Pub Date : 2024-04-12DOI: 10.1007/s12095-024-00714-1
Xing Liu
{"title":"Correction: Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation","authors":"Xing Liu","doi":"10.1007/s12095-024-00714-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00714-1","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 12","pages":"647"},"PeriodicalIF":0.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140710647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1007/s12095-024-00713-2
Giovanni Falcone, Giuseppe Filippone
For an (imaginary) hyperelliptic curve (mathcal {H}) of genus g, with a Weierstrass point (Omega ), taken as the point at infinity, we determine a basis of the Riemann-Roch space (mathcal {L}(Delta + m Omega )), where (Delta ) is of degree zero, directly from the Mumford representation of (Delta ). This provides in turn a generating matrix of a Goppa code.
对于一条属g的(虚)超椭圆曲线(mathcal {H}),有一个魏尔斯特拉斯点(Weierstrass point (Omega)),取为无穷远处的点;我们直接从(Delta )的芒福德表示法确定黎曼-罗赫空间(Riemann-Roch space)(mathcal {L}(Delta + m Omega ))的基,其中(Delta )为零度。这反过来又提供了一个戈帕编码的生成矩阵。
{"title":"Mumford representation and Riemann-Roch space of a divisor on a hyperelliptic curve","authors":"Giovanni Falcone, Giuseppe Filippone","doi":"10.1007/s12095-024-00713-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00713-2","url":null,"abstract":"<p>For an (imaginary) hyperelliptic curve <span>(mathcal {H})</span> of genus <i>g</i>, with a Weierstrass point <span>(Omega )</span>, taken as the point at infinity, we determine a basis of the Riemann-Roch space <span>(mathcal {L}(Delta + m Omega ))</span>, where <span>(Delta )</span> is of degree zero, directly from the Mumford representation of <span>(Delta )</span>. This provides in turn a generating matrix of a Goppa code.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1007/s12095-024-00708-z
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi
Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128.
{"title":"New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128","authors":"Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi","doi":"10.1007/s12095-024-00708-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00708-z","url":null,"abstract":"<p>Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140599233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-22DOI: 10.1007/s12095-024-00710-5
Hongyang Xiao, Xiwang Cao
Bent functions have a number of practical applications in cryptography, coding theory, and other fields. Fourier transform is a key tool to study bent functions on finite abelian groups. Using Fourier transforms, in this paper, we first present two necessary and sufficient conditions on the existence of bent functions via faithful actions of finite abelian groups and then show two constructions of sequences with ideal auto-correlation (SIACs). In addition, we construct a periodic complementary sequence set (PCSS) by rearranging a periodic multiple shift sequence (PMSS) corresponding to a bent function on a finite abelian group. Some concrete constructions of SIACs and PCSSs are provided to illustrate the efficiency of our methods.
{"title":"Sequences with ideal auto-correlation derived from group actions","authors":"Hongyang Xiao, Xiwang Cao","doi":"10.1007/s12095-024-00710-5","DOIUrl":"https://doi.org/10.1007/s12095-024-00710-5","url":null,"abstract":"<p>Bent functions have a number of practical applications in cryptography, coding theory, and other fields. Fourier transform is a key tool to study bent functions on finite abelian groups. Using Fourier transforms, in this paper, we first present two necessary and sufficient conditions on the existence of bent functions via faithful actions of finite abelian groups and then show two constructions of sequences with ideal auto-correlation (SIACs). In addition, we construct a periodic complementary sequence set (PCSS) by rearranging a periodic multiple shift sequence (PMSS) corresponding to a bent function on a finite abelian group. Some concrete constructions of SIACs and PCSSs are provided to illustrate the efficiency of our methods.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"306 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140202440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-15DOI: 10.1007/s12095-024-00707-0
Gülsüm Gözde Yılmazgüç, Javier de la Cruz, Edgar Martínez-Moro
This paper studies Abelian and consta-Abelian polyadic codes over rings defined as affine algebras over chain rings. For this purpose, we use the classical construction via splittings and multipliers of the underlying Abelian group. We also derive some results on the structure of the associated polyadic codes and the number of codes under these conditions.
{"title":"Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring","authors":"Gülsüm Gözde Yılmazgüç, Javier de la Cruz, Edgar Martínez-Moro","doi":"10.1007/s12095-024-00707-0","DOIUrl":"https://doi.org/10.1007/s12095-024-00707-0","url":null,"abstract":"<p>This paper studies Abelian and consta-Abelian polyadic codes over rings defined as affine algebras over chain rings. For this purpose, we use the classical construction via splittings and multipliers of the underlying Abelian group. We also derive some results on the structure of the associated polyadic codes and the number of codes under these conditions.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-09DOI: 10.1007/s12095-024-00702-5
Florian Luca, Santanu Sarkar, Pantelimon Stănică
In 1953, Carlitz showed that all permutation polynomials over ({mathbb F}_q), where (q>2) is a power of a prime, are generated by the special permutation polynomials (x^{q-2}) (the inversion) and ( ax+b) (affine functions, where (0ne a, bin {mathbb F}_q)). Recently, Nikova, Nikov and Rijmen (2019) proposed an algorithm (NNR) to find a decomposition of the inverse function in quadratics, and computationally covered all dimensions (nle 16). Petrides (2023) theoretically found a class of integers for which it is easy to decompose the inverse into quadratics, and improved the NNR algorithm, thereby extending the computation up to (nle 32). In this paper, we extend Petrides’ result, as well as we propose a new number theoretical approach, which allows us to easily cover all (surely, odd) exponents up to 250, at least.
1953年,Carlitz证明了({mathbb F}_q)上的所有置换多项式,其中(q>2)是素数的幂,由特殊置换多项式(x^{q-2})(反函数)和( ax+b)(仿射函数,其中(0ne a, bin {mathbb F}_q))生成。最近,Nikova、Nikov和Rijmen(2019)提出了一种算法(NNR)来寻找二次函数的反函数分解,并在计算上覆盖了所有维度(nle 16)。Petrides (2023)从理论上找到了一类很容易将反函数分解成二次函数的整数,并改进了NNR算法,从而将计算扩展到了(nle 32)。在本文中,我们扩展了 Petrides 的结果,并提出了一种新的数论方法,使我们能够轻松地涵盖至少 250 以下的所有(肯定的奇数)指数。
{"title":"Representing the inverse map as a composition of quadratics in a finite field of characteristic 2","authors":"Florian Luca, Santanu Sarkar, Pantelimon Stănică","doi":"10.1007/s12095-024-00702-5","DOIUrl":"https://doi.org/10.1007/s12095-024-00702-5","url":null,"abstract":"<p>In 1953, Carlitz showed that all permutation polynomials over <span>({mathbb F}_q)</span>, where <span>(q>2)</span> is a power of a prime, are generated by the special permutation polynomials <span>(x^{q-2})</span> (the inversion) and <span>( ax+b)</span> (affine functions, where <span>(0ne a, bin {mathbb F}_q)</span>). Recently, Nikova, Nikov and Rijmen (2019) proposed an algorithm (NNR) to find a decomposition of the inverse function in quadratics, and computationally covered all dimensions <span>(nle 16)</span>. Petrides (2023) theoretically found a class of integers for which it is easy to decompose the inverse into quadratics, and improved the NNR algorithm, thereby extending the computation up to <span>(nle 32)</span>. In this paper, we extend Petrides’ result, as well as we propose a new number theoretical approach, which allows us to easily cover all (surely, odd) exponents up to 250, at least.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140098240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1007/s12095-024-00706-1
Fengwei Li, Fanhui Meng, Ziling Heng, Qin Yue
Let (mathbb {F}_q) be a finite field with q elements, where q is a power of a prime p. In this paper, we obtain an improvement on Weil bounds for character sums associated to a polynomial f(x) over (mathbb {F}_q ), which extends the results of Wan et al. (Des. Codes Cryptogr. 81, 459–468, 2016) and Wu et al. (Des. Codes Cryptogr. 90, 2813–2821, 2022).
{"title":"An improvement on Weil bounds for character sums of polynomials over finite fields","authors":"Fengwei Li, Fanhui Meng, Ziling Heng, Qin Yue","doi":"10.1007/s12095-024-00706-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00706-1","url":null,"abstract":"<p>Let <span>(mathbb {F}_q)</span> be a finite field with <i>q</i> elements, where <i>q</i> is a power of a prime <i>p</i>. In this paper, we obtain an improvement on Weil bounds for character sums associated to a polynomial <i>f</i>(<i>x</i>) over <span>(mathbb {F}_q )</span>, which extends the results of Wan et al. (Des. Codes Cryptogr. <b>81</b>, 459–468, 2016) and Wu et al. (Des. Codes Cryptogr. <b>90</b>, 2813–2821, 2022).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"300 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-27DOI: 10.1007/s12095-024-00704-3
Canze Zhu, Qunying Liao
In this paper, we not only give the parity check matrix of the [1, 0]-twisted generalized Reed-Solomon (in short, TGRS) code, but also determine the weight distribution. Especially, we show that the [1, 0]-TGRS code is not GRS or EGRS. Furthermore, we present a sufficient and necessary condition for any punctured code of the [1, 0]-TGRS code to be self-orthogonal, and then construct several classes of self-dual or almost self-dual [1, 0]-TGRS codes. Finally, on the basis of these self-dual or almost self-dual [1, 0]-TGRS codes, we obtain some LCD [1, 0]-TGRS codes.
{"title":"The [1, 0]-twisted generalized Reed-Solomon code","authors":"Canze Zhu, Qunying Liao","doi":"10.1007/s12095-024-00704-3","DOIUrl":"https://doi.org/10.1007/s12095-024-00704-3","url":null,"abstract":"<p>In this paper, we not only give the parity check matrix of the [1, 0]-twisted generalized Reed-Solomon (in short, TGRS) code, but also determine the weight distribution. Especially, we show that the [1, 0]-TGRS code is not GRS or EGRS. Furthermore, we present a sufficient and necessary condition for any punctured code of the [1, 0]-TGRS code to be self-orthogonal, and then construct several classes of self-dual or almost self-dual [1, 0]-TGRS codes. Finally, on the basis of these self-dual or almost self-dual [1, 0]-TGRS codes, we obtain some LCD [1, 0]-TGRS codes.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139978007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-24DOI: 10.1007/s12095-024-00701-6
Erzhong Xue, Zilong Wang, Jinjin Chai
The sequence pairs of length (2^{m}) projected from Type-II and Type-III/II complementary array pairs of size (2times 2times cdots times 2) (m-times) form Type-II and Type-III complementary sequence pairs, respectively. An exhaustive search for binary Type-II and Type-III complementary sequence pairs of small lengths (2^{m}) ((m=1,2,3,4)) shows that they are all projected from the aforementioned complementary array pairs, whose algebraic normal forms satisfy specified expressions. It’s natural to ask whether the conclusion holds for all m. In this paper, we proved that these expressions of algebraic normal forms determine all the binary Type-II and Type-III/II complementary array pairs of size (2times 2times cdots times 2).
{"title":"Boolean functions of binary Type-II and Type-III/II complementary array pairs","authors":"Erzhong Xue, Zilong Wang, Jinjin Chai","doi":"10.1007/s12095-024-00701-6","DOIUrl":"https://doi.org/10.1007/s12095-024-00701-6","url":null,"abstract":"<p>The sequence pairs of length <span>(2^{m})</span> projected from Type-II and Type-III/II complementary array pairs of size <span>(2times 2times cdots times 2)</span> (<i>m</i>-times) form Type-II and Type-III complementary sequence pairs, respectively. An exhaustive search for binary Type-II and Type-III complementary sequence pairs of small lengths <span>(2^{m})</span> (<span>(m=1,2,3,4)</span>) shows that they are all projected from the aforementioned complementary array pairs, whose algebraic normal forms satisfy specified expressions. It’s natural to ask whether the conclusion holds for all <i>m</i>. In this paper, we proved that these expressions of algebraic normal forms determine all the binary Type-II and Type-III/II complementary array pairs of size <span>(2times 2times cdots times 2)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139953628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-21DOI: 10.1007/s12095-024-00705-2
Markus Grassl, Ferruh Özbudak, Buket Özkaya, Burcu Gülmez Temür
In this paper, we address an open problem posed by Bai and Xia in [2]. We study polynomials of the form (f(x)=x^{4q+1}+lambda _1x^{5q}+lambda _2x^{q+4}) over the finite field ({mathbb F}_{5^{k}}), which are not quasi-multiplicative equivalent to any of the known permutation polynomials in the literature. We find necessary and sufficient conditions on (lambda _1, lambda _2 in {mathbb F}_{5^{k}}) so that f(x) is a permutation monomial, binomial, or trinomial of ({mathbb F}_{5^{2k}}).
{"title":"Complete characterization of a class of permutation trinomials in characteristic five","authors":"Markus Grassl, Ferruh Özbudak, Buket Özkaya, Burcu Gülmez Temür","doi":"10.1007/s12095-024-00705-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00705-2","url":null,"abstract":"<p>In this paper, we address an open problem posed by Bai and Xia in [2]. We study polynomials of the form <span>(f(x)=x^{4q+1}+lambda _1x^{5q}+lambda _2x^{q+4})</span> over the finite field <span>({mathbb F}_{5^{k}})</span>, which are not quasi-multiplicative equivalent to any of the known permutation polynomials in the literature. We find necessary and sufficient conditions on <span>(lambda _1, lambda _2 in {mathbb F}_{5^{k}})</span> so that <i>f</i>(<i>x</i>) is a permutation monomial, binomial, or trinomial of <span>({mathbb F}_{5^{2k}})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139921188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}