首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Guessing less and better: improved attacks on GIFT-64 猜测更少,更好:改进对GIFT-64的攻击
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-20 DOI: 10.1007/s10623-024-01527-2
Federico Canale, María Naya-Plasencia

GIFT-64 is a block cipher that has received a lot of attention from the community since its proposal in 2017. The attack on the highest number of rounds is a differential related-key attack on 26 rounds. We studied this attack, in particular with respect to some recent generic frameworks for improving key recovery, and we realised that this framework, combined with an efficient parallel key guessing of interesting subsets of the key and a consequent list merging applied to the partial solutions, can improve the complexity of the attack. We propose two different trade-offs, as a result of the improved key-recovery. We believe that the techniques are quite generic and that it is possible to apply them to improve other differential attacks.

GIFT-64是一种分组密码,自2017年提出以来受到了社区的广泛关注。最高回合数的攻击是26回合的差分相关键攻击。我们研究了这种攻击,特别是关于一些最近改善密钥恢复的通用框架,我们意识到这个框架,结合对密钥的有趣子集的有效并行密钥猜测和应用于部分解决方案的后续列表合并,可以提高攻击的复杂性。由于改进了密钥恢复,我们提出了两种不同的权衡。我们相信这些技术是相当通用的,并且有可能应用它们来改进其他差分攻击。
{"title":"Guessing less and better: improved attacks on GIFT-64","authors":"Federico Canale, María Naya-Plasencia","doi":"10.1007/s10623-024-01527-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01527-2","url":null,"abstract":"<p>GIFT-64 is a block cipher that has received a lot of attention from the community since its proposal in 2017. The attack on the highest number of rounds is a differential related-key attack on 26 rounds. We studied this attack, in particular with respect to some recent generic frameworks for improving key recovery, and we realised that this framework, combined with an efficient parallel key guessing of interesting subsets of the key and a consequent list merging applied to the partial solutions, can improve the complexity of the attack. We propose two different trade-offs, as a result of the improved key-recovery. We believe that the techniques are quite generic and that it is possible to apply them to improve other differential attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On automorphism groups of binary cyclic codes 论二元循环码的自形群
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-20 DOI: 10.1007/s10623-024-01539-y
Jicheng Ma, Guiying Yan

Cyclic codes, as a significant subclass of linear codes, can be constructed and analyzed using algebraic methods. Due to its cyclic nature, they have efficient encoding and decoding algorithms. To date, cyclic codes have found applications in various domains, including consumer electronics, data storage systems, and communication systems. In this paper, we investigate the full automorphism groups of binary cyclic codes. A matrix presentation technique of cyclic codewords is introduced, which subsequently serves well for presenting binary cyclic codes of long lengths. These constructions are significantly useful in facilitating the determination of the full automorphism groups of binary cyclic codes of specified lengths.

循环码作为线性码的一个重要子类,可以用代数方法构造和分析。由于其循环特性,它们具有高效的编码和解码算法。到目前为止,循环码已经在各个领域得到了应用,包括消费电子、数据存储系统和通信系统。本文研究了二元循环码的全自同构群。介绍了循环码字的矩阵表示技术,该技术可以很好地表示长二进制循环码。这些构造对于确定指定长度的二进制循环码的完全自同构群是非常有用的。
{"title":"On automorphism groups of binary cyclic codes","authors":"Jicheng Ma, Guiying Yan","doi":"10.1007/s10623-024-01539-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01539-y","url":null,"abstract":"<p>Cyclic codes, as a significant subclass of linear codes, can be constructed and analyzed using algebraic methods. Due to its cyclic nature, they have efficient encoding and decoding algorithms. To date, cyclic codes have found applications in various domains, including consumer electronics, data storage systems, and communication systems. In this paper, we investigate the full automorphism groups of binary cyclic codes. A matrix presentation technique of cyclic codewords is introduced, which subsequently serves well for presenting binary cyclic codes of long lengths. These constructions are significantly useful in facilitating the determination of the full automorphism groups of binary cyclic codes of specified lengths.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A construction of optimal quasi-cyclic locally recoverable codes using constituent codes 利用组成码构造最优拟循环局部可恢复码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-20 DOI: 10.1007/s10623-024-01532-5
Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno

A locally recoverable code of locality r over (mathbb {F}_{q}) is a code where every coordinate of a codeword can be recovered using the values of at most r other coordinates of that codeword. Locally recoverable codes are efficient at restoring corrupted messages and data which make them highly applicable to distributed storage systems. Quasi-cyclic codes of length (n=mell ) and index (ell ) are linear codes that are invariant under cyclic shifts by (ell ) places. In this paper, we decompose quasi-cyclic locally recoverable codes into a sum of constituent codes where each constituent code is a linear code over a field extension of (mathbb {F}_q). Using these constituent codes with set parameters, we propose conditions which ensure the existence of almost optimal and optimal quasi-cyclic locally recoverable codes with increased dimension and code length.

局部性为r / (mathbb {F}_{q})的局部可恢复代码是这样一种代码,其中码字的每个坐标都可以使用该码字的最多r个其他坐标的值来恢复。本地可恢复代码在恢复损坏的消息和数据方面是有效的,这使得它们非常适用于分布式存储系统。长度为(n=mell )和索引为(ell )的拟循环码是在循环移位(ell )位时不变的线性码。本文将拟循环局部可恢复码分解为组成码的和,其中每个组成码是一个域扩展(mathbb {F}_q)上的线性码。利用这些具有固定参数的组成码,我们给出了增加维数和码长的几乎最优和最优拟循环局部可恢复码存在的条件。
{"title":"A construction of optimal quasi-cyclic locally recoverable codes using constituent codes","authors":"Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno","doi":"10.1007/s10623-024-01532-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01532-5","url":null,"abstract":"<p>A locally recoverable code of locality <i>r</i> over <span>(mathbb {F}_{q})</span> is a code where every coordinate of a codeword can be recovered using the values of at most <i>r</i> other coordinates of that codeword. Locally recoverable codes are efficient at restoring corrupted messages and data which make them highly applicable to distributed storage systems. Quasi-cyclic codes of length <span>(n=mell )</span> and index <span>(ell )</span> are linear codes that are invariant under cyclic shifts by <span>(ell )</span> places. In this paper, we decompose quasi-cyclic locally recoverable codes into a sum of constituent codes where each constituent code is a linear code over a field extension of <span>(mathbb {F}_q)</span>. Using these constituent codes with set parameters, we propose conditions which ensure the existence of almost optimal and optimal quasi-cyclic locally recoverable codes with increased dimension and code length.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Several new classes of optimal ternary cyclic codes with two or three zeros 几种新的具有两个或三个零的最优三元循环码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-19 DOI: 10.1007/s10623-024-01541-4
Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang

Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let (alpha ) be a generator of (mathbb F_{3^m}setminus {0}), where m is a positive integer. Denote by (mathcal {C}_{(i_1,i_2,cdots , i_t)}) the cyclic code with generator polynomial (m_{alpha ^{i_1}}(x)m_{alpha ^{i_2}}(x)cdots m_{alpha ^{i_t}}(x)), where ({{m}_{alpha ^{i}}}(x)) is the minimal polynomial of ({{alpha }^{i}}) over ({{mathbb {F}}_{3}}). In this paper, by analyzing the solutions of certain equations over finite fields, we present four classes of optimal ternary cyclic codes (mathcal {C}_{(0,1,e)}) and (mathcal {C}_{(1,e,s)}) with parameters ([3^m-1,3^m-frac{3m}{2}-2,4]), where (s=frac{3^m-1}{2}). In addition, by determining the solutions of certain equations and analyzing the irreducible factors of certain polynomials over (mathbb F_{3^m}), we present four classes of optimal ternary cyclic codes (mathcal {C}_{(2,e)}) and (mathcal {C}_{(1,e)}) with parameters ([3^m-1,3^m-2m-1,4]). We show that our new optimal cyclic codes are not covered by known ones.

循环码是线性码的一个子类,由于其高效的编码和解码算法,在数据存储系统、通信系统和消费电子产品中有着广泛的应用。让 (α ) 是 (mathbb F_{3^m}setminus {0})的生成器,其中 m 是正整数。用 (mathcal {C}_{(i_1,i_2,cdots , i_t)}) 表示具有生成器多项式 (m_{alpha ^{i_1}}(x)m_{alpha ^{i_2}}(x)cdots m_{alpha ^{i_t}}(x)) 的循环码、其中 ({{m}_{{alpha ^{i}}}(x)) 是 ({{mathbb {F}}_{3}}) 上 ({{alpha }^{i}}} 的最小多项式。本文通过分析有限域上某些方程的解,提出了四类最优三元循环码 (mathcal {C}_{(0、参数为([3^m-1,3^m-frac{3m}{2}-2,4])的(mathcal {C}_{(0, 1,e)}) and(mathcal {C}_{(1,e,s)}), 其中(s=frac{3^m-1}{2})。此外,通过确定某些方程的解以及分析某些多项式在 (mathbb F_{3^m}) 上的不可还原因子,我们提出了参数为 ([3^m-1,3^m-2m-1,4])的四类最优三元循环码 (mathcal {C}_{(2,e)}) 和 (mathcal {C}_{(1,e)}) 。我们证明我们的新最优循环码不在已知循环码的覆盖范围之内。
{"title":"Several new classes of optimal ternary cyclic codes with two or three zeros","authors":"Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang","doi":"10.1007/s10623-024-01541-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01541-4","url":null,"abstract":"<p>Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let <span>(alpha )</span> be a generator of <span>(mathbb F_{3^m}setminus {0})</span>, where <i>m</i> is a positive integer. Denote by <span>(mathcal {C}_{(i_1,i_2,cdots , i_t)})</span> the cyclic code with generator polynomial <span>(m_{alpha ^{i_1}}(x)m_{alpha ^{i_2}}(x)cdots m_{alpha ^{i_t}}(x))</span>, where <span>({{m}_{alpha ^{i}}}(x))</span> is the minimal polynomial of <span>({{alpha }^{i}})</span> over <span>({{mathbb {F}}_{3}})</span>. In this paper, by analyzing the solutions of certain equations over finite fields, we present four classes of optimal ternary cyclic codes <span>(mathcal {C}_{(0,1,e)})</span> and <span>(mathcal {C}_{(1,e,s)})</span> with parameters <span>([3^m-1,3^m-frac{3m}{2}-2,4])</span>, where <span>(s=frac{3^m-1}{2})</span>. In addition, by determining the solutions of certain equations and analyzing the irreducible factors of certain polynomials over <span>(mathbb F_{3^m})</span>, we present four classes of optimal ternary cyclic codes <span>(mathcal {C}_{(2,e)})</span> and <span>(mathcal {C}_{(1,e)})</span> with parameters <span>([3^m-1,3^m-2m-1,4])</span>. We show that our new optimal cyclic codes are not covered by known ones.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum security of Trojan message attacks on Merkle–Damgård hash construction 基于merkle - damg<s:1> rd哈希构造的木马消息攻击的量子安全性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-18 DOI: 10.1007/s10623-024-01538-z
Ying Xu, Xiaoni Du, Jian Zou

In this paper, we promote Trojan message attacks against Merkle–Damgård hash functions and their concatenation combiner in quantum settings for the first time. Two main quantum scenarios are considered, involving the scenarios where a substantial amount of cheap quantum random access memory (qRAM) is available and where qRAM is limited and expensive to access. We first discuss the construction of diamond structures and analyze the corresponding time complexity in both of these quantum scenarios. Secondly, we propose quantum versions of the generic Trojan message attacks on Merkle–Damgård hash functions as well as their improved versions by combining with diamond structures and expandable messages, and then determine their cost. Finally, we propose Trojan message attack against Merkle–Damgård hash concatenation combiner in quantum setting. The results show that Trojan message attacks can be improved significantly with quantum computers under both scenarios, so the security of hash constructions in classical setting requires careful re-evaluation before being deployed to the post-quantum cryptography schemes.

在本文中,我们首次提出了针对量子环境下的merkle - damg散列函数及其连接组合器的特洛伊木马消息攻击。考虑了两种主要的量子场景,包括大量廉价量子随机存取存储器(qRAM)可用的场景,以及qRAM有限且访问成本昂贵的场景。我们首先讨论了金刚石结构的构造,并分析了这两种量子场景下相应的时间复杂度。其次,我们结合钻石结构和可扩展消息,提出了针对merkel - damg哈希函数的通用木马消息攻击的量子版本及其改进版本,并确定了它们的代价。最后,我们提出了针对量子环境下merkle - damg rd哈希连接组合器的木马消息攻击。结果表明,在这两种情况下,量子计算机都可以显著改善特洛伊木马消息攻击,因此在部署到后量子加密方案之前,需要仔细重新评估经典设置下哈希构造的安全性。
{"title":"Quantum security of Trojan message attacks on Merkle–Damgård hash construction","authors":"Ying Xu, Xiaoni Du, Jian Zou","doi":"10.1007/s10623-024-01538-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01538-z","url":null,"abstract":"<p>In this paper, we promote Trojan message attacks against Merkle–Damgård hash functions and their concatenation combiner in quantum settings for the first time. Two main quantum scenarios are considered, involving the scenarios where a substantial amount of cheap quantum random access memory (qRAM) is available and where qRAM is limited and expensive to access. We first discuss the construction of diamond structures and analyze the corresponding time complexity in both of these quantum scenarios. Secondly, we propose quantum versions of the generic Trojan message attacks on Merkle–Damgård hash functions as well as their improved versions by combining with diamond structures and expandable messages, and then determine their cost. Finally, we propose Trojan message attack against Merkle–Damgård hash concatenation combiner in quantum setting. The results show that Trojan message attacks can be improved significantly with quantum computers under both scenarios, so the security of hash constructions in classical setting requires careful re-evaluation before being deployed to the post-quantum cryptography schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"260 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal combinatorial neural codes via symmetric designs 通过对称设计的最优组合神经编码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-18 DOI: 10.1007/s10623-024-01534-3
Xingyu Zheng, Shukai Wang, Cuiling Fan

Combinatorial neural (CN) codes are binary codes introduced firstly by Curto et al. for asymmetric channel, and then are further studied by Cotardo and Ravagnani under the metric (delta _r) (called asymmetric discrepancy) which measures the differentiation of codewords in CN codes. When (r>1), CN codes are different from the usual error-correcting codes in symmetric channel ((r=1)). In this paper, we focus on the optimality of some CN codes with (r>1). An upper bound for the size of CN codes with (delta _r=r+1) is deduced, by discussing the relationship between such CN codes and error-detecting codes for asymmetric channels, which is shown to be tight in this case. We also propose an improved Plotkin bound for CN codes. Notably, by applying symmetric designs related with Hadamard matrices, we not only generalize one former construction of optimal CN codes by bent functions obtained by Zhang et al. (IEEE Trans Inf Theory 69:5440–5448, 2023), but also obtain seven classes of new optimal CN codes meeting the improved Plotkin bound.

组合神经(CN)码是由 Curto 等人首先针对非对称信道提出的二进制码,然后 Cotardo 和 Ravagnani 在度量 CN 码中码字差异的 (delta _r)(称为非对称差异)下对其进行了进一步研究。当(r>1)时,CN码不同于对称信道中的普通纠错码((r=1))。在本文中,我们将重点研究一些具有 (r>1) 的 CN 编码的最优性。通过讨论这种 CN 码和非对称信道的检错码之间的关系,我们推导出了具有 (delta _r=r+1) 的 CN 码大小的上界,并证明在这种情况下这种上界是紧密的。我们还提出了一种改进的 CN 码 Plotkin 约束。值得注意的是,通过应用与哈达玛矩阵相关的对称设计,我们不仅推广了张等人通过弯曲函数(IEEE Trans Inf Theory 69:5440-5448, 2023)获得的最优 CN 码的一种前构造,而且还获得了符合改进的 Plotkin 定界的七类新最优 CN 码。
{"title":"Optimal combinatorial neural codes via symmetric designs","authors":"Xingyu Zheng, Shukai Wang, Cuiling Fan","doi":"10.1007/s10623-024-01534-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01534-3","url":null,"abstract":"<p>Combinatorial neural (CN) codes are binary codes introduced firstly by Curto et al. for asymmetric channel, and then are further studied by Cotardo and Ravagnani under the metric <span>(delta _r)</span> (called asymmetric discrepancy) which measures the differentiation of codewords in CN codes. When <span>(r&gt;1)</span>, CN codes are different from the usual error-correcting codes in symmetric channel (<span>(r=1)</span>). In this paper, we focus on the optimality of some CN codes with <span>(r&gt;1)</span>. An upper bound for the size of CN codes with <span>(delta _r=r+1)</span> is deduced, by discussing the relationship between such CN codes and error-detecting codes for asymmetric channels, which is shown to be tight in this case. We also propose an improved Plotkin bound for CN codes. Notably, by applying symmetric designs related with Hadamard matrices, we not only generalize one former construction of optimal CN codes by bent functions obtained by Zhang et al. (IEEE Trans Inf Theory 69:5440–5448, 2023), but also obtain seven classes of new optimal CN codes meeting the improved Plotkin bound.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142841501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Relating code equivalence to other isomorphism problems 将代码等价与其他同构问题联系起来
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-16 DOI: 10.1007/s10623-024-01542-3
Huck Bennett, Kaung Myat Htay Win

We study the complexity of the Code Equivalence Problem on linear error-correcting codes by relating its variants to isomorphism problems on other discrete structures—graphs, lattices, and matroids. Our main results are a fine-grained reduction from the Graph Isomorphism Problem to the Linear Code Equivalence Problem over any field (mathbb {F}), and a reduction from the Linear Code Equivalence Problem over any field (mathbb {F}_p) of prime, polynomially bounded order p to the Lattice Isomorphism Problem. Both of these reductions are simple and natural. We also give reductions between variants of the Code Equivalence Problem, and study the relationship between isomorphism problems on codes and linear matroids.

通过将线性纠错码的码等价问题的变体与其它离散结构——图、格和拟阵上的同构问题联系起来,研究了线性纠错码的码等价问题的复杂性。我们的主要成果是从图同构问题到任意域上的线性码等价问题(mathbb {F})的细粒度约简,以及从质数有界阶p的任意域(mathbb {F}_p)上的线性码等价问题到格同构问题的约简。这两种缩减都是简单而自然的。给出了码等价问题的变体之间的约简,并研究了码的同构问题与线性拟阵的关系。
{"title":"Relating code equivalence to other isomorphism problems","authors":"Huck Bennett, Kaung Myat Htay Win","doi":"10.1007/s10623-024-01542-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01542-3","url":null,"abstract":"<p>We study the complexity of the <i>Code Equivalence Problem</i> on linear error-correcting codes by relating its variants to isomorphism problems on other discrete structures—graphs, lattices, and matroids. Our main results are a fine-grained reduction from the Graph Isomorphism Problem to the Linear Code Equivalence Problem over any field <span>(mathbb {F})</span>, and a reduction from the Linear Code Equivalence Problem over any field <span>(mathbb {F}_p)</span> of prime, polynomially bounded order <i>p</i> to the Lattice Isomorphism Problem. Both of these reductions are simple and natural. We also give reductions between variants of the Code Equivalence Problem, and study the relationship between isomorphism problems on codes and linear matroids.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2021 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hulls of projective Reed–Muller codes 射影里德-穆勒码的船体
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-14 DOI: 10.1007/s10623-024-01543-2
Nathan Kaplan, Jon-Lark Kim

Projective Reed–Muller codes are constructed from the family of projective hypersurfaces of a fixed degree over a finite field (mathbb {F}_q). We consider the relationship between projective Reed–Muller codes and their duals. We determine when these codes are self-dual, when they are self-orthogonal, and when they are LCD. We then show that when q is sufficiently large, the dimension of the hull of a projective Reed–Muller code is 1 less than the dimension of the code. We determine the dimension of the hull for a wider range of parameters and describe how this leads to a new proof of a recent result of Ruano and San-José.

射影Reed-Muller码是由有限域上的一组固定度的射影超曲面构成的(mathbb {F}_q)。研究了投影Reed-Muller码及其对偶之间的关系。我们确定了这些码什么时候是自对偶的,什么时候是自正交的,什么时候是LCD的。然后,我们证明了当q足够大时,一个投影Reed-Muller码的外壳维数比码的维数小1。我们确定了更广泛参数范围的船体尺寸,并描述了这如何导致Ruano和san - jos最近结果的新证明。
{"title":"Hulls of projective Reed–Muller codes","authors":"Nathan Kaplan, Jon-Lark Kim","doi":"10.1007/s10623-024-01543-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01543-2","url":null,"abstract":"<p>Projective Reed–Muller codes are constructed from the family of projective hypersurfaces of a fixed degree over a finite field <span>(mathbb {F}_q)</span>. We consider the relationship between projective Reed–Muller codes and their duals. We determine when these codes are self-dual, when they are self-orthogonal, and when they are LCD. We then show that when <i>q</i> is sufficiently large, the dimension of the hull of a projective Reed–Muller code is 1 less than the dimension of the code. We determine the dimension of the hull for a wider range of parameters and describe how this leads to a new proof of a recent result of Ruano and San-José.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142823245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On set systems with strongly restricted intersections 在具有强约束交叉口的集合系统上
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-05 DOI: 10.1007/s10623-024-01535-2
Xin Wei, Xiande Zhang, Gennian Ge

Set systems with strongly restricted intersections, called (alpha )-intersecting families for a vector (alpha ), were introduced recently as a generalization of several well-studied intersecting families including the classical oddtown and eventown. Given a binary vector (alpha =(a_1, ldots , a_k)), a collection ({mathcal {F}}) of subsets over an n element set is an (alpha )-intersecting family modulo 2 if for each (i=1,2,ldots ,k), all i-wise intersections of distinct members in ({mathcal {F}}) have sizes with the same parity as (a_i). Let (f_alpha (n)) denote the maximum size of such a family. In this paper, we study the asymptotic behavior of (f_alpha (n)) when n goes to infinity. We show that if t is the maximum integer such that (a_t=1) and (2tle k), then (f_alpha (n)sim (t! n)^{1/t}). More importantly, we show that for any constant (c>0), as the length k goes larger, (f_alpha (n)) is upper bounded by (O (n^c)) for almost all (alpha ). Equivalently, no matter what k is, there are only finitely many (alpha ) satisfying (f_alpha (n)=Omega (n^c)). This answers an open problem raised by Johnston and O’Neill in 2023. All of our results can be generalized to modulo p setting for any prime p smoothly.

具有强限制相交的集合系统,称为(alpha ) -相交族(对于一个向量(alpha )),最近被引入,作为几个已经被很好地研究的相交族的推广,包括经典的奇镇和偶镇。给定一个二进制向量(alpha =(a_1, ldots , a_k)),如果对于每个(i=1,2,ldots ,k), ({mathcal {F}})中不同成员的所有i-交叉的大小与(a_i)具有相同的奇偶性,则n元素集合上的子集集合({mathcal {F}})是一个以2模相交的(alpha )族。设(f_alpha (n))表示这种家庭的最大规模。本文研究了(f_alpha (n))在n趋于无穷时的渐近性质。我们证明如果t是最大整数使得(a_t=1)和(2tle k),那么(f_alpha (n)sim (t! n)^{1/t})。更重要的是,我们证明了对于任意常数(c>0),随着长度k的增大,对于几乎所有(alpha ), (f_alpha (n))的上界都是(O (n^c))。同样的,不管k是多少,只有有限个(alpha )满足(f_alpha (n)=Omega (n^c))。这回答了约翰斯顿和奥尼尔在2023年提出的一个悬而未决的问题。我们所有的结果都可以推广到任意素数p的模p集合。
{"title":"On set systems with strongly restricted intersections","authors":"Xin Wei, Xiande Zhang, Gennian Ge","doi":"10.1007/s10623-024-01535-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01535-2","url":null,"abstract":"<p>Set systems with strongly restricted intersections, called <span>(alpha )</span>-intersecting families for a vector <span>(alpha )</span>, were introduced recently as a generalization of several well-studied intersecting families including the classical oddtown and eventown. Given a binary vector <span>(alpha =(a_1, ldots , a_k))</span>, a collection <span>({mathcal {F}})</span> of subsets over an <i>n</i> element set is an <span>(alpha )</span>-intersecting family modulo 2 if for each <span>(i=1,2,ldots ,k)</span>, all <i>i</i>-wise intersections of distinct members in <span>({mathcal {F}})</span> have sizes with the same parity as <span>(a_i)</span>. Let <span>(f_alpha (n))</span> denote the maximum size of such a family. In this paper, we study the asymptotic behavior of <span>(f_alpha (n))</span> when <i>n</i> goes to infinity. We show that if <i>t</i> is the maximum integer such that <span>(a_t=1)</span> and <span>(2tle k)</span>, then <span>(f_alpha (n)sim (t! n)^{1/t})</span>. More importantly, we show that for any constant <span>(c&gt;0)</span>, as the length <i>k</i> goes larger, <span>(f_alpha (n))</span> is upper bounded by <span>(O (n^c))</span> for almost all <span>(alpha )</span>. Equivalently, no matter what <i>k</i> is, there are only finitely many <span>(alpha )</span> satisfying <span>(f_alpha (n)=Omega (n^c))</span>. This answers an open problem raised by Johnston and O’Neill in 2023. All of our results can be generalized to modulo <i>p</i> setting for any prime <i>p</i> smoothly.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"37 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On 3-dimensional MRD codes of type $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$ 论型的三维MRD码 $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-12-05 DOI: 10.1007/s10623-024-01528-1
Daniele Bartoli, Francesco Ghiandoni

In this work we present results on the classification of (mathbb {F}_{q^n})-linear MRD codes of dimension three. In particular, using connections with certain algebraic varieties over finite fields, we provide non-existence results for MRD codes (mathcal {C}=langle X^{q^t}, F(X), G(X) rangle subseteq mathcal {L}_{n,q}) of exceptional type, i.e. such that (mathcal {C}) is MRD over infinitely many extensions of the base field. These results partially address a conjecture of Bartoli, Zini and Zullo in 2023.

在这项工作中,我们提出了(mathbb {F}_{q^n}) -三维线性MRD代码的分类结果。特别地,利用有限域上某些代数变量的连接,我们提供了异常类型的MRD码(mathcal {C}=langle X^{q^t}, F(X), G(X) rangle subseteq mathcal {L}_{n,q})的不存在性结果,即(mathcal {C})是基域无限多扩展上的MRD。这些结果部分解决了Bartoli, Zini和Zullo在2023年的猜想。
{"title":"On 3-dimensional MRD codes of type $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$","authors":"Daniele Bartoli, Francesco Ghiandoni","doi":"10.1007/s10623-024-01528-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01528-1","url":null,"abstract":"<p>In this work we present results on the classification of <span>(mathbb {F}_{q^n})</span>-linear MRD codes of dimension three. In particular, using connections with certain algebraic varieties over finite fields, we provide non-existence results for MRD codes <span>(mathcal {C}=langle X^{q^t}, F(X), G(X) rangle subseteq mathcal {L}_{n,q})</span> of exceptional type, i.e. such that <span>(mathcal {C})</span> is MRD over infinitely many extensions of the base field. These results partially address a conjecture of Bartoli, Zini and Zullo in 2023.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1