查看更多>>摘要:The notion of an irredundant orthogonal array (IrOA) was introduced by Goyeneche and Zyczkowski who showed an IrOA(lambda)(t, k, v) corresponds to a t -uniform state of k subsystems with local dimension v (Physical Review A. 90 (2014), 022316). In this paper, we construct some kinds of 2-uniform states by establishing the existence of IrOA(lambda)(2, 5, v) for any integer v >= 4, v not equal 6;IrOA(lambda)(2, 6, v) for any integer v >= 2; IrOA(lambda)(2, q, q) and IrOA(lambda)(2, q + 1, q) for any prime power q > 3.
查看更多>>摘要:In this paper, we present two constructions of low-hit-zone frequen-cy-hopping sequence (LHZ FHS) sets. The constructions in this paper gener-alize the previous constructions based on m-sequences and d-form functions with difference-balanced property, and generate several classes of optimal LHZ FHS sets and LHZ FHS sets with optimal periodic partial Hamming correlation (PPHC).
Bortos, MariaGildea, J. O. E.Kaya, AbidinKorban, Adrian...
16页
查看更多>>摘要:Many generator matrices for constructing extremal binary self -dual codes of different lengths have the form G = (I-n | A), where In is the n x n identity matrix and A is the n x n matrix fully determined by the first row. In this work, we define a generator matrix in which A is a block matrix, where the blocks come from group rings and also, A is not fully determined by the elements appearing in the first row. By applying our construction over F-2+uF(2) and by employing the extension method for codes, we were able to construct new extremal binary self-dual codes of length 68. Additionally, by employing a generalised neighbour method to the codes obtained, we were able to construct many new binary self-dual [68, 34, 12]-codes with the rare parameters gamma = 7, 8 and 9 in W-68,W-2. In particular, we find 92 new binary self-dual [68, 34, 12]-codes.
查看更多>>摘要:Quaternary sequences with optimal autocorrelation property are preferred in applications. Cyclotomic classes of order 4 are widely used in the constructions of quaternary sequences due to the convenience of defining a quaternary sequence with the cyclotomic classes of order 4 as its support set. Recently, several classes of optimal quaternary sequences of period 2p, which are all closely related to the cyclotomic classes of order 4 with respect to Zp were introduced in the literature. However, less attention has been paid to the equivalence between these known results. In this paper, we introduce the unified form of this kind of quaternary sequences to classify these known results and then conclude the unified forms of these optimal quaternary sequences. By doing this, we disclose the relationship between the optimal quaternary sequences derived from different methods in the literature on one hand. And on the other hand, when the new obtained optimal quaternary sequence period is 2p and the cyclotomic classes of order 4 are involved, the methods and the results given in this paper can be used to identify if the sequence is new or not.
查看更多>>摘要:Elliptic curve cryptography is based upon elliptic curves defined over finite fields. Operations over such elliptic curves require arithmetic over the underlying field. In particular, fast implementations of multiplication and squaring over the finite field are required for performing efficient elliptic curve cryptography. The present work considers the problem of obtaining efficient algorithms for field multiplication and squaring. From a theoretical point of view, we present a number of algorithms for multiplication/squaring and reduction which are appropriate for different settings. Our algorithms collect together and generalize ideas which are scattered across various papers and codes. At the same time, we also introduce new ideas to improve upon existing works. A key theoretical feature of our work is that we provide formal statements and detailed proofs of correctness of the different reduction algorithms that we describe. On the implementation aspect, a total of fourteen primes are considered, covering all previously proposed cryptographically relevant (pseudo-)Mersenne prime order fields at various security levels. For each of these fields, we provide 64-bit assembly implementations of the relevant multiplication and squaring algorithms targeted towards two different modern Intel architectures. We were able to find previous 64-bit implementations for six of the fourteen primes considered in this work. On the Haswell and Skylake processors of Intel, for all the six primes where previous implementations are available, our implementations outperform such previous implementations.
查看更多>>摘要:The intersection of a linear code and its dual is called the hull of this code. The code is a linear complementary dual (LCD) code if the dimension of its hull is zero. In this paper, we develop a method to construct LCD codes and linear codes with one-dimensional hull by association schemes. One of constructions in this paper generalizes that of linear codes associated with Gauss periods given in [5]. In addition, we present a generalized construction of linear codes, which can provide more LCD codes and linear codes with onedimensional hull. We also present some examples of LCD MDS, LCD almost MDS codes, and MDS, almost MDS codes with one-dimensional hull from our constructions.
查看更多>>摘要:Rotation symmetric Boolean functions constitute a class of cryp-tographically significant Boolean functions. In this paper, based on the theory of ordered integer partitions, we present a new class of odd-variable rotation symmetric Boolean functions with optimal algebraic immunity by modifying the support of the majority function. Compared with the existing rotation symmetric Boolean functions on odd variables, the newly constructed func-tions have the highest nonlinearity.
Chi-dominguez, Jesus-javierRodriguez-henriquez, Francisco
29页
查看更多>>摘要:Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) has spurred considerable attention to improving its performance and re-evaluating its classical and quantum secu-rity guarantees. In this paper we discuss how the optimal strategies employed by the Supersingular Isogeny Diffie-Hellman (SIDH) key agreement protocol can be naturally extended to CSIDH. Furthermore, we report a software li-brary that achieves moderate but noticeable performance speedups when com-pared against state-of-the-art implementations of CSIDH-512, which is the most popular CSIDH instantiation. We also report an estimated number of field operations for larger instantiations of this protocol, namely, CSIDH-1024 and CSIDH-1792.
Zhou, Y. U.Dong, XinfengWei, YongzhuangZhang, Fengrong...
25页
查看更多>>摘要:The concept of the signal-to-noise ratio (SNR) as a useful measure indicator of the robustness of (n, m)-functions F = (f(1), . . . , f(m)) (cryptographic S-boxes) against differential power analysis (DPA), has received extensive at-tention during the previous decade. In this paper, we give an upper bound on the SNR of balanced (n, m)-functions, and a clear upper bound regarding unbalanced (n, m)-functions. Moreover, we derive some deep relationships be-tween the SNR of (n, m)-functions and three other cryptographic parameters (the maximum value of the absolute value of the Walsh transform, the sum-of-squares indicator, and the nonlinearity of its coordinates), respectively. In particular, we give a trade-off between the SNR and the refined transparency order of (n, m)-functions. Finally, we prove that the SNR of (n, m)-functions is not affine invariant, and data experiments verify this result.