Skip to main content

Cryptography and Communications OnlineFirst articles

16-05-2024 | Research

On Generalized Nega-Hadamard Transform and Nega-crosscorrelation

In the construction of cryptosystems, we need functions with some cryptographically significant properties. It is known that the Global Avalanche Characteristic (GAC) is one of them, which is based on the correlation of functions. In this paper …

Authors:
Deepmala Sharma, Mayasar Ahmad Dar

14-05-2024 | Research

Construction of DNA codes with multiple constrained properties

DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization of its nucleotides. The formation of large stem-length secondary structures makes the sequences chemically inactive towards …

Authors:
Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh

14-05-2024 | Research

-equivalence classes, a new direction to find better weightwise perfectly balanced functions, and more

This article introduces the concept of $$\mathcal {S}_0$$ S 0 -equivalence class, i.e. , n-variable Boolean functions up to the addition of a symmetric function null in $$0_n$$ 0 n and $$1_n$$ 1 n , and investigates its application to study …

Authors:
Agnese Gini, Pierrick Méaux

Open Access 10-05-2024 | Research

Integer syndrome decoding in the presence of noise

Code-based cryptography received attention after the NIST started the post-quantum cryptography standardization process in 2016. A central NP-hard problem is the binary syndrome decoding problem, on which the security of many code-based …

Authors:
Vlad-Florin Drăgoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso

09-05-2024 | Research

Additive codes with few weights

Additive codes have a wide range of applications. A classical nice and generic way to construct linear codes is via trace functions. In this paper, first, we generalize this method to construct additive codes. Then, we use this method to get some …

Authors:
Daniel Panario, Murat Sahin, Qiang Wang

02-05-2024 | Research

Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support

In recent years, zero-correlation zone (ZCZ) sequences have been studied due to their significant applications in quasi-synchronous code division multiple access (QS-CDMA) systems and other wireless communication domains. However, in a cognitive …

Authors:
Nishant Kumar, Palash Sarkar, Sudhan Majhi

02-05-2024 | Research

The sequence reconstruction problem for permutations with the Hamming distance

V. Levenshtein first proposed the sequence reconstruction problem in 2001. This problem studies the same sequence from some set is transmitted over multiple channels, and the decoder receives the different outputs. Assume that the transmitted …

Authors:
Xiang Wang, Elena V. Konstantinova

29-04-2024 | Research

ACD codes over skew-symmetric dualities

Additive codes have gained importance in algebraic coding theory due to their applications in quantum error correction and quantum computing. The article begins by developing some properties of Additive Complementary Dual (ACD) codes with respect …

Authors:
Astha Agrawal, R. K. Sharma

Open Access 26-04-2024 | Research

Propagation properties of a non-linear mapping based on squaring in odd characteristic

Many modern cryptographic primitives for hashing and (authenticated) encryption make use of constructions that are instantiated with an iterated cryptographic permutation that operates on a fixed-width state consisting of an array of bits. Often …

Authors:
Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel

26-04-2024 | Research

Equitable [[2, 10], [6, 6]]-partitions of the 12-cube

We describe the computer-aided classification of equitable partitions of the 12-cube with quotient matrix [[2, 10], [6, 6]], or, equivalently, simple orthogonal arrays OA(1536, 12, 2, 7), or order-7 correlation-immune Boolean functions in 12 …

Author:
Denis S. Krotov

19-04-2024 | Research

Integer codes correcting burst errors within one byte and single errors within two bytes

This paper presents a class of integer codes that are suitable for use in various optical networks. The presented codes are generated with the help of a computer and have the ability to correct l-bit burst errors corrupting one b-bit byte …

Authors:
Aleksandar Radonjic, Pankaj Kumar Das, Vladimir Vujicic

Open Access 10-04-2024 | Research

Mumford representation and Riemann-Roch space of a divisor on a hyperelliptic curve

For an (imaginary) hyperelliptic curve $$\mathcal {H}$$ H of genus g, with a Weierstrass point $$\Omega $$ Ω , taken as the point at infinity, we determine a basis of the Riemann-Roch space $$\mathcal {L}(\Delta + m \Omega )$$ L ( Δ + m Ω ) …

Authors:
Giovanni Falcone, Giuseppe Filippone

01-04-2024 | Research

New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128

Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear …

Authors:
Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi

22-03-2024 | Research

Sequences with ideal auto-correlation derived from group actions

Bent functions have a number of practical applications in cryptography, coding theory, and other fields. Fourier transform is a key tool to study bent functions on finite abelian groups. Using Fourier transforms, in this paper, we first present …

Authors:
Hongyang Xiao, Xiwang Cao

Open Access 15-03-2024 | Research

Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring

This paper studies Abelian and consta-Abelian polyadic codes over rings defined as affine algebras over chain rings. For this purpose, we use the classical construction via splittings and multipliers of the underlying Abelian group. We also derive …

Authors:
Gülsüm Gözde Yılmazgüç, Javier de la Cruz, Edgar Martínez-Moro

06-03-2024 | Research

An improvement on Weil bounds for character sums of polynomials over finite fields

Let $$\mathbb {F}_q$$ F q be a finite field with q elements, where q is a power of a prime p. In this paper, we obtain an improvement on Weil bounds for character sums associated to a polynomial f(x) over $$\mathbb {F}_q $$ F q , which extends the …

Authors:
Fengwei Li, Fanhui Meng, Ziling Heng, Qin Yue

27-02-2024 | Research

The [1, 0]-twisted generalized Reed-Solomon code

In this paper, we not only give the parity check matrix of the [1, 0]-twisted generalized Reed-Solomon (in short, TGRS) code, but also determine the weight distribution. Especially, we show that the [1, 0]-TGRS code is not GRS or EGRS.

Authors:
Canze Zhu, Qunying Liao

24-02-2024 | Research

Boolean functions of binary Type-II and Type-III/II complementary array pairs

The sequence pairs of length $$2^{m}$$ 2 m projected from Type-II and Type-III/II complementary array pairs of size $$2\times 2\times \cdots \times 2$$ 2 × 2 × ⋯ × 2 (m-times) form Type-II and Type-III complementary sequence pairs, respectively.

Authors:
Erzhong Xue, Zilong Wang, Jinjin Chai

Open Access 21-02-2024 | Research

Complete characterization of a class of permutation trinomials in characteristic five

In this paper, we address an open problem posed by Bai and Xia in [2]. We study polynomials of the form $$f(x)=x^{4q+1}+\lambda _1x^{5q}+\lambda _2x^{q+4}$$ f ( x ) = x 4 q + 1 + λ 1 x 5 q + λ 2 x q + 4 over the finite field $${\mathbb …

Authors:
Markus Grassl, Ferruh Özbudak, Buket Özkaya, Burcu Gülmez Temür

17-02-2024 | Research

Optimal quinary cyclic codes with three zeros

Cyclic codes are an important subclass of linear codes, they not only have good algebraic structure, but also are easy to be encoded and decoded. At present, researchers have constructed many optimal ternary cyclic codes, but the study on quinary …

Authors:
Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li