In this work, we establish a minimal set of generators for the dual code of a cyclic code having arbitrary length over a finite chain ring. It is observed that this set of generators forms a minimal strong Grobner basis for the dual code. Using this structure for the dual of a cyclic code, we obtain sufficient as well as necessary conditions for a cyclic code to be a self dual code over a finite chain ring. We enumerate the distinct non-trivial self dual cyclic codes over these rings. Further, we determine all MHDR dual cyclic codes. We provide a few examples of self dual and MHDR dual cyclic codes over various finite chain rings.
{"title":"Self dual and MHDR dual cyclic codes over finite chain rings","authors":"Monika Dalal, Disha Garg, Sucheta Dutt, Ranjeet Sehmi","doi":"10.1007/s12095-024-00731-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00731-0","url":null,"abstract":"<p>In this work, we establish a minimal set of generators for the dual code of a cyclic code having arbitrary length over a finite chain ring. It is observed that this set of generators forms a minimal strong Grobner basis for the dual code. Using this structure for the dual of a cyclic code, we obtain sufficient as well as necessary conditions for a cyclic code to be a self dual code over a finite chain ring. We enumerate the distinct non-trivial self dual cyclic codes over these rings. Further, we determine all MHDR dual cyclic codes. We provide a few examples of self dual and MHDR dual cyclic codes over various finite chain rings.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"75 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-01DOI: 10.1007/s12095-024-00730-1
Matteo Abbondati, Marco Calderini, Irene Villa
Dillon observed that an APN function F over ({{mathbb {F}}_{2}^{n}}) with n greater than 2 must satisfy the condition ({F(x) + F(y) + F(z) + F(x + y + z) :, x,y,z in {mathbb {F}}_{2}^{n}}= {mathbb {F}}_{2}^{n}). Recently, Taniguchi (Cryptogr. Commun. 15, 627–647 2023) generalized this condition to functions defined from ({{mathbb {F}}_{2}^{n}}) to ({{mathbb {F}}_{2}^{m}}), with (m>n), calling it the D-property. Taniguchi gave some characterizations of APN functions satisfying the D-property and provided some families of APN functions from ({{mathbb {F}}_{2}^{n}}) to ({{mathbb {F}}_{2}^{n+1}}) satisfying this property. In this work, we further study the D-property for (n, m)-functions with (mge n). We give some combinatorial bounds on the dimension m for the existence of such functions. Then, we characterize the D-property in terms of the Walsh transform and for quadratic functions we give a characterization of this property in terms of the ANF. We also give a simplification on checking the D-property for quadratic functions, which permits to extend some of the APN families provided by Taniguchi. We further focus on the class of the plateaued functions, providing conditions for the D-property. To conclude, we show a connection of some results obtained with the higher-order differentiability and the inverse Fourier transform.
狄龙观察到,n 大于 2 的 ({mathbb {F}_{2}^{n}}) 上的 APN 函数 F 必须满足条件({F(x) + F(y) + F(z) + F(x + y + z) :, x,y,z in {mathbb {F}_{2}^{n}}= {mathbb {F}_{2}^{n}} )。最近,谷口(Taniguchi)(Cryptogr. Commun. 15, 627-647 2023)把这个条件推广到了({mathbb {F}_{2}^{n}}) 到({mathbb {F}_{2}^{m}}) 的函数,称之为D属性。谷口给出了满足 D 特性的 APN 函数的一些特征,并提供了从 ({{mathbb {F}_{2}^{n}}) 到 ({{mathbb {F}_{2}^{n+1}}) 的一些满足此特性的 APN 函数族。在这项工作中,我们进一步研究了 (n, m) 函数的 D 特性。我们给出了此类函数存在的维数 m 的组合约束。然后,我们用沃尔什变换描述了 D 特性,并用 ANF 描述了二次函数的 D 特性。我们还给出了检验二次函数 D 特性的简化方法,从而可以扩展谷口提供的一些 APN 族。我们进一步关注高原函数类,为 D-属性提供条件。最后,我们展示了与高阶可微性和反傅里叶变换相关的一些结果。
{"title":"On Dillon’s property of (n, m)-functions","authors":"Matteo Abbondati, Marco Calderini, Irene Villa","doi":"10.1007/s12095-024-00730-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00730-1","url":null,"abstract":"<p>Dillon observed that an APN function <i>F</i> over <span>({{mathbb {F}}_{2}^{n}})</span> with <i>n</i> greater than 2 must satisfy the condition <span>({F(x) + F(y) + F(z) + F(x + y + z) :, x,y,z in {mathbb {F}}_{2}^{n}}= {mathbb {F}}_{2}^{n})</span>. Recently, Taniguchi (Cryptogr. Commun. <b>15</b>, 627–647 2023) generalized this condition to functions defined from <span>({{mathbb {F}}_{2}^{n}})</span> to <span>({{mathbb {F}}_{2}^{m}})</span>, with <span>(m>n)</span>, calling it the D-property. Taniguchi gave some characterizations of APN functions satisfying the D-property and provided some families of APN functions from <span>({{mathbb {F}}_{2}^{n}})</span> to <span>({{mathbb {F}}_{2}^{n+1}})</span> satisfying this property. In this work, we further study the D-property for (<i>n</i>, <i>m</i>)-functions with <span>(mge n)</span>. We give some combinatorial bounds on the dimension <i>m</i> for the existence of such functions. Then, we characterize the D-property in terms of the Walsh transform and for quadratic functions we give a characterization of this property in terms of the ANF. We also give a simplification on checking the D-property for quadratic functions, which permits to extend some of the APN families provided by Taniguchi. We further focus on the class of the plateaued functions, providing conditions for the D-property. To conclude, we show a connection of some results obtained with the higher-order differentiability and the inverse Fourier transform.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"181 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s12095-024-00729-8
Xingbin Qiao, Xiaoni Du, Wenping Yuan
Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing, authentication codes and association schemes. In this paper, we first present a construction of 3-dimensional linear codes (varvec{C}_{varvec{f}}) over finite field ({mathbb {F}_{varvec{2}}}^{varvec{m}}) parameterized by any Boolean function (varvec{f}). Then we determine explicitly the weight distributions of (varvec{C}_{varvec{f}}), the punctured code (widetilde{varvec{C}}_{varvec{f}}), as well as the corresponding subfield codes over (mathbb {F}_{varvec{2}}) for several classes of Boolean functions (varvec{f}). In particular, we determine the weight distributions of subfield codes derived from (varvec{r})-plateaued functions. Moreover, the parameters of their dual codes are investigated, which contain length-optimal and dimension-optimal AMDS codes with respect to the sphere packing bound. We emphasize that the new codes are projective and contain binary self-complementary codes. As applications, some of the projective codes we present can be employed to construct (varvec{s})-sum sets for any odd integer (varvec{s}>varvec{1}).
{"title":"Several classes of linear codes with AMDS duals and their subfield codes","authors":"Xingbin Qiao, Xiaoni Du, Wenping Yuan","doi":"10.1007/s12095-024-00729-8","DOIUrl":"https://doi.org/10.1007/s12095-024-00729-8","url":null,"abstract":"<p>Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing, authentication codes and association schemes. In this paper, we first present a construction of 3-dimensional linear codes <span>(varvec{C}_{varvec{f}})</span> over finite field <span>({mathbb {F}_{varvec{2}}}^{varvec{m}})</span> parameterized by any Boolean function <span>(varvec{f})</span>. Then we determine explicitly the weight distributions of <span>(varvec{C}_{varvec{f}})</span>, the punctured code <span>(widetilde{varvec{C}}_{varvec{f}})</span>, as well as the corresponding subfield codes over <span>(mathbb {F}_{varvec{2}})</span> for several classes of Boolean functions <span>(varvec{f})</span>. In particular, we determine the weight distributions of subfield codes derived from <span>(varvec{r})</span>-plateaued functions. Moreover, the parameters of their dual codes are investigated, which contain length-optimal and dimension-optimal AMDS codes with respect to the sphere packing bound. We emphasize that the new codes are projective and contain binary self-complementary codes. As applications, some of the projective codes we present can be employed to construct <span>(varvec{s})</span>-sum sets for any odd integer <span>(varvec{s}>varvec{1})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"362 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141871911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-19DOI: 10.1007/s12095-024-00726-x
Vladimir N. Potapov, Ferruh Özbudak
Using recent results of Keevash et al. [10] and Eberhard et al. [8] together with further new detailed techniques in combinatorics, we present constructions of two concrete families of generalized Maiorana-McFarland bent functions. Our constructions improve the lower bounds on the number of bent functions in n variables over a finite field ({mathbb F}_p) if p is odd and n is odd in the limit as n tends to infinity. Moreover we obtain the asymptotically exact number of two dimensional vectorial Maiorana-McFarland bent functions in n variables over ({mathbb F}_2) as n tends to infinity.
利用基瓦什等人[10]和埃伯哈德等人[8]的最新成果,以及组合论中进一步的新的详细技术,我们提出了广义马约拉纳-麦克法兰弯曲函数的两个具体族的构造。如果 p 为奇数且 n 在 n 趋于无穷大的极限中为奇数,我们的构造改进了有限域 ({mathbb F}_p) 上 n 变量弯曲函数数的下界。此外,当 n 趋于无穷大时,我们得到了 n 变量上二维向量马约拉纳-麦克法兰弯曲函数的渐近精确数。
{"title":"Asymptotic bounds on the numbers of certain bent functions","authors":"Vladimir N. Potapov, Ferruh Özbudak","doi":"10.1007/s12095-024-00726-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00726-x","url":null,"abstract":"<p>Using recent results of Keevash et al. [10] and Eberhard et al. [8] together with further new detailed techniques in combinatorics, we present constructions of two concrete families of generalized Maiorana-McFarland bent functions. Our constructions improve the lower bounds on the number of bent functions in <i>n</i> variables over a finite field <span>({mathbb F}_p)</span> if <i>p</i> is odd and <i>n</i> is odd in the limit as <i>n</i> tends to infinity. Moreover we obtain the asymptotically exact number of two dimensional vectorial Maiorana-McFarland bent functions in <i>n</i> variables over <span>({mathbb F}_2)</span> as <i>n</i> tends to infinity.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-12DOI: 10.1007/s12095-024-00727-w
Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi
This paper presents a direct construction of type-II Z-complementary pair (ZCP) of q-ary (q is even) for all even lengths with a wide zero-correlation zone (ZCZ). The proposed construction provides type-II (left( N_1times 2^m, N_1times 2^m-left( N_1-1right) /2right) )-ZCP, where (N_1) is an odd positive integer greater than 1, and (mge 1). For (N_1=3), the result produces Z-optimal type-II ZCP of length (3times 2^m). In this paper, we also present a construction of type-II (left( N_2times 2^m, N_2times 2^m-left( N_2-2right) /2right) )-ZCP, where (N_2) is an even positive integer greater than 1, and (mge 1). For (N_2=2) and (N_2=4), the result provides a Golay complementary pair (GCP) of length (2^{m+1}) and Z-optimal type-II ZCP of length (2^{m+2}). Both the proposed constructions are compared with the existing state-of-the-art, and it has been observed that it produces a large ZCZ, which covers all existing work in terms of lengths.
{"title":"Construction of all even lengths type-II Z-complementary pair with a large zero-correlation zone","authors":"Piyush Priyanshu, Subhabrata Paul, Sudhan Majhi","doi":"10.1007/s12095-024-00727-w","DOIUrl":"https://doi.org/10.1007/s12095-024-00727-w","url":null,"abstract":"<p>This paper presents a direct construction of type-II Z-complementary pair (ZCP) of <i>q</i>-ary (<i>q</i> is even) for all even lengths with a wide zero-correlation zone (ZCZ). The proposed construction provides type-II <span>(left( N_1times 2^m, N_1times 2^m-left( N_1-1right) /2right) )</span>-ZCP, where <span>(N_1)</span> is an odd positive integer greater than 1, and <span>(mge 1)</span>. For <span>(N_1=3)</span>, the result produces Z-optimal type-II ZCP of length <span>(3times 2^m)</span>. In this paper, we also present a construction of type-II <span>(left( N_2times 2^m, N_2times 2^m-left( N_2-2right) /2right) )</span>-ZCP, where <span>(N_2)</span> is an even positive integer greater than 1, and <span>(mge 1)</span>. For <span>(N_2=2)</span> and <span>(N_2=4)</span>, the result provides a Golay complementary pair (GCP) of length <span>(2^{m+1})</span> and Z-optimal type-II ZCP of length <span>(2^{m+2})</span>. Both the proposed constructions are compared with the existing state-of-the-art, and it has been observed that it produces a large ZCZ, which covers all existing work in terms of lengths.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-10DOI: 10.1007/s12095-024-00728-9
Leijo Jose, Anuradha Sharma
Let R, S be two finite commutative chain rings such that R is the Galois extension of S of degree (r ge 2) and has a self-dual basis over S. Let q be the order of the residue field of S, and let N be a positive integer with (gcd (N,q)=1.) An S-additive cyclic code of length N over R is defined as an S-submodule of (R^N,) which is invariant under the cyclic shift operator on (R^N.) In this paper, we show that each S-additive cyclic code of length N over R can be uniquely expressed as a direct sum of linear codes of length r over certain Galois extensions of the chain ring S, which are called its constituents. We further study the dual code of each S-additive cyclic code of length N over R by placing the ordinary trace bilinear form on (R^N) and relating the constituents of the code with that of its dual code. With the help of these canonical form decompositions of S-additive cyclic codes of length N over R and their dual codes, we further characterize all self-orthogonal, self-dual and complementary-dual S-additive cyclic codes of length N over R in terms of their constituents. We also derive necessary and sufficient conditions for the existence of a self-dual S-additive cyclic code of length N over R and count all self-dual and self-orthogonal S-additive cyclic codes of length N over R by considering the following two cases: (I) both q, r are odd, and (II) q is even and (S=mathbb {F}_{q}[u]/langle u^e rangle .) Besides this, we obtain the explicit enumeration formula for all complementary-dual S-additive cyclic codes of length N over R. We also illustrate our main results with some examples.
让 R, S 是两个有限交换链环,使得 R 是 S 的伽罗瓦扩展,其阶数为(r ge 2) 并且在 S 上有一个自偶基础。让 q 是 S 的残差域的阶数,让 N 是一个正整数,其阶数为(gcd (N,q)=1.)R 上长度为 N 的 S 附加循环码被定义为 (R^N,) 的一个 S 子模单元,它在(R^N.) 上的循环移位算子作用下是不变的。 在本文中,我们证明了每个 R 上长度为 N 的 S 附加循环码都可以唯一地表示为链环 S 的某些伽罗瓦扩展上长度为 r 的线性码的直接和,这些扩展被称为它的成分。我们通过在 (R^N)上放置普通迹双线性形式,进一步研究每个 R 上长度为 N 的 S 附加循环码的对偶码,并将该码的成分与其对偶码的成分联系起来。借助 R 上长度为 N 的 S-additive 循环码及其对偶码的这些规范形式分解,我们进一步用它们的组成成分表征了 R 上长度为 N 的所有自正交、自对偶和互补对偶 S-additive 循环码。我们还推导了长度为 N 的 R 上自双 S-additive 循环码存在的必要条件和充分条件,并通过考虑以下两种情况统计了长度为 N 的 R 上所有自双和自正交 S-additive 循环码:(I)q、r 均为奇数;(II)q 为偶数且 (S=mathbb {F}_{q}[u]/langle u^e rangle .除此以外,我们还得到了 R 上所有长度为 N 的互补双 S-additive 循环码的显式枚举公式。
{"title":"Enumeration formulae for self-orthogonal, self-dual and complementary-dual additive cyclic codes over finite commutative chain rings","authors":"Leijo Jose, Anuradha Sharma","doi":"10.1007/s12095-024-00728-9","DOIUrl":"https://doi.org/10.1007/s12095-024-00728-9","url":null,"abstract":"<p>Let <i>R</i>, <i>S</i> be two finite commutative chain rings such that <i>R</i> is the Galois extension of <i>S</i> of degree <span>(r ge 2)</span> and has a self-dual basis over <i>S</i>. Let <i>q</i> be the order of the residue field of <i>S</i>, and let <i>N</i> be a positive integer with <span>(gcd (N,q)=1.)</span> An <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> is defined as an <i>S</i>-submodule of <span>(R^N,)</span> which is invariant under the cyclic shift operator on <span>(R^N.)</span> In this paper, we show that each <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> can be uniquely expressed as a direct sum of linear codes of length <i>r</i> over certain Galois extensions of the chain ring <i>S</i>, which are called its constituents. We further study the dual code of each <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> by placing the ordinary trace bilinear form on <span>(R^N)</span> and relating the constituents of the code with that of its dual code. With the help of these canonical form decompositions of <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> and their dual codes, we further characterize all self-orthogonal, self-dual and complementary-dual <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> in terms of their constituents. We also derive necessary and sufficient conditions for the existence of a self-dual <i>S</i>-additive cyclic code of length <i>N</i> over <i>R</i> and count all self-dual and self-orthogonal <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i> by considering the following two cases: (I) both <i>q</i>, <i>r</i> are odd, and (II) <i>q</i> is even and <span>(S=mathbb {F}_{q}[u]/langle u^e rangle .)</span> Besides this, we obtain the explicit enumeration formula for all complementary-dual <i>S</i>-additive cyclic codes of length <i>N</i> over <i>R</i>. We also illustrate our main results with some examples.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"231 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1007/s12095-024-00725-y
Jin Li, Huan Zhu, Shan Huang
It is very hard to construct an infinite family of cyclic codes of rate close to one half whose minimum distances have a good bound. Tang-Ding codes are very interesting, as their minimum distances have a square-root-like bound. Recently, a new generalization of Tang-Ding codes has been presented, Sun constructed several infinite families of binary cyclic codes with length (2^{m}-1) and dimension near (2^{m-1}) whose minimum distances much exceed the square-root bound (Sun, Finite Fields Appl. 89, 102200, 2023). In this paper, we construct several families of q-ary cyclic codes with length (q^{m}-1) and dimension near (frac{q^{m}-1}{2}), where (qge 3) is a prime power and (m ge 3) is an integer. The minimum distances of these codes and their dual codes much exceed the square-root bound.
{"title":"Several families of q-ary cyclic codes with length $$q^m-1$$","authors":"Jin Li, Huan Zhu, Shan Huang","doi":"10.1007/s12095-024-00725-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00725-y","url":null,"abstract":"<p>It is very hard to construct an infinite family of cyclic codes of rate close to one half whose minimum distances have a good bound. Tang-Ding codes are very interesting, as their minimum distances have a square-root-like bound. Recently, a new generalization of Tang-Ding codes has been presented, Sun constructed several infinite families of binary cyclic codes with length <span>(2^{m}-1)</span> and dimension near <span>(2^{m-1})</span> whose minimum distances much exceed the square-root bound (Sun, Finite Fields Appl. <b>89</b>, 102200, 2023). In this paper, we construct several families of <i>q</i>-ary cyclic codes with length <span>(q^{m}-1)</span> and dimension near <span>(frac{q^{m}-1}{2})</span>, where <span>(qge 3)</span> is a prime power and <span>(m ge 3)</span> is an integer. The minimum distances of these codes and their dual codes much exceed the square-root bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-18DOI: 10.1007/s12095-024-00724-z
Alexandr Polujan, Enes Pasalic, Sadmir Kudin, Fengrong Zhang
The concatenation of four Boolean bent functions (f=f_1||f_2||f_3||f_4) is bent if and only if the dual bent condition (f_1^* + f_2^* + f_3^* + f_4^* =1) is satisfied. However, to specify four bent functions satisfying this duality condition is in general quite a difficult task. Commonly, to simplify this problem, certain relations between (f_i) are assumed, as well as functions (f_i) of a special shape are considered, e.g., (f_i(x,y)=xcdot pi _i(y)+h_i(y)) are Maiorana-McFarland bent functions. In the case when permutations (pi _i) of (mathbb {F}_2^m) have the ((mathcal {A}_m)) property and Maiorana-McFarland bent functions (f_i) satisfy the additional condition (f_1+f_2+f_3+f_4=0), the dual bent condition is known to have a relatively simple shape allowing to specify the functions (f_i) explicitly. In this paper, we generalize this result for the case when Maiorana-McFarland bent functions (f_i) satisfy the condition (f_1(x,y)+f_2(x,y)+f_3(x,y)+f_4(x,y)=s(y)) and provide a construction of new permutations with the ((mathcal {A}_m)) property from the old ones. Combining these two results, we obtain a recursive construction method of bent functions satisfying the dual bent condition. Moreover, we provide a generic condition on the Maiorana-McFarland bent functions (f_1,f_2,f_3,f_4) stemming from the permutations of (mathbb {F}_2^m) with the ((mathcal {A}_m)) property, such that the concatenation (f=f_1||f_2||f_3||f_4) does not belong, up to equivalence, to the Maiorana-McFarland class. Using monomial permutations (pi _i) of (mathbb {F}_{2^m}) with the ((mathcal {A}_m)) property and monomial functions (h_i) on (mathbb {F}_{2^m}), we provide explicit constructions of such bent functions; a particular case of our result shows how one can construct bent functions from APN permutations, when m is odd. Finally, with our construction method, we explain how one can construct homogeneous cubic bent functions, noticing that only very few design methods of these objects are known.
{"title":"Bent functions satisfying the dual bent condition and permutations with the $$(mathcal {A}_m)$$ property","authors":"Alexandr Polujan, Enes Pasalic, Sadmir Kudin, Fengrong Zhang","doi":"10.1007/s12095-024-00724-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00724-z","url":null,"abstract":"<p>The concatenation of four Boolean bent functions <span>(f=f_1||f_2||f_3||f_4)</span> is bent if and only if the dual bent condition <span>(f_1^* + f_2^* + f_3^* + f_4^* =1)</span> is satisfied. However, to specify four bent functions satisfying this duality condition is in general quite a difficult task. Commonly, to simplify this problem, certain relations between <span>(f_i)</span> are assumed, as well as functions <span>(f_i)</span> of a special shape are considered, e.g., <span>(f_i(x,y)=xcdot pi _i(y)+h_i(y))</span> are Maiorana-McFarland bent functions. In the case when permutations <span>(pi _i)</span> of <span>(mathbb {F}_2^m)</span> have the <span>((mathcal {A}_m))</span> property and Maiorana-McFarland bent functions <span>(f_i)</span> satisfy the additional condition <span>(f_1+f_2+f_3+f_4=0)</span>, the dual bent condition is known to have a relatively simple shape allowing to specify the functions <span>(f_i)</span> explicitly. In this paper, we generalize this result for the case when Maiorana-McFarland bent functions <span>(f_i)</span> satisfy the condition <span>(f_1(x,y)+f_2(x,y)+f_3(x,y)+f_4(x,y)=s(y))</span> and provide a construction of new permutations with the <span>((mathcal {A}_m))</span> property from the old ones. Combining these two results, we obtain a recursive construction method of bent functions satisfying the dual bent condition. Moreover, we provide a generic condition on the Maiorana-McFarland bent functions <span>(f_1,f_2,f_3,f_4)</span> stemming from the permutations of <span>(mathbb {F}_2^m)</span> with the <span>((mathcal {A}_m))</span> property, such that the concatenation <span>(f=f_1||f_2||f_3||f_4)</span> does not belong, up to equivalence, to the Maiorana-McFarland class. Using monomial permutations <span>(pi _i)</span> of <span>(mathbb {F}_{2^m})</span> with the <span>((mathcal {A}_m))</span> property and monomial functions <span>(h_i)</span> on <span>(mathbb {F}_{2^m})</span>, we provide explicit constructions of such bent functions; a particular case of our result shows how one can construct bent functions from APN permutations, when <i>m</i> is odd. Finally, with our construction method, we explain how one can construct homogeneous cubic bent functions, noticing that only very few design methods of these objects are known.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-16DOI: 10.1007/s12095-024-00721-2
Deepmala Sharma, Mayasar Ahmad Dar
{"title":"On Generalized Nega-Hadamard Transform and Nega-crosscorrelation","authors":"Deepmala Sharma, Mayasar Ahmad Dar","doi":"10.1007/s12095-024-00721-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00721-2","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"113 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140967917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}