated within the framework of commutative cryptanalysis, most importantly differential attacks, as well as rotational and rotational-differential attacks. Besides, the notion of <i>c</i>-differentials on S-boxes can be analyzed as a special case within this framework. We discuss the relations between a general notion of commutative cryptanalysis, with <i>A</i> and <i>B</i> being arbitrary functions over a finite Abelian group, and differential cryptanalysis, both from the view of conducting an attack on a symmetric cryptographic primitive, as well as from the view of a theoretical study of cryptographic S-boxes.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"30 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143931303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings 最小码的刻画:有限链环上的图论方法和代数方法
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-10 DOI: 10.1007/s10623-025-01636-6
Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda
{"title":"Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings","authors":"Makhan Maji, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda","doi":"10.1007/s10623-025-01636-6","DOIUrl":"https://doi.org/10.1007/s10623-025-01636-6","url":null,"abstract":"<p>The concept of minimal linear codes was introduced by Ashikhmin and Barg in 1998, leading to the development of various methods for constructing these codes over finite fields. In this context, minimality is defined as a codeword u in a linear code <span>(mathcal {C})</span> is considered minimal if u covers the codeword cu for all <i>c</i> in the finite field <span>(mathbb {F}_{q})</span> of order <i>q</i> but no other codewords in <span>(mathcal {C})</span>. A linear code <span>(mathcal {C})</span> is said to be minimal if each of its codewords is minimal. Minimal codewords are widely used in decoding linear codes, secret sharing schemes, secure two-party computations, cryptography, and other areas such as combinatorics. They have also facilitated the exploration of codes and research codes over finite commutative rings, which are considered appropriate alphabets for coding theory. Extending the minimality property from finite fields to rings and developing such codes poses significant challenges but presents opportunities for advancing coding theory in the context of finite rings. Firstly, the aim is to create graphs that produce a linear minimal (or nearly minimal) code through their adjacency, and examples will be offered for explicit illustrations. Secondly, there is an investigation of codes over rings generated by minimal codewords and an exploration of related minimal codes over finite chain rings. More specifically, a basis <span>(mathcal {C})</span> is constructed so that every codeword is minimal. To this end, a linear transformation of <span>(mathcal {C})</span> with this basis is built, and sufficient and necessary minimal linear codes over finite chain rings are provided. Then, there is a new design of minimality conditions over finite principal ideal rings.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"145 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143932686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trace representation of a family of generalized cyclotomic binary sequences with period $$p^n$$ 一类具有周期的广义分环二值序列的迹表示 $$p^n$$
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-07 DOI: 10.1007/s10623-025-01638-4
Zibi Xiao, Yaya Ye, Zhiye Yang, Xiangyong Zeng
{"title":"Trace representation of a family of generalized cyclotomic binary sequences with period $$p^n$$","authors":"Zibi Xiao, Yaya Ye, Zhiye Yang, Xiangyong Zeng","doi":"10.1007/s10623-025-01638-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01638-4","url":null,"abstract":"<p>The trace representation of sequences is useful for implementing the generator of sequences and analyzing their cryptographic properties. In this paper, we focus on investigating the trace representation for a family of generalized cyclotomic binary sequences with period <span>(p^n)</span>. On the basis of the properties of the generalized cyclotomic classes, a trace representation of this family of sequences is obtained by computing the discrete Fourier transform of the sequences, whenever <i>p</i> is a non-Wieferich prime. In addition, a known result on the linear complexity for this family of sequences is derived from its trace representation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143916033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Avoiding trusted setup in isogeny-based commitments 在基于等基因的承诺中避免可信设置
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-02 DOI: 10.1007/s10623-025-01633-9
Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Célestin Nkuimi-Jugnia
{"title":"Avoiding trusted setup in isogeny-based commitments","authors":"Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Célestin Nkuimi-Jugnia","doi":"10.1007/s10623-025-01633-9","DOIUrl":"https://doi.org/10.1007/s10623-025-01633-9","url":null,"abstract":"<p>In 2021, Sterner proposed a commitment scheme based on supersingular isogenies. For this scheme to be binding, one relies on a trusted party to generate a starting supersingular elliptic curve of unknown endomorphism ring. In fact, the knowledge of the endomorphism ring allows one to compute an endomorphism of degree a power of a given small prime. Such an endomorphism can then be split into two to obtain two different messages with the same commitment. This is the reason why one needs a curve of unknown endomorphism ring, and the only known way to generate such supersingular curves is to rely on a trusted party or on some expensive multiparty computation. We observe that if the degree of the endomorphism in play is well chosen, then the knowledge of the endomorphism ring is not sufficient to efficiently compute such an endomorphism and in some particular cases, one can even prove that endomorphism of a certain degree do not exist. Leveraging these observations, we adapt Sterner’s commitment scheme in such a way that the endomorphism ring of the starting curve can be known and public. This allows us to obtain isogeny-based commitment schemes which can be instantiated without trusted setup requirements.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"51 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143898087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weak colourings of Kirkman triple systems 柯克曼三元系的弱着色
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-01 DOI: 10.1007/s10623-025-01635-7
Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. Pike
{"title":"Weak colourings of Kirkman triple systems","authors":"Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. Pike","doi":"10.1007/s10623-025-01635-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01635-7","url":null,"abstract":"<p>A <span>(delta )</span>-colouring of the point set of a block design is said to be <i>weak</i> if no block is monochromatic. The <i>chromatic number</i> <span>(chi (S))</span> of a block design <i>S</i> is the smallest integer <span>(delta )</span> such that <i>S</i> has a weak <span>(delta )</span>-colouring. It has previously been shown that any Steiner triple system has chromatic number at least 3 and that for each <span>(vequiv 1)</span> or <span>(3pmod {6})</span> there exists a Steiner triple system on <i>v</i> points that has chromatic number 3. Moreover, for each integer <span>(delta geqslant 3)</span> there exist infinitely many Steiner triple systems with chromatic number <span>(delta )</span>. We consider colourings of the subclass of Steiner triple systems which are resolvable. A <i>Kirkman triple system</i> consists of a resolvable Steiner triple system together with a partition of its blocks into parallel classes. We show that for each <span>(vequiv 3pmod {6})</span> there exists a Kirkman triple system on <i>v</i> points with chromatic number 3. We also show that for each integer <span>(delta geqslant 3)</span>, there exist infinitely many Kirkman triple systems with chromatic number <span>(delta )</span>. We close with several open problems.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"26 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice codes for CRYSTALS-Kyber 晶格代码为CRYSTALS-Kyber
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-05-01 DOI: 10.1007/s10623-025-01640-w
Shuiyin Liu, Amin Sakzad
{"title":"Lattice codes for CRYSTALS-Kyber","authors":"Shuiyin Liu, Amin Sakzad","doi":"10.1007/s10623-025-01640-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01640-w","url":null,"abstract":"<p>This paper describes a constant-time lattice encoder for the National Institute of Standards and Technology (NIST) recommended post-quantum encryption algorithm: Kyber. The first main contribution of this paper is to refine the analysis of Kyber decoding noise and prove that Kyber decoding noise can be bounded by a sphere. This result shows that the Kyber encoding problem is essentially a sphere packing in a hypercube. The original Kyber encoder uses the integer lattice for sphere packing purposes, which is far from optimal. Our second main contribution is to construct optimal lattice codes to ensure denser packing and a lower decryption failure rate (DFR). Given the same ciphertext size as the original Kyber, the proposed lattice encoder enjoys a larger decoding radius, and is able to encode much more information bits. This way we achieve a decrease of the communication cost by up to <span>(32.6%)</span>, and a reduction of the DFR by a factor of up to <span>(2^{85})</span>. Given the same plaintext size as the original Kyber, e.g., 256 bits, we propose a bit-interleaved coded modulation (BICM) approach, which combines a BCH code and the proposed lattice encoder. The proposed BICM scheme significantly reduces the DFR of Kyber, thus enabling further compression of the ciphertext. Compared with the original Kyber encoder, the communication cost is reduced by <span>(24.49%)</span>, while the DFR is decreased by a factor of <span>(2^{39})</span>. The proposed encoding scheme is a constant-time algorithm, thus resistant against the timing side-channel attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"114 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143893779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rational transformations over finite fields that are never irreducible 有限域上从不不可约的有理变换
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-04-24 DOI: 10.1007/s10623-025-01591-2
Max Schulz
{"title":"Rational transformations over finite fields that are never irreducible","authors":"Max Schulz","doi":"10.1007/s10623-025-01591-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01591-2","url":null,"abstract":"<p>Rational transformations play an important role in the construction of irreducible polynomials over finite fields. Usually, the methods involve fixing a rational function <i>Q</i> and deriving conditions on polynomials <span>(Fin mathbb {F}_q[x])</span> such that the rational transformation of <i>F</i> with <i>Q</i> is irreducible. Here we want to change the perspective and study rational functions with which the rational transformation never yields irreducible polynomials. We show that if the rational function is contained in certain subfields of <span>(mathbb {F}_q(x))</span> then the rational transformation with it is always reducible. This extends the list of known examples.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143872961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permutations minimizing the number of collinear triples 排列最小化共线三元组的数量
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-04-23 DOI: 10.1007/s10623-025-01632-w
Joshua Cooper, Jack Hyatt
{"title":"Permutations minimizing the number of collinear triples","authors":"Joshua Cooper, Jack Hyatt","doi":"10.1007/s10623-025-01632-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01632-w","url":null,"abstract":"<p>We characterize the permutations of <span>(mathbb {F}_q)</span> whose graph minimizes the number of collinear triples and describe the lexicographically-least one, confirming a conjecture of Cooper-Solymosi. This question is connected to Dudeney’s No-3-in-a-Line problem, the Heilbronn triangle problem, and the structure of finite plane Kakeya sets. We discuss a connection with complete sets of mutually orthogonal latin squares and state a few open problems primarily about general finite affine planes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"5 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143866496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coding properties and automorphism groups of two classes of twisted generalized Reed–Solomon codes 两类扭曲广义里德-所罗门码的编码特性和自形群
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-04-19 DOI: 10.1007/s10623-025-01630-y
Xue Jia, Qin Yue, Huan Sun
{"title":"Coding properties and automorphism groups of two classes of twisted generalized Reed–Solomon codes","authors":"Xue Jia, Qin Yue, Huan Sun","doi":"10.1007/s10623-025-01630-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01630-y","url":null,"abstract":"<p>Twisted generalized Reed–Solomon (TGRS) codes as a generalization of generalized Reed–Solomon (GRS) codes have attracted a lot of attention from many researchers in recent years. In this paper, we investigate the conditions for the equality of two classes of TGRS codes with different parameters. Moreover, we construct the permutation automorphism groups of two classes of TGRS codes and show they are quasi-cyclic codes. Finally, building upon the Berlekamp–Massey algorithm for GRS codes, we show a decoding scheme for a class of MDS TGRS codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"65 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143849722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信