Pub Date : 2025-04-18DOI: 10.1007/s10623-025-01615-x
Altan B. Kılıç, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani
This paper builds a novel bridge between algebraic coding theory and mathematical knot theory, with applications in both directions. We give methods to construct error-correcting codes starting from the colorings of a knot, describing through a series of results how the properties of the knot translate into code parameters. We show that knots can be used to obtain error-correcting codes with prescribed parameters and an efficient decoding algorithm.
{"title":"Knot theory and error-correcting codes","authors":"Altan B. Kılıç, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani","doi":"10.1007/s10623-025-01615-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01615-x","url":null,"abstract":"<p>This paper builds a novel bridge between algebraic coding theory and mathematical knot theory, with applications in both directions. We give methods to construct error-correcting codes starting from the colorings of a knot, describing through a series of results how the properties of the knot translate into code parameters. We show that knots can be used to obtain error-correcting codes with prescribed parameters and an efficient decoding algorithm.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143849749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-10DOI: 10.1007/s10623-025-01590-3
Yuqing Zhu, Chang Lv, Jiqiang Liu
The hardness of discrete logarithm problem (DLP) over finite fields forms the security foundation of many cryptographic schemes. When the characteristic is not small, the state-of-the-art algorithms for solving the DLP are the number field sieve (NFS) and its variants. NFS first computes the logarithms of the factor base, which consists of elements of small norms. Then, for a target element, its logarithm is calculated by establishing a relation with the factor base. Although computing the factor-base elements is the most time-consuming part of NFS, it can be performed only once and treated as pre-computation for a fixed finite field when multiple logarithms need to be computed. In this paper, we present a method for accelerating individual logarithm computation by utilizing two subfields. We focus on the case where the extension degree of the finite field is a multiple of 6 within the extended tower number field sieve framework. Our method allows for the construction of an element with a lower degree, while maintaining the same coefficient bound compared to Guillevic’s method, which uses only one subfield. Consequently, the element derived from our approach enjoys a smaller norm, which will improve the efficiency in individual logarithm computation.
{"title":"Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve","authors":"Yuqing Zhu, Chang Lv, Jiqiang Liu","doi":"10.1007/s10623-025-01590-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01590-3","url":null,"abstract":"<p>The hardness of discrete logarithm problem (DLP) over finite fields forms the security foundation of many cryptographic schemes. When the characteristic is not small, the state-of-the-art algorithms for solving the DLP are the number field sieve (NFS) and its variants. NFS first computes the logarithms of the factor base, which consists of elements of small norms. Then, for a target element, its logarithm is calculated by establishing a relation with the factor base. Although computing the factor-base elements is the most time-consuming part of NFS, it can be performed only once and treated as pre-computation for a fixed finite field when multiple logarithms need to be computed. In this paper, we present a method for accelerating individual logarithm computation by utilizing two subfields. We focus on the case where the extension degree of the finite field is a multiple of 6 within the extended tower number field sieve framework. Our method allows for the construction of an element with a lower degree, while maintaining the same coefficient bound compared to Guillevic’s method, which uses only one subfield. Consequently, the element derived from our approach enjoys a smaller norm, which will improve the efficiency in individual logarithm computation.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"26 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143819557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-09DOI: 10.1007/s10623-025-01628-6
Matteo Bonini, Martino Borello, Eimear Byrne
We introduce the concept of a sum–rank saturating system and outline its correspondence to covering properties of a sum–rank metric code. We consider the problem of determining the shortest length of a sum–rank-(rho )-saturating system of a fixed dimension, which is equivalent to the covering problem in the sum–rank metric. We obtain upper and lower bounds on this quantity. We also give constructions of saturating systems arising from geometrical structures.
{"title":"The geometry of covering codes in the sum–rank metric","authors":"Matteo Bonini, Martino Borello, Eimear Byrne","doi":"10.1007/s10623-025-01628-6","DOIUrl":"https://doi.org/10.1007/s10623-025-01628-6","url":null,"abstract":"<p>We introduce the concept of a sum–rank saturating system and outline its correspondence to covering properties of a sum–rank metric code. We consider the problem of determining the shortest length of a sum–rank-<span>(rho )</span>-saturating system of a fixed dimension, which is equivalent to the covering problem in the sum–rank metric. We obtain upper and lower bounds on this quantity. We also give constructions of saturating systems arising from geometrical structures.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"74 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143805904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-07DOI: 10.1007/s10623-025-01601-3
Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo M. Sánchez-Ledesma
We prove the equivalence between the Ring Learning With Errors (RLWE) and the Polynomial Learning With Errors (PLWE) problems for the maximal totally real subfield of the (2^r 3^s)th cyclotomic field for (r ge 3) and (s ge 1). Moreover, we describe a fast algorithm for computing the product of two elements in the ring of integers of these subfields. This multiplication algorithm has quasilinear complexity in the dimension of the field, as it makes use of the fast Discrete Cosine Transform (DCT). Our approach assumes that the two input polynomials are given in a basis of Chebyshev-like polynomials, in contrast to the customary power basis. To validate this assumption, we prove that the change of basis from the power basis to the Chebyshev-like basis can be computed with ({mathcal {O}}(n log n)) arithmetic operations, where n is the problem dimension. Finally, we provide a heuristic and theoretical comparison of the vulnerability to some attacks for the pth cyclotomic field versus the maximal totally real subextension of the 4pth cyclotomic field for a reasonable set of parameters of cryptographic size.
我们证明了带误差环学习(RLWE)问题与带误差多项式学习(PLWE)问题在全实数子域上的等价性 (2^r 3^s)切眼场为 (r ge 3) 和 (s ge 1). 此外,我们还描述了一种计算这些子域的整数环中两个元素乘积的快速算法。该乘法算法在域的维度上具有拟线性复杂性,因为它使用了快速的离散余弦变换(DCT)。我们的方法假设两个输入多项式是在类似切比雪夫多项式的基础上给出的,与习惯的幂基相反。为了验证这一假设,我们证明了基从幂基到类切比雪夫基的变化可以用 ({mathcal {O}}(n log n)) 算术运算,其中n是问题维数。最后,我们提供了一个启发式的和理论上的比较,在一组合理的密码大小参数下,第p个环形域与第4个环形域的最大全实子扩展对某些攻击的脆弱性。
{"title":"Fast multiplication and the PLWE–RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields","authors":"Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo M. Sánchez-Ledesma","doi":"10.1007/s10623-025-01601-3","DOIUrl":"https://doi.org/10.1007/s10623-025-01601-3","url":null,"abstract":"<p>We prove the equivalence between the Ring Learning With Errors (RLWE) and the Polynomial Learning With Errors (PLWE) problems for the maximal totally real subfield of the <span>(2^r 3^s)</span>th cyclotomic field for <span>(r ge 3)</span> and <span>(s ge 1)</span>. Moreover, we describe a fast algorithm for computing the product of two elements in the ring of integers of these subfields. This multiplication algorithm has quasilinear complexity in the dimension of the field, as it makes use of the fast Discrete Cosine Transform (DCT). Our approach assumes that the two input polynomials are given in a basis of Chebyshev-like polynomials, in contrast to the customary power basis. To validate this assumption, we prove that the change of basis from the power basis to the Chebyshev-like basis can be computed with <span>({mathcal {O}}(n log n))</span> arithmetic operations, where <i>n</i> is the problem dimension. Finally, we provide a heuristic and theoretical comparison of the vulnerability to some attacks for the <i>p</i>th cyclotomic field versus the maximal totally real subextension of the 4<i>p</i>th cyclotomic field for a reasonable set of parameters of cryptographic size.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"74 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143797694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-07DOI: 10.1007/s10623-025-01621-z
Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi
Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Constructing binary cyclic codes with parameters ([n, frac{n+1}{2}, d ge sqrt{n}]) is an interesting topic in coding theory, as their minimum distances have a square-root bound. Let (n=2^lambda -1), where (lambda ) has three forms: (p^2, p_1p_2, 2p_2) for odd primes (p, p_1, p_2). In this paper, we mainly construct several classes of binary cyclic codes with parameters ([2^lambda -1, k ge 2^{lambda -1}, d ge sqrt{n}]). Specifically, the binary cyclic codes ({mathcal {C}}_{(1, p^2)}), ({mathcal {C}}_{(1, 2p_2)}), ({mathcal {C}}_{(2, 2p_2)}), and ({mathcal {C}}_{(1, p_1p_2)}) have minimum distance (d ge sqrt{n}) though their dimensions satisfy (k > frac{n+1}{2}). Moreover, two classes of binary cyclic codes ({mathcal {C}}_{(2, p^2)}) and ({mathcal {C}}_{(2, p_1p_2)}) with dimension (k= frac{n+1}{2}) and minimum distance d much exceeding the square-root bound are presented, which extends the results given by Sun, Li, and Ding [30]. In fact, the rate of these two classes of binary cyclic codes are around (frac{1}{2}) and the lower bounds on their minimum distances are close to (frac{n}{log _2 n}). In addition, their extended codes are also investigated.
循环码是一种有趣的线性码,由于其高效的编解码算法,在通信和存储系统中有着广泛的应用。构造参数为([n, frac{n+1}{2}, d ge sqrt{n}])的二进制循环码是编码理论中一个有趣的话题,因为它们的最小距离具有平方根界。设(n=2^lambda -1),其中(lambda )有三种形式:(p^2, p_1p_2, 2p_2)表示奇数素数(p, p_1, p_2)。本文主要构造了几类参数为([2^lambda -1, k ge 2^{lambda -1}, d ge sqrt{n}])的二进制循环码。具体来说,二进制循环码({mathcal {C}}_{(1, p^2)})、({mathcal {C}}_{(1, 2p_2)})、({mathcal {C}}_{(2, 2p_2)})和({mathcal {C}}_{(1, p_1p_2)})的最小距离为(d ge sqrt{n}),但它们的维数满足(k > frac{n+1}{2})。此外,给出了维数(k= frac{n+1}{2})和最小距离d远远超过平方根界的两类二进制循环码({mathcal {C}}_{(2, p^2)})和({mathcal {C}}_{(2, p_1p_2)}),推广了Sun、Li、Ding[30]的结果。事实上,这两类二进制循环码的速率在(frac{1}{2})左右,其最小距离的下界接近(frac{n}{log _2 n})。此外,还研究了它们的扩展码。
{"title":"Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound","authors":"Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi","doi":"10.1007/s10623-025-01621-z","DOIUrl":"https://doi.org/10.1007/s10623-025-01621-z","url":null,"abstract":"<p>Cyclic codes are an interesting type of linear codes and have wide applications in communication and storage systems due to their efficient encoding and decoding algorithms. Constructing binary cyclic codes with parameters <span>([n, frac{n+1}{2}, d ge sqrt{n}])</span> is an interesting topic in coding theory, as their minimum distances have a square-root bound. Let <span>(n=2^lambda -1)</span>, where <span>(lambda )</span> has three forms: <span>(p^2, p_1p_2, 2p_2)</span> for odd primes <span>(p, p_1, p_2)</span>. In this paper, we mainly construct several classes of binary cyclic codes with parameters <span>([2^lambda -1, k ge 2^{lambda -1}, d ge sqrt{n}])</span>. Specifically, the binary cyclic codes <span>({mathcal {C}}_{(1, p^2)})</span>, <span>({mathcal {C}}_{(1, 2p_2)})</span>, <span>({mathcal {C}}_{(2, 2p_2)})</span>, and <span>({mathcal {C}}_{(1, p_1p_2)})</span> have minimum distance <span>(d ge sqrt{n})</span> though their dimensions satisfy <span>(k > frac{n+1}{2})</span>. Moreover, two classes of binary cyclic codes <span>({mathcal {C}}_{(2, p^2)})</span> and <span>({mathcal {C}}_{(2, p_1p_2)})</span> with dimension <span>(k= frac{n+1}{2})</span> and minimum distance <i>d</i> much exceeding the square-root bound are presented, which extends the results given by Sun, Li, and Ding [30]. In fact, the rate of these two classes of binary cyclic codes are around <span>(frac{1}{2})</span> and the lower bounds on their minimum distances are close to <span>(frac{n}{log _2 n})</span>. In addition, their extended codes are also investigated.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143797794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-05DOI: 10.1007/s10623-025-01599-8
Eric Kubischta, Ian Teixeira
In a recent paper, we defined a type of weighted unitary design called a twisted unitary 1-group and showed that such a design automatically induced error-detecting quantum codes. We also showed that twisted unitary 1-groups correspond to irreducible products of characters thereby reducing the problem of code-finding to a computation in the character theory of finite groups. Using a combination of GAP computations and results from the mathematics literature on irreducible products of characters, we identify many new non-trivial quantum codes with unusual transversal gates. Transversal gates are of significant interest to the quantum information community for their central role in fault tolerant quantum computing. Most unitary (text {t})-designs have never been realized as the transversal gate group of a quantum code. We, for the first time, find nontrivial quantum codes realizing nearly every finite group which is a unitary 2-design or better as the transversal gate group of some error-detecting quantum code.
{"title":"Quantum codes and irreducible products of characters","authors":"Eric Kubischta, Ian Teixeira","doi":"10.1007/s10623-025-01599-8","DOIUrl":"https://doi.org/10.1007/s10623-025-01599-8","url":null,"abstract":"<p>In a recent paper, we defined a type of weighted unitary design called a twisted unitary 1-group and showed that such a design automatically induced error-detecting quantum codes. We also showed that twisted unitary 1-groups correspond to irreducible products of characters thereby reducing the problem of code-finding to a computation in the character theory of finite groups. Using a combination of GAP computations and results from the mathematics literature on irreducible products of characters, we identify many new non-trivial quantum codes with unusual transversal gates. Transversal gates are of significant interest to the quantum information community for their central role in fault tolerant quantum computing. Most unitary <span>(text {t})</span>-designs have never been realized as the transversal gate group of a quantum code. We, for the first time, find nontrivial quantum codes realizing nearly every finite group which is a unitary 2-design or better as the transversal gate group of some error-detecting quantum code.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"72 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143784818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-05DOI: 10.1007/s10623-025-01624-w
Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith
Let p be a prime number, m be a positive integer, and (q=p^m). For any fixed locality r such that (pnot mid r(r+1)), we construct infinite families of locally recoverable codes with availabilty of nodes lower bounded by (q/r!+O(sqrt{q})) and number of locality sets equal to (q^2/(r+1)!+O(q^{3/2})).
{"title":"Constructions of locally recoverable codes with large availability","authors":"Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith","doi":"10.1007/s10623-025-01624-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01624-w","url":null,"abstract":"<p>Let <i>p</i> be a prime number, <i>m</i> be a positive integer, and <span>(q=p^m)</span>. For any fixed locality <i>r</i> such that <span>(pnot mid r(r+1))</span>, we construct infinite families of locally recoverable codes with availabilty of nodes lower bounded by <span>(q/r!+O(sqrt{q}))</span> and number of locality sets equal to <span>(q^2/(r+1)!+O(q^{3/2}))</span>.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"34 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143784812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-03DOI: 10.1007/s10623-025-01623-x
Julia Lieb, Raquel Pinto, Carlos Vela
In this paper, we propose a new erasure decoding algorithm for convolutional codes using the generator matrix. This implies that our decoding method also applies to catastrophic convolutional codes in opposite to the classic approach using the parity-check matrix. We compare the performance of both decoding algorithms. Moreover, we enlarge the family of optimal convolutional codes (complete-MDP) based on the generator matrix.
{"title":"A new method for erasure decoding of convolutional codes","authors":"Julia Lieb, Raquel Pinto, Carlos Vela","doi":"10.1007/s10623-025-01623-x","DOIUrl":"https://doi.org/10.1007/s10623-025-01623-x","url":null,"abstract":"<p>In this paper, we propose a new erasure decoding algorithm for convolutional codes using the generator matrix. This implies that our decoding method also applies to catastrophic convolutional codes in opposite to the classic approach using the parity-check matrix. We compare the performance of both decoding algorithms. Moreover, we enlarge the family of optimal convolutional codes (complete-MDP) based on the generator matrix.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"17 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143766850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-04-01DOI: 10.1007/s10623-025-01619-7
Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José
The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, t-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by (x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y) over the finite field of cardinality (q^s), where u is a positive divisor of (frac{q^s - 1}{q - 1}). As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.
{"title":"The weight hierarchy of decreasing norm-trace codes","authors":"Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José","doi":"10.1007/s10623-025-01619-7","DOIUrl":"https://doi.org/10.1007/s10623-025-01619-7","url":null,"abstract":"<p>The Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, <i>t</i>-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined for some families of codes, including Cartesian codes and Hermitian one-point codes. In this paper, we determine the generalized Hamming weights of decreasing norm-trace codes, which are linear codes defined by evaluating sets of monomials that are closed under divisibility on the rational points of the extended norm-trace curve given by <span>(x^{u} = y^{q^{s - 1}} + y^{q^{s - 2}} + cdots + y)</span> over the finite field of cardinality <span>(q^s)</span>, where <i>u</i> is a positive divisor of <span>(frac{q^s - 1}{q - 1})</span>. As a particular case, we obtain the weight hierarchy of one-point norm-trace codes and recover the result of Barbero and Munuera (2001) giving the weight hierarchy of one-point Hermitian codes. We also study the relative generalized Hamming weights for these codes and use them to construct impure quantum codes with excellent parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143745305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-03-29DOI: 10.1007/s10623-025-01616-w
Xiao-juan Wang, Tian Tian, Wen-feng Qi
Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an n-bit F-Ring NFSR generates n sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is singular. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an n-stage m-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of (2^n-1). At last, two toy examples are given to illustrate the new configuration.
{"title":"On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods","authors":"Xiao-juan Wang, Tian Tian, Wen-feng Qi","doi":"10.1007/s10623-025-01616-w","DOIUrl":"https://doi.org/10.1007/s10623-025-01616-w","url":null,"abstract":"<p>Nonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an <i>n</i>-bit F-Ring NFSR generates <i>n</i> sequences with the same period simultaneously, that is, sequences from all bit registers have the same period. Recall that the ring-like cascade connection proposed by Zhao et al. (Des Codes Cryptogr 86:2775–2790, 2018) also has such period property. But it is abnormal that if every component shift register is nonsingular, then the ring-like cascade connection is <i>singular</i>. F-Ring NFSRs proposed in this paper could fix this weakness. Moreover, it is proved that when an <i>n</i>-stage <i>m</i>-sequence is input to the internal state of an F-Ring NFSR by xor, the periods of its internal state are multiples of <span>(2^n-1)</span>. At last, two toy examples are given to illustrate the new configuration.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"216 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143736558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}