Catálogo de publicaciones - libros
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings
Marc P. C. Fossorier ; Hideki Imai ; Shu Lin ; Alain Poli (eds.)
En conferencia: 16º International Symposium on Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes (AAECC) . Las Vegas, NV, USA . February 20, 2006 - February 24, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Coding and Information Theory; Data Encryption; Discrete Mathematics in Computer Science; Algorithm Analysis and Problem Complexity; Symbolic and Algebraic Manipulation; Algorithms
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-31423-3
ISBN electrónico
978-3-540-31424-0
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11617983_1
On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities
Claude Carlet
Since the introduction of the notions of nonlinearity in the mid-70’s (the term has been in fact introduced later), of correlation immunity and resiliency in the mid-80’s, and of algebraic immunity recently, the problem of efficiently constructing Boolean functions satisfying, at high levels, one or several of these criteria has received much attention. Only few primary constructions are known, and secondary constructions are also necessary to obtain functions achieving or approaching the best possible cryptographic characteristics. After recalling the background on cryptographic criteria and making some general observations, we try to give a survey of all these constructions and their properties. We then show that a nice and simple property of Boolean functions leads to a general secondary construction building an -variable function from three known -variable functions. This construction generalizes secondary constructions recently obtained for Boolean bent functions and also leads to secondary constructions of highly nonlinear balanced or resilient functions, with potentially better algebraic immunities than the three functions used as building blocks.
Pp. 1-28
doi: 10.1007/11617983_2
On Generalized Parity Checks
Robert J. McEliece; Edwin Soedarmadji
An ordinary parity-check is an extra bit appended to a block (, ..., ) of information bits such that the resulting codeword (, ..., ,) is capable of detecting one error. The choices for are
= + ... + ( 2) ()
= + ... + + 1 ( 2) ()
In this paper we consider defining a parity-check if the underlying alphabet is nonbinary. The obvious definition is of course
= + ... + + ().
We shall show that this obvious choice is the only choice for =2, and up to a natural equivalence the only choice for =3. For ≥ 4, however, the situation is much more complicated.
Pp. 29-34
doi: 10.1007/11617983_3
Cryptography Based on Bilinear Maps
Tatsuaki Okamoto
The bilinear mapping technique that uses the (Weil and Tate) pairings over elliptic (or hyperelliptic) curves represents a great breakthrough in cryptography. This paper surveys this new trend in cryptography, and emphasizes the design of efficient cryptographic primitives that are provably secure in the standard model (i.e., without the random oracle model).
Pp. 35-50
doi: 10.1007/11617983_4
The Merit Factor Problem for Binary Sequences
Tom Høholdt
Binary sequences with small aperiodic correlations play an important role in many applications ranging from radar to modulation and testing of systems. In 1977, M. Golay introduced the as a measure of the goodness of the sequence and conjectured an upper bound for this. His conjecture is still open. In this paper we survey the known results on the Merit Factor problem and comment on the recent experimental results by R.A.Kristiansen and M. Parker and by P. Borwein,K.-K.S.Choi and J. Jedwab.
Pp. 51-59
doi: 10.1007/11617983_5
Quantum Period Reconstruction of Binary Sequences
Florina Piroi; Arne Winterhof
We consider the problem of determining the period of a binary sequence. For sequences with small autocorrelation we prove the existence of a polynomial time quantum algorithm for the above problem based on an algorithm of Hales and Hallgren. We apply this result to several concrete examples for which the autocorrelation can be estimated using known bounds on character sums.
Pp. 60-67
doi: 10.1007/11617983_6
The Vector Key Equation and Multisequence Shift Register Synthesis
Li-Ping Wang
We introduce the vector key equation for cyclic codes with more than one set of consecutive roots. Using the lattice basis reduction multisequence shift register synthesis algorithm [7, 8], we find the minimal solution to the vector equation key and also give an important parameter of the multiple sequences, that is, characteristic sequence. Using it, we give a simpler sufficient and necessary condition for the uniqueness of the minimal polynomial of multiple sequences than that in [7]. The new approach enables us not only to decode cyclic codes up to HT and Roos bounds and but also to find out certain error patterns which can be decoded beyond the two bounds.
Pp. 68-75
doi: 10.1007/11617983_7
A General Framework for Applying FGLM Techniques to Linear Codes
M. Borges-Quintana; M. A. Borges-Trenard; E. Martínez-Moro
We show herein that a pattern based on FGLM techniques can be used for computing Gröbner bases, or related structures, associated to linear codes. This Gröbner bases setting turns out to be strongly related to the combinatorics of the codes.
Pp. 76-86
doi: 10.1007/11617983_8
A Theory of Highly Nonlinear Functions
K. J. Horadam
Highly nonlinear functions are important as sources of low-correlation sequences, high-distance codes and cryptographic primitives, as well as for applications in combinatorics and finite geometry.
We argue that the theory of such functions is best seen in terms of splitting factor pairs. This introduces an extra degree of freedom, through the pairing of a normalised function : → between groups with a homomorphism .
From this perspective we introduce a new definition of equivalence for functions, relative to , and show it preserves their difference distributions. When it includes CCZ and generalised linear equivalence, as well as planar and linear equivalence.
More generally, we use splitting factor pairs to relate several important measures of nonlinearity. We propose approaches to both linear approximation theory and bent functions, and to difference distribution theory and perfect nonlinear functions, which encompass the current approaches.
Pp. 87-100
doi: 10.1007/11617983_9
The Solutions of the Third Power Sum Equation for Niho Type Decimations
Kalle Ranto; Petri Rosendahl
We will completely describe the solutions of the equation ( + 1) = + 1 in the field (), where = and is of Niho type, i.e., ≡ 1 ( − 1). Our results have applications in the theory of cross-correlation functions of -sequences and in the theory of cyclic codes.
Pp. 101-107
doi: 10.1007/11617983_10
On Constructing AG Codes Without Basis Functions for Riemann-Roch Spaces
Drue Coles
The standard construction of linear error-correcting codes on algebraic curves requires determining a basis for the Riemann-Roch space ( associated to a given divisor , often a hard problem. Here we consider the problem of constructing the code without any knowledge of such a basis. We interpret the columns of a generator matrix as points on an embedded copy of the curve, and show that in certain cases these points can be realized in principle as the images of a set of vector bundles under a standard map to a class of repartitions.
Pp. 108-117