Skip to main content

Designs, Codes and Cryptography OnlineFirst articles

18-04-2024

Meet-in-the-middle attacks on AES with value constraints

In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the effectiveness. In this paper, value constraints are presented to reduce the size of the precomputation table in MITM attacks on AES. Based on a differential …

Authors:
Xiaoli Dong, Jun Liu, Yongzhuang Wei, Wen Gao, Jie Chen

Open Access 16-04-2024

Fast decoding of lifted interleaved linearized Reed–Solomon codes for multishot network coding

Martínez-Peñas and Kschischang (IEEE Trans. Inf. Theory 65(8):4785–4803, 2019) proposed lifted linearized Reed–Solomon codes as suitable codes for error control in multishot network coding. We show how to construct and decode lifted interleaved …

Authors:
Hannes Bartz, Sven Puchinger

16-04-2024

Symmetric 2-adic complexity of Tang–Gong interleaved sequences from generalized GMW sequence pair

Tang–Gong interleaved sequences constructed from the generalized GMW sequence pair are a class of binary sequences with optimal autocorrelation magnitude. In this paper, the symmetric 2-adic complexity of these sequences is investigated. We first …

Authors:
Bo Yang, Kangkang He, Xiangyong Zeng, Zibi Xiao

16-04-2024

Constructing linked systems of relative difference sets via Schur rings

In the present paper, we study relative difference sets (RDSs) and linked systems of them. It is shown that a closed linked system of RDSs is always graded by a group. Based on this result, we also define a product of RDS linked systems sharing …

Authors:
Mikhail Muzychuk, Grigory Ryabov

13-04-2024

Lengths of divisible codes: the missing cases

A linear code C over $${\mathbb {F}}_q$$ F q is called $$\Delta $$ Δ -divisible if the Hamming weights $${\text {wt}}(c)$$ wt ( c ) of all codewords $$c \in C$$ c ∈ C are divisible by $$\Delta $$ Δ . The possible effective lengths of $$q^r$$ q r …

Author:
Sascha Kurz

10-04-2024

New constructions of signed difference sets

Signed difference sets have interesting applications in communications and coding theory. A $$(v,k,\lambda )$$ ( v , k , λ ) -difference set in a finite group G of order v is a subset D of G with k distinct elements such that the expressions …

Authors:
Zhiwen He, Tingting Chen, Gennian Ge

Open Access 10-04-2024

Algebraic properties of the maps

The Boolean map $$\chi _n :\mathbb {F}_2^n \rightarrow \mathbb {F}_2^n,\ x \mapsto y$$ χ n : F 2 n → F 2 n , x ↦ y defined by $$y_i = x_i + (x_{i+1}+1)x_{i+2}$$ y i = x i + ( x i + 1 + 1 ) x i + 2 (where $$i\in \mathbb {Z}/n\mathbb {Z}$$ i ∈ Z / n …

Authors:
Jan Schoone, Joan Daemen

Open Access 08-04-2024

Jacobi polynomials for the first-order generalized Reed–Muller codes

In this paper, we give the Jacobi polynomials for first-order generalized Reed–Muller codes. We show as a corollary the nonexistence of combinatorial 3-designs in these codes.

Author:
Ryosuke Yamaguchi

Open Access 06-04-2024

Anonymous attribute-based broadcast encryption with hidden multiple access structures

Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered …

Author:
Tran Viet Xuan Phuong

Open Access 06-04-2024

Ovoids of Q(6, q) of low degree

Ovoids of the parabolic quadric Q(6, q) of $$\textrm{PG}(6,q)$$ PG ( 6 , q ) have been largely studied in the last 40 years. They can only occur if q is an odd prime power and there are two known families of ovoids of Q(6, q), the Thas-Kantor …

Authors:
Daniele Bartoli, Nicola Durante, Giovanni Giuseppe Grimaldi

05-04-2024

On the size distribution of the fixed-length Levenshtein balls with radius one

The fixed-length Levenshtein (FLL) distance between two words $$\varvec{x}, \varvec{y}\in \mathbb {Z}_m^n$$ x , y ∈ Z m n is the smallest integer t such that $$\varvec{x}$$ x can be transformed to $$\varvec{y}$$ y by t insertions and t deletions.

Authors:
Geyang Wang, Qi Wang

05-04-2024

Special overlarge sets of Kirkman triple systems

A Steiner quadruple system of order $$v+1$$ v + 1 with resolvable derived designs (every derived Steiner triple system of order v at a point is resolvable), abbreviated as RDSQS $$(v+1)$$ ( v + 1 ) , has been used to construct a large set of …

Authors:
Juanjuan Xu, Lijun Ji

04-04-2024

Combinatorial constructions of optimal low-power error-correcting cooling codes

High temperatures have dramatic negative effects on interconnect performance. In a bus, whenever the state transitions from “0” to “1”, or “0” to “1”, joule heating causes the temperature to rise. A low-power error-correcting cooling (LPECC) code …

Authors:
Shuangqing Liu, Lijun Ji

02-04-2024

Optimal binary signed-digit representations of integers and the Stern polynomial

The binary signed-digit (BSD) representation of integers is used for efficient integer computation in various settings. The Stern polynomial is a polynomial extension of the well-studied Stern diatomic sequence. In this paper, we show previously …

Author:
Laura Monroe

02-04-2024

Construction of quantum codes from multivariate polynomial rings

In this paper, we use multivariate polynomial rings to construct quantum error-correcting codes (QECCs) via Hermitian construction. We establish a relation between linear codes and ideals of multivariate polynomial rings. We give a necessary and …

Authors:
Cong Yu, Shixin Zhu, Fuyin Tian

30-03-2024

Preimage attacks on reduced-round Ascon-Xof

Ascon, a family of algorithms that supports authenticated encryption and hashing, has been selected as the new standard for lightweight cryptography in the NIST Lightweight Cryptography Project. Ascon’s permutation and authenticated encryption …

Authors:
Seungjun Baek, Giyoon Kim, Jongsung Kim

30-03-2024

Families of quadratic sets on the Klein quadric

Consider the Klein quadric $$Q^+(5,q)$$ Q + ( 5 , q ) in $$\text{ PG }(5,q)$$ PG ( 5 , q ) . A set of points of $$Q^+(5,q)$$ Q + ( 5 , q ) is called a quadratic set if it intersects each plane $$\pi $$ π of $$Q^+(5,q)$$ Q + ( 5 , q ) in a possibly …

Author:
Bart De Bruyn

Open Access 29-03-2024

Classifying pseudo-ovals, translation generalized quadrangles, and elation Laguerre planes of small order

We provide classification results for translation generalized quadrangles of order less than or equal to 64, and hence, for all incidence geometries related to them. The results consist of the classification of all pseudo-ovals in …

Authors:
Giusy Monzillo, Tim Penttila, Alessandro Siciliano

27-03-2024

PERK: compact signature scheme based on a new variant of the permuted kernel problem

In this work we introduce PERK a compact digital signature scheme based on the hardness of a new variant of the permuted kernel problem (PKP). PERK achieves the smallest signature sizes for any PKP-based scheme for NIST category I security with 6 …

Authors:
Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi

27-03-2024

Efficient secure multi-party computation for proof of custody in Ethereum sharding

Ethereum, one of the most prominent and widely deployed blockchain systems, is undergoing a significant upgrade that adopts sharding for capacity expansion and secure multi-party computation (MPC) to enable distributed validator technology (DVT).

Authors:
Yuxin Tong, Xiang Xie, Kang Yang, Rui Zhang, Rui Xue