Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 92, Issue 2Feb 2024
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:0925-1022
Reflects downloads up to 28 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks
Abstract

Farfalle is a permutation-based construction for building a pseudorandom function which has been proposed by Bertoni et al. in 2017. In this work, we show that by observing suitable inputs to Farfalle, one can derive various constructions of a ...

research-article
Flag-transitive symmetric 2-designs of prime order
Abstract

In this paper, we study a flag-transitive automorphism group G of symmetric 2-(v,k,λ) designs, where λ>1 and the order n=k-λ is a prime number. We prove that G is point-primitive, and it is of affine or almost simple type.

research-article
Permutation polynomials and their compositional inverses over finite fields by a local method
Abstract

Recently, P. Yuan presented a local method to find permutation polynomials and their compositional inverses over finite fields. The work of P. Yuan inspires us to construct some classes of permutation polynomials and their compositional inverses ...

research-article
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
Abstract

Threshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based threshold PKEs have not been ...

research-article
Construction and enumeration of self-orthogonal and self-dual codes over Galois rings of even characteristic
Abstract

Let e2 and r1 be integers, and let Re,r denote the Galois ring of characteristic 2e and cardinality 2er. The Teichmu¨ller set Tr of the Galois ring Re,r can be viewed as the finite field of order 2r under the addition operation and the ...

research-article
Codes with respect to weighted poset block metric
Abstract

We study a new family of metrics, weighted poset block metric, which generalizes the weighted coordinates poset metric introduced by Panek and Pinheiro (IEEE Trans Inf Theory 66(11):6823–6834, 2020) and the metric for linear error-block codes ...

research-article
Determination of the sizes of optimal geometric orthogonal codes with parameters (n×m,k,λ,k-1)
Abstract

The study of (n×m,k,λa,λc)-geometric orthogonal codes ((n×m,k,λa,λc)-GOCs) is motivated by the application in DNA origami. The central research on GOCs is to determine the value of Φ(n×m,k,λa,λc), i.e., the largest possible size among all (n×m,k,λ...

research-article
New classes of NMDS codes with dimension 3
Abstract

The singleton defect of an [nkd] linear code C is defined as s(C)=n-k+1-d. Codes with s(C)=s(C)=1 are called near maximum distance separable (NMDS) codes. It is known that an [n,3,n-3] NMDS code is equivalent to an (n, 3)-arc in PG(2, q). In ...

research-article
On maximal partial Latin hypercubes
Abstract

A lower bound is presented for the minimal number of filled cells in a maximal partial Latin hypercube of dimension d and order n. The result generalises and extends previous results for d=2 (Latin squares) and d=3 (Latin cubes). Explicit ...

research-article
Fast Kötter–Nielsen–Høholdt interpolation over skew polynomial rings and its application in coding theory
Abstract

Skew polynomials are a class of non-commutative polynomials that have several applications in computer science, coding theory and cryptography. In particular, skew polynomials can be used to construct and decode evaluation codes in several metrics,...

research-article
On the image of an affine subspace under the inverse function within a finite field
Abstract

We consider the function x-1 that inverses a finite field element xFpn (p is prime, 0-1=0) and affine Fp-subspaces of Fpn such that their images are affine subspaces as well. It is proved that the image of an affine subspace L, |L|>2, is an ...

research-article
Defects of codes from higher dimensional algebraic varieties
Abstract

An MDS code is a code which achieves equality in the singleton bound. The defect of a code measures how far it is from an MDS code. Amplifying on the relationship between the weight distribution of a code and its dual code as in the well-known ...

research-article
On the 430-cap of PG(6,4) having two intersection sizes with respect to hyperplanes
Abstract

Let C be a 430-cap of PG(6,4) having two intersection sizes with respect to hyperplanes. We show that no hyperplane of PG(6,4) intersects C in a Hill 78-cap. So if it can be shown that the Hill 78-cap of PG(5,4) is projectively unique, then such a ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.