{"title":"Association schemes and orthogonality graphs on anisotropic points of polar spaces","authors":"Sam Adriaensen, Maarten De Boeck","doi":"10.1007/s10623-024-01514-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01514-7","url":null,"abstract":"<p>In this paper, we study association schemes on the anisotropic points of classical polar spaces. Our main result concerns non-degenerate elliptic and hyperbolic quadrics in <span>({{,textrm{PG},}}(n,q))</span> with <i>q</i> odd. We define relations on the anisotropic points of such a quadric that depend on the type of line spanned by the points and whether or not they are of the same “quadratic type”. This yields an imprimitive 5-class association scheme. We calculate the matrices of eigenvalues and dual eigenvalues of this scheme. We also use this result, together with similar results from the literature concerning other classical polar spaces, to exactly calculate the spectrum of orthogonality graphs on the anisotropic points of non-degenerate quadrics in odd characteristic and of non-degenerate Hermitian varieties. As a byproduct, we obtain a 3-class association scheme on the anisotropic points of non-degenerate Hermitian varieties, where the relation containing two points depends on the type of line spanned by these points, and whether or not they are orthogonal.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"48 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algebraic hierarchical locally recoverable codes with nested affine subspace recovery","authors":"Kathryn Haymaker, Beth Malmskog, Gretchen Matthews","doi":"10.1007/s10623-024-01510-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01510-x","url":null,"abstract":"<p>Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. These subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we describe a hierarchical recovery structure arising from geometry in Reed–Muller codes and codes with availability from fiber products of curves. We demonstrate how the fiber product hierarchical codes can be viewed as punctured subcodes of Reed–Muller codes, uniting the two constructions. This point of view provides natural structures for local recovery with availability at each level in the hierarchy.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"92 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko
{"title":"DNA codes over groups","authors":"Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko","doi":"10.1007/s10623-024-01515-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01515-6","url":null,"abstract":"<p>The purpose of this paper is to establish a one-to-one correspondence between <i>k</i>-tuples of DNA codewords and the elements of a finite group to simulate the reverse and the complement operations of codewords by an automorphism and a translation of the group, respectively, in order to determine the structure of DNA codes. Finally, the case of vector spaces is characterized.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142487530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi
{"title":"Equivalence of constacyclic codes with shift constants of different orders","authors":"Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi","doi":"10.1007/s10623-024-01512-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01512-9","url":null,"abstract":"<p>Let <i>a</i> and <i>b</i> be two non-zero elements of a finite field <span>(mathbb {F}_q)</span>, where <span>(q>2)</span>. It has been shown that if <i>a</i> and <i>b</i> have the same multiplicative order in <span>(mathbb {F}_q)</span>, then the families of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes over <span>(mathbb {F}_q)</span> are monomially equivalent. In this paper, we investigate the monomial equivalence of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes when <i>a</i> and <i>b</i> have distinct multiplicative orders. We present novel conditions for establishing monomial equivalence in such constacyclic codes, surpassing previous methods of determining monomially equivalent constacyclic and cyclic codes. As an application, we use these results to search for new linear codes more systematically. In particular, we present more than 70 new record-breaking linear codes over various finite fields, as well as new binary quantum codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia
{"title":"Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64","authors":"Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia","doi":"10.1007/s10623-024-01486-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01486-8","url":null,"abstract":"<p>Truncated differential cryptanalyses were introduced by Knudsen in 1994. They are a well-known family of attacks that has arguably received less attention than some other variants of differential attacks. This paper gives some new insights into the theory of truncated differential attacks, specifically the conditions of provable security of SPN ciphers with MDS diffusion matrices against this type of attack. Furthermore, our study extends to various versions within the <span>QARMA</span> family of block ciphers, unveiling the only valid instances of single-tweak attacks on 10-round <span>QARMAv1</span>-64, 10-round <span>QARMAv1</span>-128, and 10- and 11-round <span>QARMAv2</span>-64. These attacks benefit from the optimal truncated differential distinguishers as well as some evolved key-recovery techniques.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"124 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts
{"title":"Conjunctive hierarchical secret sharing by finite geometry","authors":"Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts","doi":"10.1007/s10623-024-01496-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01496-6","url":null,"abstract":"<p>Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets. The construction is the first method for arbitrary parameters based on finite geometry arguments and yields an improvement in the size of the underlying finite field in contrast with the existing results using polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting products of the form X times a linearized polynomial L(X)","authors":"Christof Beierle","doi":"10.1007/s10623-024-01511-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01511-w","url":null,"abstract":"<p>For a <i>q</i>-polynomial <i>L</i> over a finite field <span>(mathbb {F}_{q^n})</span>, we characterize the differential spectrum of the function <span>(f_L:mathbb {F}_{q^n} rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x))</span> and show that, for <span>(n le 5)</span>, it is completely determined by the image of the rational function <span>(r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto L(x)/x)</span>. This result follows from the classification of the pairs (<i>L</i>, <i>M</i>) of <i>q</i>-polynomials in <span>(mathbb {F}_{q^n}[X])</span>, <span>(n le 5)</span>, for which <span>(r_L)</span> and <span>(r_M)</span> have the same image, obtained in Csajbók et al. (Ars Math Contemp 16(2):585–608, 2019). For the case of <span>(n>5)</span>, we pose an open question on the dimensions of the kernels of <span>(x mapsto L(x) - ax)</span> for <span>(a in mathbb {F}_{q^n})</span>. We further present a link between functions <span>(f_L)</span> of differential uniformity bounded above by <i>q</i> and scattered <i>q</i>-polynomials and show that, for odd values of <i>q</i>, we can construct CCZ-inequivalent functions <span>(f_M)</span> with bounded differential uniformity from a given function <span>(f_L)</span> fulfilling certain properties.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding error probability of random parity-check matrix ensemble over the erasure channel","authors":"Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong","doi":"10.1007/s10623-024-01516-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01516-5","url":null,"abstract":"<p>In this paper we carry out an in-depth study on the average decoding error probability of the random parity-check matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the random parity-check matrix ensemble under these three decoding principles and compute the error exponents. Moreover, for unambiguous decoding, we compute the variance of the decoding error probability of the random parity-check matrix ensemble and the error exponent of the variance, which implies a strong concentration result, that is, roughly speaking, the ratio of the decoding error probability of a random linear code in the ensemble and the average decoding error probability of the ensemble converges to 1 with high probability when the code length goes to infinity.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"231 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The sequence reconstruction of permutations with Hamming metric","authors":"Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova","doi":"10.1007/s10623-024-01509-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01509-4","url":null,"abstract":"<p>In the combinatorial context, one of the key problems in sequence reconstruction is to find the largest intersection of two metric balls of radius <i>r</i>. In this paper we study this problem for permutations of length <i>n</i> distorted by Hamming errors and determine the size of the largest intersection of two metric balls with radius <i>r</i> whose centers are at distance <span>(d=2,3,4)</span>. Moreover, it is shown that for any <span>(ngeqslant 3)</span> an arbitrary permutation is uniquely reconstructible from four distinct permutations at Hamming distance at most two from the given one, and it is proved that for any <span>(ngeqslant 4)</span> an arbitrary permutation is uniquely reconstructible from <span>(4n-5)</span> distinct permutations at Hamming distance at most three from the permutation. It is also proved that for any <span>(ngeqslant 5)</span> an arbitrary permutation is uniquely reconstructible from <span>(7n^2-31n+37)</span> distinct permutations at Hamming distance at most four from the permutation. Finally, in the case of at most <i>r</i> Hamming errors and sufficiently large <i>n</i>, it is shown that at least <span>({varTheta }(n^{r-2}))</span> distinct erroneous patterns are required in order to reconstruct an arbitrary permutation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"14 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique","authors":"Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song","doi":"10.1007/s10623-024-01497-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01497-5","url":null,"abstract":"<p>A corrector is a critical component of True Random Number Generators (TRNGs), serving as a post-processing function to reduce statistical weaknesses in raw random sequences. It is important to note that a <span>(textit{t})</span>-resilient Boolean function is a <span>(textit{t})</span>-corrector, while the converse is not necessarily true. Building upon the pioneering method introduced by Zhang in 2023 for constructing nonlinear correctors with correction order one greater than resiliency order, this paper presents for the first time two approaches for constructing nonlinear plateaued correctors with correction order at least two greater than resiliency order via Walsh spectral neutralization technique, and the resulting correctors have algebraic degree at least <span>(text {2})</span>. The first approach yields <span>(textit{n})</span>-variable plateaued correctors with correction order <span>(textit{n}-text {2})</span> and resiliency order approximately <span>(textit{n}- text {log}_text {2} textit{n})</span>. The nonlinearity and algebraic degree of the resulting correctors are also analyzed, demonstrating that they meet both Siegenthaler’s and Sarkar-Maitra’s bounds. Another approach based on Walsh spectral neutralization technique for constructing <span>(textit{n})</span>-variable plateaued correctors is proposed. This approach facilitates the design of semi-bent correctors with algebraic degree <span>(lceil frac{textit{n}}{text {2}} rceil )</span>, correction order <span>(lfloor frac{textit{n}}{text {2}} rfloor -text {1})</span> and resiliency order approximately <span>( frac{textit{n}}{text {4}} )</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}