Constructing Symmetric Ciphers Using the CAST Design ProcedureDesigns, Codes and Cryptography - Tập 12 - Trang 283-316 - 1997
Carlisle M. Adams
This paper describes the CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems which appear to have good resistance to differential cryptanalysis, linear cryptanalysis, and related-key cryptanalysis, along with a number of other desirable cryptographic properties. Details of the design choices in the procedure are given, including those re...... hiện toàn bộ
The Structure of 1-Generator Quasi-Twisted Codes and New Linear CodesDesigns, Codes and Cryptography - Tập 24 - Trang 313-326 - 2001
Nuh Aydin, Irfan Siap, Dijen K. Ray-Chaudhuri
One of the most important problems of coding theory is to construct codes with best possible minimum distances. Recently, quasi-cyclic (QC) codes have been proven to contain many such codes. In this paper, we consider quasi-twisted (QT) codes, which are generalizations of QC codes, and their structural properties and obtain new codes which improve minimum distances of best known linear codes over ...... hiện toàn bộ
Bent functions in the partial spread class generated by linear recurring sequencesDesigns, Codes and Cryptography - Tập 91 - Trang 63-82 - 2022
Maximilien Gadouleau, Luca Mariot, Stjepan Picek
We present a construction of partial spread bent functions using subspaces generated by linear recurring sequences (LRS). We first show that the kernels of the linear mappings defined by two LRS have a trivial intersection if and only if their feedback polynomials are relatively prime. Then, we characterize the appropriate parameters for a family of pairwise coprime polynomials to generate a parti...... hiện toàn bộ
Characterization of 2 n -periodic binary sequences with fixed 2-error or 3-error linear complexityDesigns, Codes and Cryptography - Tập 53 - Trang 75-97 - 2009
Ramakanth Kavuluru
The linear complexity of sequences is an important measure of the cryptographic strength of key streams used in stream ciphers. The instability of linear complexity caused by changing a few symbols of sequences can be measured using k-error linear complexity. In their SETA 2006 paper, Fu et al. (SETA, pp. 88–103, 2006) studied the linear complexity and the 1-error linear complexity of 2
...... hiện toàn bộ
Full classification of permutation rational functions and complete rational functions of degree three over finite fieldsDesigns, Codes and Cryptography - Tập 88 - Trang 867-886 - 2020
Andrea Ferraguti, Giacomo Micheli
Let q be a prime power, $$\mathbb {F}_q$$ be the finite field of order q and $$\mathbb {F}_q(x)$$ be the field of rational functions over $$\mathbb {F}_q$$. In this paper we classify and count all rational functions $$\varphi \in \mathbb {F}_q(x)$$ of degree 3 that induce a permutation of $$\mathbb {P}^1(\mathbb {F}_q)$$. As a consequence of our classification, we can show that there is no complet...... hiện toàn bộ
Multimedia IPP codes with efficient tracingDesigns, Codes and Cryptography - Tập 88 - Trang 851-866 - 2020
Jing Jiang, Yujie Gu, Minquan Cheng
Wu et al. (IEEE Signal Process Mag 21:15–27, 2004) showed that fingerprinting system can be designed according to different criteria: catching one, catching many and catching all. For the case of “catching many”, binary multimedia identifiable parent property codes (t-MIPPCs) were introduced to construct fingerprints resistant to the averaging collusion attack on multimedia contents. In this paper...... hiện toàn bộ