Designs, Codes and Cryptography最新文献

筛选
英文 中文
Association schemes and orthogonality graphs on anisotropic points of polar spaces 极空间各向异性点上的关联方案和正交图谱
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-24 DOI: 10.1007/s10623-024-01514-7
Sam Adriaensen, Maarten De Boeck
{"title":"Association schemes and orthogonality graphs on anisotropic points of polar spaces","authors":"Sam Adriaensen, Maarten De Boeck","doi":"10.1007/s10623-024-01514-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01514-7","url":null,"abstract":"<p>In this paper, we study association schemes on the anisotropic points of classical polar spaces. Our main result concerns non-degenerate elliptic and hyperbolic quadrics in <span>({{,textrm{PG},}}(n,q))</span> with <i>q</i> odd. We define relations on the anisotropic points of such a quadric that depend on the type of line spanned by the points and whether or not they are of the same “quadratic type”. This yields an imprimitive 5-class association scheme. We calculate the matrices of eigenvalues and dual eigenvalues of this scheme. We also use this result, together with similar results from the literature concerning other classical polar spaces, to exactly calculate the spectrum of orthogonality graphs on the anisotropic points of non-degenerate quadrics in odd characteristic and of non-degenerate Hermitian varieties. As a byproduct, we obtain a 3-class association scheme on the anisotropic points of non-degenerate Hermitian varieties, where the relation containing two points depends on the type of line spanned by these points, and whether or not they are orthogonal.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"48 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic hierarchical locally recoverable codes with nested affine subspace recovery 具有嵌套仿射子空间恢复功能的代数分层局部可恢复编码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-24 DOI: 10.1007/s10623-024-01510-x
Kathryn Haymaker, Beth Malmskog, Gretchen Matthews
{"title":"Algebraic hierarchical locally recoverable codes with nested affine subspace recovery","authors":"Kathryn Haymaker, Beth Malmskog, Gretchen Matthews","doi":"10.1007/s10623-024-01510-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01510-x","url":null,"abstract":"<p>Codes with locality, also known as locally recoverable codes, allow for recovery of erasures using proper subsets of other coordinates. These subsets are typically of small cardinality to promote recovery using limited network traffic and other resources. Hierarchical locally recoverable codes allow for recovery of erasures using sets of other symbols whose sizes increase as needed to allow for recovery of more symbols. In this paper, we describe a hierarchical recovery structure arising from geometry in Reed–Muller codes and codes with availability from fiber products of curves. We demonstrate how the fiber product hierarchical codes can be viewed as punctured subcodes of Reed–Muller codes, uniting the two constructions. This point of view provides natural structures for local recovery with availability at each level in the hierarchy.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"92 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142489402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA codes over groups 组上的 DNA 编码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-23 DOI: 10.1007/s10623-024-01515-6
Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko
{"title":"DNA codes over groups","authors":"Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko","doi":"10.1007/s10623-024-01515-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01515-6","url":null,"abstract":"<p>The purpose of this paper is to establish a one-to-one correspondence between <i>k</i>-tuples of DNA codewords and the elements of a finite group to simulate the reverse and the complement operations of codewords by an automorphism and a translation of the group, respectively, in order to determine the structure of DNA codes. Finally, the case of vector spaces is characterized.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"46 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142487530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Equivalence of constacyclic codes with shift constants of different orders 具有不同阶移位常量的常环码的等价性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-18 DOI: 10.1007/s10623-024-01512-9
Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi
{"title":"Equivalence of constacyclic codes with shift constants of different orders","authors":"Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi","doi":"10.1007/s10623-024-01512-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01512-9","url":null,"abstract":"<p>Let <i>a</i> and <i>b</i> be two non-zero elements of a finite field <span>(mathbb {F}_q)</span>, where <span>(q&gt;2)</span>. It has been shown that if <i>a</i> and <i>b</i> have the same multiplicative order in <span>(mathbb {F}_q)</span>, then the families of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes over <span>(mathbb {F}_q)</span> are monomially equivalent. In this paper, we investigate the monomial equivalence of <i>a</i>-constacyclic and <i>b</i>-constacyclic codes when <i>a</i> and <i>b</i> have distinct multiplicative orders. We present novel conditions for establishing monomial equivalence in such constacyclic codes, surpassing previous methods of determining monomially equivalent constacyclic and cyclic codes. As an application, we use these results to search for new linear codes more systematically. In particular, we present more than 70 new record-breaking linear codes over various finite fields, as well as new binary quantum codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64 截断差分密码分析:QARMAv1-n 和 QARMAv2-64 的新见解和应用
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-18 DOI: 10.1007/s10623-024-01486-8
Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia
{"title":"Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64","authors":"Zahra Ahmadian, Akram Khalesi, Dounia M’foukh, Hossein Moghimi, María Naya-Plasencia","doi":"10.1007/s10623-024-01486-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01486-8","url":null,"abstract":"<p>Truncated differential cryptanalyses were introduced by Knudsen in 1994. They are a well-known family of attacks that has arguably received less attention than some other variants of differential attacks. This paper gives some new insights into the theory of truncated differential attacks, specifically the conditions of provable security of SPN ciphers with MDS diffusion matrices against this type of attack. Furthermore, our study extends to various versions within the <span>QARMA</span> family of block ciphers, unveiling the only valid instances of single-tweak attacks on 10-round <span>QARMAv1</span>-64, 10-round <span>QARMAv1</span>-128, and 10- and 11-round <span>QARMAv2</span>-64. These attacks benefit from the optimal truncated differential distinguishers as well as some evolved key-recovery techniques.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"124 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142448824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conjunctive hierarchical secret sharing by finite geometry 通过有限几何实现连接式分层秘密共享
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01496-6
Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts
{"title":"Conjunctive hierarchical secret sharing by finite geometry","authors":"Máté Gyarmati, Péter Ligeti, Peter Sziklai, Marcella Takáts","doi":"10.1007/s10623-024-01496-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01496-6","url":null,"abstract":"<p>Secret sharing is a general method for distributing sensitive data among the participants of a system such that only a collection of predefined qualified coalitions can recover the secret data. One of the most widely used special cases is threshold secret sharing, where every subset of participants of size above a given number is qualified. In this short note, we propose a general construction for a generalized threshold scheme, called conjunctive hierarchical secret sharing, where the participants are divided into disjoint levels of hierarchy, and there are different thresholds for all levels, all of which must be satisfied by qualified sets. The construction is the first method for arbitrary parameters based on finite geometry arguments and yields an improvement in the size of the underlying finite field in contrast with the existing results using polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting products of the form X times a linearized polynomial L(X) 重温形式为 X 乘以线性化多项式 L(X) 的乘积
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01511-w
Christof Beierle
{"title":"Revisiting products of the form X times a linearized polynomial L(X)","authors":"Christof Beierle","doi":"10.1007/s10623-024-01511-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01511-w","url":null,"abstract":"<p>For a <i>q</i>-polynomial <i>L</i> over a finite field <span>(mathbb {F}_{q^n})</span>, we characterize the differential spectrum of the function <span>(f_L:mathbb {F}_{q^n} rightarrow mathbb {F}_{q^n}, x mapsto x cdot L(x))</span> and show that, for <span>(n le 5)</span>, it is completely determined by the image of the rational function <span>(r_L :mathbb {F}_{q^n}^* rightarrow mathbb {F}_{q^n}, x mapsto L(x)/x)</span>. This result follows from the classification of the pairs (<i>L</i>, <i>M</i>) of <i>q</i>-polynomials in <span>(mathbb {F}_{q^n}[X])</span>, <span>(n le 5)</span>, for which <span>(r_L)</span> and <span>(r_M)</span> have the same image, obtained in Csajbók et al. (Ars Math Contemp 16(2):585–608, 2019). For the case of <span>(n&gt;5)</span>, we pose an open question on the dimensions of the kernels of <span>(x mapsto L(x) - ax)</span> for <span>(a in mathbb {F}_{q^n})</span>. We further present a link between functions <span>(f_L)</span> of differential uniformity bounded above by <i>q</i> and scattered <i>q</i>-polynomials and show that, for odd values of <i>q</i>, we can construct CCZ-inequivalent functions <span>(f_M)</span> with bounded differential uniformity from a given function <span>(f_L)</span> fulfilling certain properties.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoding error probability of random parity-check matrix ensemble over the erasure channel 擦除信道上随机奇偶校验矩阵集合的解码误差概率
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01516-5
Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong
{"title":"Decoding error probability of random parity-check matrix ensemble over the erasure channel","authors":"Chin Hei Chan, Fang-Wei Fu, Maosheng Xiong","doi":"10.1007/s10623-024-01516-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01516-5","url":null,"abstract":"<p>In this paper we carry out an in-depth study on the average decoding error probability of the random parity-check matrix ensemble over the erasure channel under three decoding principles, namely unambiguous decoding, maximum likelihood decoding and list decoding. We obtain explicit formulas for the average decoding error probabilities of the random parity-check matrix ensemble under these three decoding principles and compute the error exponents. Moreover, for unambiguous decoding, we compute the variance of the decoding error probability of the random parity-check matrix ensemble and the error exponent of the variance, which implies a strong concentration result, that is, roughly speaking, the ratio of the decoding error probability of a random linear code in the ensemble and the average decoding error probability of the ensemble converges to 1 with high probability when the code length goes to infinity.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"231 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142440632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The sequence reconstruction of permutations with Hamming metric 含汉明度量的排列序列重构
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01509-4
Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova
{"title":"The sequence reconstruction of permutations with Hamming metric","authors":"Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova","doi":"10.1007/s10623-024-01509-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01509-4","url":null,"abstract":"<p>In the combinatorial context, one of the key problems in sequence reconstruction is to find the largest intersection of two metric balls of radius <i>r</i>. In this paper we study this problem for permutations of length <i>n</i> distorted by Hamming errors and determine the size of the largest intersection of two metric balls with radius <i>r</i> whose centers are at distance <span>(d=2,3,4)</span>. Moreover, it is shown that for any <span>(ngeqslant 3)</span> an arbitrary permutation is uniquely reconstructible from four distinct permutations at Hamming distance at most two from the given one, and it is proved that for any <span>(ngeqslant 4)</span> an arbitrary permutation is uniquely reconstructible from <span>(4n-5)</span> distinct permutations at Hamming distance at most three from the permutation. It is also proved that for any <span>(ngeqslant 5)</span> an arbitrary permutation is uniquely reconstructible from <span>(7n^2-31n+37)</span> distinct permutations at Hamming distance at most four from the permutation. Finally, in the case of at most <i>r</i> Hamming errors and sufficiently large <i>n</i>, it is shown that at least <span>({varTheta }(n^{r-2}))</span> distinct erroneous patterns are required in order to reconstruct an arbitrary permutation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"14 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique 通过沃尔什谱中和技术构建具有高校正阶和良好非线性的高原校正器
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-10-16 DOI: 10.1007/s10623-024-01497-5
Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song
{"title":"Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique","authors":"Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song","doi":"10.1007/s10623-024-01497-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01497-5","url":null,"abstract":"<p>A corrector is a critical component of True Random Number Generators (TRNGs), serving as a post-processing function to reduce statistical weaknesses in raw random sequences. It is important to note that a <span>(textit{t})</span>-resilient Boolean function is a <span>(textit{t})</span>-corrector, while the converse is not necessarily true. Building upon the pioneering method introduced by Zhang in 2023 for constructing nonlinear correctors with correction order one greater than resiliency order, this paper presents for the first time two approaches for constructing nonlinear plateaued correctors with correction order at least two greater than resiliency order via Walsh spectral neutralization technique, and the resulting correctors have algebraic degree at least <span>(text {2})</span>. The first approach yields <span>(textit{n})</span>-variable plateaued correctors with correction order <span>(textit{n}-text {2})</span> and resiliency order approximately <span>(textit{n}- text {log}_text {2} textit{n})</span>. The nonlinearity and algebraic degree of the resulting correctors are also analyzed, demonstrating that they meet both Siegenthaler’s and Sarkar-Maitra’s bounds. Another approach based on Walsh spectral neutralization technique for constructing <span>(textit{n})</span>-variable plateaued correctors is proposed. This approach facilitates the design of semi-bent correctors with algebraic degree <span>(lceil frac{textit{n}}{text {2}} rceil )</span>, correction order <span>(lfloor frac{textit{n}}{text {2}} rfloor -text {1})</span> and resiliency order approximately <span>( frac{textit{n}}{text {4}} )</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142444001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信