首页 > 最新文献

Cryptography and Communications最新文献

英文 中文
Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem 基于中文余数定理构建具有严格最优部分汉明相关性的低命中区跳频序列集
Pub Date : 2024-09-17 DOI: 10.1007/s12095-024-00738-7
Xinyu Tian, Hongyu Han, Udaya Parampalli

The low-hit-zone (LHZ) frequency-hopping sequence (FHS) sets are commonly applied in quasi-synchronous (QS) frequency-hopping multiple access (FHMA) systems to reduce MA interference. In addition, due to the short synchronization time or sophisticated hardware, the correlation window is typically less than the period of the selected FHS set. In this paper, we construct a class of LHZ FHS sets with strictly optimal partial Hamming correlation (PHC) based on the Chinese Remainder Theorem (CRT) and analyze the PHC of our constructed LHZ FHS sets. It turns out that the new LHZ FHS sets are optimal with respect to the Niu-Peng-Fan bound.

在准同步(QS)跳频多路存取(FHMA)系统中,通常采用低命中区(LHZ)跳频序列(FHS)集来减少 MA 干扰。此外,由于同步时间短或硬件复杂,相关窗口通常小于所选跳频序列集的周期。本文基于中文余数定理(CRT)构建了一类具有严格最优部分汉明相关性(PHC)的 LHZ FHS 集,并分析了所构建的 LHZ FHS 集的 PHC。结果表明,新的 LHZ FHS 集在牛朋范约束方面是最优的。
{"title":"Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem","authors":"Xinyu Tian, Hongyu Han, Udaya Parampalli","doi":"10.1007/s12095-024-00738-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00738-7","url":null,"abstract":"<p>The low-hit-zone (LHZ) frequency-hopping sequence (FHS) sets are commonly applied in quasi-synchronous (QS) frequency-hopping multiple access (FHMA) systems to reduce MA interference. In addition, due to the short synchronization time or sophisticated hardware, the correlation window is typically less than the period of the selected FHS set. In this paper, we construct a class of LHZ FHS sets with strictly optimal partial Hamming correlation (PHC) based on the Chinese Remainder Theorem (CRT) and analyze the PHC of our constructed LHZ FHS sets. It turns out that the new LHZ FHS sets are optimal with respect to the Niu-Peng-Fan bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142263833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the second-order zero differential spectra of some power functions over finite fields 论有限域上某些幂函数的二阶零微分谱
Pub Date : 2024-09-04 DOI: 10.1007/s12095-024-00740-z
Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng

Boukerrou et al. (IACR Trans. Symm. Cryptol. 2020(1), 331–362, 2020) introduced the notion of the Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic fields). The FBCT is a crucial table for the analysis of the resistance of block ciphers to power attacks such as differential and boomerang attacks. It is worth noting that the coefficients of the FBCT are related to the second-order zero differential spectra of functions and the FBCT of functions can be extended as their second-order zero differential spectra. In this paper, by carrying out certain finer manipulations consisting of solving some specific equations over finite fields, we explicitly determine the second-order zero differential spectra of some power functions with low differential uniformity, and show that these functions also have low second-order zero differential uniformity. Our study further pushes previous investigations on second-order zero differential uniformity and Feistel boomerang uniformity for a power function F.

Boukerrou 等人(IACR Trans.Symm.Cryptol.2020(1),331-362,2020)提出了费斯特回旋镖连接表(FBCT)的概念,即回旋镖连接表(BCT)的费斯特对应表,以及费斯特回旋镖均匀性(与偶数特征域中的二阶零微分均匀性相同)。FBCT 是分析块密码对差分攻击和回旋镖攻击等强力攻击的抵抗能力的重要表格。值得注意的是,FBCT 的系数与函数的二阶零微分谱相关,函数的 FBCT 可以扩展为函数的二阶零微分谱。在本文中,我们通过求解有限域上的一些特定方程等精细操作,明确确定了一些具有低微分均匀性的幂函数的二阶零微分谱,并证明这些函数也具有低二阶零微分均匀性。我们的研究进一步推动了之前关于幂函数 F 的二阶零微分均匀性和费氏回旋镖均匀性的研究。
{"title":"On the second-order zero differential spectra of some power functions over finite fields","authors":"Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng","doi":"10.1007/s12095-024-00740-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00740-z","url":null,"abstract":"<p>Boukerrou et al. (IACR Trans. Symm. Cryptol. <b>2020</b>(1), 331–362, 2020) introduced the notion of the Feistel Boomerang Connectivity Table (FBCT), the Feistel counterpart of the Boomerang Connectivity Table (BCT), and the Feistel boomerang uniformity (which is the same as the second-order zero differential uniformity in even characteristic fields). The FBCT is a crucial table for the analysis of the resistance of block ciphers to power attacks such as differential and boomerang attacks. It is worth noting that the coefficients of the FBCT are related to the second-order zero differential spectra of functions and the FBCT of functions can be extended as their second-order zero differential spectra. In this paper, by carrying out certain finer manipulations consisting of solving some specific equations over finite fields, we explicitly determine the second-order zero differential spectra of some power functions with low differential uniformity, and show that these functions also have low second-order zero differential uniformity. Our study further pushes previous investigations on second-order zero differential uniformity and Feistel boomerang uniformity for a power function <i>F</i>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orientable sequences over non-binary alphabets 非二进制字母上的可定向序列
Pub Date : 2024-09-02 DOI: 10.1007/s12095-024-00742-x
Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild

We describe new, simple, recursive methods of construction for orientable sequences over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of n consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previous work on the binary case. We also derive an upper bound on the period of an orientable sequence.

我们描述了在任意有限字母表上构建可定向序列的新的、简单的递归方法,即在一个周期内,n 个连续元素的任何子序列在任一方向上最多出现一次的周期序列。我们特别确定了如何利用广义伦佩尔同态的两种变体来递归地构造这种序列,这是对以前关于二进制情况的工作的概括。我们还推导出了可定向序列周期的上限。
{"title":"Orientable sequences over non-binary alphabets","authors":"Abbas Alhakim, Chris J. Mitchell, Janusz Szmidt, Peter R. Wild","doi":"10.1007/s12095-024-00742-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00742-x","url":null,"abstract":"<p>We describe new, simple, recursive methods of construction for <i>orientable sequences</i> over an arbitrary finite alphabet, i.e. periodic sequences in which any sub-sequence of <i>n</i> consecutive elements occurs at most once in a period in either direction. In particular we establish how two variants of a generalised Lempel homomorphism can be used to recursively construct such sequences, generalising previous work on the binary case. We also derive an upper bound on the period of an orientable sequence.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trace dual of additive cyclic codes over finite fields 有限域上可加循环码的迹对偶
Pub Date : 2024-08-29 DOI: 10.1007/s12095-024-00741-y
Gyanendra K. Verma, R. K. Sharma

In (Shi et al. Finite Fields Appl. 80, 102087 2022) studied additive cyclic complementary dual codes with respect to trace Euclidean and trace Hermitian inner products over the finite field (mathbb {F}_4). In this article, we extend their results over (mathbb {F}_{q^2},) where q is an odd prime power. We describe the algebraic structure of additive cyclic codes and obtain the dual of a class of these codes with respect to the trace inner products. We also use generating polynomials to construct several examples of additive cyclic codes over (mathbb {F}_9.) These codes are better than linear codes of the same length and size. Furthermore, we describe the subfield codes and the trace codes of these codes as linear cyclic codes over (mathbb {F}_q).

Shi et al. 有限域应用 80, 102087 2022)研究了有限域 (mathbb {F}_4) 上关于痕欧几里得和痕赫尔墨特内积的加循环互补对偶码。在本文中,我们扩展了他们在 (mathbb {F}_{q^2},) 上的研究成果,其中 q 是奇素数幂。我们描述了可加循环码的代数结构,并得到了这些码的一类关于迹内积的对偶码。我们还利用生成多项式构造了几个在 (mathbb {F}_9.) 上的加循环码的例子,这些码比相同长度和大小的线性码更好。此外,我们将这些码的子域码和痕码描述为 (mathbb {F}_q) 上的线性循环码。
{"title":"Trace dual of additive cyclic codes over finite fields","authors":"Gyanendra K. Verma, R. K. Sharma","doi":"10.1007/s12095-024-00741-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00741-y","url":null,"abstract":"<p>In (Shi et al. <i>Finite Fields Appl.</i> <b>80</b>, 102087 2022) studied additive cyclic complementary dual codes with respect to trace Euclidean and trace Hermitian inner products over the finite field <span>(mathbb {F}_4)</span>. In this article, we extend their results over <span>(mathbb {F}_{q^2},)</span> where <i>q</i> is an odd prime power. We describe the algebraic structure of additive cyclic codes and obtain the dual of a class of these codes with respect to the trace inner products. We also use generating polynomials to construct several examples of additive cyclic codes over <span>(mathbb {F}_9.)</span> These codes are better than linear codes of the same length and size. Furthermore, we describe the subfield codes and the trace codes of these codes as linear cyclic codes over <span>(mathbb {F}_q)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two classes of q-ary constacyclic BCH codes 两类 q-ary 常环 BCH 码
Pub Date : 2024-08-27 DOI: 10.1007/s12095-024-00736-9
Jiayuan Zhang, Xiaoshan Kai, Ping Li

Constacyclic BCH codes are an interesting subclass of constacyclic codes because of their important theoretical and practical value. The purpose of this paper is to study the parameters of cyclic BCH codes of length (varvec{n = q^{m} - 1}) and negacyclic BCH codes of length (varvec{n = frac{q^{m} - 1}{2}}). We settle completely their dimensions. We also determine the minimum distances of a class of cyclic BCH codes of length (varvec{n = q^m - 1}) and give a lower bound on the minimum distances of other classes of constacyclic BCH codes. As seen by the code examples in this paper, the lower bound on the minimum distances of constacyclic BCH codes we gave is very close to the true minimum distances. These (varvec{q})-ary codes have good parameters in general.

常环 BCH 码是常环码的一个有趣子类,因为它具有重要的理论和实用价值。本文旨在研究长度为 (varvec{n = q^{m} - 1}) 的循环 BCH 码和长度为 (varvec{n = frac{q^{m} - 1}{2}}) 的负循环 BCH 码的参数。我们完全解决了它们的维数问题。我们还确定了一类长度为 (varvec{n = frac{q^{m} - 1}{2}} 的循环 BCH 码的最小距离,并给出了其他类 Constacyclic BCH 码的最小距离的下限。从本文的编码示例中可以看出,我们给出的constacyclic BCH码最小距离的下界非常接近真实的最小距离。这些 (varvec{q}) -ary 码一般都有很好的参数。
{"title":"Two classes of q-ary constacyclic BCH codes","authors":"Jiayuan Zhang, Xiaoshan Kai, Ping Li","doi":"10.1007/s12095-024-00736-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00736-9","url":null,"abstract":"<p>Constacyclic BCH codes are an interesting subclass of constacyclic codes because of their important theoretical and practical value. The purpose of this paper is to study the parameters of cyclic BCH codes of length <span>(varvec{n = q^{m} - 1})</span> and negacyclic BCH codes of length <span>(varvec{n = frac{q^{m} - 1}{2}})</span>. We settle completely their dimensions. We also determine the minimum distances of a class of cyclic BCH codes of length <span>(varvec{n = q^m - 1})</span> and give a lower bound on the minimum distances of other classes of constacyclic BCH codes. As seen by the code examples in this paper, the lower bound on the minimum distances of constacyclic BCH codes we gave is very close to the true minimum distances. These <span>(varvec{q})</span>-ary codes have good parameters in general.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On $$mathbb {Z}_{p^r} mathbb {Z}_{p^s} mathbb {Z}_{p^t}$$ -additive cyclic codes exhibit asymptotically good properties 关于 $$mathbb {Z}_{p^r}mathbb {Z}_{p^s}附加循环码表现出渐进的良好特性
Pub Date : 2024-08-26 DOI: 10.1007/s12095-024-00737-8
Mousumi Ghosh, Sachin Pathak, Dipendu Maity

In this paper, we construct a class of (mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-additive cyclic codes generated by 3-tuples of polynomials, where p is a prime number and (1 le r le s le t). We investigate the algebraic structure of these codes and establish that it is possible to determine generator matrices for a subfamily of codes within this class. We employ a probabilistic approach to analyze the asymptotic properties of these codes. For any positive real number (delta ) satisfying (0< delta < 1) such that the asymptotic Gilbert-Varshamov bound at (left( frac{k+l+n}{3p^{r-1}}delta right) ) is greater than (frac{1}{2}), we demonstrate that the relative distance of the random code converges to (delta ), while the rate of the random code converges to (frac{1}{k+l+n}). Finally, we conclude that the (mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-additive cyclic codes exhibit asymptotically good properties.

在本文中,我们构建了一类由 3 组多项式生成的 (mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-附加循环码,其中 p 是素数且 (1 le r le s le t)。我们研究了这些编码的代数结构,并确定有可能确定该类编码中一个子族的生成矩阵。我们采用概率方法来分析这些编码的渐近特性。对于满足 (0< delta <;1),使得在 (left( frac{k+l+n}{3p^{r-1}}delta right) )处的渐近吉尔伯特-瓦尔沙莫夫边界大于 (frac{1}{2}),我们证明随机码的相对距离收敛于 (delta),而随机码的速率收敛于 (frac{1}{k+l+n})。最后,我们得出结论:(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})-附加循环码表现出渐进的良好特性。
{"title":"On $$mathbb {Z}_{p^r} mathbb {Z}_{p^s} mathbb {Z}_{p^t}$$ -additive cyclic codes exhibit asymptotically good properties","authors":"Mousumi Ghosh, Sachin Pathak, Dipendu Maity","doi":"10.1007/s12095-024-00737-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00737-8","url":null,"abstract":"<p>In this paper, we construct a class of <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes generated by 3-tuples of polynomials, where <i>p</i> is a prime number and <span>(1 le r le s le t)</span>. We investigate the algebraic structure of these codes and establish that it is possible to determine generator matrices for a subfamily of codes within this class. We employ a probabilistic approach to analyze the asymptotic properties of these codes. For any positive real number <span>(delta )</span> satisfying <span>(0&lt; delta &lt; 1)</span> such that the asymptotic Gilbert-Varshamov bound at <span>(left( frac{k+l+n}{3p^{r-1}}delta right) )</span> is greater than <span>(frac{1}{2})</span>, we demonstrate that the relative distance of the random code converges to <span>(delta )</span>, while the rate of the random code converges to <span>(frac{1}{k+l+n})</span>. Finally, we conclude that the <span>(mathbb {Z}_{p^r}mathbb {Z}_{p^s}mathbb {Z}_{p^t})</span>-additive cyclic codes exhibit asymptotically good properties.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the minimum weights of quaternary Hermitian LCD codes 论四元赫米提液晶编码的最小权重
Pub Date : 2024-08-20 DOI: 10.1007/s12095-024-00733-y
Makoto Araya, Masaaki Harada

We study the largest minimum weights among quaternary Hermitian LCD codes. We determine the largest minimum weights among quaternary Hermitian LCD codes of length n and dimension k for (k le n le 17). A quaternary Hermitian LCD [21, 5, 13] code and a quaternary Hermitian LCD [21, 9, 9] code are also constructed for the first time. An updated table of the largest minimum weights among quaternary Hermitian LCD [nk] codes is also given for (k le n le 30).

我们研究了四元赫米提液晶编码中的最大最小权值。我们确定了长度为 n、维数为 k 的四元赫米提液晶码中 (k le n le 17) 的最大最小权值。我们还首次构造了四元赫米提液晶[21, 5, 13]码和四元赫米提液晶[21, 9, 9]码。还给出了(k le n le 30) 的四元赫米提液晶[n, k]码中最大最小权值的更新表。
{"title":"On the minimum weights of quaternary Hermitian LCD codes","authors":"Makoto Araya, Masaaki Harada","doi":"10.1007/s12095-024-00733-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00733-y","url":null,"abstract":"<p>We study the largest minimum weights among quaternary Hermitian LCD codes. We determine the largest minimum weights among quaternary Hermitian LCD codes of length <i>n</i> and dimension <i>k</i> for <span>(k le n le 17)</span>. A quaternary Hermitian LCD [21, 5, 13] code and a quaternary Hermitian LCD [21, 9, 9] code are also constructed for the first time. An updated table of the largest minimum weights among quaternary Hermitian LCD [<i>n</i>, <i>k</i>] codes is also given for <span>(k le n le 30)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new construction of cyclic subspace codes 循环子空间码的新构造
Pub Date : 2024-08-13 DOI: 10.1007/s12095-024-00735-w
Yuqing Han, Xiwang Cao

Subspace codes have attracted a lot of attention in the last few decades due to their applications in noncoherent linear network coding, in particular cyclic subspace codes can be encoded and decoded more efficiently because of their special algebraic structure. In this paper, we present a family of cyclic subspace codes with minimum distance (varvec{2k-2}) and size (varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}}), where (varvec{k|n}), (varvec{frac{n}{k}ge 2s+1}), (varvec{sge 1, e=lceil frac{n}{2sk} rceil -1}). In the case of (varvec{n=(2s+1)k}) with (varvec{2le s <q^k}), our cyclic subspace codes have larger size than the known ones in the literature.

子空间码因其在非相干线性网络编码中的应用而在过去几十年中引起了广泛关注,尤其是循环子空间码,由于其特殊的代数结构,可以更有效地编码和解码。在本文中,我们提出了最小距离为 (varvec{2k-2})、大小为 (varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}})的循环子空间编码族、其中:(varvec{k|n}),(varvec{frac{n}{k}ge 2s+1}),(varvec{sge 1, e=lceil frac{n}{2sk} rceil-1})。在 (varvec{n=(2s+1)k}) 与 (varvec{2le s <q^k}) 的情况下,我们的循环子空间编码比文献中已知的编码具有更大的尺寸。
{"title":"A new construction of cyclic subspace codes","authors":"Yuqing Han, Xiwang Cao","doi":"10.1007/s12095-024-00735-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00735-w","url":null,"abstract":"<p>Subspace codes have attracted a lot of attention in the last few decades due to their applications in noncoherent linear network coding, in particular cyclic subspace codes can be encoded and decoded more efficiently because of their special algebraic structure. In this paper, we present a family of cyclic subspace codes with minimum distance <span>(varvec{2k-2})</span> and size <span>(varvec{seq^{k}(q^k-1)^{s-1}(q^n-1)+frac{q^n-1}{q^k-1}})</span>, where <span>(varvec{k|n})</span>, <span>(varvec{frac{n}{k}ge 2s+1})</span>, <span>(varvec{sge 1, e=lceil frac{n}{2sk} rceil -1})</span>. In the case of <span>(varvec{n=(2s+1)k})</span> with <span>(varvec{2le s &lt;q^k})</span>, our cyclic subspace codes have larger size than the known ones in the literature.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142196441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on nonlinear invariants of a power function over a binary field 二进制域上幂函数的非线性不变式研究
Pub Date : 2024-08-12 DOI: 10.1007/s12095-024-00734-x
Zebin Wang, Chenhui Jin, Ting Cui

The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an (varvec{n})-bit width function, the time complexity (varvec{O}(textbf{2}^{varvec{3n}})) is needed to find its all nonlinear invariants. In this paper, for the positive integer (varvec{m}), we consider the power function (varvec{x}^{varvec{m}}) over the finite field (varvec{GF}(varvec{2}^{varvec{n}})), which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of (varvec{x}^{varvec{m}}) is studied and we provide two mathematical toolboxes named (varvec{sim }_{varvec{m}}) periodical point and (varvec{sim }_{varvec{m}}) equivalence class. Second, we present an algorithm to get all the nonlinear invariants of (varvec{x}^{varvec{m}}) over (varvec{GF}(varvec{2}^{varvec{n}})) at the cost of time complexity (varvec{O}(frac{{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}})). If the growth of n exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of (varvec{x}^{varvec{m}}). Finally, we consider the nonlinear invariants of (varvec{x}^textbf{3}) over (varvec{GF(2}^{varvec{129}})) as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.

非线性不变量攻击是一种针对轻量级块密码的新型、强大的密码分析方法。这种密码分析方法的核心步骤是找到其级联轮的非线性不变量。一般来说,对于一个宽度为 (varvec{n})bit 的函数,要找到它的所有非线性不变量,需要的时间复杂度为 (varvec{O}(textbf{2}^{varvec{3n}})) 。在本文中,对于正整数 (varvec{m}),我们考虑有限域 (varvec{GF}(varvec{2}^{varvec{n}})上的幂函数 (varvec{x}^{varvec{m}}),它是近几十年来最重要的加密函数之一。首先,我们研究了 (varvec{x}^{varvec{m}}) 的非线性不变量,并提供了两个数学工具箱,分别命名为 (varvec{sim }_{varvec{m}}) 周期点和 (varvec{sim }_{varvec{m}}) 等价类。其次、我们提出了一种算法来获取 (varvec{x}^{varvec{m}} 上 (varvec{GF}(varvec{2}^{varvec{n}})) 的所有非线性不变式,代价是时间复杂度 (varvec{O}(frac{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}})).如果 n 的增长超过了我们上面的容许范围,我们会提供另一种方法来得到 (varvec{x}^{varvec{m}}) 的部分非线性不变式。最后,我们考虑了 (varvec{GF(2}^{varvec{129}}) 上 (varvec{x}^textbf{3}) 的非线性不变式的应用,它被用于块密码 MiMC。根据现有方法,这似乎是不切实际的。这些结果让我们第一次找到了这种函数的几个(但不是全部)非难非线性不变式。
{"title":"Research on nonlinear invariants of a power function over a binary field","authors":"Zebin Wang, Chenhui Jin, Ting Cui","doi":"10.1007/s12095-024-00734-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00734-x","url":null,"abstract":"<p>The nonlinear invariant attack is a new and powerful cryptanalytic method for lightweight block ciphers. The core step of such cryptanalytic method is to find the nonlinear invariant(s) of its cascade round. Generally, for an <span>(varvec{n})</span>-bit width function, the time complexity <span>(varvec{O}(textbf{2}^{varvec{3n}}))</span> is needed to find its all nonlinear invariants. In this paper, for the positive integer <span>(varvec{m})</span>, we consider the power function <span>(varvec{x}^{varvec{m}})</span> over the finite field <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span>, which is one of the most important cryptographic functions in recent decades. First, the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> is studied and we provide two mathematical toolboxes named <span>(varvec{sim }_{varvec{m}})</span> <i>periodical point</i> and <span>(varvec{sim }_{varvec{m}})</span> <i>equivalence class</i>. Second, we present an algorithm to get all the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span> over <span>(varvec{GF}(varvec{2}^{varvec{n}}))</span> at the cost of time complexity <span>(varvec{O}(frac{{varvec{2}}^{varvec{n}}varvec{-1}}{varvec{gcd (2}^{varvec{n}}varvec{-1,m)}}))</span>. If the growth of <i>n</i> exceeds our tolerance above, another method is provided to get parts of the nonlinear invariants of <span>(varvec{x}^{varvec{m}})</span>. Finally, we consider the nonlinear invariants of <span>(varvec{x}^textbf{3})</span> over <span>(varvec{GF(2}^{varvec{129}}))</span> as an application, which is used in the block cipher MiMC. It seems impractical by existing methods. The results allow us to find several (but not all) nontrivial nonlinear invariants of such a function for the first time.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On quasi-twisted codes and generalized quasi-twisted codes over $$mathbb {Z}_{4} +umathbb {Z}_{4}$$ 关于 $$mathbb {Z}_{4} 上的准扭曲码和广义准扭曲码+umathbb {Z}_{4}$$
Pub Date : 2024-08-05 DOI: 10.1007/s12095-024-00732-z
Ayoub Mounir, Abdelfattah Haily

In this paper, our main objective is to examine the properties and characteristics of 1-generator ((2 + u))-quasi-twisted (QT) codes and ((2 + u))-generalized quasi-twisted (GQT) codes over the ring (mathbb {Z}_4 +umathbb {Z}_4 ), with (u^2=1). We determine the structure of the generators and minimal generating sets for both 1-generator ((2 + u))-QT and ((2 + u))-GQT codes. Additionally, we establish a lower bound for the minimum distance of free 1-generator ((2 + u))-QT and ((2 + u))-GQT codes over R. Furthermore, we present some numerical examples that illustrate the construction of some optimal (mathbb {Z}_4)-linear codes using the Gray map.

在本文中,我们的主要目标是研究环 (mathbb {Z}_4 +umathbb {Z}_4 )上的、带有 (u^2=1)的 1-生成器 ((2+u))-准扭曲(QT)码和 ((2+u))-广义准扭曲(GQT)码的性质和特征。我们确定了 1 个生成器 ((2 + u))-QT 和 ((2 + u))-GQT 码的生成器和最小生成集的结构。此外,我们还为 R 上的自由 1-生成器 ((2 + u))-QT 和 ((2 + u))-GQT 码的最小距离建立了一个下限。此外,我们还给出了一些数值示例,说明了使用格雷映射构造一些最优 (mathbb {Z}_4)-线性码的方法。
{"title":"On quasi-twisted codes and generalized quasi-twisted codes over $$mathbb {Z}_{4} +umathbb {Z}_{4}$$","authors":"Ayoub Mounir, Abdelfattah Haily","doi":"10.1007/s12095-024-00732-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00732-z","url":null,"abstract":"<p>In this paper, our main objective is to examine the properties and characteristics of 1-generator <span>((2 + u))</span>-quasi-twisted (QT) codes and <span>((2 + u))</span>-generalized quasi-twisted (GQT) codes over the ring <span>(mathbb {Z}_4 +umathbb {Z}_4 )</span>, with <span>(u^2=1)</span>. We determine the structure of the generators and minimal generating sets for both 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes. Additionally, we establish a lower bound for the minimum distance of free 1-generator <span>((2 + u))</span>-QT and <span>((2 + u))</span>-GQT codes over <i>R</i>. Furthermore, we present some numerical examples that illustrate the construction of some optimal <span>(mathbb {Z}_4)</span>-linear codes using the Gray map.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141934587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptography and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1