-
On approximate real mutually unbiased bases in square dimension Cryptogr. Commun. (IF 1.291) Pub Date : 2021-01-11 Ajeet Kumar, Subhamoy Maitra, Chandra Sekhar Mukherjee
Construction of Mutually Unbiased Bases (MUBs) is a very challenging combinatorial problem in quantum information theory with several long standing open questions in this domain. With certain relaxations, the object Approximate Mutually Unbiased Bases (AMUBs) is defined in this context. In this paper we provide a method to construct upto \((\sqrt {d} + 1)\) many AMUBs in dimension d = q2, where q is
-
( σ , δ )-Skew quasi-cyclic codes over the ring ℤ 4 + u ℤ 4 $\mathbb {Z}_{4}+u\mathbb {Z}_{4}$ Cryptogr. Commun. (IF 1.291) Pub Date : 2021-01-07 Fanghui Ma, Jian Gao, Juan Li, Fang-Wei Fu
Let \(R=\mathbb {Z}_{4}+u\mathbb {Z}_{4}\) be a finite non-chain ring, where u2 = 1. In this paper, we consider (σ, δ)-skew quasi-cyclic codes over the ring R, where σ is an automorphism of R and δ is an inner σ-derivation of R. We determine the structure of 1-generator (σ, δ)-skew quasi-cyclic codes over R and give a sufficient condition for 1-generator (σ, δ)-skew quasi-cyclic codes over R to be
-
The c -differential behavior of the inverse function under the EA -equivalence Cryptogr. Commun. (IF 1.291) Pub Date : 2021-01-07 Pantelimon Stănică, Aaron Geary
While the classical differential uniformity (c = 1) is invariant under the CCZ-equivalence, the newly defined (Ellingsen et al., IEEE Trans. Inf. Theory 66(9), 5781–5789, 2020) concept of c-differential uniformity (cDU), as was observed in Hasan et al. (2020), is not invariant under EA or CCZ-equivalence, for c≠ 1. In this paper, we find an intriguing behavior of the inverse function, namely, that
-
Permutations polynomials of the form G ( X ) k − L ( X ) and curves over finite fields Cryptogr. Commun. (IF 1.291) Pub Date : 2021-01-05 Nurdagül Anbar, Canan Kaşıkcı
For a positive integer k and a linearized polynomial L(X), polynomials of the form \(P(X)=G(X)^{k}-L(X) \in {\mathbb F}_{q^{n}}[X]\) are investigated. It is shown that when L has a non-trivial kernel and G is a permutation of \(\mathbb {F}_{q^{n}}\), then P(X) cannot be a permutation if \(\gcd (k,q^{n}-1)>1\). Further, necessary conditions for P(X) to be a permutation of \(\mathbb {F}_{q^{n}}\) are
-
Correction to: Self-dual codes over F 2 × ( F 2 + v F 2 ) $$ {\mathbbm{F}}_2\times \left({\mathbbm{F}}_2+v{\mathbbm{F}}_2\right) $$ Cryptogr. Commun. (IF 1.291) Pub Date : 2020-12-22 Refia Aksoy, Fatma Çalışkan
The original version of this article unfortunately contained some mistakes on the equations at page 4 of the published paper.
-
Characteristic vector and weight distribution of a linear code Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-29 Iliya Bouyukliev, Stefka Bouyuklieva, Tatsuya Maruta, Paskal Piperkov
An algorithm for computing the weight distribution of a linear [n,k] code over a finite field \(\mathbb {F}_{q}\) is developed. The codes are represented by their characteristic vector with respect to a given generator matrix and a generator matrix of the k-dimensional simplex code \(\mathcal {S}_{q,k}\).
-
Further constructions of cyclic subspace codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-28 He Zhang, Xiwang Cao
Subspace codes, especially cyclic subspace codes, have attracted a wide attention in the past few decades due to their applications in error correction for random network coding. In 2016, Ben-Sasson et al. gave a systematic approach to constructing cyclic subspace codes by employing subspace polynomials. Inspired by Ben-Sasson’s idea, Chen et al. also provided some constructions of cyclic subspace
-
Linear codes with one-dimensional hull associated with Gaussian sums Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-26 Liqin Qian, Xiwang Cao, Sihem Mesnager
The hull of a linear code over finite fields, the intersection of the code and its dual, has been of interest and extensively studied due to its wide applications. For example, it plays a vital role in determining the complexity of algorithms for checking permutation equivalence of two linear codes and for computing the automorphism group of a linear code. People are interested in pursuing linear codes
-
The t -wise intersection and trellis of relative four-weight codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-21 B. Rega, Z. H. Liu, C. Durairajan
Based on the applications of codes with few weights, we define the so-called relative four-weight codes and present a method for constructing such codes by using the finite projective geometry method. Also, the t-wise intersection and the trellis of relative four-weight codes are determined.
-
A class of subfield codes of linear codes and their duals Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-18 Xiaoqiang Wang, Dabin Zheng, Yan Zhang
Recently, subfield codes of some optimal linear codes have been studied. In this paper, we further investigate a class of subfield codes and generalize the results of the subfield codes of the conic codes in Ding and Wang (Finite Fields Appl. 56, 308–331, 2020). The weight distributions of these subfield codes and the parameters of their duals are determined. Some of the presented codes are optimal
-
On conflict free DNA codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-13 Krishna Gopal Benerjee, Sourav Deb, Manish K. Gupta
DNA storage has emerged as an important area of research. The reliability of a DNA storage system depends on designing those DNA strings (called DNA codes) that are sufficiently dissimilar. In this work, we introduce DNA codes that satisfy the newly introduced constraint, a generalization of the non-homopolymers constraint. In particular, each codeword of the DNA code has the specific property that
-
Self-dual codes over F 2 × ( F 2 + v F 2 ) $\mathbb {F}_{2} \times (\mathbb {F}_{2}+v\mathbb {F}_{2})$ Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-13 Refia Aksoy, Fatma Çalışkan
In this study we consider Euclidean and Hermitian self-dual codes over the direct product ring \(\mathbb {F}_{2} \times (\mathbb {F}_{2}+v\mathbb {F}_{2})\) where v2 = v. We obtain some theoretical outcomes about self-dual codes via the generator matrices of free linear codes over \(\mathbb {F}_{2} \times (\mathbb {F}_{2}+v\mathbb {F}_{2})\). Also, we obtain upper bounds on the minimum distance of
-
Two families of subfield codes with a few weights Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-06 Can Xiang, Wenjuan Yin
Subfield codes of linear codes over finite fields have recently received a lot of attention, as some of these codes are optimal and have applications in secrete sharing, authentication codes and association schemes. In this paper, two families of binary subfield codes with a few weights are presented from two special classes of linear codes, and their parameters are explicitly determined. Moreover
-
On symbol-pair weight distribution of MDS codes and simplex codes over finite fields Cryptogr. Commun. (IF 1.291) Pub Date : 2020-10-01 Junru Ma, Jinquan Luo
Symbol-pair code is a new coding framework proposed to combat pair-errors in symbol-pair read channels. Remarkably, a classical maximum distance separable (MDS) code is also an MDS symbol-pair code. In this paper, we investigate the symbol-pair weight distribution of MDS codes and the symbol b-weight distribution of simplex codes over finite fields respectively. Surprisingly, one can derive that all
-
Design of fault-resilient S-boxes for AES-like block ciphers Cryptogr. Commun. (IF 1.291) Pub Date : 2020-09-08 Swapan Maiti, Dipanwita Roy Chowdhury
Substitution functions (S-boxes) play an important role in the security of AES-like cryptosystems, but the cryptosystems are highly vulnerable against fault injection attacks. Some research has been carried out previously to prevent fault injection attacks on AES, but most of the countermeasures are restricted to the detection of faults only, and they only work at the cost of large hardware needed
-
Algebraic manipulation detection codes via highly nonlinear functions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-08-25 Minfeng Shao, Ying Miao
In this paper, we study the relationship between algebraic manipulation detection (AMD) codes and highly nonlinear functions. As applications, on one hand, a generic construction for systematic AMD codes is introduced based on highly nonlinear functions. Systematic AMD codes with new parameters can be generated from known highly nonlinear functions. Especially, several infinite classes of optimal systematic
-
Repeated-root constacyclic codes of length 2 p s over F p m + u F p m + u 2 F p m $\mathbb {F}_{p^{m}}+u\mathbb {F}_{p^{m}}+u^{2}\mathbb {F}_{p^{m}}$ Cryptogr. Commun. (IF 1.291) Pub Date : 2020-08-09 Wateekorn Sriwirach, Chakkrid Klin-eam
Let λ be a unit of the finite commutative chain ring \(R=\mathbb {F}_{p^{m}}+u\mathbb {F}_{p^{m}}+u^{2}\mathbb {F}_{p^{m}}=\{\alpha +u\upbeta +u^{2}\gamma : \alpha ,\upbeta ,\gamma \in \mathbb { F}_{p^{m}}\}\) with u3 = 0, where p is an odd prime and m is a positive integer. In this paper, we consider any λ-constacyclic codes of length 2ps over R. In the case of square λ = δ2, where δ ∈ R, the algebraic
-
Computing the 2-adic complexity of two classes of Ding-Helleseth generalized cyclotomic sequences of periods of twin prime products Cryptogr. Commun. (IF 1.291) Pub Date : 2020-08-07 Ming Yan, Tongjiang Yan, Yu Li
This paper contributes to compute the 2-adic complexity of two classes of Ding-Helleseth generalized cyclotomic sequences. Results show that the 2-adic complexity of these sequences is good enough to resist the attack by the rational approximation algorithm.
-
On Euclidean Hulls of MDS Codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-28 Xiaolei Fang, Meiqing Liu, Jinquan Luo
In this paper, we propose a mechanism for the construction of MDS codes with arbitrary dimensions of Euclidean hulls. Precisely, we construct (extended) generalized Reed-Solomon (GRS) codes with assigned dimensions of Euclidean hulls from self-orthogonal GRS codes. It turns out our constructions are more general than previous works on Euclidean hulls of (extended) GRS codes.
-
On decoding additive generalized twisted Gabidulin codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-23 Wrya K. Kadir; Chunlei Li
In this paper, we consider an interpolation-based decoding algorithm for a large family of maximum rank distance codes, known as the additive generalized twisted Gabidulin codes, over the finite field \(\mathbb {F}_{q^{n}}\) for any prime power q. This paper extends the work of the conference paper Li and Kadir (2019) presented at the International Workshop on Coding and Cryptography 2019, which decoded
-
Permutation polynomials and factorization Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-22 Tekgül Kalaycı; Henning Stichtenoth; Alev Topuzoğlu
We discuss a special class of permutation polynomials over finite fields focusing on some recent work on their factorization. In particular we obtain permutation polynomials with various factorization patterns that are favoured for applications. We also address a wide range of problems of current interest concerning irreducible factors of the terms of sequences and iterations of such permutation polynomials
-
Boolean functions with multiplicative complexity 3 and 4 Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-18 Çağdaş Çalık; Meltem Sönmez Turan; René Peralta
Multiplicative complexity (MC) is defined as the minimum number of AND gates required to implement a function with a circuit over the basis (AND, XOR, NOT). Boolean functions with MC 1 and 2 have been characterized in Fisher and Peralta (2002), and Find et al. (IJICoT 4(4), 222–236, 2017), respectively. In this work, we identify the affine equivalence classes for functions with MC 3 and 4. In order
-
Two constructions of asymptotically optimal codebooks via the trace functions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-15 Xia Wu, Wei Lu, Xiwang Cao
In this paper, we present two new constructions of complex codebooks with multiplicative characters, additive characters and trace functions over finite fields, and determin the maximal cross-correlation amplitude of these codebooks. We prove that the codebooks we constructed are asymptotically optimal with respect to the Welch bound. Moreover, in the first construction, we generalize the result in
-
Vectorial bent functions in odd characteristic and their components Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-15 Ayça Çeşmelioğlu; Wilfried Meidl; Alexander Pott
Bent functions in odd characteristic can be either (weakly) regular or non-weakly regular. Furthermore one can distinguish between dual-bent functions, which are bent functions for which the dual is bent as well, and non-dual bent functions. Whereas a weakly regular bent function always has a bent dual, a non-weakly regular bent function can be either dual-bent or non-dual-bent. The classical constructions
-
Cryptographic properties of small bijective S-boxes with respect to modular addition Cryptogr. Commun. (IF 1.291) Pub Date : 2020-07-10 Pavol Zajac; Matúš Jókay
We define affine equivalence of S-boxes with respect to modular addition, and explore its use in cryptanalysis. We have identified classes of small bijective S-boxes with respect to this new equivalence, and experimentally computed their properties.
-
A note on the distinctness of some Kloosterman sums Cryptogr. Commun. (IF 1.291) Pub Date : 2020-06-25 Yuri Borissov; Lyubomir Borissov
The Fischer result about distinctness of the Kloosterman sums on F∗p is extended for the finite fields of degrees of extension that are powers of 2. To obtain the desired outcome, we give an elementary proof of the fact that there does not exist a pair of Kloosterman sums on same odd characteristic fields which are opposite to each other.
-
Inverse function is not component-wise uniform Cryptogr. Commun. (IF 1.291) Pub Date : 2020-06-24 Faruk Göloğlu
Recently, Carlet introduced (Carlet Finite. Fields Appl. 53, 226–253 (2018)) the concept of component-wise uniform (CWU) functions which is a stronger notion than being almost perfect nonlinear (APN). Carlet showed that crooked functions (in particular quadratic functions, including Gold functions) and the compositional inverse of a specific Gold function are CWU. Carlet also compiled a table on the
-
Root-Hadamard transforms and complementary sequences Cryptogr. Commun. (IF 1.291) Pub Date : 2020-06-22 Luis A. Medina; Matthew G. Parker; Constanza Riera; Pantelimon Stănică
In this paper we define a new transform on (generalized) Boolean functions, which generalizes the Walsh-Hadamard, nega-Hadamard, 2k-Hadamard, consta-Hadamard and all HN-transforms. We describe the behavior of what we call the root-Hadamard transform for a generalized Boolean function f in terms of the binary components of f. Further, we define a notion of complementarity (in the spirit of the Golay
-
Combinatorial t -designs from special functions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-06-18 Cunsheng Ding; Chunming Tang
A special function is a function either of special form or with a special property. Special functions have interesting applications in coding theory and combinatorial t-designs. The main objective of this paper is to survey t-designs constructed from special functions, including quadratic functions, almost perfect nonlinear functions, almost bent functions, bent functions, bent vectorial functions
-
On the boomerang uniformity of some permutation polynomials Cryptogr. Commun. (IF 1.291) Pub Date : 2020-06-11 Marco Calderini, Irene Villa
The boomerang attack, introduced by Wagner in 1999, is a cryptanalysis technique against block ciphers based on differential cryptanalysis. In particular it takes into consideration two differentials, one for the upper part of the cipher and one for the lower part, and it exploits the dependency of these two differentials. At Eurocrypt’18, Cid et al. introduced a new tool, called the Boomerang Connectivity
-
The group of automorphisms of the set of self-dual bent functions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-06-11 Aleksandr Kutsenko
A bent function is a Boolean function in even number of variables which is on the maximal Hamming distance from the set of affine Boolean functions. It is called self-dual if it coincides with its dual. It is called anti-self-dual if it is equal to the negation of its dual. A mapping of the set of all Boolean functions in n variables to itself is said to be isometric if it preserves the Hamming distance
-
The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic Cryptogr. Commun. (IF 1.291) Pub Date : 2020-05-16 Patrick Felke
Let f(x) = xd be a power mapping over \(\mathbb {F}_{n}\) and \(\mathcal {U}_{d}\) the maximum number of solutions \(x\in \mathbb {F}_{n}\) of \({\Delta }_{f,c}(x):=f(x+c)-f(x)=a\text {, where }c,a\in \mathbb {F}_{n}\text { and } c\neq 0\). f is said to be differentially k-uniform if \(\mathcal {U}_{d} =k\). The investigation of power functions with low differential uniformity over finite fields \(\mathbb
-
Several new infinite families of bent functions via second order derivatives Cryptogr. Commun. (IF 1.291) Pub Date : 2020-05-14 Lijing Zheng, Jie Peng, Haibin Kan, Yanjun Li
Inspired by a recent work of Tang et al. on constructing bent functions [14, IEEE TIT, 63(1): 6149-6157, 2017], we introduce a property (Pτ) of any Boolean function that its second order derivatives vanish at any direction (ui,uj) for some τ-subset {u1,…,uτ} of \(\mathbb {F}_{2^{n}}\), and then establish a link between this property and the construction of Tang et al. (IEEE Trans. Inf. Theory 63(10)
-
Recent results and problems on constructions of linear codes from cryptographic functions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-05-07 Nian Li; Sihem Mesnager
Linear codes have a wide range of applications in the data storage systems, communication systems, consumer electronics products since their algebraic structure can be analyzed and they are easy to implement in hardware. How to construct linear codes with excellent properties to meet the demands of practical systems becomes a research topic, and it is an efficient way to construct linear codes from
-
4-uniform permutations with null nonlinearity Cryptogr. Commun. (IF 1.291) Pub Date : 2020-04-18 Christof Beierle, Gregor Leander
We consider n-bit permutations with differential uniformity of 4 and null nonlinearity. We first show that the inverses of Gold functions have the interesting property that one component can be replaced by a linear function such that it still remains a permutation. This directly yields a construction of 4-uniform permutations with trivial nonlinearity in odd dimension. We further show their existence
-
The subfield codes of several classes of linear codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-04-04 Xiaoqiang Wang, Dabin Zheng
Let \(\mathbb {F}_{2^{m}}\) be the finite field with 2m elements, where m is a positive integer. Recently, Heng and Ding in (Finite Fields Appl. 56:308–331, 2019) studied the subfield codes of two families of hyperovel codes and determined the weight distribution of the linear code $$ \mathcal{C}_{a,b}=\left\{((\text{Tr}_{1}^{m}(a f(x)+bx)+c)_{x \in \mathbb{F}_{2^{m}}}, \text{Tr}_{1}^{m}(a), \text{Tr}_{1}^{m}(b))
-
Correcting mistakes in the paper “A mass formula for negacyclic codes of length 2 k and some good negacyclic codes over ℤ4+uℤ4$\mathbb {Z}_{4}+u\mathbb {Z}_{4}$ ” [Cryptogr. Commun. (2017) 9: 241–272] Cryptogr. Commun. (IF 1.291) Pub Date : 2020-03-25 Yuan Cao, Yonglin Cao, Ramakrishna Bandi, Fang-Wei Fu
We correct some mistakes in the paper “A mass formula for negacyclic codes of length 2k and some good negacyclic codes over \(\mathbb {Z}_{4}+u\mathbb {Z}_{4}\)” (Bandi et al. Cryptogr. Commun. 9, 241–272, 2017).
-
Shifted plateaued functions and their differential properties Cryptogr. Commun. (IF 1.291) Pub Date : 2020-03-23 Nurdagül Anbar, Canan Kaşıkçı, Wilfried Meidl, Alev Topuzoğlu
A bent4 function is a Boolean function with a flat spectrum with respect to a certain unitary transform \(\mathcal {T}\). It was shown previously that a Boolean function f in an even number of variables is bent4 if and only if f + σ is bent, where σ is a certain quadratic function depending on \(\mathcal {T}\). Hence bent4 functions are also called shifted bent functions. Similarly, a Boolean function
-
Regular ( k , R , 1)-packings with max(R)=3$\max \limits {(R)}=3$ and their locally repairable codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-03-05 Jing Jiang, Minquan Cheng
The concept of a locally repairable code (LRC) was introduced to protect the data from disk failures in large-scale storage systems. In this paper, we consider the LRCs with multiple disjoint repair sets and each repair set contains exactly one check symbol. By using several structures from combinatorial design theory, such as balanced incomplete block design, cyclic packing, group divisible design
-
Correction to: Integer codes correcting burst asymmetric errors within a byte and double asymmetric errors Cryptogr. Commun. (IF 1.291) Pub Date : 2019-08-23 Aleksandar Radonjic, Vladimir Vujicic
The original version of this article unfortunately contained a mistake in the main title.
-
Almost p -ary sequences Cryptogr. Commun. (IF 1.291) Pub Date : 2020-02-17 Büşra Özden, Oğuz Yayla
In this paper we study almost p-ary sequences and their autocorrelation coefficients. We first study the number ℓ of distinct out-of-phase autocorrelation coefficients for an almost p-ary sequence of period n + s with s consecutive zero-symbols. We prove an upper bound and a lower bound on ℓ. It is shown that ℓ can not be less than \(\min \limits \{s,p,n\}\). In particular, it is shown that a nearly
-
On the EA-classes of known APN functions in small dimensions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-04-06 Marco Calderini
Recently Budaghyan et al. (Cryptogr. Commun. 12, 85–100, 2020) introduced a procedure for investigating if CCZ-equivalence can be more general than EA-equivalence together with inverse transformation (when applicable). In this paper, we show that it is possible to use this procedure for classifying, up to EA-equivalence, all known APN functions in dimension 6. We also give some discussion for dimension
-
On non-uniform flower codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-04-06 Krishna Gopal Benerjee; Manish K. Gupta
For a Distributed Storage System (DSS), the Fractional Repetition (FR) code is a class in which replicas of encoded data packets are stored on distributed chunk servers, where the encoding is done using the Maximum Distance Separable (MDS) code. The FR codes allow for the exact uncoded repair with minimum repair bandwidth. In this paper, FR codes (called Flower codes) are constructed using finite binary
-
On the linear structures of balanced functions and quadratic APN functions Cryptogr. Commun. (IF 1.291) Pub Date : 2020-04-03 A. Musukwa; M. Sala
The set of linear structures of most known balanced Boolean functions is non-trivial. In this paper, some balanced Boolean functions whose set of linear structures is trivial are constructed. We show that any APN function in even dimension must have a component whose set of linear structures is trivial. We determine a general form for the number of bent components in quadratic APN functions in even
-
Solving x + x 2 l + ⋯ + x 2 m l = a $x+x^{2^{l}}+\cdots +x^{2^{ml}}=a$ over F 2 n $\mathbb {F}_{2^{n}}$ Cryptogr. Commun. (IF 1.291) Pub Date : 2020-02-11 Sihem Mesnager; Kwang Ho Kim; Jong Hyok Choe; Dok Nam Lee; Dae Song Go
This paper presents an explicit representation for the solutions of the equation \({\sum }_{i=0}^{\frac kl-1}x^{2^{li}} = a \in \mathbb {F}_{2^{n}}\) for any given positive integers k, l with l|k and n, in the closed field \({\overline {\mathbb {F}_{2}}}\) and in the finite field \(\mathbb {F}_{2^{n}}\). As a by-product of our study, we are able to completely characterize the a’s for which this equation
-
Certain sequence of arithmetic progressions and a new key sharing method Cryptogr. Commun. (IF 1.291) Pub Date : 2020-01-30 Ch. Srikanth
We consider a special type of sequence of arithmetic progressions, in which consecutive progressions are related by the property: ithterms ofjth, (j + 1)thprogressions of the sequence are multiplicative inverses of each other modulo(i + 1)thterm ofjthprogression. Such a sequence is uniquely defined for any pair of co-prime numbers. A computational problem, defined in the context of such a sequence
-
The minimum distance of new generalisations of the punctured binary Reed-Muller codes Cryptogr. Commun. (IF 1.291) Pub Date : 2020-01-11 Liqin Hu; Keqin Feng
In 2018, Ding et al. introduced a new generalisation of the punctured binary Reed-Muller codes to construct LCD codes and 2-designs. They studied the minimum distance of the codes and proposed an open problem about the minimum distance. In this paper, several new results on the minimum distance of the generalised punctured binary Reed- Muller are presented. Particularly, some of the results are a generalisation
-
New asymptotically optimal three-dimensional wave-length/space/time optical orthogonal codes for OCDMA systems Cryptogr. Commun. (IF 1.291) Pub Date : 2020-01-10 José Ortiz-Ubarri
We present new families of three-dimensional (3-D) optical orthogonal codes for applications to optical code-division multiple access (OCDMA) networks. The families are based in the extended rational cycle used for the 2-D Moreno-Maric construction. The new families are asymptotically optimal with respect to the Johnson bound.
-
Almost supplementary difference sets and quaternary sequences with optimal autocorrelation Cryptogr. Commun. (IF 1.291) Pub Date : 2020-01-09 J. A. Armario; D. L. Flannery
We introduce almost supplementary difference sets (ASDS). For odd m, certain ASDS in \(\mathbb Z_{m}\) that have amicable incidence matrices are equivalent to quaternary sequences of odd length m with optimal autocorrelation. As one consequence, if 2m − 1 is a prime power, or m ≡ 1 mod 4 is prime, then ASDS of this kind exist. We also explore connections to optimal binary sequences and group cohomology
-
Double bordered constructions of self-dual codes from group rings over Frobenius rings Cryptogr. Commun. (IF 1.291) Pub Date : 2020-01-09 Joe Gildea; Rhian Taylor; Abidin Kaya; A. Tylyshchak
In this work, we describe a double bordered construction of self-dual codes from group rings. We show that this construction is effective for groups of order 2p where p is odd, over the rings \(\mathbb {F}_{2}+u\mathbb {F}_{2}\) and \(\mathbb {F}_{4}+u\mathbb {F}_{4}\). We demonstrate the importance of this new construction by finding many new binary self-dual codes of lengths 64, 68 and 80; the new
-
Some new bounds on LCD codes over finite fields Cryptogr. Commun. (IF 1.291) Pub Date : 2020-01-09 Binbin Pang; Shixin Zhu; Xiaoshan Kai
In this paper, we show that LCD codes are not equivalent to non-LCD codes over small finite fields. The enumeration of binary optimal LCD codes is obtained. We also get the exact value of LD(n,2) over \(\mathbb {F}_{3}\) and \(\mathbb {F}_{4}\), where LD(n,2) := max{d∣thereexsitsan [n,2, d] LCD\( code~ over~ \mathbb {F}_{q}\}\). We study the bound of LCD codes over \(\mathbb {F}_{q}\) and generalize
-
About the linear complexity of quaternary sequences with even length Cryptogr. Commun. (IF 1.291) Pub Date : 2019-12-14 Lu Zhao
Several classes of quaternary sequences of even period with optimal autocorrelation have been constructed by Su et al. based on interleaving certain kinds of binary sequences of odd period, i.e. Legendre sequence, twin-prime sequence and generalized GMW sequence. In this correspondence, the exact values of linear complexity over finite field \(\mathbb {F}_{4}\) and Galois ring \(\mathbb {Z}_{4}\) of
-
Polyphase zero correlation zone sequences from generalised bent functions Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-30 Dan Zhang; Matthew Geoffrey Parker; Tor Helleseth
Sequence families with zero correlation zone (ZCZ) have been extensively studied in recent years due to their important applications in quasi-synchronous code-division multiple-access (QS-CDMA) systems. To accommodate multiuser environments, multiple ZCZ sequence sets with low inter-set cross-correlation are expected. In this paper, we propose a construction of polyphase ZCZ sequences based on generalised
-
On the search of smallest QC-LDPC code with girth six and eight Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-27 Jasvinder Singh; Manish Gupta; Jaskarn Singh Bhullar
In this paper, a new and simple method for the construction of Girth-6 (J,L) Quasi-Cyclic Low-Density Parity-Check (QC-LDPC) codes is proposed. The method is further extended to the search of Girth-8 QC-LDPC codes with base matrices of order 3 × L and 4 × L. The construction is based on three different forms of exponent matrices and the parameters α, p, and q which satisfy the necessary algebraic conditions
-
On degree- d zero-sum sets of full rank Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-19 Christof Beierle; Alex Biryukov; Aleksei Udovenko
A set \(S \subseteq {{\mathbb {F}}_{2}^{n}}\) is called degree-d zero-sum if the sum \({\sum }_{s \in S} f(s)\) vanishes for all n-bit Boolean functions of algebraic degree at most d. Those sets correspond to the supports of the n-bit Boolean functions of degree at most n − d − 1. We prove some results on the existence of degree-d zero-sum sets of full rank, i.e., those that contain n linearly independent
-
One construction of perfect ternary sequences Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-16 Evgeny Krengel
We present a new construction of a family of perfect ternary sequences (PTSs) that is a generalization of one of the known families of PTSs. These PTSs of length N1N2 are derived from shift sequences of odd length N1 corresponding to m-sequences over GF(p) and PTSs of odd length N2. Ipatov PTSs are a special case where N2 = 1. For N2 ≥ 3, we find conditions under which the obtained PTSs are new. We
-
The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-14 Yuhua Sun; Tongjiang Yan; Zhixiong Chen; Lianhai Wang
Recently, a class of binary sequences with optimal autocorrelation magnitude has been presented by Su et al. based on Ding-Helleseth-Lam sequences and interleaving technique (Designs, Codes and Cryptography 86, 1329–1338, 2018). The linear complexity of this class of sequences has been proved to be large enough to resist the B-M Algorithm by Fan (Designs, Codes and Cryptography 86, 2441–2450, 2018)
-
On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-13 Sihem Mesnager; Kwang Ho Kim; Myong Song Jo
Determine the number of the rational zeros of any given linearized polynomial is one of the vital problems in finite field theory, with applications in modern symmetric cryptosystems. But, the known general theory for this task is much far from giving the exact number when applied to a specific linearized polynomial. The first contribution of this paper is a better general method to get a more precise
-
Two constructions for 16-QAM complementary sequence sets with non-power-of-two length Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-12 Yajing Zhou; Zhengchun Zhou; Yang Yang; Yong Wang
Complementary sequences with quadrature amplitude modulation (QAM) symbols have important applications in OFDM communication systems. The objective of this paper is to present two constructions of 16-QAM complementary sequence sets of size 4. The first construction generates four complementary sequences of length L = 2m− 1 + 2v, where m and v are two positive integers with 1 ≤ v ≤ m − 1. The second
-
New quaternary sequences with optimal odd-periodic autocorrelation magnitude Cryptogr. Commun. (IF 1.291) Pub Date : 2019-11-08 Yang Yang; Chunlei Li
A quaternary sequence is said to be optimal if its odd-periodic autocorrelation magnitude equal to 2 for even length, and 1 for odd length. In this paper, we propose three constructions of optimal quaternary sequences: the first construction applies the inverse Gray mapping to four component binary sequences, which could be chosen from GMW sequence pair, twin-prime sequence pair, Legendre sequence
Contents have been reproduced by permission of the publishers.