首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Divisible design graphs from the symplectic graph 辛图的可分设计图
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-29 DOI: 10.1007/s10623-024-01557-w
Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov

A divisible design graph is a graph whose adjacency matrix is an incidence matrix of a (group) divisible design. Divisible design graphs were introduced in 2011 as a generalization of ((v,k,lambda ))-graphs. Here we describe four new infinite families that can be obtained from the symplectic strongly regular graph Sp(2eq) (q odd, (ege 2)) by modifying the set of edges. To achieve this we need two kinds of spreads in (PG(2e-1,q)) with respect to the associated symplectic form: the symplectic spread consisting of totally isotropic subspaces and, when (e=2), a special spread that consists of lines which are not totally isotropic and which is closed under the action of the associated symplectic polarity. Existence of symplectic spreads is known, but the construction of a special spread for every odd prime power q is a main result of this paper. We also show an equivalence between special spreads of Sp(4, q) and certain nice point sets in the projective space (operatorname {PG}(4,q)). We have included relevant background from finite geometry, and when (q=3,5) and 7 we worked out all possible special spreads.

可整除设计图是指其邻接矩阵为可整除设计的关联矩阵的图。可分设计图是在2011年作为((v,k,lambda )) -图的推广引入的。本文描述了辛强正则图Sp(2e, q) (q奇,(ege 2))通过修改边集可以得到的四个新的无限族。为了实现这一点,我们需要(PG(2e-1,q))中关于相关辛形式的两种扩展:由完全各向同性子空间组成的辛扩展,以及(e=2)中由不完全各向同性且在相关辛极性作用下闭合的线组成的特殊扩展。辛展开的存在性是已知的,但对于每一个奇素数幂q的特殊展开的构造是本文的主要成果。我们还证明了Sp(4, q)的特殊扩展与射影空间(operatorname {PG}(4,q))中某些好的点集之间的等价性。我们包含了有限几何的相关背景,当(q=3,5)和7时,我们计算出了所有可能的特殊扩展。
{"title":"Divisible design graphs from the symplectic graph","authors":"Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov","doi":"10.1007/s10623-024-01557-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01557-w","url":null,"abstract":"<p>A divisible design graph is a graph whose adjacency matrix is an incidence matrix of a (group) divisible design. Divisible design graphs were introduced in 2011 as a generalization of <span>((v,k,lambda ))</span>-graphs. Here we describe four new infinite families that can be obtained from the symplectic strongly regular graph <i>Sp</i>(2<i>e</i>, <i>q</i>) (<i>q</i> odd, <span>(ege 2)</span>) by modifying the set of edges. To achieve this we need two kinds of spreads in <span>(PG(2e-1,q))</span> with respect to the associated symplectic form: the symplectic spread consisting of totally isotropic subspaces and, when <span>(e=2)</span>, a special spread that consists of lines which are not totally isotropic and which is closed under the action of the associated symplectic polarity. Existence of symplectic spreads is known, but the construction of a special spread for every odd prime power <i>q</i> is a main result of this paper. We also show an equivalence between special spreads of <i>Sp</i>(4, <i>q</i>) and certain nice point sets in the projective space <span>(operatorname {PG}(4,q))</span>. We have included relevant background from finite geometry, and when <span>(q=3,5)</span> and 7 we worked out all possible special spreads.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The set of pure gaps at several rational places in function fields 函数域中若干有理位上的纯间隙集
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-28 DOI: 10.1007/s10623-024-01556-x
Alonso S. Castellanos, Erik A. R. Mendoza, Guilherme Tizziotti

In this work, we explore the use of maximal elements in generalized Weierstrass semigroups and their relationship with pure gaps, extending the results in Castellanos et al. [J Pure Appl Algebra 228(4):107513, 2024]. We provide a method to completely determine the set of pure gaps at several rational places in a function field F over a finite field, where the periods of certain places are the same, and determine its cardinality. As an example, we calculate the cardinality and provide a simple, explicit description of the set of pure gaps at several rational places distinct from the infinity place on Kummer extensions, offering a different characterization from that presented by Hu and Yang [Des Codes Cryptogr 86(1):211–230, 2018]. Furthermore, we present some applications in coding theory and AG codes with good parameters.

本文研究了广义Weierstrass半群中极大元的使用及其与纯间隙的关系,推广了Castellanos等人的研究结果[J].应用数学学报,28(4):513 - 513。给出了在有限域上函数域F上若干有理点上纯间隙集的完全确定方法,其中某些点的周期相同,并确定了其基数。作为一个例子,我们计算了基数,并提供了一个简单的,明确的描述在几个有理性的地方与Kummer扩展上的无穷位不同的纯间隙集,提供了一个与Hu和Yang提出的不同的表征[Des Codes Cryptogr 86(1):211 - 230,2018]。此外,我们还介绍了它在编码理论和具有良好参数的AG码中的一些应用。
{"title":"The set of pure gaps at several rational places in function fields","authors":"Alonso S. Castellanos, Erik A. R. Mendoza, Guilherme Tizziotti","doi":"10.1007/s10623-024-01556-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01556-x","url":null,"abstract":"<p>In this work, we explore the use of maximal elements in generalized Weierstrass semigroups and their relationship with pure gaps, extending the results in Castellanos et al. [J Pure Appl Algebra 228(4):107513, 2024]. We provide a method to completely determine the set of pure gaps at several rational places in a function field <i>F</i> over a finite field, where the periods of certain places are the same, and determine its cardinality. As an example, we calculate the cardinality and provide a simple, explicit description of the set of pure gaps at several rational places distinct from the infinity place on Kummer extensions, offering a different characterization from that presented by Hu and Yang [Des Codes Cryptogr 86(1):211–230, 2018]. Furthermore, we present some applications in coding theory and AG codes with good parameters.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"23 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The weight hierarchies of three classes of linear codes 三类线性码的权重层次
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-27 DOI: 10.1007/s10623-024-01553-0
Wei Lu, Qingyao Wang, Xiaoqiang Wang, Dabin Zheng

Studying the generalized Hamming weights of linear codes is a significant research area within coding theory, as it provides valuable structural information about the codes and plays a crucial role in determining their performance in various applications. However, determining the generalized Hamming weights of linear codes, particularly their weight hierarchy, is generally a challenging task. In this paper, we focus on investigating the generalized Hamming weights of three classes of linear codes over finite fields. These codes are constructed by different defining sets. By analysing the intersections between the definition sets and the duals of all r-dimensional subspaces, we get the inequalities on the sizes of these intersections. Then constructing subspaces that reach the upper bounds of these inequalities, we successfully determine the complete weight hierarchies of these codes.

研究线性码的广义汉明权重是编码理论中的一个重要研究领域,因为它提供了有价值的编码结构信息,并在各种应用中起着决定其性能的关键作用。然而,确定线性码的广义汉明权重,特别是其权重层次,通常是一项具有挑战性的任务。本文研究了有限域上三类线性码的广义汉明权。这些代码由不同的定义集构造。通过分析定义集与所有r维子空间的对偶之间的交点,得到了这些交点大小的不等式。然后构造到达这些不等式上界的子空间,我们成功地确定了这些码的完整权层次。
{"title":"The weight hierarchies of three classes of linear codes","authors":"Wei Lu, Qingyao Wang, Xiaoqiang Wang, Dabin Zheng","doi":"10.1007/s10623-024-01553-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01553-0","url":null,"abstract":"<p>Studying the generalized Hamming weights of linear codes is a significant research area within coding theory, as it provides valuable structural information about the codes and plays a crucial role in determining their performance in various applications. However, determining the generalized Hamming weights of linear codes, particularly their weight hierarchy, is generally a challenging task. In this paper, we focus on investigating the generalized Hamming weights of three classes of linear codes over finite fields. These codes are constructed by different defining sets. By analysing the intersections between the definition sets and the duals of all <i>r</i>-dimensional subspaces, we get the inequalities on the sizes of these intersections. Then constructing subspaces that reach the upper bounds of these inequalities, we successfully determine the complete weight hierarchies of these codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"87 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault attacks on multi-prime RSA signatures 针对RSA多素数签名的故障攻击
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-27 DOI: 10.1007/s10623-024-01554-z
Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng

At CHES 2009, Coron et al. proposed a fault attack on standard RSA signatures based on Coppersmith’s method. This work greatly enhances the practicality of fault attacks on RSA signatures. In practice, multi-prime RSA signatures are widely used due to their faster generation speed. In this paper, we propose fault attacks on multi-prime RSA signatures under the PKCS#1 v2.x protocols. We conduct the fault attacks based on Coppersmith’s method in various scenarios. To be specific, we first consider the case where there is only one fault signature, and then we consider the cases where there are multiple fault signatures with co-prime moduli, common moduli, and arbitrary moduli. For each case, we give the upper bound of the unknowns that can be solved in polynomial time, which improves the practicability of the attacks. Our research is grounded in the EMSA-PKCS1-v1_5 encoding method and has been verified by experiments.

在CHES 2009上,Coron等人基于Coppersmith的方法提出了对标准RSA签名的错误攻击。这项工作大大提高了RSA签名错误攻击的实用性。在实际应用中,多素数RSA签名由于其生成速度较快而得到了广泛的应用。本文提出了在pkcs# 1 v2下对多素数RSA签名进行错误攻击的方法。x协议。我们基于Coppersmith的方法在各种场景下进行故障攻击。具体地说,我们首先考虑只有一个故障签名的情况,然后考虑具有共素模、共模和任意模的多个故障签名的情况。对于每种情况,我们给出了可以在多项式时间内求解的未知数的上界,提高了攻击的实用性。我们的研究基于EMSA-PKCS1-v1_5编码方法,并通过实验进行了验证。
{"title":"Fault attacks on multi-prime RSA signatures","authors":"Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng","doi":"10.1007/s10623-024-01554-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01554-z","url":null,"abstract":"<p>At CHES 2009, Coron et al. proposed a fault attack on standard RSA signatures based on Coppersmith’s method. This work greatly enhances the practicality of fault attacks on RSA signatures. In practice, multi-prime RSA signatures are widely used due to their faster generation speed. In this paper, we propose fault attacks on multi-prime RSA signatures under the PKCS#1 v2.x protocols. We conduct the fault attacks based on Coppersmith’s method in various scenarios. To be specific, we first consider the case where there is only one fault signature, and then we consider the cases where there are multiple fault signatures with co-prime moduli, common moduli, and arbitrary moduli. For each case, we give the upper bound of the unknowns that can be solved in polynomial time, which improves the practicability of the attacks. Our research is grounded in the EMSA-PKCS1-v1_5 encoding method and has been verified by experiments.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"33 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Several families of negacyclic BCH codes and their duals 几个负环BCH码族及其对偶
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-27 DOI: 10.1007/s10623-024-01551-2
Zhonghua Sun, Xinyue Liu

Negacyclic BCH codes are a special subclasses of negacyclic codes, and have the best parameters known in many cases. A family of good negacyclic BCH codes are the q-ary narrow-sense negacyclic BCH codes of length (n=(q^m-1)/2), where q is an odd prime power. Little is known about the true minimum distance of this family of negacyclic BCH codes and the dimension of this family of negacyclic BCH codes with large designed distance. The main objective of this paper is to study three subfamilies of this family of negacyclic BCH codes. The dimension and true minimum distance of a subfamily of the q-ary narrow-sense negacyclic BCH codes of length n are determined. The dimension and good lower bounds on the minimum distance of two subfamilies of the q-ary narrow-sense negacyclic BCH codes of length n are presented. The minimum distances of the duals of the q-ary narrow-sense negacyclic BCH codes of length n are also investigated. As will be seen, the three subfamilies of negacyclic BCH codes are sometimes distance-optimal and sometimes have the same parameters as the best linear codes known.

负环BCH码是负环码的一个特殊子类,在许多情况下具有已知的最佳参数。一类好的负环BCH码是长度为(n=(q^m-1)/2)的q元狭义负环BCH码,其中q是奇素数幂。对于这类负环BCH码的真实最小距离和设计距离较大的这类负环BCH码的维数,我们知之甚少。本文的主要目的是研究这个负循环BCH码族的三个亚族。确定了长度为n的q元狭义负环BCH码的一个亚族的维数和真最小距离。给出了长度为n的q元狭义负环BCH码的两个亚族的最小距离的维数和良好的下界。研究了长度为n的q元窄意义负环BCH码对偶的最小距离。正如将看到的,负循环BCH码的三个亚族有时是距离最优的,有时与已知的最佳线性码具有相同的参数。
{"title":"Several families of negacyclic BCH codes and their duals","authors":"Zhonghua Sun, Xinyue Liu","doi":"10.1007/s10623-024-01551-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01551-2","url":null,"abstract":"<p>Negacyclic BCH codes are a special subclasses of negacyclic codes, and have the best parameters known in many cases. A family of good negacyclic BCH codes are the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <span>(n=(q^m-1)/2)</span>, where <i>q</i> is an odd prime power. Little is known about the true minimum distance of this family of negacyclic BCH codes and the dimension of this family of negacyclic BCH codes with large designed distance. The main objective of this paper is to study three subfamilies of this family of negacyclic BCH codes. The dimension and true minimum distance of a subfamily of the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <i>n</i> are determined. The dimension and good lower bounds on the minimum distance of two subfamilies of the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <i>n</i> are presented. The minimum distances of the duals of the <i>q</i>-ary narrow-sense negacyclic BCH codes of length <i>n</i> are also investigated. As will be seen, the three subfamilies of negacyclic BCH codes are sometimes distance-optimal and sometimes have the same parameters as the best linear codes known.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the vector subspaces of $$mathbb {F}_{2^n}$$ over which the multiplicative inverse function sums to zero 在$$mathbb {F}_{2^n}$$的向量子空间上,其上的乘法逆函数和为零
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-27 DOI: 10.1007/s10623-024-01531-6
Claude Carlet

We study the behavior of the multiplicative inverse function (which plays an important role in cryptography and in the study of finite fields), with respect to a recently introduced generalization of almost perfect nonlinearity (APNness), called kth-order sum-freedom, that extends a classic characterization of APN functions, and has also some relationship with integral attacks. This generalization corresponds to the fact that a vectorial function (F:mathbb {F}_2^nmapsto mathbb {F}_2^m) sums to a nonzero value over every k-dimensional affine subspace of (mathbb {F}_2^n), for some (kle n) (APNness corresponds to (k=2)). The sum of the values of the inverse function (xin mathbb {F}_{2^n}mapsto x^{2^n-2}in mathbb {F}_{2^n}) over any affine subspace A of (mathbb {F}_{2^n}) not containing 0 (i.e. being not a vector space) has been addressed, thanks to a simple expression of such sum, which shows that it never vanishes. We study in the present paper the case of vector (i.e. linear) subspaces, which is much less simple to handle. The sum depends on a coefficient in subspace polynomials. We study for which values of k the multiplicative inverse function can sum to nonzero values over all k-dimensional vector subspaces. We show that, for every k not co-prime with n, it sums to zero over at least one k-dimensional (mathbb {F}_2)-subspace of (mathbb {F}_{2^n}). We study the behavior of the inverse function over direct sums of vector spaces and we deduce that the property of the inverse function to be kth-order sum-free happens for k if and only if it happens for (n-k). We derive several other results and we show that the set of values k such that the inverse function is not kth-order sum-free is stable when adding two values of k whose product is smaller than n (and when subtracting two values under some conditions). We clarify the case of dimension at most 4 (equivalently, of co-dimension at most 4) and this allows to address, for every n, all small enough values of k of the form (3a+4b).

我们研究了乘法逆函数(在密码学和有限域的研究中起着重要作用)的行为,关于最近引入的几乎完全非线性(APNness)的推广,称为k阶和自由,它扩展了APN函数的经典表征,并且与积分攻击有一定的关系。这种推广对应于这样一个事实:对于某些(kle n) (APNness对应于(k=2)),向量函数(F:mathbb {F}_2^nmapsto mathbb {F}_2^m)在(mathbb {F}_2^n)的每个k维仿射子空间上求和为非零值。反函数(xin mathbb {F}_{2^n}mapsto x^{2^n-2}in mathbb {F}_{2^n})在(mathbb {F}_{2^n})的任何仿射子空间A上的值的和不包含0(即不是一个向量空间)已经被处理,由于这样的和的一个简单的表达式,这表明它永远不会消失。本文研究了向量(即线性)子空间的情况,这种情况处理起来要简单得多。和取决于子空间多项式的系数。我们研究了在所有k维向量子空间上,哪些k的乘法逆函数值可以和为非零值。我们证明,对于每一个k不与n共素数,它在(mathbb {F}_{2^n})的至少一个k维(mathbb {F}_2)子空间上和为零。我们研究了逆函数在向量空间的直接和上的行为,我们推断出逆函数的k阶无和的性质发生在k当且仅当它发生在(n-k)。我们得到了其他几个结果,并证明当两个k的值相加且乘积小于n时(以及在某些条件下相减两个值),使得逆函数不是k阶无和函数的值集k是稳定的。我们澄清了维数不超过4的情况(等价地,协维数不超过4),这允许对每一个n,所有足够小的形式为(3a+4b)的k值进行处理。
{"title":"On the vector subspaces of $$mathbb {F}_{2^n}$$ over which the multiplicative inverse function sums to zero","authors":"Claude Carlet","doi":"10.1007/s10623-024-01531-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01531-6","url":null,"abstract":"<p>We study the behavior of the multiplicative inverse function (which plays an important role in cryptography and in the study of finite fields), with respect to a recently introduced generalization of almost perfect nonlinearity (APNness), called <i>k</i>th-order sum-freedom, that extends a classic characterization of APN functions, and has also some relationship with integral attacks. This generalization corresponds to the fact that a vectorial function <span>(F:mathbb {F}_2^nmapsto mathbb {F}_2^m)</span> sums to a nonzero value over every <i>k</i>-dimensional affine subspace of <span>(mathbb {F}_2^n)</span>, for some <span>(kle n)</span> (APNness corresponds to <span>(k=2)</span>). The sum of the values of the inverse function <span>(xin mathbb {F}_{2^n}mapsto x^{2^n-2}in mathbb {F}_{2^n})</span> over any affine subspace <i>A</i> of <span>(mathbb {F}_{2^n})</span> not containing 0 (i.e. being not a vector space) has been addressed, thanks to a simple expression of such sum, which shows that it never vanishes. We study in the present paper the case of vector (i.e. linear) subspaces, which is much less simple to handle. The sum depends on a coefficient in subspace polynomials. We study for which values of <i>k</i> the multiplicative inverse function can sum to nonzero values over all <i>k</i>-dimensional vector subspaces. We show that, for every <i>k</i> not co-prime with <i>n</i>, it sums to zero over at least one <i>k</i>-dimensional <span>(mathbb {F}_2)</span>-subspace of <span>(mathbb {F}_{2^n})</span>. We study the behavior of the inverse function over direct sums of vector spaces and we deduce that the property of the inverse function to be <i>k</i>th-order sum-free happens for <i>k</i> if and only if it happens for <span>(n-k)</span>. We derive several other results and we show that the set of values <i>k</i> such that the inverse function is not <i>k</i>th-order sum-free is stable when adding two values of <i>k</i> whose product is smaller than <i>n</i> (and when subtracting two values under some conditions). We clarify the case of dimension at most 4 (equivalently, of co-dimension at most 4) and this allows to address, for every <i>n</i>, all small enough values of <i>k</i> of the form <span>(3a+4b)</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Codes from $$A_m$$ -invariant polynomials 代码来自$$A_m$$ -不变多项式
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-27 DOI: 10.1007/s10623-024-01550-3
Giacomo Micheli, Vincenzo Pallozzi Lavorante, Phillip Waitkevich

Let q be a prime power. This paper provides a new class of linear codes that arises from the action of the alternating group on ({mathbb {F}}_q[x_1,dots ,x_m]) combined with the ideas in Datta and Johnsen (Des Codes Cryptogr 91(3):747–761, 2023). Compared with Generalized Reed–Muller codes with analogous parameters, our codes have the same asymptotic relative distance but a better rate. Our results follow from combinations of Galois theoretical methods with Weil-type bounds for hypersurfaces.

设q为质数幂。本文结合Datta和Johnsen (Des codes Cryptogr 91(3): 747-761, 2023)的思想,提出了由({mathbb {F}}_q[x_1,dots ,x_m])上的交替群作用产生的一类新的线性码。与具有类似参数的广义Reed-Muller码相比,我们的码具有相同的渐近相对距离,但速率更高。我们的结果来自于伽罗瓦理论方法与超曲面的weil型界的结合。
{"title":"Codes from $$A_m$$ -invariant polynomials","authors":"Giacomo Micheli, Vincenzo Pallozzi Lavorante, Phillip Waitkevich","doi":"10.1007/s10623-024-01550-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01550-3","url":null,"abstract":"<p>Let <i>q</i> be a prime power. This paper provides a new class of linear codes that arises from the action of the alternating group on <span>({mathbb {F}}_q[x_1,dots ,x_m])</span> combined with the ideas in Datta and Johnsen (Des Codes Cryptogr 91(3):747–761, 2023). Compared with Generalized Reed–Muller codes with analogous parameters, our codes have the same asymptotic relative distance but a better rate. Our results follow from combinations of Galois theoretical methods with Weil-type bounds for hypersurfaces.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"153 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142887319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The support designs of several families of lifted linear codes 几种提升线性码族的支撑设计
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-25 DOI: 10.1007/s10623-024-01549-w
Cunsheng Ding, Zhonghua Sun, Qianqian Yan

A generator matrix of a linear code ({mathcal {C}}) over ({textrm{GF}}(q)) is also a matrix of the same rank k over any extension field ({textrm{GF}}(q^ell )) and generates a linear code of the same length, same dimension and same minimum distance over ({textrm{GF}}(q^ell )), denoted by ({mathcal {C}}(q|q^ell )) and called a lifted code of ({mathcal {C}}). Although ({mathcal {C}}) and their lifted codes ({mathcal {C}}(q|q^ell )) have the same parameters, they have different weight distributions and different applications. Few results about lifted linear codes are known in the literature. This paper proves some fundamental theory for lifted linear codes, and studies the 2-designs of the lifted projective Reed–Muller codes, lifted Hamming codes and lifted Simplex codes. In addition, this paper settles the weight distributions of the lifted Reed–Muller codes of certain orders, and investigates the 3-designs supported by these lifted codes. As a by-product, an infinite family of three-weight projective codes over ({textrm{GF}}(4)) is obtained.

在({textrm{GF}}(q))上的线性代码({mathcal {C}})的生成器矩阵也是在任何扩展域({textrm{GF}}(q^ell ))上具有相同秩k的矩阵,并且在({textrm{GF}}(q^ell ))上生成具有相同长度,相同维度和相同最小距离的线性代码,用({mathcal {C}}(q|q^ell ))表示,称为({mathcal {C}})的提升代码。虽然({mathcal {C}})及其提升代码({mathcal {C}}(q|q^ell ))具有相同的参数,但它们具有不同的权重分布和不同的应用。文献中关于提升线性码的结果很少。本文证明了提升线性码的一些基本理论,研究了提升投影Reed-Muller码、提升Hamming码和提升单纯形码的2种设计。此外,本文还确定了若干阶的提升Reed-Muller规范的权重分布,并对这些提升规范所支持的3种设计进行了研究。作为副产物,得到了({textrm{GF}}(4))上的无限族三权投影码。
{"title":"The support designs of several families of lifted linear codes","authors":"Cunsheng Ding, Zhonghua Sun, Qianqian Yan","doi":"10.1007/s10623-024-01549-w","DOIUrl":"https://doi.org/10.1007/s10623-024-01549-w","url":null,"abstract":"<p>A generator matrix of a linear code <span>({mathcal {C}})</span> over <span>({textrm{GF}}(q))</span> is also a matrix of the same rank <i>k</i> over any extension field <span>({textrm{GF}}(q^ell ))</span> and generates a linear code of the same length, same dimension and same minimum distance over <span>({textrm{GF}}(q^ell ))</span>, denoted by <span>({mathcal {C}}(q|q^ell ))</span> and called a lifted code of <span>({mathcal {C}})</span>. Although <span>({mathcal {C}})</span> and their lifted codes <span>({mathcal {C}}(q|q^ell ))</span> have the same parameters, they have different weight distributions and different applications. Few results about lifted linear codes are known in the literature. This paper proves some fundamental theory for lifted linear codes, and studies the 2-designs of the lifted projective Reed–Muller codes, lifted Hamming codes and lifted Simplex codes. In addition, this paper settles the weight distributions of the lifted Reed–Muller codes of certain orders, and investigates the 3-designs supported by these lifted codes. As a by-product, an infinite family of three-weight projective codes over <span>({textrm{GF}}(4))</span> is obtained.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"25 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142884413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-weight codewords in cyclic codes 循环码中的低权重码字
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-24 DOI: 10.1007/s10623-024-01547-y
J. G. Coelho, F. E. Brochero Martínez

We introduce a formula for determining the number of codewords of weight 2 in cyclic codes and provide results related to the count of codewords with weight 3. Additionally, we establish a recursive relationship for binary cyclic codes that connects their weight distribution to the number of solutions of associated systems of polynomial equations. This relationship allows for the computation of weight distributions from known solutions of systems of diagonal equations and vice versa, offering a new insight into the structure and properties of binary cyclic codes.

介绍了循环码中权值为2的码字数的确定公式,并给出了权值为3的码字数的计算结果。此外,我们建立了二元循环码的递归关系,将它们的权分布与多项式方程的关联系统的解的个数联系起来。这种关系允许从对角方程系统的已知解计算权分布,反之亦然,为二元循环码的结构和性质提供了新的见解。
{"title":"Low-weight codewords in cyclic codes","authors":"J. G. Coelho, F. E. Brochero Martínez","doi":"10.1007/s10623-024-01547-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01547-y","url":null,"abstract":"<p>We introduce a formula for determining the number of codewords of weight 2 in cyclic codes and provide results related to the count of codewords with weight 3. Additionally, we establish a recursive relationship for binary cyclic codes that connects their weight distribution to the number of solutions of associated systems of polynomial equations. This relationship allows for the computation of weight distributions from known solutions of systems of diagonal equations and vice versa, offering a new insight into the structure and properties of binary cyclic codes.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"123 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142884410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A class of permutations on $${mathbb {Z}}_{p}$$ with differential uniformity at most 3 $${mathbb {Z}}_{p}$$上微分均匀性最多为3的一类置换
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-22 DOI: 10.1007/s10623-024-01548-x
Prachi Gupta, P. R. Mishra, Atul Gaur

In this paper, we give a class of permutations on ({mathbb {Z}}_{p}) having differential uniformity at most 3, where prime p satisfies (p equiv 1 pmod {4}). Further, we present a sufficient condition for differential uniformity exactly 3 and identify a subclass achieving this value.

在本文中,我们给出了一类在 ({mathbb {Z}}_{p}) 上的排列具有最多 3 的微分均匀性,其中素数 p 满足 (p equiv 1 pmod {4})。此外,我们还提出了差分均匀性恰好为 3 的充分条件,并确定了达到这个值的子类。
{"title":"A class of permutations on $${mathbb {Z}}_{p}$$ with differential uniformity at most 3","authors":"Prachi Gupta, P. R. Mishra, Atul Gaur","doi":"10.1007/s10623-024-01548-x","DOIUrl":"https://doi.org/10.1007/s10623-024-01548-x","url":null,"abstract":"<p>In this paper, we give a class of permutations on <span>({mathbb {Z}}_{p})</span> having differential uniformity at most 3, where prime <i>p</i> satisfies <span>(p equiv 1 pmod {4})</span>. Further, we present a sufficient condition for differential uniformity exactly 3 and identify a subclass achieving this value.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142869956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1