首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
The revised boomerang connectivity tables and their connection to the difference distribution table
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-02-01 DOI: 10.1007/s10623-025-01582-3
Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stănică

It is well-known that functions over finite fields play a crucial role in designing substitution boxes (S-boxes) in modern block ciphers. In order to analyze the security of an S-box, recently, three new tables have been introduced: the Extended Boomerang Connectivity Table (EBCT), the Lower Boomerang Connectivity Table (LBCT), and the Upper Boomerang Connectivity Table (UBCT). In fact, these tables offer improved methods over the usual Boomerang Connectivity Table (BCT) for analyzing the security of S-boxes against boomerang-style attacks. Here, we put in context these new EBCT, LBCT, and UBCT concepts by connecting them to the DDT for a differentially (delta )-uniform function and also determine the EBCT, LBCT, and UBCT entries of three classes of differentially 4-uniform power permutations, namely, Gold, Kasami and Bracken–Leander. We also determine the Double Boomerang Connectivity Table (DBCT) entries of the Gold function. As byproducts of our approach, we obtain some previously published results quite easily.

{"title":"The revised boomerang connectivity tables and their connection to the difference distribution table","authors":"Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stănică","doi":"10.1007/s10623-025-01582-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01582-3","url":null,"abstract":"<p>It is well-known that functions over finite fields play a crucial role in designing substitution boxes (S-boxes) in modern block ciphers. In order to analyze the security of an S-box, recently, three new tables have been introduced: the Extended Boomerang Connectivity Table (EBCT), the Lower Boomerang Connectivity Table (LBCT), and the Upper Boomerang Connectivity Table (UBCT). In fact, these tables offer improved methods over the usual Boomerang Connectivity Table (BCT) for analyzing the security of S-boxes against boomerang-style attacks. Here, we put in context these new EBCT, LBCT, and UBCT concepts by connecting them to the DDT for a differentially <span>(delta )</span>-uniform function and also determine the EBCT, LBCT, and UBCT entries of three classes of differentially 4-uniform power permutations, namely, Gold, Kasami and Bracken–Leander. We also determine the Double Boomerang Connectivity Table (DBCT) entries of the Gold function. As byproducts of our approach, we obtain some previously published results quite easily.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-02-01 DOI: 10.1007/s10623-025-01579-y
Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro

Side Channel Attacks (SCA) exploit physical information leakage from devices performing cryptographic operations, posing significant security threats. While SCA has been extensively studied in the context of block ciphers, similar analyses on stream ciphers and constructions like authenticated encryption are less explored. In this paper, we present a novel enhancement to existing SCA techniques based on the hamming weight model for stream ciphers. We have identified critical oversights in previous SCA attack models, allowing us to introduce additional inequalities that enhance the model’s effectiveness. For TRIVIUM and GRAIN-128-AEAD, we demonstrate that a practical state recovery attack can be achieved in significantly less time than existing attacks on the HW/32 model. Furthermore, we show that our improved model is capable of handling the HW/64 model and can recover the state even with noisy traces within a few hours. Additionally, we extend our model to the authenticated encryption schemes ACORN-128 v3 and ASCON-128a, demonstrating its broader applicability.

{"title":"Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a","authors":"Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro","doi":"10.1007/s10623-025-01579-y","DOIUrl":"https://doi.org/10.1007/s10623-025-01579-y","url":null,"abstract":"<p>Side Channel Attacks (SCA) exploit physical information leakage from devices performing cryptographic operations, posing significant security threats. While SCA has been extensively studied in the context of block ciphers, similar analyses on stream ciphers and constructions like authenticated encryption are less explored. In this paper, we present a novel enhancement to existing SCA techniques based on the hamming weight model for stream ciphers. We have identified critical oversights in previous SCA attack models, allowing us to introduce additional inequalities that enhance the model’s effectiveness. For TRIVIUM and GRAIN-128-AEAD, we demonstrate that a practical state recovery attack can be achieved in significantly less time than existing attacks on the HW/32 model. Furthermore, we show that our improved model is capable of handling the HW/64 model and can recover the state even with noisy traces within a few hours. Additionally, we extend our model to the authenticated encryption schemes ACORN-128 v3 and ASCON-128a, demonstrating its broader applicability.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"50 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perturbation-resilient sets for dynamic service balancing
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-31 DOI: 10.1007/s10623-025-01565-4
Jin Sima, Chao Pan, Olgica Milenkovic

A combinatorial trade is a pair of sets of blocks of elements that can be exchanged while preserving relevant subset intersection constraints. The class of balanced and swap-robust minimal trades was proposed in Pan et al. (in: 2022 IEEE International Symposium on Information Theory (ISIT), IEEE, pp 2385–2390, 2022) for exchanging blocks of data chunks stored on distributed storage systems in an access- and load-balanced manner. More precisely, data chunks in the trades of interest are labeled by popularity ranks and the blocks are required to have both balanced overall popularity and stability properties with respect to swaps in chunk popularities. The original construction of such trades relied on computer search and paired balanced sets obtained through iterative combining of smaller sets that have provable stability guarantees. To reduce the substantial gap between the results of prior approaches and the known theoretical lower bound, we present new analytical upper and lower bounds on the minimal disbalance of blocks introduced by limited-magnitude popularity ranking swaps. Our constructive and near-optimal approach relies on pairs of graphs whose vertices are two balanced sets with edges/arcs that capture the balance and potential balance changes induced by limited-magnitude popularity swaps. In particular, we show that if we start with carefully selected balanced trades and limit the magnitude of rank swaps to one, the new upper and lower bound on the maximum block disbalance caused by a swap only differ by a factor of 1.07. We also extend these results for larger popularity swap magnitudes.

{"title":"Perturbation-resilient sets for dynamic service balancing","authors":"Jin Sima, Chao Pan, Olgica Milenkovic","doi":"10.1007/s10623-025-01565-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01565-4","url":null,"abstract":"<p>A combinatorial trade is a pair of sets of blocks of elements that can be exchanged while preserving relevant subset intersection constraints. The class of balanced and swap-robust minimal trades was proposed in Pan et al. (in: 2022 IEEE International Symposium on Information Theory (ISIT), IEEE, pp 2385–2390, 2022) for exchanging blocks of data chunks stored on distributed storage systems in an access- and load-balanced manner. More precisely, data chunks in the trades of interest are labeled by popularity ranks and the blocks are required to have both balanced overall popularity and stability properties with respect to swaps in chunk popularities. The original construction of such trades relied on computer search and paired balanced sets obtained through iterative combining of smaller sets that have provable stability guarantees. To reduce the substantial gap between the results of prior approaches and the known theoretical lower bound, we present new analytical upper and lower bounds on the minimal disbalance of blocks introduced by limited-magnitude popularity ranking swaps. Our constructive and near-optimal approach relies on pairs of graphs whose vertices are two balanced sets with edges/arcs that capture the balance and potential balance changes induced by limited-magnitude popularity swaps. In particular, we show that if we start with carefully selected balanced trades and limit the magnitude of rank swaps to one, the new upper and lower bound on the maximum block disbalance caused by a swap only differ by a factor of 1.07. We also extend these results for larger popularity swap magnitudes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143072631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear complementary pairs of skew constacyclic codes
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-31 DOI: 10.1007/s10623-025-01568-1
F. J. Lobillo, José Manuel Muñoz

Linear complementary pairs (LCPs) of codes have been studied since they were introduced in the context of discussing mitigation measures against possible hardware attacks to integrated circuits. In this situation, the security parameters for LCPs of codes are defined as the (Hamming) distance and the dual distance of the codes in the pair. We study the properties of LCPs of skew constacyclic codes, since their algebraic structure provides tools for studying their duals and their distances. As a result, we give a characterization for those pairs, as well as multiple results that lead to constructing pairs with designed security parameters. We extend skew BCH codes to a constacyclic context and show that an LCP of codes can be immediately constructed from a skew BCH constacyclic code. Additionally, we describe a Hamming weight-preserving automorphism group in the set of skew constacyclic codes, which can be used for constructing LCPs of codes.

{"title":"Linear complementary pairs of skew constacyclic codes","authors":"F. J. Lobillo, José Manuel Muñoz","doi":"10.1007/s10623-025-01568-1","DOIUrl":"https://doi.org/10.1007/s10623-025-01568-1","url":null,"abstract":"<p>Linear complementary pairs (LCPs) of codes have been studied since they were introduced in the context of discussing mitigation measures against possible hardware attacks to integrated circuits. In this situation, the security parameters for LCPs of codes are defined as the (Hamming) distance and the dual distance of the codes in the pair. We study the properties of LCPs of skew constacyclic codes, since their algebraic structure provides tools for studying their duals and their distances. As a result, we give a characterization for those pairs, as well as multiple results that lead to constructing pairs with designed security parameters. We extend skew BCH codes to a constacyclic context and show that an LCP of codes can be immediately constructed from a skew BCH constacyclic code. Additionally, we describe a Hamming weight-preserving automorphism group in the set of skew constacyclic codes, which can be used for constructing LCPs of codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143071705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On vectorial functions with maximal number of bent components
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-31 DOI: 10.1007/s10623-025-01569-0
Xianhong Xie, Yi Ouyang, Honggang Hu

We study vectorial functions with maximal number of bent components in this paper. We first study the Walsh transform and nonlinearity of (F(x)=x^{2^e}h(textrm{Tr}_{2^{2m}/2^m}(x))), where (ege 0) and h(x) is a permutation over ({mathbb {F}}_{2^m}). If h(x) is monomial, the nonlinearity of F(x) is shown to be at most ( 2^{2,m-1}-2^{lfloor frac{3,m}{2}rfloor }) and some non-plateaued and plateaued functions attaining the upper bound are found. If h(x) is linear, the exact nonlinearity of F(x) is determined. Secondly, we give a construction of vectorial functions with maximal number of bent components from known ones, thus obtain two new classes from the Niho class and the Maiorana-McFarland class. Our construction gives a quadratic vectorial function that is not equivalent to the known functions of the form xh(x), and also contains vectorial functions outside the completed Maiorana-McFarland class. Finally, we show that the vectorial function (F: {mathbb {F}}_{2^{2m}}rightarrow {mathbb {F}}_{2^{2m}}), (xmapsto x^{2^m+1}+x^{2^i+1}) has maximal number of bent components if and only if (i=0).

{"title":"On vectorial functions with maximal number of bent components","authors":"Xianhong Xie, Yi Ouyang, Honggang Hu","doi":"10.1007/s10623-025-01569-0","DOIUrl":"https://doi.org/10.1007/s10623-025-01569-0","url":null,"abstract":"<p>We study vectorial functions with maximal number of bent components in this paper. We first study the Walsh transform and nonlinearity of <span>(F(x)=x^{2^e}h(textrm{Tr}_{2^{2m}/2^m}(x)))</span>, where <span>(ege 0)</span> and <i>h</i>(<i>x</i>) is a permutation over <span>({mathbb {F}}_{2^m})</span>. If <i>h</i>(<i>x</i>) is monomial, the nonlinearity of <i>F</i>(<i>x</i>) is shown to be at most <span>( 2^{2,m-1}-2^{lfloor frac{3,m}{2}rfloor })</span> and some non-plateaued and plateaued functions attaining the upper bound are found. If <i>h</i>(<i>x</i>) is linear, the exact nonlinearity of <i>F</i>(<i>x</i>) is determined. Secondly, we give a construction of vectorial functions with maximal number of bent components from known ones, thus obtain two new classes from the Niho class and the Maiorana-McFarland class. Our construction gives a quadratic vectorial function that is not equivalent to the known functions of the form <i>xh</i>(<i>x</i>), and also contains vectorial functions outside the completed Maiorana-McFarland class. Finally, we show that the vectorial function <span>(F: {mathbb {F}}_{2^{2m}}rightarrow {mathbb {F}}_{2^{2m}})</span>, <span>(xmapsto x^{2^m+1}+x^{2^i+1})</span> has maximal number of bent components if and only if <span>(i=0)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143071707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-30 DOI: 10.1007/s10623-025-01574-3
Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang

Due to the operational efficiency and lower computational costs of the Chebyshev polynomial compared to ECC, this chaotic system has attracted widespread attention in public key cryptography. However, the single recurrence coefficient limitation and inherent short-period flaw, often render the Chebyshev polynomials cryptosystem ineffective against various attacks, such as Exhaustive Attacks and Ciphertext-Only Attacks. To address these vulnerabilities, the Multi-Dimensional General Chebyshev Polynomials (MDGCP) is developed in this study by parameterizing the coefficient of the Chebyshev polynomial over finite fields and converting its variable from one dimension to multiple dimensions. The MDGCP preserves the semigroup property and significantly reduces the likelihood of short periods by imposing a simple and explicit restriction on the initial state matrix. This enhancement improves the complexity and pluralism of the Chebyshev polynomial, thereby increasing its applicability in the design of public key cryptosystems. Consequently, a novel public key encryption algorithm based on MDGCP is proposed. Theoretical analyses and experimental results reveal that the proposed algorithm possesses better abilities than existing public key encryption algorithms based on Chebyshev polynomial in resisting exhaustive attacks and Ciphertext-only attacks.

{"title":"A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial","authors":"Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang","doi":"10.1007/s10623-025-01574-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01574-3","url":null,"abstract":"<p>Due to the operational efficiency and lower computational costs of the Chebyshev polynomial compared to ECC, this chaotic system has attracted widespread attention in public key cryptography. However, the single recurrence coefficient limitation and inherent short-period flaw, often render the Chebyshev polynomials cryptosystem ineffective against various attacks, such as Exhaustive Attacks and Ciphertext-Only Attacks. To address these vulnerabilities, the Multi-Dimensional General Chebyshev Polynomials (MDGCP) is developed in this study by parameterizing the coefficient of the Chebyshev polynomial over finite fields and converting its variable from one dimension to multiple dimensions. The MDGCP preserves the semigroup property and significantly reduces the likelihood of short periods by imposing a simple and explicit restriction on the initial state matrix. This enhancement improves the complexity and pluralism of the Chebyshev polynomial, thereby increasing its applicability in the design of public key cryptosystems. Consequently, a novel public key encryption algorithm based on MDGCP is proposed. Theoretical analyses and experimental results reveal that the proposed algorithm possesses better abilities than existing public key encryption algorithms based on Chebyshev polynomial in resisting exhaustive attacks and Ciphertext-only attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"45 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143071706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On polynomials over finite fields that are free of binomials
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-29 DOI: 10.1007/s10623-025-01573-4
Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas

Let (mathbb {F}_q) be the finite field with q elements, where q is a power of a prime p. Given a monic polynomial (f in mathbb {F}_q[x]) that is not divisible by x, there exists a positive integer (e=e(f)) such that f(x) divides the binomial (x^e-1) and e is minimal with this property. The integer e is commonly known as the order of f and we write (textrm{ord}(f)=e). Motivated by a recent work of the second author on primitive k-normal elements over finite fields, in this paper we introduce the concept of polynomials free of binomials. These are the polynomials (f in mathbb {F}_q[x]), not divisible by x, such that f(x) does not divide any binomial (x^d-delta in mathbb {F}_q[x]) with (1le d<textrm{ord}(f)). We obtain some general results on polynomials free of binomials and we focus on the problem of describing the set of degrees of the polynomials that are free of binomials and whose order is fixed. In particular, we completely describe such set when the order equals a positive integer (n>1) whose prime factors divide (p(q-1)). Moreover, we also provide a correspondence between the polynomials that are free of binomials and cyclic codes that cannot be submerged into smaller constacyclic codes.

{"title":"On polynomials over finite fields that are free of binomials","authors":"Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas","doi":"10.1007/s10623-025-01573-4","DOIUrl":"https://doi.org/10.1007/s10623-025-01573-4","url":null,"abstract":"<p>Let <span>(mathbb {F}_q)</span> be the finite field with <i>q</i> elements, where <i>q</i> is a power of a prime <i>p</i>. Given a monic polynomial <span>(f in mathbb {F}_q[x])</span> that is not divisible by <i>x</i>, there exists a positive integer <span>(e=e(f))</span> such that <i>f</i>(<i>x</i>) divides the binomial <span>(x^e-1)</span> and <i>e</i> is minimal with this property. The integer <i>e</i> is commonly known as the order of <i>f</i> and we write <span>(textrm{ord}(f)=e)</span>. Motivated by a recent work of the second author on primitive <i>k</i>-normal elements over finite fields, in this paper we introduce the concept of polynomials free of binomials. These are the polynomials <span>(f in mathbb {F}_q[x])</span>, not divisible by <i>x</i>, such that <i>f</i>(<i>x</i>) does not divide any binomial <span>(x^d-delta in mathbb {F}_q[x])</span> with <span>(1le d&lt;textrm{ord}(f))</span>. We obtain some general results on polynomials free of binomials and we focus on the problem of describing the set of degrees of the polynomials that are free of binomials and whose order is fixed. In particular, we completely describe such set when the order equals a positive integer <span>(n&gt;1)</span> whose prime factors divide <span>(p(q-1))</span>. Moreover, we also provide a correspondence between the polynomials that are free of binomials and cyclic codes that cannot be submerged into smaller constacyclic codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"23 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143055042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polynomial reduction from syndrome decoding problem to regular decoding problem
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-28 DOI: 10.1007/s10623-025-01567-2
Pavol Zajac

The regular decoding problem asks for (the existence of) regular solutions to a syndrome decoding problem (SDP). This problem has increased applications in post-quantum cryptography and cryptanalysis. Recently, Esser and Santini explored in depth the connection between the regular (RSD) and classical syndrome decoding problems. They have observed that while RSD to SDP reductions are known (in any parametric regime), a similar generic reduction from SDP to RSD is not known. In our contribution, we examine two different generic polynomial reductions from a syndrome decoding problem to a regular decoding problem instance. The first reduction is based on constructing a special parity check matrix that encodes weight counter progression inside the parity check matrix, which is then the input of the regular decoding oracle. The target regular decoding problem has a significantly longer code length, that depends linearly on the weight parameter of the original SDP. The second reduction is based on translating the SDP to a non-linear system of equations in the Multiple Right-Hand Sides form, and then applying RSD oracle to solve this system. The second reduction has better code length. The ratio between RSD and SDP code length of the second reduction can be bounded by a constant (less than 8).

{"title":"Polynomial reduction from syndrome decoding problem to regular decoding problem","authors":"Pavol Zajac","doi":"10.1007/s10623-025-01567-2","DOIUrl":"https://doi.org/10.1007/s10623-025-01567-2","url":null,"abstract":"<p>The regular decoding problem asks for (the existence of) regular solutions to a syndrome decoding problem (SDP). This problem has increased applications in post-quantum cryptography and cryptanalysis. Recently, Esser and Santini explored in depth the connection between the regular (RSD) and classical syndrome decoding problems. They have observed that while RSD to SDP reductions are known (in any parametric regime), a similar generic reduction from SDP to RSD is not known. In our contribution, we examine two different generic polynomial reductions from a syndrome decoding problem to a regular decoding problem instance. The first reduction is based on constructing a special parity check matrix that encodes weight counter progression inside the parity check matrix, which is then the input of the regular decoding oracle. The target regular decoding problem has a significantly longer code length, that depends linearly on the weight parameter of the original SDP. The second reduction is based on translating the SDP to a non-linear system of equations in the Multiple Right-Hand Sides form, and then applying RSD oracle to solve this system. The second reduction has better code length. The ratio between RSD and SDP code length of the second reduction can be bounded by a constant (less than 8).</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"114 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143049911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-24 DOI: 10.1007/s10623-025-01570-7
Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel

Let (n=2^k-1) and (m=2^{k-2}) for a certain (kge 3). Consider the point-line geometry of 2m-element subsets of an n-element set. Maximal singular subspaces of this geometry correspond to binary simplex codes of dimension k. For (kge 4) the associated collinearity graph contains maximal cliques different from maximal singular subspaces. We investigate maximal cliques corresponding to symmetric (n, 2mm)-designs. The main results concern the case (k=4) and give a geometric interpretation of the five well-known symmetric (15, 8, 4)-designs.

{"title":"Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4","authors":"Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel","doi":"10.1007/s10623-025-01570-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01570-7","url":null,"abstract":"<p>Let <span>(n=2^k-1)</span> and <span>(m=2^{k-2})</span> for a certain <span>(kge 3)</span>. Consider the point-line geometry of 2<i>m</i>-element subsets of an <i>n</i>-element set. Maximal singular subspaces of this geometry correspond to binary simplex codes of dimension <i>k</i>. For <span>(kge 4)</span> the associated collinearity graph contains maximal cliques different from maximal singular subspaces. We investigate maximal cliques corresponding to symmetric (<i>n</i>, 2<i>m</i>, <i>m</i>)-designs. The main results concern the case <span>(k=4)</span> and give a geometric interpretation of the five well-known symmetric (15, 8, 4)-designs.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"206 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143026657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blocking sets of secant and tangent lines with respect to a quadric of $$text{ PG }(n,q)$$ 关于二次函数的正割线和切线的块集 $$text{ PG }(n,q)$$
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-01-17 DOI: 10.1007/s10623-024-01559-8
Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo

For a set ({mathcal {L}}) of lines of (text{ PG }(n,q)), a set X of points of (text{ PG }(n,q)) is called an ({mathcal {L}})-blocking set if each line of ({mathcal {L}}) contains at least one point of X. Consider a possibly singular quadric Q of (text{ PG }(n,q)) and denote by ({mathcal {S}}) (respectively, ({mathcal {T}})) the set of all lines of (text{ PG }(n,q)) meeting Q in 2 (respectively, 1 or (q+1)) points. For ({mathcal {L}}in {{mathcal {S}},{mathcal {T}}cup {mathcal {S}}}), we find the minimal cardinality of an ({mathcal {L}})-blocking set of (text{ PG }(n,q)) and determine all ({mathcal {L}})-blocking sets of that minimal cardinality.

对于({mathcal {L}})的(text{ PG }(n,q))的线集合,如果({mathcal {L}})的每条线包含至少一个点X,则(text{ PG }(n,q))的点集合X称为({mathcal {L}}) -blocking set,考虑(text{ PG }(n,q))的一个可能的奇异二次型Q,用({mathcal {S}})(分别为({mathcal {T}}))表示(text{ PG }(n,q))的所有线的集合在2个(分别为1个或(q+1))点中与Q相遇。对于({mathcal {L}}in {{mathcal {S}},{mathcal {T}}cup {mathcal {S}}}),我们找到(text{ PG }(n,q))的({mathcal {L}})阻塞集的最小基数,并确定该最小基数的所有({mathcal {L}})阻塞集。
{"title":"Blocking sets of secant and tangent lines with respect to a quadric of $$text{ PG }(n,q)$$","authors":"Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo","doi":"10.1007/s10623-024-01559-8","DOIUrl":"https://doi.org/10.1007/s10623-024-01559-8","url":null,"abstract":"<p>For a set <span>({mathcal {L}})</span> of lines of <span>(text{ PG }(n,q))</span>, a set <i>X</i> of points of <span>(text{ PG }(n,q))</span> is called an <span>({mathcal {L}})</span>-blocking set if each line of <span>({mathcal {L}})</span> contains at least one point of <i>X</i>. Consider a possibly singular quadric <i>Q</i> of <span>(text{ PG }(n,q))</span> and denote by <span>({mathcal {S}})</span> (respectively, <span>({mathcal {T}})</span>) the set of all lines of <span>(text{ PG }(n,q))</span> meeting <i>Q</i> in 2 (respectively, 1 or <span>(q+1)</span>) points. For <span>({mathcal {L}}in {{mathcal {S}},{mathcal {T}}cup {mathcal {S}}})</span>, we find the minimal cardinality of an <span>({mathcal {L}})</span>-blocking set of <span>(text{ PG }(n,q))</span> and determine all <span>({mathcal {L}})</span>-blocking sets of that minimal cardinality.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142987886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1