Dual and Hull code in the first two generic constructions and relationship with the Walsh transform of cryptographic functions
Dual and Hull code in the first two generic constructions and relationship with the Walsh transform of cryptographic functions
58
- 10.1109/tit.2012.2229782
- Mar 1, 2013
- IEEE Transactions on Information Theory
95
- 10.1142/9789812832245_0009
- Jul 1, 2008
31
- 10.1007/s12095-015-0158-1
- Sep 30, 2015
- Cryptography and Communications
288
- 10.1023/a:1008292303803
- Jan 1, 1997
- Designs, Codes and Cryptography
93
- 10.1109/tit.2018.2819196
- Oct 1, 2018
- IEEE Transactions on Information Theory
320
- 10.1109/tit.2015.2473861
- Nov 1, 2015
- IEEE Transactions on Information Theory
60
- 10.1016/j.disc.2016.11.029
- Dec 27, 2016
- Discrete Mathematics
27
- 10.1109/tit.2014.2339861
- Sep 1, 2014
- IEEE Transactions on Information Theory
188
- 10.1007/978-3-319-32595-8
- Jan 1, 2016
187
- 10.1016/s0019-9958(72)90354-3
- Mar 1, 1972
- Information and Control
- Research Article
- 10.1007/s40314-025-03287-8
- Jun 30, 2025
- Computational and Applied Mathematics
The construction of linear codes from functions in finite fields has been widely studied in the literature. There are two generic construction methods: the first and second generic construction methods for generating linear codes from functions over finite fields. In this paper, we first define the augmented code construction of the variation of the second generic construction method and then present new infinite families of four- and five-weight self-orthogonal divisible codes derived from trace functions. Moreover, by using the augmented code construction based on the first generic construction method, we construct new infinite families of three-weight and four-weight self-orthogonal divisible codes from weakly regular plateaued functions. We determine all parameters of the constructed self-orthogonal codes as well as their dual codes over the odd characteristic finite fields. We present Hamming weights and their weight distributions for the constructed self-orthogonal codes. Additionally, we utilise the constructed p-ary self-orthogonal codes to develop p-ary Linear Complementary Dual (LCD) codes and determine the parameters of the obtained LCD codes and their dual codes.
- Research Article
62
- 10.1109/tit.2018.2823704
- Jan 1, 2019
- IEEE Transactions on Information Theory
Linear codes with certain special properties have received renewed attention in recent years due to their practical applications. Among them, binary linear complementary dual (LCD) codes play an important role in implementations against side-channel attacks and fault injection attacks. Self-orthogonal codes can be used to construct quantum codes. In this paper, four classes of binary linear codes are constructed via a generic construction which has been intensively investigated in the past decade. Simple characterizations of these linear codes to be LCD or self-orthogonal are presented. Resultantly, infinite families of binary LCD codes and self-orthogonal codes are obtained. Infinite families of binary LCD codes from the duals of these four classes of linear codes are produced. Many LCD codes and self-orthogonal codes obtained in this paper are optimal or almost optimal in the sense that they meet certain bounds on general linear codes. In addition, the weight distributions of two sub-families of the proposed linear codes are established in terms of Krawtchouk polynomials.
- Research Article
77
- 10.1109/tit.2019.2956130
- Dec 5, 2019
- IEEE Transactions on Information Theory
Minimal linear codes have significant applications in secret sharing schemes and secure two-party computation. There are several methods to construct linear codes, one of which is based on functions over finite fields. Recently, many construction methods for linear codes from functions have been proposed in the literature. In this paper, we generalize the recent construction methods given by Tang et al. in [IEEE Transactions on Information Theory, 62(3), 1166-1176, 2016] to weakly regular plateaued functions over finite fields of odd characteristic. We first construct three-weight linear codes from weakly regular plateaued functions based on the second generic construction and then determine their weight distributions. We also give a punctured version and subcode of each constructed code. We note that they may be (almost) optimal codes and can be directly employed to obtain (democratic) secret sharing schemes, which have diverse applications in the industry. We next observe that the constructed codes are minimal for almost all cases and finally describe the access structures of the secret sharing schemes based on their dual codes.
- Research Article
6
- 10.1007/s10623-013-9873-9
- Aug 21, 2013
- Designs, Codes and Cryptography
Given a self-dual code over $$\mathbb{F }_q[u]/(u^t)$$ F q [ u ] / ( u t ) we present a method to obtain explicitly new self-dual codes of larger length. Conversely, we also prove that, with the appropriate assumptions on length and number of generators, every self-dual code over $$\mathbb{F }_q[u]/(u^t)$$ F q [ u ] / ( u t ) can be obtained in this manner. We use this construction to produce several optimal self-dual codes over the base field in a manner that generalizes the Lee weight. This construction is based on ideas presented by Han et al. (Bull Korean Math Soc, 49:135---143, 2012) and also by Lee and Kim (An efficient construction of self dual codes, 2012), not only generalizing it, but joining the two different cases from the original paper as special cases of one general construction.
- Book Chapter
4
- 10.1007/978-3-642-15874-2_23
- Jan 1, 2010
New results on quaternary (Z4 = {0, 1, 2, 3}-valued) cryptographic functions are presented. We define and characterize completely the Z4-balancedness and the Z4-nonlinearity according the Hamming metric and the LEE metric. In the particular case of quaternary Bent functions we show that the maximal nonlinearity of these functions is bounded for the HAMMING metric and we give the exact value of the maximal nonlinearity of these functions for the LEE metric. A general construction, based on Galois ring is detailed and applied to obtain a class of balanced and high nonlinearity quaternary cryptographic functions. We use Gray map to derive these constructed quaternary functions to obtain balanced boolean functions having high nonlinearity.
- Book Chapter
1
- 10.1016/s1874-5911(00)80012-3
- Jan 1, 2000
- International Perspectives on Child and Adolescent Mental Health
11 The Relationship Between Antisocial and Prosocial Behaviors in Chinese Preschool Children
- Research Article
7
- 10.1007/s10623-004-1704-6
- Aug 1, 2005
- Designs, Codes and Cryptography
Boolean functions with good cryptographic characteristics are needed for the design of robust pseudo-random generators for stream ciphers and of S-boxes for block ciphers. Very few general constructions of such cryptographic Boolean functions are known. The main ones correspond to concatenating affine or quadratic functions. We introduce a general construction corresponding to the concatenation of indicators of flats. We show that the functions it permits to design can present very good cryptographic characteristics.
- Research Article
76
- 10.1111/j.1475-682x.1999.tb00880.x
- Jul 1, 1999
- Sociological Inquiry
This study examined the extent to which adolescents’behavioral autonomy was predicted by several aspects of the parent‐youth relationship that are encompassed by the general constructs connectedness and restrictiveness. Both of these general relationship constructs are composed of more specific social‐psychological predictors consisting of parental behaviors, parent‐adolescent authority dimensions, and indicators of family ties. A total of 657 adolescents (mean age = 16.3 years) and 753 parents responded to self‐report questionnaires. Hierarchical multiple regression analyses were used to test the hypotheses from both the adolescents’and parents’perspectives in separate models. Many of the predictions were confirmed, indicating that adolescent behavioral autonomy often develops within contexts of relationship connectedness, such as continuing parent‐youth authority and supportiveness. Moreover, as expected, youthful autonomous behavior was inhibited by such aspects of relationship restrictiveness as punitive behavior and the perceived coercive abilities of parents.
- Research Article
13
- 10.1109/tit.2023.3236955
- May 1, 2023
- IEEE Transactions on Information Theory
Minimal linear codes have important applications in secure communications, including in the framework of secret sharing schemes and secure multi-party computation. A lot of research have been carried out to derive codes with few weights (but more importantly, being minimal) using algebraic or geometric approaches. One of the main power and fructify algebraic methods is based on the design of those codes by employing functions over finite fields. K. Li, C. Li, T. Helleseth, and L. Qu have recently identified in [Binary linear codes with few weights from two-to-one functions, IEEE Trans. Inf. Theory, 2021] some binary linear codes with few weights from two classes of two-to-one functions. In this paper, our ultimate objective is to expand the class of codes derived from the paper of Li <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . by proposing larger classes of binary linear codes with few weights via generic constructions involving other known families of two-to-one functions over the finite field F <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2<sup><i>n</i></sup></sub> of order 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><i>n</i></sup> . We succeed in constructing such codes, and we also completely determine their weight distributions. The linear codes presented in this paper differ in parameters from those known in the literature. Besides, some of them are optimal concerning the well-known Griesmer bound. Notably, we prove that our codes are either optimal or almost optimal with respect to the online Database of Grassl. We next observe that the derived binary linear codes also have the minimality property for most cases. We then describe the access structures of the secret-sharing schemes based on their dual codes. Finally, we solve two problems left open in the paper by Li <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . (more specifically, a complete solution to Problem 2 and a partial solution to Problem 1).
- Research Article
1
- 10.1016/j.disc.2008.06.037
- Aug 5, 2008
- Discrete Mathematics
On rank and kernel of some mixed perfect codes
- Conference Article
- 10.1109/chinacom.2009.5339811
- Aug 1, 2009
To resist various attacks, a Boolean function used in symmetric cipher systems should satisfy multiple cryptographic criteria. In this paper, a new generalized construction method for Boolean functions which satisfy multiple cryptographic criteria is provided. These multiple cryptographic criteria include balanced, high nonlinearity, high algebraic degree, propagation criterion of order l (PC(l)) and nonexistence of nonzero linear structures. The construction is based on the use of linear error-correcting code. Given a linear code and its dual code, we show that it is possible to obtain these cryptographic functions.
- Conference Article
- 10.1109/itw.2005.1531898
- Jan 1, 2005
In this paper, we provide a new generalized construction method for (n, m, t) resilient functions with satisfying synthetical cryptographic criteria. These synthetical cryptographic criteria include high nonlinearity, good resiliency, high algebraic degree, and nonexistence of nonzero linear structure and so on. The construction is based on the use of linear error-correcting code. Given a linear [u, m, t + 1] code and its dual code [u, u - m, t/sup */ + 1], we show that it is possible to construct (n, m, d) resilient functions with satisfying synthetical cryptographic criteria, where d = min(t, t/sup */) and n > u > 2m. The method provides a new idea in designing cryptographic functions.
- Book Chapter
10
- 10.1007/3-540-48224-5_86
- Jan 1, 2001
We consider a model of learning Boolean functions from quantum membership queries. This model was studied in [26], where it was shown that any class of Boolean functions which is information-theoretically learnable from polynomially many quantum membership queries is also information-theoretically learnable from polynomially many classical membership queries. In this paper we establish a strong computational separation between quantum and classical learning. We prove that if any cryptographic one-way function exists, then there is a class of Boolean functions which is polynomial-time learnable from quantum membership queries but not polynomial-time learnable from classical membership queries. A novel consequence of our result is a quantum algorithm that breaks a general cryptographic construction which is secure in the classical setting.
- Research Article
- 10.1016/0375-9601(95)00722-f
- Nov 1, 1995
- Physics Letters A
Fully developed turbulence and Brownian motion
- Conference Article
18
- 10.1145/2508859.2516691
- Jan 1, 2013
How is it possible to prevent the sharing of cryptographic functions? This question appears to be fundamentally hard to address since in this setting the owner of the key is the adversary: she wishes to share a program or device that (potentially only partly) implements her main cryptographic functionality. Given that she possesses the cryptographic key, it is impossible for her to be prevented from writing code or building a device that uses that key. She may though be deterred from doing so. We introduce leakage-deterring public-key cryptosystems to address this problem. Such primitives have the feature of enabling the embedding of owner-specific private data into the owner's public-key so that given access to any (even partially functional) implementation of the primitive, the recovery of the data can be facilitated. We formalize the notion of leakage-deterring in the context of encryption, signature, and identification and we provide efficient generic constructions that facilitate the recoverability of the hidden data while retaining privacy as long as no sharing takes place.
- Research Article
- 10.1007/s00200-025-00707-4
- Oct 3, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00703-8
- Aug 4, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00702-9
- Jul 29, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00697-3
- Jul 29, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00701-w
- Jul 16, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00695-5
- Jul 16, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00700-x
- Jul 15, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00694-6
- Jul 14, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00696-4
- Jun 27, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Research Article
- 10.1007/s00200-025-00688-4
- Jun 26, 2025
- Applicable Algebra in Engineering, Communication and Computing
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.