Pub Date : 2024-02-17DOI: 10.1007/s12095-024-00703-4
Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li
Cyclic codes are an important subclass of linear codes, they not only have good algebraic structure, but also are easy to be encoded and decoded. At present, researchers have constructed many optimal ternary cyclic codes, but the study on quinary cyclic codes is less developed. In this paper, by analyzing the solutions of certain equations over (mathbb {F}_{5^m}), we construct some optimal quinary cyclic codes with three zeros and with parameters ([5^m-1, 5^m-2-2m, 4]), ([5^m-1, 5^m-2-frac{3m}{2}, 4]). Moreover, the weight distributions of two classes of their duals are also provided.
{"title":"Optimal quinary cyclic codes with three zeros","authors":"Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li","doi":"10.1007/s12095-024-00703-4","DOIUrl":"https://doi.org/10.1007/s12095-024-00703-4","url":null,"abstract":"<p>Cyclic codes are an important subclass of linear codes, they not only have good algebraic structure, but also are easy to be encoded and decoded. At present, researchers have constructed many optimal ternary cyclic codes, but the study on quinary cyclic codes is less developed. In this paper, by analyzing the solutions of certain equations over <span>(mathbb {F}_{5^m})</span>, we construct some optimal quinary cyclic codes with three zeros and with parameters <span>([5^m-1, 5^m-2-2m, 4])</span>, <span>([5^m-1, 5^m-2-frac{3m}{2}, 4])</span>. Moreover, the weight distributions of two classes of their duals are also provided.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"138 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-05DOI: 10.1007/s12095-024-00700-7
Praveen Kumar, Sudhan Majhi, Subhabrata Paul
This paper presents a direct construction of novel type cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The proposed generalized Boolean function-based construction can generate CZCSS/SZCCS of length in the form of a non-power-of-two with variable set size (2^{n+1}), where each code has (2^{n+1}) constituent sequences. The proposed construction also yields cross Z-complementary pairs and cross Z-complementary sets with a larger number of constituent sequences compared to the existing work.
本文提出了一种直接构建新型交叉 Z 补充序列集(CZCSS)的方法,这种序列集的非周期性相关和在前端和尾端移位时都表现出零相关区。CZCSS 可视为对称 Z 补充码集(SZCCS)的扩展。现有的 SZCCS 结构对集合大小有限制,最大集合大小为 8,而本文提出的基于布尔函数的广义结构可以生成长度为非二幂形式的 CZCSS/SZCCS,集合大小为 (2^{n+1}),其中每个编码有 (2^{n+1})个组成序列。与现有工作相比,所提出的构造还能产生具有更多组成序列的交叉 Z 互补对和交叉 Z 互补集。
{"title":"A direct construction of cross z-complementary sequence sets with large set size","authors":"Praveen Kumar, Sudhan Majhi, Subhabrata Paul","doi":"10.1007/s12095-024-00700-7","DOIUrl":"https://doi.org/10.1007/s12095-024-00700-7","url":null,"abstract":"<p>This paper presents a direct construction of novel type cross Z-complementary sequence sets (CZCSSs), whose aperiodic correlation sums exhibit zero correlation zones at both the front-end and tail-end shifts. CZCSS can be regarded as an extension of the symmetrical Z-complementary code set (SZCCS). The available construction of SZCCS has a limitation on the set size, with a maximum set size of 8. The proposed generalized Boolean function-based construction can generate CZCSS/SZCCS of length in the form of a non-power-of-two with variable set size <span>(2^{n+1})</span>, where each code has <span>(2^{n+1})</span> constituent sequences. The proposed construction also yields cross Z-complementary pairs and cross Z-complementary sets with a larger number of constituent sequences compared to the existing work.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"157 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139764284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-05DOI: 10.1007/s12095-024-00699-x
Shitao Li, Minjia Shi, Huizhou Liu
Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity and information protection. In this paper, we give some methods for constructing LCD codes over small finite fields by modifying some typical methods for constructing linear codes. We show that all odd-like binary Euclidean LCD codes, ternary Euclidean LCD codes and quaternary Hermitian LCD codes can be constructed using the modified methods. Our results improve the known lower bounds on the largest minimum distances of LCD codes. Furthermore, we give two counterexamples to disprove the conjecture proposed by Bouyuklieva (Des. Codes Cryptogr. 89(11), 2445–2461 2021).
{"title":"Several constructions of optimal LCD codes over small finite fields","authors":"Shitao Li, Minjia Shi, Huizhou Liu","doi":"10.1007/s12095-024-00699-x","DOIUrl":"https://doi.org/10.1007/s12095-024-00699-x","url":null,"abstract":"<p>Linear complementary dual (LCD) codes are linear codes which intersect their dual codes trivially, which have been of interest and extensively studied due to their practical applications in computational complexity and information protection. In this paper, we give some methods for constructing LCD codes over small finite fields by modifying some typical methods for constructing linear codes. We show that all odd-like binary Euclidean LCD codes, ternary Euclidean LCD codes and quaternary Hermitian LCD codes can be constructed using the modified methods. Our results improve the known lower bounds on the largest minimum distances of LCD codes. Furthermore, we give two counterexamples to disprove the conjecture proposed by Bouyuklieva (Des. Codes Cryptogr. <b>89</b>(11), 2445–2461 2021).</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139764282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-26DOI: 10.1007/s12095-024-00697-z
Abstract
As a particular subclass of cyclic codes, BCH codes have wide applications in storage devices, communication systems, consumer electronics and other fields. However, parameters of BCH codes are unknown in general. In this paper, we investigate parameters of BCH codes of length (frac{q^m+1}{lambda }) where (lambda mid q+1).Some new techniques are employed to study the coset leaders. For any odd prime power q and (m=4,8), or (mge 12) and (mequiv 4~ (textrm{mod}~ 8)), the second, the third and the fourth largest coset leaders modulo (q^m+1) are determined, and the dimensions of some BCH codes of length (q^m+1) with large designed distances are given. For (1<lambda <q+1), the first few largest coset leaders and the coset leaders modulo (frac{q^m+1}{lambda }) in the range 1 to ( frac{ q^{lfloor (m+1)/2rfloor }}{lambda }) are studied, and the dimensions of some BCH codes of length (frac{q^m+1}{lambda }) are given as well. The BCH codes presented in this paper are LCD codes and have a sharper lower bound on the minimum distance than the well-known BCH bound.
{"title":"On the parameters of some LCD BCH codes over $$mathbb {F}_q$$ with length $$(q^m+1)/lambda $$","authors":"","doi":"10.1007/s12095-024-00697-z","DOIUrl":"https://doi.org/10.1007/s12095-024-00697-z","url":null,"abstract":"<h3>Abstract</h3> <p>As a particular subclass of cyclic codes, BCH codes have wide applications in storage devices, communication systems, consumer electronics and other fields. However, parameters of BCH codes are unknown in general. In this paper, we investigate parameters of BCH codes of length <span> <span>(frac{q^m+1}{lambda })</span> </span> where <span> <span>(lambda mid q+1)</span> </span>.Some new techniques are employed to study the coset leaders. For any odd prime power <em>q</em> and <span> <span>(m=4,8)</span> </span>, or <span> <span>(mge 12)</span> </span> and <span> <span>(mequiv 4~ (textrm{mod}~ 8))</span> </span>, the second, the third and the fourth largest coset leaders modulo <span> <span>(q^m+1)</span> </span> are determined, and the dimensions of some BCH codes of length <span> <span>(q^m+1)</span> </span> with large designed distances are given. For <span> <span>(1<lambda <q+1)</span> </span>, the first few largest coset leaders and the coset leaders modulo <span> <span>(frac{q^m+1}{lambda })</span> </span> in the range 1 to <span> <span>( frac{ q^{lfloor (m+1)/2rfloor }}{lambda })</span> </span> are studied, and the dimensions of some BCH codes of length <span> <span>(frac{q^m+1}{lambda })</span> </span> are given as well. The BCH codes presented in this paper are LCD codes and have a sharper lower bound on the minimum distance than the well-known BCH bound.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139580798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-25DOI: 10.1007/s12095-024-00698-y
Pierrick Méaux, Dibyendu Roy
In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an adversary flips a single bit of the key at an unknown position. Our analysis involves establishing complexity bounds for these attacks, contingent upon the cryptographic parameters of the Boolean functions employed as filters and the key size. Initially, we demonstrate how the concept of sensitivity enables the detection of the fault position using only a few keystream bits. This represents an enhancement over previous DFA methodologies applied to these ciphers. Subsequently, we leverage the properties of the filter’s derivatives to execute attacks. This approach is universally applicable to any filter, and we delineate specific attack strategies for the two function families previously implemented in these ciphers.
本文研究了针对 FLIP 和 FiLIP 两种流密码的差分故障攻击(DFA)。我们探讨了对手在未知位置翻转密钥单比特的故障模型。我们的分析包括建立这些攻击的复杂度边界,取决于作为过滤器使用的布尔函数的加密参数和密钥大小。首先,我们展示了灵敏度的概念如何使我们只需使用几个密钥流比特就能检测到故障位置。这比以前应用于这些密码的 DFA 方法更先进。随后,我们利用滤波器导数的特性来实施攻击。这种方法普遍适用于任何滤波器,我们还为这些密码中先前实现的两个函数族划分了具体的攻击策略。
{"title":"Theoretical differential fault attacks on FLIP and FiLIP","authors":"Pierrick Méaux, Dibyendu Roy","doi":"10.1007/s12095-024-00698-y","DOIUrl":"https://doi.org/10.1007/s12095-024-00698-y","url":null,"abstract":"<p>In this article, we examine Differential Fault Attacks (DFA) targeting two stream ciphers, FLIP and FiLIP. We explore the fault model where an adversary flips a single bit of the key at an unknown position. Our analysis involves establishing complexity bounds for these attacks, contingent upon the cryptographic parameters of the Boolean functions employed as filters and the key size. Initially, we demonstrate how the concept of sensitivity enables the detection of the fault position using only a few keystream bits. This represents an enhancement over previous DFA methodologies applied to these ciphers. Subsequently, we leverage the properties of the filter’s derivatives to execute attacks. This approach is universally applicable to any filter, and we delineate specific attack strategies for the two function families previously implemented in these ciphers.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-17DOI: 10.1007/s12095-024-00694-2
Xiao-Juan Wang, Tian Tian, Wen-Feng Qi
Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning NFSRs is to construct NFSRs with large periods. In this paper, a new NFSR structure whose period could be theoretically analyzed is proposed and studied, called GL-S-NFSR. A GL-S-NFSR is a selective cascade connection of a primitive Galois LFSR into a standard Galois NFSR with a linear simplified feedback function, where standard Galois NFSRs with linear simplified feedback functions are very useful in stream ciphers, e.g., Trivium. It is proved that the periods of the output sequences of a GL-S-NFSR are lower bounded by the product of all the Zsigmondy primes of ( 2^n-1 ) with a probability close to 1 under a weak assumption, and particularly, if n is a prime, then (2^n-1) divides the periods of the output sequences with a high probability, where n is the stage of the Galois LFSR. Besides, it is also proved that there are several registers satisfying that the periods are multiples of Zsigmondy primes without any assumption. Note that the main building block of Kreyvium consists of a standard Galois NFSR with a linear simplified feedback function and two pure cycling registers (PCRs). Periodic results on GL-S-NFSR are applied to Kreyvium by modifying one PCR to a primitive LFSR and the modified building block of Kreyvium is called M-Kreyvium. It is shown that the sequences involved in M-Kreyvium could have large periods with high probabilities.
{"title":"GL-S-NFSR: A new NFSR structure and its period properties","authors":"Xiao-Juan Wang, Tian Tian, Wen-Feng Qi","doi":"10.1007/s12095-024-00694-2","DOIUrl":"https://doi.org/10.1007/s12095-024-00694-2","url":null,"abstract":"<p>Recently nonlinear feedback shift registers (NFSRs) have frequently been used as basic building blocks for stream ciphers. A major problem concerning NFSRs is to construct NFSRs with large periods. In this paper, a new NFSR structure whose period could be theoretically analyzed is proposed and studied, called GL-S-NFSR. A GL-S-NFSR is a selective cascade connection of a primitive Galois LFSR into a standard Galois NFSR with a linear simplified feedback function, where standard Galois NFSRs with linear simplified feedback functions are very useful in stream ciphers, e.g., Trivium. It is proved that the periods of the output sequences of a GL-S-NFSR are lower bounded by the product of all the Zsigmondy primes of <span>( 2^n-1 )</span> with a probability close to 1 under a weak assumption, and particularly, if <i>n</i> is a prime, then <span>(2^n-1)</span> divides the periods of the output sequences with a high probability, where <i>n</i> is the stage of the Galois LFSR. Besides, it is also proved that there are several registers satisfying that the periods are multiples of Zsigmondy primes without any assumption. Note that the main building block of Kreyvium consists of a standard Galois NFSR with a linear simplified feedback function and two pure cycling registers (PCRs). Periodic results on GL-S-NFSR are applied to Kreyvium by modifying one PCR to a primitive LFSR and the modified building block of Kreyvium is called M-Kreyvium. It is shown that the sequences involved in M-Kreyvium could have large periods with high probabilities.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-17DOI: 10.1007/s12095-024-00695-1
Jinghui Zhao, Xiuling Shan, Zihong Tian
A repairable ramp scheme is a ramp scheme in which a player can securely reconstruct a lost share with the help from a subset of players. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the security of the ramp scheme. Distribution designs were introduced by Stinson and Wei (Des. Codes Cryptogr. 86, 195–210 2018) and can be used to construct repairable ramp schemes. In this paper, we first give the definitions of a (varvec{(tau _{1},tau _{2},l_{1},l_{2})})-distribution design and a repairable ramp scheme. And we use anti-Pasch Steiner triple systems as distribution designs to construct repairable ramp schemes. We determine the existence of an anti-Pasch Steiner triple system (QFSTS(varvec{(v)})) with a minimum basic repairing set for (varvec{vequiv 1,3pmod 6}), (varvec{vgeqslant 9}) and (varvec{vne 13}). Then we obtain a (varvec{(2,4,n,3)})-repairable ramp scheme containing (varvec{n}) players with (varvec{lceil frac{2v}{3}rceil leqslant nleqslant frac{v(v-1)}{6}}).
{"title":"Combinatorial constructions of repairable ramp schemes","authors":"Jinghui Zhao, Xiuling Shan, Zihong Tian","doi":"10.1007/s12095-024-00695-1","DOIUrl":"https://doi.org/10.1007/s12095-024-00695-1","url":null,"abstract":"<p>A repairable ramp scheme is a ramp scheme in which a player can securely reconstruct a lost share with the help from a subset of players. This will take place without the participation of the dealer who set up the scheme. The repairing protocol should not compromise the security of the ramp scheme. Distribution designs were introduced by Stinson and Wei (Des. Codes Cryptogr. 86, 195–210 2018) and can be used to construct repairable ramp schemes. In this paper, we first give the definitions of a <span>(varvec{(tau _{1},tau _{2},l_{1},l_{2})})</span>-distribution design and a repairable ramp scheme. And we use anti-Pasch Steiner triple systems as distribution designs to construct repairable ramp schemes. We determine the existence of an anti-Pasch Steiner triple system (QFSTS<span>(varvec{(v)})</span>) with a minimum basic repairing set for <span>(varvec{vequiv 1,3pmod 6})</span>, <span>(varvec{vgeqslant 9})</span> and <span>(varvec{vne 13})</span>. Then we obtain a <span>(varvec{(2,4,n,3)})</span>-repairable ramp scheme containing <span>(varvec{n})</span> players with <span>(varvec{lceil frac{2v}{3}rceil leqslant nleqslant frac{v(v-1)}{6}})</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139497354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-05DOI: 10.1007/s12095-023-00693-9
Prity Kumari, Karam Ratan Singh
The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is (n-1).
{"title":"Re-keying analysis in group key management of wireless sensor networks","authors":"Prity Kumari, Karam Ratan Singh","doi":"10.1007/s12095-023-00693-9","DOIUrl":"https://doi.org/10.1007/s12095-023-00693-9","url":null,"abstract":"<p>The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is <span>(n-1)</span>.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139374108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-03DOI: 10.1007/s12095-023-00692-w
Shuhui Shen, Xiaojun Zhang
In this paper, we study a class of binary sequences with two-valued non-zero periodic autocorrelation sum and good periodic crosscorrelation sum as well as balanced properties. We make use of the sequences obtained in (No, J. et al., IEEE Trans. Inform. Theory 44(3), 1278-1282 2001) and adopt the extraction method similar to (Lüke, H. IEEE Trans. Inform. Theory 43(1) 1997). The new sequences are proven to be balanced or almost balanced. Based on these correlation and balanced properties, an important application is to construct Hadamard matrices of order (p+1) for (pequiv 3~()mod 4) and (2p+2) for (pequiv 1~()mod 4). Some examples are shown to verify the theoretical results.
在本文中,我们研究了一类具有两值非零周期自相关和、良好周期交叉相关和以及平衡特性的二进制序列。我们利用在(No, J. et al.Inform.Theory 44(3), 1278-1282 2001)中获得的序列,并采用与(Lüke, H. IEEE Trans.Inform.Theory 43(1) 1997)。新序列被证明是平衡或几乎平衡的。基于这些相关性和平衡性,一个重要的应用就是为 (pequiv 3~()mod 4) 构造秩为 (p+1) 的 Hadamard 矩阵,为 (pequiv 1~()mod 4) 构造秩为 (2p+2) 的 Hadamard 矩阵。通过一些例子来验证理论结果。
{"title":"A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum","authors":"Shuhui Shen, Xiaojun Zhang","doi":"10.1007/s12095-023-00692-w","DOIUrl":"https://doi.org/10.1007/s12095-023-00692-w","url":null,"abstract":"<p>In this paper, we study a class of binary sequences with two-valued non-zero periodic autocorrelation sum and good periodic crosscorrelation sum as well as balanced properties. We make use of the sequences obtained in (No, J. et al., IEEE Trans. Inform. Theory 44(3), 1278-1282 2001) and adopt the extraction method similar to (Lüke, H. IEEE Trans. Inform. Theory 43(1) 1997). The new sequences are proven to be balanced or almost balanced. Based on these correlation and balanced properties, an important application is to construct Hadamard matrices of order <span>(p+1)</span> for <span>(pequiv 3~()</span>mod 4) and <span>(2p+2)</span> for <span>(pequiv 1~()</span>mod 4). Some examples are shown to verify the theoretical results.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139093770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}