-
A class of triple-twisted GRS codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-05 Kapish Chand Meena, Piyush Pachauri, Ambrish Awasthi, Maheshanand Bhaintwal
This paper focuses on the study of triple-twisted generalized Reed–Solomon (TTGRS) codes over a finite field \({\mathbb {F}}_q\), having twists \(\varvec{t} = (1, 2, 3)\) and hooks \(\varvec{h} = (0, 1, 2)\). We have obtained the necessary and sufficient conditions for such TTGRS codes to be MDS, AMDS, and AAMDS via algebraic techniques. We have also enumerated these codes for some particular values
-
Constructing k-ary orientable sequences with asymptotically optimal length Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-28 Daniel Gabrić, Joe Sawada
An orientable sequence of order n over an alphabet\(\{0,1,\ldots , k{-}1\}\) is a cyclic sequence such that each length-n substring appears at most once in either direction. When \(k= 2\), efficient algorithms are known to construct binary orientable sequences, with asymptotically optimal length, by applying the classic cycle-joining technique. The key to the construction is the definition of a parent
-
Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-27 Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang
SCARF, an ultra low-latency tweakable block cipher, is the first cipher designed for cache randomization. The block cipher design is significantly different from other common tweakable block ciphers; with a block size of only 10 bits, and yet the input key size is a whopping 240 bits. Notably, the majority of the round key in its round function is absorbed into the data path through AND operations
-
A new family of AMDS symbol-pair constacyclic codes of length $$\textbf{4p}$$ and symbol-pair distance $$\textbf{9}$$ Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-27 Hai Q. Dinh, Hieu V. Ha, Bac T. Nguyen, Thieu N. Vo
Let p be any prime number such that \(p\equiv 1 \pmod 4\), and let \({\mathbb {F}}_p\) be the finite field of p elements. In this paper, we first construct a new AMDS symbol-pair cyclic code of length 4p and of symbol-pair distance 9 by examining its generator polynomial. We then use the generator polynomial to obtain a family of \((p-1)/2\) AMDS symbol-pair constacyclic codes of the same length and
-
Introducing locality in some generalized AG codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-24 Bastien Pacifico
In 1999, Xing, Niederreiter and Lam introduced a generalization of AG codes (GAG codes) using the evaluation at non-rational places of a function field. In this paper, we show that one can obtain a locality parameter r in such codes by using only non-rational places of degree at most r. This is, up to the author’s knowledge, a new way to construct locally recoverable codes (LRCs). We give an example
-
Bounds and constructions of optimal symbol-pair codes with constant pair-weight Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-22 Mengzhen Zhao, Yanxun Chang
Symbol-pair codes introduced by Cassuto and Blaum in 2010 are designed to protect against pair errors in symbol-pair read channels. This special channel structure is motivated by the limitations of the reading process in high density data storage systems, where it is no longer possible to read individual symbols. In this work, we study bounds and constructions of codes in symbol-pair metric. By using
-
Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-18 Hengming Zhao, Rongcun Qin, Minquan Cheng, Dianhua Wu
Two-dimensional multilength optical orthogonal codes (2D MLOOCs) were proposed as a means of simultaneously reducing the chip rate and accommodating multimedia services with multiple bit rates and quality of service (QoS) requirements in OCDMA networks. This paper considers two-dimensional multilength optical orthogonal codes with inter-cross-correlation of \(\lambda =2\). New upper bounds on the size
-
A generalized construction of variable-length non-overlapping codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-15 Chunyan Qin, Gaojun Luo
Non-overlapping codes over a given alphabet are defined as a set of words satisfying the property that no prefix of any length of any word is a suffix of any word in the set, including itself. When the word lengths are variable, it is additionally required that no word is contained as a subword within any other word. In this paper, we present a new construction of variable-length non-overlapping codes
-
A note on the Walsh spectrum of the Flystel Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-15 Matthias Johann Steiner
Anemoi is a family of compression and hash functions over finite fields \(\mathbb {F}_q\) for efficient Zero-Knowledge applications. Its round function is based on a novel permutation \(\mathcal {H}: \mathbb {F}_q^2 \rightarrow \mathbb {F}_q^2\), called the open Flystel, which is parametrized by a permutation \(E: \mathbb {F}_q \rightarrow \mathbb {F}_q\) and two functions \(Q_\gamma , Q_\delta : \mathbb
-
Probabilistic results on the 2-adic complexity Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-14 Zhixiong Chen, Arne Winterhof
This work is devoted to solving some closely related open problems on the average and asymptotic behavior of the 2-adic complexity of binary sequences. First, for fixed N, we prove that the expected value \(E^{\text {2-adic}}_N\) of the 2-adic complexity over all binary sequences of length N is close to \(\frac{N}{2}\) and the deviation from \(\frac{N}{2}\) is at most of order of magnitude \(\log (N)\)
-
Constructions of complete permutations in multiplication Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-14 Kangquan Li
Complete permutations in addition over finite fields have attracted many scholars’ attention due to their wide applications in combinatorics, cryptography, sequences, and so on. In 2020, Tu et al. introduced the concept of the complete permutation in the sense of multiplication (CPM for short). In this paper, we further study the constructions and applications of CPMs. We mainly construct many classes
-
Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-14 Alexander L. Gavrilyuk, Vladislav V. Kabanov
In a previous paper, the authors determined the parameters of all strongly regular graphs that can be decomposed into a divisible design graph and a Hoffman coclique. As a counterpart of this result, in the present paper we determine the parameters of all strongly regular graphs that can be decomposed into a divisible design graph and a Delsarte clique. In particular, an infinite family of strongly
-
Secret and shared keys recovery on hamming quasi-cyclic with SASCA Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-12 Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau
Soft Analytical Side Channel Attacks (SASCA) are a powerful family of Side Channel Attacks (SCA) that allows the recovery of secret values with only a small number of traces. Their effectiveness lies in the Belief Propagation (BP) algorithm, which enables efficient computation of the marginal distributions of intermediate values. Post-quantum schemes such as Kyber, and more recently, Hamming Quasi-Cyclic
-
On equidistant single-orbit cyclic and quasi-cyclic subspace codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-12 Mahak, Maheshanand Bhaintwal
A code is said to be equidistant if the distance between any two distinct codewords of the code is the same. In this paper, we have studied equidistant single-orbit cyclic and quasi-cyclic subspace codes. The orbit code generated by a subspace U in \({\mathbb {F}}_{q^n}\) such that the dimension of U over \({\mathbb {F}}_q\) is t or \(n-t\), \(\text{ where }~t=\dim _{{\mathbb {F}}_q}(\text{ Stab }(U)\cup
-
Construction of optimal flag codes by MRD codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-10 Shuangqing Liu, Shuhui Yu, Lijun Ji
Flag codes have received a lot of attention due to its application in random network coding. In 2021, Alonso-González et al. constructed optimal \((n,{\mathcal {A}})_{q}\)-Optimum distance flag codes (ODFC) for \({\mathcal {A}}\subseteq \{1,2,\ldots ,k,n-k,\ldots ,n-1\}\) with \(k\in {\mathcal {A}}\) and \(k\mid n\). In this paper, we introduce a new construction of \((n,{\mathcal {A}})_q\)-ODFCs by
-
New models for the cryptanalysis of ASCON Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-08 Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher
This paper focuses on the cryptanalysis of the ASCON family using automatic tools. We analyze two different problems with the goal to obtain new modelings, both simpler and less computationally heavy than previous works (all our models require only a small amount of code and run on regular desktop computers). The first problem is the search for Meet-in-the-middle attacks on reduced-round ASCON–XOF
-
Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-08 Chunghun Baek, Taechan Kim
Recent improvements to garbled circuits are mainly focused on reducing their size. The state-of-the-art construction of Rosulek and Roy (Crypto 2021) requires \(1.5\kappa \) bits for garbling AND gates in the free-XOR setting. This is below the previously proven lower bound \(2\kappa \) in the linear garbling model of Zahur, Rosulek, and Evans (Eurocrypt 2015). Whether their construction is optimal
-
The asymptotic existence of BIBDs having a nesting Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-08 Xinyue Ming, Tao Feng, Menglong Zhang
A \((v,k,\lambda )\)-BIBD \((X,\mathcal {B})\) has a nesting if there is a mapping \(\phi :\mathcal {B}\rightarrow X\) such that \((X,\{B\cup \{\phi (B)\}\mid B\in \mathcal {B}\})\) is a \((v,k+1,\lambda +1)\)-packing. If the \((v,k+1,\lambda +1)\)-packing is a \((v,k+1,\lambda +1)\)-BIBD, then this nesting is said to be perfect. We show that given any positive integers k and \(\lambda \), if \(k\ge
-
New results on non-disjoint and classical strong external difference families Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-05 Sophie Huczynska, Sophie Hume
Classical strong external difference families (SEDFs) are much-studied combinatorial structures motivated by information security applications; it is conjectured that only one classical abelian SEDF exists with more than two sets. Recently, non-disjoint SEDFs were introduced; it was shown that families of these exist with arbitrarily many sets. We present constructions for both classical and non-disjoint
-
A new automatic framework for searching rotational-XOR differential characteristics in ARX ciphers Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-05 Yuhan Zhang, Lei Zhang, Yafei Zheng, Wenling Wu
In this paper, a security evaluation framework for ARX ciphers, using modular addition as non-linear component, against rotational-XOR differential cryptanalysis is proposed. We first model all the possible propagations for rotational-XOR difference and rotational-XOR differential probability by some conjunctive normal form clauses. Then, acceleration techniques of automatic search are presented to
-
The revised boomerang connectivity tables and their connection to the difference distribution table Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-01 Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stănică
It is well-known that functions over finite fields play a crucial role in designing substitution boxes (S-boxes) in modern block ciphers. In order to analyze the security of an S-box, recently, three new tables have been introduced: the Extended Boomerang Connectivity Table (EBCT), the Lower Boomerang Connectivity Table (LBCT), and the Upper Boomerang Connectivity Table (UBCT). In fact, these tables
-
Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-01 Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro
Side Channel Attacks (SCA) exploit physical information leakage from devices performing cryptographic operations, posing significant security threats. While SCA has been extensively studied in the context of block ciphers, similar analyses on stream ciphers and constructions like authenticated encryption are less explored. In this paper, we present a novel enhancement to existing SCA techniques based
-
Perturbation-resilient sets for dynamic service balancing Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-31 Jin Sima, Chao Pan, Olgica Milenkovic
A combinatorial trade is a pair of sets of blocks of elements that can be exchanged while preserving relevant subset intersection constraints. The class of balanced and swap-robust minimal trades was proposed in Pan et al. (in: 2022 IEEE International Symposium on Information Theory (ISIT), IEEE, pp 2385–2390, 2022) for exchanging blocks of data chunks stored on distributed storage systems in an access-
-
Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-02-01 Zuling Chang, Qiang Wang
Experimental results show that, when the order n is odd, there are de Bruijn sequences such that the corresponding complement sequence and the reverse sequence are the same. In this paper, we propose one efficient method to generate such de Bruijn sequences. This solves an open problem asked by Fredricksen forty years ago for showing the existence of such de Bruijn sequences when the odd order \(n
-
A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-30 Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang
Due to the operational efficiency and lower computational costs of the Chebyshev polynomial compared to ECC, this chaotic system has attracted widespread attention in public key cryptography. However, the single recurrence coefficient limitation and inherent short-period flaw, often render the Chebyshev polynomials cryptosystem ineffective against various attacks, such as Exhaustive Attacks and Ciphertext-Only
-
Linear complementary pairs of skew constacyclic codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-31 F. J. Lobillo, José Manuel Muñoz
Linear complementary pairs (LCPs) of codes have been studied since they were introduced in the context of discussing mitigation measures against possible hardware attacks to integrated circuits. In this situation, the security parameters for LCPs of codes are defined as the (Hamming) distance and the dual distance of the codes in the pair. We study the properties of LCPs of skew constacyclic codes
-
On vectorial functions with maximal number of bent components Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-31 Xianhong Xie, Yi Ouyang, Honggang Hu
We study vectorial functions with maximal number of bent components in this paper. We first study the Walsh transform and nonlinearity of \(F(x)=x^{2^e}h(\textrm{Tr}_{2^{2m}/2^m}(x))\), where \(e\ge 0\) and h(x) is a permutation over \({\mathbb {F}}_{2^m}\). If h(x) is monomial, the nonlinearity of F(x) is shown to be at most \( 2^{2\,m-1}-2^{\lfloor \frac{3\,m}{2}\rfloor }\) and some non-plateaued
-
On polynomials over finite fields that are free of binomials Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-29 Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas
Let \(\mathbb {F}_q\) be the finite field with q elements, where q is a power of a prime p. Given a monic polynomial \(f \in \mathbb {F}_q[x]\) that is not divisible by x, there exists a positive integer \(e=e(f)\) such that f(x) divides the binomial \(x^e-1\) and e is minimal with this property. The integer e is commonly known as the order of f and we write \(\textrm{ord}(f)=e\). Motivated by a recent
-
Polynomial reduction from syndrome decoding problem to regular decoding problem Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-28 Pavol Zajac
The regular decoding problem asks for (the existence of) regular solutions to a syndrome decoding problem (SDP). This problem has increased applications in post-quantum cryptography and cryptanalysis. Recently, Esser and Santini explored in depth the connection between the regular (RSD) and classical syndrome decoding problems. They have observed that while RSD to SDP reductions are known (in any parametric
-
Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4 Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-24 Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel
Let \(n=2^k-1\) and \(m=2^{k-2}\) for a certain \(k\ge 3\). Consider the point-line geometry of 2m-element subsets of an n-element set. Maximal singular subspaces of this geometry correspond to binary simplex codes of dimension k. For \(k\ge 4\) the associated collinearity graph contains maximal cliques different from maximal singular subspaces. We investigate maximal cliques corresponding to symmetric
-
Efficient information-theoretic distributed point functions with general output groups Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-16 Junru Li, Pengzhen Ke, Liang Feng Zhang
An n-server information-theoretic Distributed Point Function (DPF) allows a client to secret-share a point function \(f_{\alpha ,\beta }(x)\) with domain [N] and output group \(\mathbb {G}\) among n servers such that each server learns no information about the function from its share (called a key) but can compute an additive share of \(f_{\alpha ,\beta }(x)\) for any x. DPFs with small key sizes and
-
Additive twisted codes: new distance bounds and infinite families of quantum codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-16 Reza Dastbasteh, Petr Lisoněk
We provide a new construction of quantum codes that enables integration of a broader class of classical codes into the mathematical framework of quantum stabilizer codes. Next, we present new connections between twisted codes and linear cyclic codes and provide novel bounds for the minimum distance of twisted codes. We show that classical tools such as the Hartmann–Tzeng minimum distance bound are
-
Rate-improved multi-permutation codes for correcting a single burst of stable deletions Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-16 Xiang Wang, Fang-Wei Fu
Permutation and multi-permutation codes have been widely studied due to their potential applications in communications and storage systems, especially in flash memory. In this paper, we consider balanced multi-permutation codes correcting a single burst of stable deletions of length t and length at most t, respectively. Based on the properties of burst stable deletions and stabilizer permutation subgroups
-
Blocking sets of secant and tangent lines with respect to a quadric of $$\text{ PG }(n,q)$$ Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-17 Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo
For a set \({\mathcal {L}}\) of lines of \(\text{ PG }(n,q)\), a set X of points of \(\text{ PG }(n,q)\) is called an \({\mathcal {L}}\)-blocking set if each line of \({\mathcal {L}}\) contains at least one point of X. Consider a possibly singular quadric Q of \(\text{ PG }(n,q)\) and denote by \({\mathcal {S}}\) (respectively, \({\mathcal {T}}\)) the set of all lines of \(\text{ PG }(n,q)\) meeting
-
On LCD skew group codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-13 Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir
In this paper we study skew group codes as left ideals in some skew group rings. We have constructed a large class of LCD codes and a class of an LCD MDS codes. An important interest is given to the construction of idempotents generators of these codes.
-
Designer of codes: a tribute to Jennifer Key Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-12 Vassili C. Mavron, Harold N. Ward
We offer this tribute to our friend and colleague, Jenny Key. After describing her education and career, we comment on her areas of research. The paper concludes with a complete list of her publications.
-
Ternary isodual codes and 3-designs Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-06 Minjia Shi, Ruowen Liu, Dean Crnković, Patrick Solé, Andrea Švob
Ternary isodual codes and their duals are shown to support 3-designs under mild symmetry conditions. These designs are held invariant by a double cover of the permutation part of the automorphism group of the code. Examples of interest include extended quadratic residues (QR) codes of lengths 14 and 38 whose automorphism groups are PSL(2, 13) and PSL(2, 37), respectively. We also consider Generalized
-
Somewhat homomorphic encryption based on random codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-06 Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit
We present a secret-key encryption scheme based on random rank metric ideal linear codes with a simple decryption circuit. It supports unlimited homomorphic additions and plaintext multiplications (i.e. the homomorphic multiplication of a clear plaintext with a ciphertext) as well as a fixed arbitrary number of homomorphic multiplications. We study a candidate bootstrapping algorithm that requires
-
RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-04 Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte
We present a signature scheme based on the syndrome decoding (SD) problem in rank metric. It is a construction from Multi-Party Computation (MPC), using a MPC protocol which is a slight improvement of the linearized polynomial protocol used in Feneuil (Cryptology ePrint Archive, Report 2022/1512, 2022), allowing to obtain a zero-knowledge proof thanks to the MPCitH (MPC-in-the-Head) paradigm. We design
-
Quantum sieving for code-based cryptanalysis and its limitations for ISD Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-02 Lynn Engelberts, Simona Etinski, Johanna Loyer
Sieving using near-neighbor search techniques is a well-known method in lattice-based cryptanalysis, yielding the current best runtime for the shortest vector problem in both the classical and quantum setting. Recently, sieving has also become an important tool in code-based cryptanalysis. Specifically, a variant of the information-set decoding (ISD) framework, commonly used for attacking cryptographically
-
Fully selective opening secure IBE from LWE Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-01-03 Dingding Jia, Haiyang Xue, Bao Li
Selective opening security ensures that, when an adversary is given multiple ciphertexts and corrupts a subset of the senders (thereby obtaining the plaintexts and the senders’ randomness), the privacy of the remaining ciphertexts is still preserved. Previous selective opening secure IBE schemes encrypt messages bit-by-bit, or only achieve selective-id security. In this paper, we present the first
-
Divisible design graphs from the symplectic graph Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-29 Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov
A divisible design graph is a graph whose adjacency matrix is an incidence matrix of a (group) divisible design. Divisible design graphs were introduced in 2011 as a generalization of \((v,k,\lambda )\)-graphs. Here we describe four new infinite families that can be obtained from the symplectic strongly regular graph Sp(2e, q) (q odd, \(e\ge 2\)) by modifying the set of edges. To achieve this we need
-
The set of pure gaps at several rational places in function fields Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-28 Alonso S. Castellanos, Erik A. R. Mendoza, Guilherme Tizziotti
In this work, we explore the use of maximal elements in generalized Weierstrass semigroups and their relationship with pure gaps, extending the results in Castellanos et al. [J Pure Appl Algebra 228(4):107513, 2024]. We provide a method to completely determine the set of pure gaps at several rational places in a function field F over a finite field, where the periods of certain places are the same
-
Several families of negacyclic BCH codes and their duals Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-27 Zhonghua Sun, Xinyue Liu
Negacyclic BCH codes are a special subclasses of negacyclic codes, and have the best parameters known in many cases. A family of good negacyclic BCH codes are the q-ary narrow-sense negacyclic BCH codes of length \(n=(q^m-1)/2\), where q is an odd prime power. Little is known about the true minimum distance of this family of negacyclic BCH codes and the dimension of this family of negacyclic BCH codes
-
The weight hierarchies of three classes of linear codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-27 Wei Lu, Qingyao Wang, Xiaoqiang Wang, Dabin Zheng
Studying the generalized Hamming weights of linear codes is a significant research area within coding theory, as it provides valuable structural information about the codes and plays a crucial role in determining their performance in various applications. However, determining the generalized Hamming weights of linear codes, particularly their weight hierarchy, is generally a challenging task. In this
-
Codes from $$A_m$$ -invariant polynomials Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-27 Giacomo Micheli, Vincenzo Pallozzi Lavorante, Phillip Waitkevich
Let q be a prime power. This paper provides a new class of linear codes that arises from the action of the alternating group on \({\mathbb {F}}_q[x_1,\dots ,x_m]\) combined with the ideas in Datta and Johnsen (Des Codes Cryptogr 91(3):747–761, 2023). Compared with Generalized Reed–Muller codes with analogous parameters, our codes have the same asymptotic relative distance but a better rate. Our results
-
On the vector subspaces of $$\mathbb {F}_{2^n}$$ over which the multiplicative inverse function sums to zero Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-27 Claude Carlet
We study the behavior of the multiplicative inverse function (which plays an important role in cryptography and in the study of finite fields), with respect to a recently introduced generalization of almost perfect nonlinearity (APNness), called kth-order sum-freedom, that extends a classic characterization of APN functions, and has also some relationship with integral attacks. This generalization
-
Fault attacks on multi-prime RSA signatures Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-27 Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng
At CHES 2009, Coron et al. proposed a fault attack on standard RSA signatures based on Coppersmith’s method. This work greatly enhances the practicality of fault attacks on RSA signatures. In practice, multi-prime RSA signatures are widely used due to their faster generation speed. In this paper, we propose fault attacks on multi-prime RSA signatures under the PKCS#1 v2.x protocols. We conduct the
-
Low-weight codewords in cyclic codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-24 J. G. Coelho, F. E. Brochero Martínez
We introduce a formula for determining the number of codewords of weight 2 in cyclic codes and provide results related to the count of codewords with weight 3. Additionally, we establish a recursive relationship for binary cyclic codes that connects their weight distribution to the number of solutions of associated systems of polynomial equations. This relationship allows for the computation of weight
-
The support designs of several families of lifted linear codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-25 Cunsheng Ding, Zhonghua Sun, Qianqian Yan
A generator matrix of a linear code \({\mathcal {C}}\) over \({\textrm{GF}}(q)\) is also a matrix of the same rank k over any extension field \({\textrm{GF}}(q^\ell )\) and generates a linear code of the same length, same dimension and same minimum distance over \({\textrm{GF}}(q^\ell )\), denoted by \({\mathcal {C}}(q|q^\ell )\) and called a lifted code of \({\mathcal {C}}\). Although \({\mathcal
-
A class of permutations on $${\mathbb {Z}}_{p}$$ with differential uniformity at most 3 Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-22 Prachi Gupta, P. R. Mishra, Atul Gaur
In this paper, we give a class of permutations on \({\mathbb {Z}}_{p}\) having differential uniformity at most 3, where prime p satisfies \(p \equiv 1 \pmod {4}\). Further, we present a sufficient condition for differential uniformity exactly 3 and identify a subclass achieving this value.
-
A construction of optimal quasi-cyclic locally recoverable codes using constituent codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-20 Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno
A locally recoverable code of locality r over \(\mathbb {F}_{q}\) is a code where every coordinate of a codeword can be recovered using the values of at most r other coordinates of that codeword. Locally recoverable codes are efficient at restoring corrupted messages and data which make them highly applicable to distributed storage systems. Quasi-cyclic codes of length \(n=m\ell \) and index \(\ell
-
On automorphism groups of binary cyclic codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-20 Jicheng Ma, Guiying Yan
Cyclic codes, as a significant subclass of linear codes, can be constructed and analyzed using algebraic methods. Due to its cyclic nature, they have efficient encoding and decoding algorithms. To date, cyclic codes have found applications in various domains, including consumer electronics, data storage systems, and communication systems. In this paper, we investigate the full automorphism groups of
-
Guessing less and better: improved attacks on GIFT-64 Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-20 Federico Canale, María Naya-Plasencia
GIFT-64 is a block cipher that has received a lot of attention from the community since its proposal in 2017. The attack on the highest number of rounds is a differential related-key attack on 26 rounds. We studied this attack, in particular with respect to some recent generic frameworks for improving key recovery, and we realised that this framework, combined with an efficient parallel key guessing
-
Several new classes of optimal ternary cyclic codes with two or three zeros Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-19 Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang
Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let \(\alpha \) be a generator of \(\mathbb F_{3^m}\setminus \{0\}\), where m is a positive integer. Denote by \(\mathcal {C}_{(i_1,i_2,\cdots , i_t)}\) the cyclic code with generator polynomial \(m_{\alpha
-
Quantum security of Trojan message attacks on Merkle–Damgård hash construction Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-18 Ying Xu, Xiaoni Du, Jian Zou
In this paper, we promote Trojan message attacks against Merkle–Damgård hash functions and their concatenation combiner in quantum settings for the first time. Two main quantum scenarios are considered, involving the scenarios where a substantial amount of cheap quantum random access memory (qRAM) is available and where qRAM is limited and expensive to access. We first discuss the construction of diamond
-
Optimal combinatorial neural codes via symmetric designs Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-18 Xingyu Zheng, Shukai Wang, Cuiling Fan
Combinatorial neural (CN) codes are binary codes introduced firstly by Curto et al. for asymmetric channel, and then are further studied by Cotardo and Ravagnani under the metric \(\delta _r\) (called asymmetric discrepancy) which measures the differentiation of codewords in CN codes. When \(r>1\), CN codes are different from the usual error-correcting codes in symmetric channel (\(r=1\)). In this
-
Relating code equivalence to other isomorphism problems Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-16 Huck Bennett, Kaung Myat Htay Win
We study the complexity of the Code Equivalence Problem on linear error-correcting codes by relating its variants to isomorphism problems on other discrete structures—graphs, lattices, and matroids. Our main results are a fine-grained reduction from the Graph Isomorphism Problem to the Linear Code Equivalence Problem over any field \(\mathbb {F}\), and a reduction from the Linear Code Equivalence Problem
-
Hulls of projective Reed–Muller codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-14 Nathan Kaplan, Jon-Lark Kim
Projective Reed–Muller codes are constructed from the family of projective hypersurfaces of a fixed degree over a finite field \(\mathbb {F}_q\). We consider the relationship between projective Reed–Muller codes and their duals. We determine when these codes are self-dual, when they are self-orthogonal, and when they are LCD. We then show that when q is sufficiently large, the dimension of the hull
-
Codes over $$\mathbb {F}_4$$ and $$\mathbb {F}_2 \times \mathbb {F}_2$$ and theta series of the corresponding lattices in quadratic fields Des. Codes Cryptogr. (IF 1.4) Pub Date : 2024-12-04 Josline Freed
Using codes defined over \(\mathbb {F}_4\) and \(\mathbb {F}_2 \times \mathbb {F}_2\), we simultaneously define the theta series of corresponding lattices for both real and imaginary quadratic fields \(\mathbb {Q}(\sqrt{d})\) with \(d \equiv 1\mod 4\) a square-free integer. For such a code, we use its weight enumerator to prove which term in the code’s corresponding theta series is the first to depend