{"title":"Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique","authors":"Alexander L. Gavrilyuk, Vladislav V. Kabanov","doi":"10.1007/s10623-024-01563-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01563-y","url":null,"abstract":"<p>In a previous paper, the authors determined the parameters of all strongly regular graphs that can be decomposed into a divisible design graph and a Hoffman coclique. As a counterpart of this result, in the present paper we determine the parameters of all strongly regular graphs that can be decomposed into a divisible design graph and a Delsarte clique. In particular, an infinite family of strongly regular graphs with the required decomposition and a new infinite family of divisible design graphs are found.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructions of complete permutations in multiplication","authors":"Kangquan Li","doi":"10.1007/s10623-025-01593-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01593-0","url":null,"abstract":"<p>Complete permutations in addition over finite fields have attracted many scholars’ attention due to their wide applications in combinatorics, cryptography, sequences, and so on. In 2020, Tu et al. introduced the concept of the complete permutation in the sense of multiplication (CPM for short). In this paper, we further study the constructions and applications of CPMs. We mainly construct many classes of CPMs through three different approaches, i.e., index, self-inverse binomial, which is a new concept proposed in this paper, and linearized polynomial. Particularly, we provide a modular algorithm to produce all CPMs with a given index and determine all CPMs with index 3. Many infinite classes of complete self-inverse binomials are proposed, which explain most of the experimental results about complete self-inverse binomials over <span>({mathbb {F}}_{2^n})</span> with <span>(nle 10)</span>. Six classes of linearized CPMs are given by using standard arguments from fast symbolic computations and a general method is proposed by the AGW criterion. Finally, two applications of CPMs in cryptography are discussed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic results on the 2-adic complexity","authors":"Zhixiong Chen, Arne Winterhof","doi":"10.1007/s10623-025-01592-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01592-1","url":null,"abstract":"<p>This work is devoted to solving some closely related open problems on the average and asymptotic behavior of the 2-adic complexity of binary sequences. First, for fixed <i>N</i>, we prove that the expected value <span>(E^{text {2-adic}}_N)</span> of the 2-adic complexity over all binary sequences of length <i>N</i> is close to <span>(frac{N}{2})</span> and the deviation from <span>(frac{N}{2})</span> is at most of order of magnitude <span>(log (N))</span>. More precisely, we show that </p><span>$$begin{aligned} frac{N}{2}-1 le E^{text {2-adic}}_N= frac{N}{2}+O(log (N)). end{aligned}$$</span><p>We also prove bounds on the expected value of the <i>N</i>th rational complexity. Our second contribution is to prove for a random binary sequence <span>(mathcal {S})</span> that the <i>N</i>th 2-adic complexity satisfies with probability 1 </p><span>$$begin{aligned} lambda _{mathcal {S}}(N)=frac{N}{2}+O(log (N)) , hbox { for all} N. end{aligned}$$</span>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"80 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau
{"title":"Secret and shared keys recovery on hamming quasi-cyclic with SASCA","authors":"Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau","doi":"10.1007/s10623-025-01575-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01575-2","url":null,"abstract":"<p>Soft Analytical Side Channel Attacks (SASCA) are a powerful family of Side Channel Attacks (SCA) that allows the recovery of secret values with only a small number of traces. Their effectiveness lies in the Belief Propagation (BP) algorithm, which enables efficient computation of the marginal distributions of intermediate values. Post-quantum schemes such as Kyber, and more recently, Hamming Quasi-Cyclic (HQC), have been targets of SASCA. Previous SASCA on HQC focused on Reed–Solomon (RS) codes and successfully retrieved the shared key with a high success rate for high noise levels using a single trace. In this work, we present new SASCA on HQC, where both the shared key and the secret key are targeted. Our attacks are realized on simulations. Unlike the previous SASCA, we take a closer look at the Reed–Muller (RM) code. The advantage of this choice is that the RM decoder is applied before the RS decoder, enabling attacks targeting both the secret key and shared key. We build a factor graph of the Fast Hadamard Transform (FHT) function from the HQC reference implementation of April 2023. The information recovered from BP allows us to retrieve the shared key with a single trace. In addition to the previous SASCA targeting HQC, we also manage to recover the secret key with two different chosen ciphertext attacks. One of them requires a single trace and is successful until high noise levels.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On equidistant single-orbit cyclic and quasi-cyclic subspace codes","authors":"Mahak, Maheshanand Bhaintwal","doi":"10.1007/s10623-025-01586-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01586-z","url":null,"abstract":"<p>A code is said to be equidistant if the distance between any two distinct codewords of the code is the same. In this paper, we have studied equidistant single-orbit cyclic and quasi-cyclic subspace codes. The orbit code generated by a subspace <i>U</i> in <span>({mathbb {F}}_{q^n})</span> such that the dimension of <i>U</i> over <span>({mathbb {F}}_q)</span> is <i>t</i> or <span>(n-t)</span>, <span>(text{ where }~t=dim _{{mathbb {F}}_q}(text{ Stab }(U)cup {0}))</span>, is equidistant and is termed a trivial equidistant orbit code. Using the concept of cyclic difference sets, we have proved that only the trivial equidistant single-orbit cyclic subspace codes exist. Further, we have explored equidistant single-orbit quasi-cyclic subspace codes, focusing specifically on those which are sunflowers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"61 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of optimal flag codes by MRD codes","authors":"Shuangqing Liu, Shuhui Yu, Lijun Ji","doi":"10.1007/s10623-025-01584-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01584-1","url":null,"abstract":"<p>Flag codes have received a lot of attention due to its application in random network coding. In 2021, Alonso-González et al. constructed optimal <span>((n,{mathcal {A}})_{q})</span>-Optimum distance flag codes (ODFC) for <span>({mathcal {A}}subseteq {1,2,ldots ,k,n-k,ldots ,n-1})</span> with <span>(kin {mathcal {A}})</span> and <span>(kmid n)</span>. In this paper, we introduce a new construction of <span>((n,{mathcal {A}})_q)</span>-ODFCs by maximum rank-metric codes, and prove that there is an <span>((n,{mathcal {A}})_{q})</span>-ODFC of size <span>(frac{q^n-q^{k+r}}{q^k-1}+1)</span> for any <span>({mathcal {A}}subseteq {1,2,ldots ,k,n-k,ldots ,n-1})</span> with <span>({mathcal {A}}cap {k,n-k}ne emptyset )</span>, where <span>(requiv npmod k)</span> and <span>(0le r<k)</span>. Furthermore, when <span>(k>frac{q^r-1}{q-1})</span>, this <span>((n,{mathcal {A}})_q)</span>-ODFC is optimal. Specially, when <span>(r=0)</span>, Alonso-González et al.’s result is also obtained. We also give a characterization of almost optimum distance flag codes, and construct a family of optimal almost optimum flag distance codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143375193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The asymptotic existence of BIBDs having a nesting","authors":"Xinyue Ming, Tao Feng, Menglong Zhang","doi":"10.1007/s10623-025-01583-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01583-2","url":null,"abstract":"<p>A <span>((v,k,lambda ))</span>-BIBD <span>((X,mathcal {B}))</span> has a nesting if there is a mapping <span>(phi :mathcal {B}rightarrow X)</span> such that <span>((X,{Bcup {phi (B)}mid Bin mathcal {B}}))</span> is a <span>((v,k+1,lambda +1))</span>-packing. If the <span>((v,k+1,lambda +1))</span>-packing is a <span>((v,k+1,lambda +1))</span>-BIBD, then this nesting is said to be perfect. We show that given any positive integers <i>k</i> and <span>(lambda )</span>, if <span>(kge 2lambda +2)</span>, then for any sufficiently large <i>v</i>, every <span>((v,k,lambda ))</span>-BIBD can be nested into a <span>((v,k+1,lambda +1))</span>-packing; and if <span>(k=2lambda +1)</span>, then for any sufficiently large <i>v</i> satisfying <span>(v equiv 1 pmod {2k})</span>, there exists a <span>((v,k,lambda ))</span>-BIBD having a perfect nesting. Banff difference families (BDF), as a special kind of difference families (DF), can be used to generate nested BIBDs. We show that if <i>G</i> is a finite abelian group with a large size whose number of order 2 elements is no more than a given constant, and <span>(kge 2lambda +2)</span>, then one can obtain a <span>((G,k,lambda ))</span>-BDF by taking any <span>((G,k,lambda ))</span>-DF and then replacing each of its base blocks by a suitable translation. This is a Novák-like theorem. The generalized Novák’s conjecture states that given any positive integers <i>k</i> and <span>(lambda )</span> with <span>(kge lambda +1)</span>, there exists an integer <span>(v_0)</span> such that, for any cyclic <span>((v,k,lambda ))</span>-BIBD with <span>(vge v_0)</span>, it is always possible to choose one block from each block orbit so that the chosen blocks are pairwise disjoint. We confirm this conjecture for every <span>(kge lambda +2)</span>. Most of the theorems in this paper are based on a recent result presented by Delcourt and Postle on the asymptotic existence of an A-perfect matching of a bipartite hypergraph.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143371556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits","authors":"Chunghun Baek, Taechan Kim","doi":"10.1007/s10623-025-01577-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01577-0","url":null,"abstract":"<p>Recent improvements to garbled circuits are mainly focused on reducing their size. The state-of-the-art construction of Rosulek and Roy (Crypto 2021) requires <span>(1.5kappa )</span> bits for garbling AND gates in the free-XOR setting. This is below the previously proven lower bound <span>(2kappa )</span> in the linear garbling model of Zahur, Rosulek, and Evans (Eurocrypt 2015). Whether their construction is optimal in a more inclusive model than the linear garbling model still remains open. This paper begins by providing a comprehensive model for a large class of practical garbling schemes and proves the lower bound for the size of the garbled AND gates in our model. We show that garbled AND gates require at least <span>(1.5kappa )</span> bits in our new model with the free-XOR setting. It is remarkable to see that the construction by Rosulek and Roy is already optimal despite the fact that our model possibly captures any potential extension of their construction.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"16 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143371606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher
{"title":"New models for the cryptanalysis of ASCON","authors":"Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher","doi":"10.1007/s10623-025-01572-5","DOIUrl":"https://doi.org/10.1007/s10623-025-01572-5","url":null,"abstract":"<p>This paper focuses on the cryptanalysis of the ASCON family using automatic tools. We analyze two different problems with the goal to obtain new modelings, both simpler and less computationally heavy than previous works (all our models require only a small amount of code and run on regular desktop computers). The first problem is the search for Meet-in-the-middle attacks on reduced-round ASCON–XOF. Starting from the MILP modeling of Qin et al. (Meet-in-the-middle preimage attacks on sponge-based hashing. In: EUROCRYPT (4). Lecture notes in computer science, vol 14007. Springer, pp. 158–188, 2023. https://doi.org/10.1007/978-3-031-30634-1_6), we rephrase the problem in SAT, which accelerates significantly the solving time and removes the need for the “weak diffusion structure” heuristic. This allows us to reduce the memory complexity of Qin et al.’s attacks and to prove some optimality results. The second problem is the search for lower bounds on the probability of differential characteristics for the ASCON permutation. We introduce a lossy MILP encoding of the propagation rules based on the Hamming weight, in order to find quickly lower bounds which are comparable to the state of the art. We find a small improvement over the existing bound on 7 rounds.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"47 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143371604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New results on non-disjoint and classical strong external difference families","authors":"Sophie Huczynska, Sophie Hume","doi":"10.1007/s10623-025-01566-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01566-3","url":null,"abstract":"<p>Classical strong external difference families (SEDFs) are much-studied combinatorial structures motivated by information security applications; it is conjectured that only one classical abelian SEDF exists with more than two sets. Recently, non-disjoint SEDFs were introduced; it was shown that families of these exist with arbitrarily many sets. We present constructions for both classical and non-disjoint SEDFs, which encompass all known non-cyclotomic examples for either type (plus many new examples) using a sequence-based framework. Moreover, we introduce a range of new external difference structures (allowing set-sizes to vary, and sets to be replaced by multisets) in both the classical and non-disjoint case, and show how these may be applied to various communications applications.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143125228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}