Pub Date : 2024-07-04DOI: 10.1007/s10623-024-01453-3
Xu Pan, Hao Chen, Hongwei Liu
In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic codes. In this paper, we study a family of matrix product codes with wonderful properties, which is a generalization of linear codes obtained from the ([u+v|u-v])-construction and ([u+v|lambda ^{-1}u-lambda ^{-1}v])-construction. Then we show that any (lambda )-constacyclic code (not necessary repeated-root (lambda )-constacyclic code) of length N over the finite field (mathbb {F}_q) with (textrm{gcd}(frac{q-1}{textrm{ord}(lambda )},N)ge 2), where (textrm{ord}(lambda )) is the order of (lambda ) in the cyclic group (mathbb {F}^*_q=mathbb {F}_qbackslash {0}), is a matrix product code of some constacyclic codes. It is a highly interesting question that the existence of sequences ({C_1,C_2,C_3,...}) of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances, i.e., (C_i) is an ([n(C_i),k(C_i),d(C_i)]_q)-linear code such that
Based on the ([u+v|lambda ^{-1}u-lambda ^{-1}v])-construction, we construct several families of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances by using Reed-Muller codes, projective Reed-Muller codes. And we construct some new Euclidean isodual (lambda )-constacyclic codes with square-root-like minimum Hamming distances from Euclidean self-dual cyclic codes and Euclidean self-dual negacyclic codes by monomial equivalences.
{"title":"Some self-dual codes and isodual codes constructed by matrix product codes","authors":"Xu Pan, Hao Chen, Hongwei Liu","doi":"10.1007/s10623-024-01453-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01453-3","url":null,"abstract":"<p>In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic codes. In this paper, we study a family of matrix product codes with wonderful properties, which is a generalization of linear codes obtained from the <span>([u+v|u-v])</span>-construction and <span>([u+v|lambda ^{-1}u-lambda ^{-1}v])</span>-construction. Then we show that any <span>(lambda )</span>-constacyclic code (not necessary repeated-root <span>(lambda )</span>-constacyclic code) of length <i>N</i> over the finite field <span>(mathbb {F}_q)</span> with <span>(textrm{gcd}(frac{q-1}{textrm{ord}(lambda )},N)ge 2)</span>, where <span>(textrm{ord}(lambda ))</span> is the order of <span>(lambda )</span> in the cyclic group <span>(mathbb {F}^*_q=mathbb {F}_qbackslash {0})</span>, is a matrix product code of some constacyclic codes. It is a highly interesting question that the existence of sequences <span>({C_1,C_2,C_3,...})</span> of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances, i.e., <span>(C_i)</span> is an <span>([n(C_i),k(C_i),d(C_i)]_q)</span>-linear code such that </p><span>$$begin{aligned} lim _{irightarrow +infty }n(C_i)=+infty ,,,,,text {and},,,,,lim _{irightarrow +infty }frac{d(C_i)}{sqrt{n(C_i)}}>0. end{aligned}$$</span><p>Based on the <span>([u+v|lambda ^{-1}u-lambda ^{-1}v])</span>-construction, we construct several families of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances by using Reed-Muller codes, projective Reed-Muller codes. And we construct some new Euclidean isodual <span>(lambda )</span>-constacyclic codes with square-root-like minimum Hamming distances from Euclidean self-dual cyclic codes and Euclidean self-dual negacyclic codes by monomial equivalences.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"37 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141521431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-02DOI: 10.1007/s10623-024-01433-7
Jin Li, Huilian Zhu, Shan Huang
BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are still very limited. In this paper, we investigate some q-ary BCH codes and (lambda )-constacyclic BCH codes of length (q^{m}+1), where q is a prime power and (textrm{ord}(lambda )mid q-1). We determine the dimensions of these codes with some large designed distances, and give good lower bounds on the minimum distance. The code examples presented in this paper indicate that these codes contain many distance-optimal codes and codes with best known parameters.
{"title":"Some constacyclic BCH codes with good parameters","authors":"Jin Li, Huilian Zhu, Shan Huang","doi":"10.1007/s10623-024-01433-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01433-7","url":null,"abstract":"<p>BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are still very limited. In this paper, we investigate some <i>q</i>-ary BCH codes and <span>(lambda )</span>-constacyclic BCH codes of length <span>(q^{m}+1)</span>, where <i>q</i> is a prime power and <span>(textrm{ord}(lambda )mid q-1)</span>. We determine the dimensions of these codes with some large designed distances, and give good lower bounds on the minimum distance. The code examples presented in this paper indicate that these codes contain many distance-optimal codes and codes with best known parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"93 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141489579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-27DOI: 10.1007/s10623-024-01436-4
Qiang Wang
In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In particular, we describe a framework in terms of a commutative diagram which unifies several recent methods in finding the inverses of permutation polynomials.
{"title":"A survey of compositional inverses of permutation polynomials over finite fields","authors":"Qiang Wang","doi":"10.1007/s10623-024-01436-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01436-4","url":null,"abstract":"<p>In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In particular, we describe a framework in terms of a commutative diagram which unifies several recent methods in finding the inverses of permutation polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141462364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-27DOI: 10.1007/s10623-024-01449-z
Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
Deterministic random bit generators (DRBGs) are essential tools in modern cryptography for generating secure and unpredictable random numbers. The ISO DRBG standards provide guidelines for designing and implementing DRBGs, including four algorithms: (textsf{HASH}text {-}textsf{DRBG}), (textsf{HMAC}text {-}textsf{DRBG}), (textsf{CTR}text {-}textsf{DRBG}), and (textsf{OFB}text {-}textsf{DRBG}). While security analyses have been conducted for the former three algorithms, there is a lack of specific security analysis for the (textsf{OFB})-(textsf{DRBG}) algorithm. We prove its security in the robustness security framework that has been used to analyze (mathsf {CTRtext {-}DRBG}) by Hoang and Shen at Crypto 2020. More precisely, we prove that (textsf{OFB})-(textsf{DRBG}) provides (O(min left{ frac{lambda }{3}, frac{n}{2} right} ))-bit security, including ideal cipher queries, where (lambda ) and n denote the lower bound of min-entropy and the size of the underlying block cipher, respectively. The proof strategy is to transform the robustness game of (textsf{OFB})-(textsf{DRBG}) into an indistinguishability game and then apply the H-coefficient technique to upper bound the distinguishing advantage.
{"title":"Security analysis of the ISO standard $$textsf{OFB}$$ - $$textsf{DRBG}$$","authors":"Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee","doi":"10.1007/s10623-024-01449-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01449-z","url":null,"abstract":"<p>Deterministic random bit generators (DRBGs) are essential tools in modern cryptography for generating secure and unpredictable random numbers. The ISO DRBG standards provide guidelines for designing and implementing DRBGs, including four algorithms: <span>(textsf{HASH}text {-}textsf{DRBG})</span>, <span>(textsf{HMAC}text {-}textsf{DRBG})</span>, <span>(textsf{CTR}text {-}textsf{DRBG})</span>, and <span>(textsf{OFB}text {-}textsf{DRBG})</span>. While security analyses have been conducted for the former three algorithms, there is a lack of specific security analysis for the <span>(textsf{OFB})</span>-<span>(textsf{DRBG})</span> algorithm. We prove its security in the robustness security framework that has been used to analyze <span>(mathsf {CTRtext {-}DRBG})</span> by Hoang and Shen at Crypto 2020. More precisely, we prove that <span>(textsf{OFB})</span>-<span>(textsf{DRBG})</span> provides <span>(O(min left{ frac{lambda }{3}, frac{n}{2} right} ))</span>-bit security, including ideal cipher queries, where <span>(lambda )</span> and <i>n</i> denote the lower bound of min-entropy and the size of the underlying block cipher, respectively. The proof strategy is to transform the robustness game of <span>(textsf{OFB})</span>-<span>(textsf{DRBG})</span> into an indistinguishability game and then apply the H-coefficient technique to upper bound the distinguishing advantage.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"48 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141462439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-27DOI: 10.1007/s10623-024-01447-1
Somi Gupta, Francesco Pavese
An affine spread is a set of subspaces of (textrm{AG}(n, q)) of the same dimension that partitions the points of (textrm{AG}(n, q)). Equivalently, an affine spread is a set of projective subspaces of (textrm{PG}(n, q)) of the same dimension which partitions the points of (textrm{PG}(n, q) setminus H_{infty }); here (H_{infty }) denotes the hyperplane at infinity of the projective closure of (textrm{AG}(n, q)). Let (mathcal {Q}) be a non-degenerate quadric of (H_infty ) and let (Pi ) be a generator of (mathcal {Q}), where (Pi ) is a t-dimensional projective subspace. An affine spread (mathcal {P}) consisting of ((t+1))-dimensional projective subspaces of (textrm{PG}(n, q)) is called hyperbolic, parabolic or elliptic (according as (mathcal {Q}) is hyperbolic, parabolic or elliptic) if the following hold: