Designs, Codes and Cryptography最新文献

筛选
英文 中文
Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique 强正则图可分解为可整除的设计图和Delsarte团
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-14 DOI: 10.1007/s10623-024-01563-y
Alexander L. Gavrilyuk, Vladislav V. Kabanov
{"title":"Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique","authors":"Alexander L. Gavrilyuk, Vladislav V. Kabanov","doi":"10.1007/s10623-024-01563-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01563-y","url":null,"abstract":"<p>In a previous paper, the authors determined the parameters of all strongly regular graphs that can be decomposed into a divisible design graph and a Hoffman coclique. As a counterpart of this result, in the present paper we determine the parameters of all strongly regular graphs that can be decomposed into a divisible design graph and a Delsarte clique. In particular, an infinite family of strongly regular graphs with the required decomposition and a new infinite family of divisible design graphs are found.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of complete permutations in multiplication 乘法中完全排列的构造
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-14 DOI: 10.1007/s10623-025-01593-0
Kangquan Li
{"title":"Constructions of complete permutations in multiplication","authors":"Kangquan Li","doi":"10.1007/s10623-025-01593-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01593-0","url":null,"abstract":"<p>Complete permutations in addition over finite fields have attracted many scholars’ attention due to their wide applications in combinatorics, cryptography, sequences, and so on. In 2020, Tu et al. introduced the concept of the complete permutation in the sense of multiplication (CPM for short). In this paper, we further study the constructions and applications of CPMs. We mainly construct many classes of CPMs through three different approaches, i.e., index, self-inverse binomial, which is a new concept proposed in this paper, and linearized polynomial. Particularly, we provide a modular algorithm to produce all CPMs with a given index and determine all CPMs with index 3. Many infinite classes of complete self-inverse binomials are proposed, which explain most of the experimental results about complete self-inverse binomials over <span>({mathbb {F}}_{2^n})</span> with <span>(nle 10)</span>. Six classes of linearized CPMs are given by using standard arguments from fast symbolic computations and a general method is proposed by the AGW criterion. Finally, two applications of CPMs in cryptography are discussed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"11 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic results on the 2-adic complexity 二进复杂度的概率结果
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-14 DOI: 10.1007/s10623-025-01592-1
Zhixiong Chen, Arne Winterhof
{"title":"Probabilistic results on the 2-adic complexity","authors":"Zhixiong Chen, Arne Winterhof","doi":"10.1007/s10623-025-01592-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01592-1","url":null,"abstract":"<p>This work is devoted to solving some closely related open problems on the average and asymptotic behavior of the 2-adic complexity of binary sequences. First, for fixed <i>N</i>, we prove that the expected value <span>(E^{text {2-adic}}_N)</span> of the 2-adic complexity over all binary sequences of length <i>N</i> is close to <span>(frac{N}{2})</span> and the deviation from <span>(frac{N}{2})</span> is at most of order of magnitude <span>(log (N))</span>. More precisely, we show that </p><span>$$begin{aligned} frac{N}{2}-1 le E^{text {2-adic}}_N= frac{N}{2}+O(log (N)). end{aligned}$$</span><p>We also prove bounds on the expected value of the <i>N</i>th rational complexity. Our second contribution is to prove for a random binary sequence <span>(mathcal {S})</span> that the <i>N</i>th 2-adic complexity satisfies with probability 1 </p><span>$$begin{aligned} lambda _{mathcal {S}}(N)=frac{N}{2}+O(log (N)) , hbox { for all} N. end{aligned}$$</span>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"80 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143417491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret and shared keys recovery on hamming quasi-cyclic with SASCA 基于SASCA的hamming拟环上的密钥和共享密钥恢复
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-12 DOI: 10.1007/s10623-025-01575-2
Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau
{"title":"Secret and shared keys recovery on hamming quasi-cyclic with SASCA","authors":"Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau","doi":"10.1007/s10623-025-01575-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01575-2","url":null,"abstract":"<p>Soft Analytical Side Channel Attacks (SASCA) are a powerful family of Side Channel Attacks (SCA) that allows the recovery of secret values with only a small number of traces. Their effectiveness lies in the Belief Propagation (BP) algorithm, which enables efficient computation of the marginal distributions of intermediate values. Post-quantum schemes such as Kyber, and more recently, Hamming Quasi-Cyclic (HQC), have been targets of SASCA. Previous SASCA on HQC focused on Reed–Solomon (RS) codes and successfully retrieved the shared key with a high success rate for high noise levels using a single trace. In this work, we present new SASCA on HQC, where both the shared key and the secret key are targeted. Our attacks are realized on simulations. Unlike the previous SASCA, we take a closer look at the Reed–Muller (RM) code. The advantage of this choice is that the RM decoder is applied before the RS decoder, enabling attacks targeting both the secret key and shared key. We build a factor graph of the Fast Hadamard Transform (FHT) function from the HQC reference implementation of April 2023. The information recovered from BP allows us to retrieve the shared key with a single trace. In addition to the previous SASCA targeting HQC, we also manage to recover the secret key with two different chosen ciphertext attacks. One of them requires a single trace and is successful until high noise levels.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"18 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On equidistant single-orbit cyclic and quasi-cyclic subspace codes 关于等距单轨循环和拟循环子空间码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-12 DOI: 10.1007/s10623-025-01586-z
Mahak, Maheshanand Bhaintwal
{"title":"On equidistant single-orbit cyclic and quasi-cyclic subspace codes","authors":"Mahak, Maheshanand Bhaintwal","doi":"10.1007/s10623-025-01586-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01586-z","url":null,"abstract":"<p>A code is said to be equidistant if the distance between any two distinct codewords of the code is the same. In this paper, we have studied equidistant single-orbit cyclic and quasi-cyclic subspace codes. The orbit code generated by a subspace <i>U</i> in <span>({mathbb {F}}_{q^n})</span> such that the dimension of <i>U</i> over <span>({mathbb {F}}_q)</span> is <i>t</i> or <span>(n-t)</span>, <span>(text{ where }~t=dim _{{mathbb {F}}_q}(text{ Stab }(U)cup {0}))</span>, is equidistant and is termed a trivial equidistant orbit code. Using the concept of cyclic difference sets, we have proved that only the trivial equidistant single-orbit cyclic subspace codes exist. Further, we have explored equidistant single-orbit quasi-cyclic subspace codes, focusing specifically on those which are sunflowers.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"61 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of optimal flag codes by MRD codes 用MRD码构造最优标志码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-10 DOI: 10.1007/s10623-025-01584-1
Shuangqing Liu, Shuhui Yu, Lijun Ji
{"title":"Construction of optimal flag codes by MRD codes","authors":"Shuangqing Liu, Shuhui Yu, Lijun Ji","doi":"10.1007/s10623-025-01584-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01584-1","url":null,"abstract":"<p>Flag codes have received a lot of attention due to its application in random network coding. In 2021, Alonso-González et al. constructed optimal <span>((n,{mathcal {A}})_{q})</span>-Optimum distance flag codes (ODFC) for <span>({mathcal {A}}subseteq {1,2,ldots ,k,n-k,ldots ,n-1})</span> with <span>(kin {mathcal {A}})</span> and <span>(kmid n)</span>. In this paper, we introduce a new construction of <span>((n,{mathcal {A}})_q)</span>-ODFCs by maximum rank-metric codes, and prove that there is an <span>((n,{mathcal {A}})_{q})</span>-ODFC of size <span>(frac{q^n-q^{k+r}}{q^k-1}+1)</span> for any <span>({mathcal {A}}subseteq {1,2,ldots ,k,n-k,ldots ,n-1})</span> with <span>({mathcal {A}}cap {k,n-k}ne emptyset )</span>, where <span>(requiv npmod k)</span> and <span>(0le r&lt;k)</span>. Furthermore, when <span>(k&gt;frac{q^r-1}{q-1})</span>, this <span>((n,{mathcal {A}})_q)</span>-ODFC is optimal. Specially, when <span>(r=0)</span>, Alonso-González et al.’s result is also obtained. We also give a characterization of almost optimum distance flag codes, and construct a family of optimal almost optimum flag distance codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143375193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The asymptotic existence of BIBDs having a nesting 具有嵌套的bibd的渐近存在性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-08 DOI: 10.1007/s10623-025-01583-2
Xinyue Ming, Tao Feng, Menglong Zhang
{"title":"The asymptotic existence of BIBDs having a nesting","authors":"Xinyue Ming, Tao Feng, Menglong Zhang","doi":"10.1007/s10623-025-01583-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01583-2","url":null,"abstract":"<p>A <span>((v,k,lambda ))</span>-BIBD <span>((X,mathcal {B}))</span> has a nesting if there is a mapping <span>(phi :mathcal {B}rightarrow X)</span> such that <span>((X,{Bcup {phi (B)}mid Bin mathcal {B}}))</span> is a <span>((v,k+1,lambda +1))</span>-packing. If the <span>((v,k+1,lambda +1))</span>-packing is a <span>((v,k+1,lambda +1))</span>-BIBD, then this nesting is said to be perfect. We show that given any positive integers <i>k</i> and <span>(lambda )</span>, if <span>(kge 2lambda +2)</span>, then for any sufficiently large <i>v</i>, every <span>((v,k,lambda ))</span>-BIBD can be nested into a <span>((v,k+1,lambda +1))</span>-packing; and if <span>(k=2lambda +1)</span>, then for any sufficiently large <i>v</i> satisfying <span>(v equiv 1 pmod {2k})</span>, there exists a <span>((v,k,lambda ))</span>-BIBD having a perfect nesting. Banff difference families (BDF), as a special kind of difference families (DF), can be used to generate nested BIBDs. We show that if <i>G</i> is a finite abelian group with a large size whose number of order 2 elements is no more than a given constant, and <span>(kge 2lambda +2)</span>, then one can obtain a <span>((G,k,lambda ))</span>-BDF by taking any <span>((G,k,lambda ))</span>-DF and then replacing each of its base blocks by a suitable translation. This is a Novák-like theorem. The generalized Novák’s conjecture states that given any positive integers <i>k</i> and <span>(lambda )</span> with <span>(kge lambda +1)</span>, there exists an integer <span>(v_0)</span> such that, for any cyclic <span>((v,k,lambda ))</span>-BIBD with <span>(vge v_0)</span>, it is always possible to choose one block from each block orbit so that the chosen blocks are pairwise disjoint. We confirm this conjecture for every <span>(kge lambda +2)</span>. Most of the theorems in this paper are based on a recent result presented by Delcourt and Postle on the asymptotic existence of an A-perfect matching of a bipartite hypergraph.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"12 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143371556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits 我们能打败3 / 2的下界吗?降低乱码电路通信成本的可能性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-08 DOI: 10.1007/s10623-025-01577-0
Chunghun Baek, Taechan Kim
{"title":"Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits","authors":"Chunghun Baek, Taechan Kim","doi":"10.1007/s10623-025-01577-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01577-0","url":null,"abstract":"<p>Recent improvements to garbled circuits are mainly focused on reducing their size. The state-of-the-art construction of Rosulek and Roy (Crypto 2021) requires <span>(1.5kappa )</span> bits for garbling AND gates in the free-XOR setting. This is below the previously proven lower bound <span>(2kappa )</span> in the linear garbling model of Zahur, Rosulek, and Evans (Eurocrypt 2015). Whether their construction is optimal in a more inclusive model than the linear garbling model still remains open. This paper begins by providing a comprehensive model for a large class of practical garbling schemes and proves the lower bound for the size of the garbled AND gates in our model. We show that garbled AND gates require at least <span>(1.5kappa )</span> bits in our new model with the free-XOR setting. It is remarkable to see that the construction by Rosulek and Roy is already optimal despite the fact that our model possibly captures any potential extension of their construction.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"16 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143371606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New models for the cryptanalysis of ASCON ASCON密码分析的新模型
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-08 DOI: 10.1007/s10623-025-01572-5
Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher
{"title":"New models for the cryptanalysis of ASCON","authors":"Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher","doi":"10.1007/s10623-025-01572-5","DOIUrl":"https://doi.org/10.1007/s10623-025-01572-5","url":null,"abstract":"<p>This paper focuses on the cryptanalysis of the ASCON family using automatic tools. We analyze two different problems with the goal to obtain new modelings, both simpler and less computationally heavy than previous works (all our models require only a small amount of code and run on regular desktop computers). The first problem is the search for Meet-in-the-middle attacks on reduced-round ASCON–XOF. Starting from the MILP modeling of Qin et al. (Meet-in-the-middle preimage attacks on sponge-based hashing. In: EUROCRYPT (4). Lecture notes in computer science, vol 14007. Springer, pp. 158–188, 2023. https://doi.org/10.1007/978-3-031-30634-1_6), we rephrase the problem in SAT, which accelerates significantly the solving time and removes the need for the “weak diffusion structure” heuristic. This allows us to reduce the memory complexity of Qin et al.’s attacks and to prove some optimality results. The second problem is the search for lower bounds on the probability of differential characteristics for the ASCON permutation. We introduce a lossy MILP encoding of the propagation rules based on the Hamming weight, in order to find quickly lower bounds which are comparable to the state of the art. We find a small improvement over the existing bound on 7 rounds.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"47 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143371604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New results on non-disjoint and classical strong external difference families 非不相交和经典强外差族的新结果
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2025-02-05 DOI: 10.1007/s10623-025-01566-3
Sophie Huczynska, Sophie Hume
{"title":"New results on non-disjoint and classical strong external difference families","authors":"Sophie Huczynska, Sophie Hume","doi":"10.1007/s10623-025-01566-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01566-3","url":null,"abstract":"<p>Classical strong external difference families (SEDFs) are much-studied combinatorial structures motivated by information security applications; it is conjectured that only one classical abelian SEDF exists with more than two sets. Recently, non-disjoint SEDFs were introduced; it was shown that families of these exist with arbitrarily many sets. We present constructions for both classical and non-disjoint SEDFs, which encompass all known non-cyclotomic examples for either type (plus many new examples) using a sequence-based framework. Moreover, we introduce a range of new external difference structures (allowing set-sizes to vary, and sets to be replaced by multisets) in both the classical and non-disjoint case, and show how these may be applied to various communications applications.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143125228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信