Designs, Codes and Cryptography最新文献

筛选
英文 中文
Hulls of projective Reed–Muller codes 射影里德-穆勒码的船体
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-14 DOI: 10.1007/s10623-024-01543-2
Nathan Kaplan, Jon-Lark Kim
{"title":"Hulls of projective Reed–Muller codes","authors":"Nathan Kaplan, Jon-Lark Kim","doi":"10.1007/s10623-024-01543-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01543-2","url":null,"abstract":"<p>Projective Reed–Muller codes are constructed from the family of projective hypersurfaces of a fixed degree over a finite field <span>(mathbb {F}_q)</span>. We consider the relationship between projective Reed–Muller codes and their duals. We determine when these codes are self-dual, when they are self-orthogonal, and when they are LCD. We then show that when <i>q</i> is sufficiently large, the dimension of the hull of a projective Reed–Muller code is 1 less than the dimension of the code. We determine the dimension of the hull for a wider range of parameters and describe how this leads to a new proof of a recent result of Ruano and San-José.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142823245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On set systems with strongly restricted intersections 在具有强约束交叉口的集合系统上
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-05 DOI: 10.1007/s10623-024-01535-2
Xin Wei, Xiande Zhang, Gennian Ge
{"title":"On set systems with strongly restricted intersections","authors":"Xin Wei, Xiande Zhang, Gennian Ge","doi":"10.1007/s10623-024-01535-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01535-2","url":null,"abstract":"<p>Set systems with strongly restricted intersections, called <span>(alpha )</span>-intersecting families for a vector <span>(alpha )</span>, were introduced recently as a generalization of several well-studied intersecting families including the classical oddtown and eventown. Given a binary vector <span>(alpha =(a_1, ldots , a_k))</span>, a collection <span>({mathcal {F}})</span> of subsets over an <i>n</i> element set is an <span>(alpha )</span>-intersecting family modulo 2 if for each <span>(i=1,2,ldots ,k)</span>, all <i>i</i>-wise intersections of distinct members in <span>({mathcal {F}})</span> have sizes with the same parity as <span>(a_i)</span>. Let <span>(f_alpha (n))</span> denote the maximum size of such a family. In this paper, we study the asymptotic behavior of <span>(f_alpha (n))</span> when <i>n</i> goes to infinity. We show that if <i>t</i> is the maximum integer such that <span>(a_t=1)</span> and <span>(2tle k)</span>, then <span>(f_alpha (n)sim (t! n)^{1/t})</span>. More importantly, we show that for any constant <span>(c&gt;0)</span>, as the length <i>k</i> goes larger, <span>(f_alpha (n))</span> is upper bounded by <span>(O (n^c))</span> for almost all <span>(alpha )</span>. Equivalently, no matter what <i>k</i> is, there are only finitely many <span>(alpha )</span> satisfying <span>(f_alpha (n)=Omega (n^c))</span>. This answers an open problem raised by Johnston and O’Neill in 2023. All of our results can be generalized to modulo <i>p</i> setting for any prime <i>p</i> smoothly.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"37 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On 3-dimensional MRD codes of type $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$ 论型的三维MRD码 $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-05 DOI: 10.1007/s10623-024-01528-1
Daniele Bartoli, Francesco Ghiandoni
{"title":"On 3-dimensional MRD codes of type $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$","authors":"Daniele Bartoli, Francesco Ghiandoni","doi":"10.1007/s10623-024-01528-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01528-1","url":null,"abstract":"<p>In this work we present results on the classification of <span>(mathbb {F}_{q^n})</span>-linear MRD codes of dimension three. In particular, using connections with certain algebraic varieties over finite fields, we provide non-existence results for MRD codes <span>(mathcal {C}=langle X^{q^t}, F(X), G(X) rangle subseteq mathcal {L}_{n,q})</span> of exceptional type, i.e. such that <span>(mathcal {C})</span> is MRD over infinitely many extensions of the base field. These results partially address a conjecture of Bartoli, Zini and Zullo in 2023.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Derivative descendants of cyclic codes and constacyclic codes 循环码和恒循环码的派生后代
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01536-1
Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou
{"title":"Derivative descendants of cyclic codes and constacyclic codes","authors":"Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou","doi":"10.1007/s10623-024-01536-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01536-1","url":null,"abstract":"<p>Cyclic codes, as a special type of constacyclic codes, have been extensively studied due to their favorable theoretical and mathematical properties. Very recently, by using the derivative of the Mattson-Solomon polynomials, Huang and Zhang (IEEE Trans Inf Theor 70(4):2395–2410, 2024) studied the cyclic derivative descendants (DDs) and linear DDs of binary extended cyclic codes and proposed the corresponding derivative decoding methods. One objective of this paper is to generalize these conclusions to <i>q</i>-ary extended cyclic codes with group algebra theory. It demonstrates that the cyclic DDs of a <i>q</i>-ary extended cyclic code are the same codes and its linear DDs are equivalent codes. In addition, we show that the relevant results can be generalized to <i>q</i>-ary constacyclic codes and the linear codes generated by Plotkin construction. Our conclusions reveal that the soft-decision decoding method proposed by Huang and Zhang for binary cyclic codes is also applicable to <i>q</i>-ary cyclic codes, <i>q</i>-ary constacyclic codes and the linear codes generated by Plotkin construction.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"67 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Codes over $$mathbb {F}_4$$ and $$mathbb {F}_2 times mathbb {F}_2$$ and theta series of the corresponding lattices in quadratic fields 二次域中对应格的$$mathbb {F}_4$$和$$mathbb {F}_2 times mathbb {F}_2$$上的代码和级数
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01537-0
Josline Freed
{"title":"Codes over $$mathbb {F}_4$$ and $$mathbb {F}_2 times mathbb {F}_2$$ and theta series of the corresponding lattices in quadratic fields","authors":"Josline Freed","doi":"10.1007/s10623-024-01537-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01537-0","url":null,"abstract":"<p>Using codes defined over <span>(mathbb {F}_4)</span> and <span>(mathbb {F}_2 times mathbb {F}_2)</span>, we simultaneously define the theta series of corresponding lattices for both real and imaginary quadratic fields <span>(mathbb {Q}(sqrt{d}))</span> with <span>(d equiv 1mod 4)</span> a square-free integer. For such a code, we use its weight enumerator to prove which term in the code’s corresponding theta series is the first to depend on the choice of <i>d</i>. For a given choice of real or imaginary quadratic field, we find conditions on the length of the code relative to the choice of quadratic field. When these conditions are satisfied, the generated theta series is unique to the code’s symmetric weight enumerator. We show that whilst these conditions ensure all non-equivalent codes will produce distinct theta series, for other codes that do not satisfy this condition, the length of the code and choice of quadratic field is not always enough to determine if the corresponding theta series will be unique.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"29 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A pair of orthogonal orthomorphisms of finite nilpotent groups 有限幂零群的一对正交正胚
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01540-5
Shikang Yu, Tao Feng, Menglong Zhang
{"title":"A pair of orthogonal orthomorphisms of finite nilpotent groups","authors":"Shikang Yu, Tao Feng, Menglong Zhang","doi":"10.1007/s10623-024-01540-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01540-5","url":null,"abstract":"<p>A bijection <span>(theta :Grightarrow G)</span> of a finite group <i>G</i> is an orthomorphism of <i>G</i> if the mapping <span>(xmapsto x^{-1}theta (x))</span> is also a bijection. Two orthomorphisms <span>(theta )</span> and <span>(phi )</span> of a finite group <i>G</i> are orthogonal if the mapping <span>(xmapsto theta (x)^{-1}phi (x))</span> is also bijective. We show that there is a pair of orthogonal orthomorphisms of a finite nilpotent group <i>G</i> if and only if the Sylow 2-subgroup of <i>G</i> is either trivial or noncyclic with the definite exceptions of <span>(Gcong G')</span> where <span>(G'in {D_8,Q_8,{mathbb {Z}}_3,{mathbb {Z}}_9})</span> and except possibly for <span>(Gcong Q_8times {mathbb {Z}}_9)</span> or <span>(Gcong SD_{2^n}times {mathbb {Z}}_3)</span> for any <span>(ngeqslant 4)</span>. This result yields the existence of difference matrices over finite nilpotent groups with four rows.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"9 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factorization and irreducibility of composed products 合成产物的分解和不可约性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01529-0
Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan
{"title":"Factorization and irreducibility of composed products","authors":"Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan","doi":"10.1007/s10623-024-01529-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01529-0","url":null,"abstract":"<p>Brawley and Carlitz introduced diamond products of elements of finite fields and associated composed products of polynomials in 1987. Composed products yield a method to construct irreducible polynomials of large composite degrees from irreducible polynomials of lower degrees. We show that the composed product of two irreducible polynomials of degrees <i>m</i> and <i>n</i> is again irreducible if and only if <i>m</i> and <i>n</i> are coprime and the involved diamond product satisfies a special cancellation property, the so-called conjugate cancellation. This completes the characterization of irreducible composed products, considered in several previous papers. More generally, we give precise criteria when a diamond product satisfies conjugate cancellation. For diamond products defined via bivariate polynomials, we prove simple criteria that characterize when conjugate cancellation holds. We also provide efficient algorithms to check these criteria. We achieve stronger results as well as more efficient algorithms in the case that the polynomials are bilinear. Lastly, we consider possible constructions of normal elements using composed products and the methods we developed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On translation hyperovals in semifield planes 半场平面上的平移超卵圆
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-12-04 DOI: 10.1007/s10623-024-01533-4
Kevin Allen, John Sheekey
{"title":"On translation hyperovals in semifield planes","authors":"Kevin Allen, John Sheekey","doi":"10.1007/s10623-024-01533-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01533-4","url":null,"abstract":"<p>In this paper we demonstrate the first example of a finite translation plane which does not contain a translation hyperoval, disproving a conjecture of Cherowitzo. The counterexample is a semifield plane, specifically a Generalised Twisted Field plane, of order 64. We also relate this non-existence to the covering radius of two associated rank-metric codes, and the non-existence of scattered subspaces of maximum dimension with respect to the associated spread.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"83 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum rectangle attack and its application on Deoxys-BC 量子矩形攻击及其在 Deoxys-BC 上的应用
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-11-21 DOI: 10.1007/s10623-024-01526-3
Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiao-Yang Dong
{"title":"Quantum rectangle attack and its application on Deoxys-BC","authors":"Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiao-Yang Dong","doi":"10.1007/s10623-024-01526-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01526-3","url":null,"abstract":"<p>In recent years, it has become a popular trend to propose quantum versions of classical attacks. The rectangle attack as a differential attack is widely used in symmetric cryptanalysis and applied on many block ciphers. To improve its efficiency, we propose a new quantum rectangle attack firstly. In rectangle attack, it counts the number of valid quartets for each guessed subkeys and filters out subkey candidates according to the counter. To speed up this procedure, we propose a quantum key counting algorithm based on parallel amplitude estimation algorithm and amplitude amplification algorithm. Then, we complete with the remaining key bits and search the right full key by nested Grover search. Besides, we give a strategy to find a more suitable distinguisher to make the complexity lower. Finally, to evaluate post-quantum security of the tweakable block cipher Deoxys-BC, we perform automatic search for good distinguishers of Deoxys-BC according to the strategy, and then apply our attack on 9/10-round Deoxys-BC-256 and 12/13/14-round Deoxys-BC-384. The results show that our attack has some improvements than classical attacks and Grover search.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"15 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142684484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more 多项式模网格中的近乎严密的安全性--PRF、IBE、全但多LTF等
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-11-19 DOI: 10.1007/s10623-024-01523-6
Zhedong Wang, Qiqi Lai, Feng-Hao Liu
{"title":"Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more","authors":"Zhedong Wang, Qiqi Lai, Feng-Hao Liu","doi":"10.1007/s10623-024-01523-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01523-6","url":null,"abstract":"<p>Achieving tight security is a fundamental task in cryptography. While one of the most important purposes of this task is to improve the overall efficiency of a construction (by allowing smaller security parameters), many current lattice-based instantiations do not completely achieve the goal. Particularly, a super-polynomial modulus seems to be necessary in all prior work for (almost) tight schemes that allow the adversary to conduct queries, such as PRF, IBE, and Signatures. As the super-polynomial modulus would affect the noise-to-modulus ratio and thus increase the parameters, this might cancel out the advantages (in efficiency) brought from the tighter analysis. To determine the full power of tight security/analysis in lattices, it is necessary to determine whether the super-polynomial modulus restriction is inherent. In this work, we remove the super-polynomial modulus restriction for many important primitives—PRF, IBE, all-but-many Lossy Trapdoor Functions, and Signatures. The crux relies on an improvement over the framework of Boyen and Li (Asiacrypt 16), and an almost tight reduction from LWE to LWR, which improves prior work by Alwen et al. (Eurocrypt 13), Bogdanov et al. (TCC 16), and Bai et al. (Asiacrypt 15). By combining these two advances, we are able to derive these almost tight schemes under LWE with a polynomial modulus.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142671014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信