All Issues

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Areas covered include coding theory, cryptology, combinatorics, finite geometry, algebra and number theory, but are not restricted to these. This journal also aims to cover the algorithmic and computational aspects of these disciplines. Hence, all mathematics and computer science contributions of appropriate depth and relevance to the above mentioned applications in communications technology are welcome.

More detailed indication of the journal's scope is given by the subject interests of the members of the board of editors.

All papers will undergo a thorough peer reviewing process unless the subject matter of the paper does not fit the journal; in this case, the author will be informed promptly. Every effort will be made to secure a decision in three months and to publish accepted papers within six months.

  • AIMS is a member of COPE. All AIMS journals adhere to the publication ethics and malpractice policies outlined by COPE.
  • Publishes 4 issues a year in February, May, August and November.
  • Publishes online only.
  • Indexed in Science Citation Index E, CompuMath Citation Index, Current Contents/Physics, Chemical, & Earth Sciences, INSPEC, Mathematical Reviews, MathSciNet, PASCAL/CNRS, Scopus, Web of Science, Zentralblatt MATH and dblp: computer science bibliography.
  • Archived in Portico and CLOCKSS.
  • Shandong University is a founding institution of AMC.
  • AMC is a publication of the American Institute of Mathematical Sciences. All rights reserved.

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles


Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields
Ryutaroh Matsumoto
2019, 13(1) : 1-10 doi: 10.3934/amc.2019001 +[Abstract](211) +[HTML](88) +[PDF](344.95KB)

The first construction of strongly secure quantum ramp secret sharing by Zhang and Matsumoto had an undesirable feature that the dimension of quantum shares must be larger than the number of shares. By using algebraic curves over finite fields, we propose a new construction in which the number of shares can become arbitrarily large for fixed dimension of shares.

The secrecy capacity of the arbitrarily varying wiretap channel under list decoding
Ahmed S. Mansour, Holger Boche and Rafael F. Schaefer
2019, 13(1) : 11-39 doi: 10.3934/amc.2019002 +[Abstract](149) +[HTML](66) +[PDF](558.99KB)

We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modelled by the concept of arbitrarily varying wiretap channels (AVWCs). In this paper, we derive a full characterization of the list secrecy capacity of the AVWC, showing that the list secrecy capacity is equivalent to the correlated random secrecy capacity if the list size L is greater than the order of symmetrizability of the AVC between the transmitter and the legitimate receiver. Otherwise, it is zero. Our result indicates that for a sufficiently large list size L, list codes can overcome the drawbacks of correlated and uncorrelated codes and provide a stable secrecy capacity for AVWCs. Furthermore, we investigate the effect of relaxing the reliability and secrecy constraints by allowing a non-vanishing error probability and information leakage on the list size L. We found that we can construct a list code whose rate is close to the correlated secrecy capacity using a finite list size L that only depends on the average error probability requested. Finally, we point out that our capacity characterization is an important step in investigating the analytical properties of the capacity function such as: the continuity behavior, Turing computability and super-activation of parallel AVWCs.

Connecting Legendre with Kummer and Edwards
Sabyasachi Karati and Palash Sarkar
2019, 13(1) : 41-66 doi: 10.3934/amc.2019003 +[Abstract](163) +[HTML](84) +[PDF](538.14KB)

Scalar multiplication on suitable Legendre form elliptic curves can be speeded up in two ways. One can perform the bulk of the computation either on the associated Kummer line or on an appropriate twisted Edwards form elliptic curve. This paper provides details of moving to and from between Legendre form elliptic curves and associated Kummer line and moving to and from between Legendre form elliptic curves and related twisted Edwards form elliptic curves. Further, concrete twisted Edwards form elliptic curves are identified which correspond to known Kummer lines at the 128-bit security level which provide very fast scalar multiplication on modern architectures supporting SIMD operations.

Wave-shaped round functions and primitive groups
Riccardo Aragona, Marco Calderini, Roberto Civino, Massimiliano Sala and Ilaria Zappatore
2019, 13(1) : 67-88 doi: 10.3934/amc.2019004 +[Abstract](158) +[HTML](66) +[PDF](804.06KB)

Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks (SPN) and Feistel Networks (FN), are often obtained as the composition of different layers. The bijectivity of any encryption function is guaranteed by the use of invertible layers or by the Feistel structure. In this work a new family of ciphers, called wave ciphers, is introduced. In wave ciphers, round functions feature wave functions, which are vectorial Boolean functions obtained as the composition of non-invertible layers, where the confusion layer enlarges the message which returns to its original size after the diffusion layer is applied. Efficient decryption is guaranteed by the use of wave functions in FNs. It is shown how to avoid that the group generated by the round functions acts imprimitively, a serious flaw for the cipher. The primitivity is a consequence of a more general result, which reduce the problem of proving that a given FN generates a primitive group to proving that an SPN, directly related to the given FN, generates a primitive group. Finally, a concrete instance of real-world size wave cipher is proposed as an example, and its resistance against differential and linear cryptanalyses is also established.

Optimal information ratio of secret sharing schemes on Dutch windmill graphs
Bagher Bagherpour, Shahrooz Janbaz and Ali Zaghian
2019, 13(1) : 89-99 doi: 10.3934/amc.2019005 +[Abstract](129) +[HTML](119) +[PDF](181.63KB)

One of the basic problems in secret sharing is to determine the exact values of the information ratio of the access structures. This task is important from the practical point of view, since the security of any system degrades as the amount of secret information increases.

A Dutch windmill graph consists of the edge-disjoint cycles such that all of them meet in one vertex. In this paper, we determine the exact information ratio of secret sharing schemes on the Dutch windmill graphs. Furthermore, we determine the exact ratio of some related graph families.

Maximum weight spectrum codes
Tim Alderson and Alessandro Neri
2019, 13(1) : 101-119 doi: 10.3934/amc.2019006 +[Abstract](143) +[HTML](72) +[PDF](444.44KB)

In the recent work [9], a combinatorial problem concerning linear codes over a finite field \begin{document}$\mathbb{F}_q$\end{document} was introduced. In that work the authors studied the weight set of an \begin{document}$[n,k]_q$\end{document} linear code, that is the set of non-zero distinct Hamming weights, showing that its cardinality is bounded above by \begin{document}$\frac{q^k-1}{q-1}$\end{document}. They showed that this bound was sharp in the case \begin{document}$ q = 2 $\end{document}, and in the case \begin{document}$ k = 2 $\end{document}. They conjectured that the bound is sharp for every prime power \begin{document}$ q $\end{document} and every positive integer \begin{document}$ k $\end{document}. In this work we quickly establish the truth of this conjecture. We provide two proofs, each employing different construction techniques. The first relies on the geometric view of linear codes as systems of projective points. The second approach is purely algebraic. We establish some lower bounds on the length of codes that satisfy the conjecture, and the length of the new codes constructed here are discussed.

Further improvement of factoring $ N = p^r q^s$ with partial known bits
Shixiong Wang, Longjiang Qu, Chao Li and Huaxiong Wang
2019, 13(1) : 121-135 doi: 10.3934/amc.2019007 +[Abstract](128) +[HTML](76) +[PDF](453.93KB)

We revisit the factoring with known bits problem on RSA moduli. In 1996, Coppersmith showed that the RSA modulus \begin{document}$N = pq$\end{document} with balanced \begin{document}$p,q$\end{document} can be efficiently factored, if the high order \begin{document}$\frac{1}{4} \log_2 N$\end{document} bits of one prime factor is given. Later, this important result is also generalized to the factorization of RSA variants moduli such as \begin{document}$N = p^r q$\end{document} or \begin{document}$N = p_1 p_2 ··· p_n$\end{document}. In 2000, Lim et al. proposed a new RSA variant with the modulus of the form \begin{document}$N = p^r q^s$\end{document}, which is much faster in the decryption process than the standard RSA. Then from 2015 to 2018, in order to investigate the security property of this RSA variant, Lu et al. and Coron et al. have presented three works studying the polynomial-time factorization of \begin{document}$N = p^r q^s$\end{document} with partial known bits of \begin{document}$p^u q^v$\end{document} (or one of the prime factors \begin{document}$p,q$\end{document}) for different choices of \begin{document}$u, v$\end{document}. In this paper, we present a new lattice construction used for Coppersmith's method, and thus improve previous results. Namely, our result requires fewer known bits to recover the prime factors \begin{document}$p,q$\end{document}. We also generalize our result to the factorization of \begin{document}$N = p_1^{r_1}p_2^{r_2}··· p_n^{r_n}$\end{document}.

The weight distribution of a class of p-ary cyclic codes and their applications
Lanqiang Li, Shixin Zhu and Li Liu
2019, 13(1) : 137-156 doi: 10.3934/amc.2019008 +[Abstract](187) +[HTML](75) +[PDF](466.06KB)

Cyclic codes over finite field have been studied for decades due to their wide applications in communication and storage systems. However their weight distributions are known only in a few cases. In this paper, we investigate a class of \begin{document}$ p$\end{document}-ary cyclic codes whose duals have three zeros, where \begin{document}$ p$\end{document} is an odd prime. The weight distributions of the class of cyclic codes for all distinct cases are determined explicitly. The results indicate that these codes contain five-weight codes, seven-weight codes and eleven-weight codes. Some of these codes are optimal. Moreover, the covering structures of the class of codes are considered and being used to construct secret sharing schemes.

Cyclic DNA codes over $ \mathbb{F}_2[u,v]/\langle u^3, v^2-v, vu-uv\rangle$
Minjia Shi and Yaqi Lu
2019, 13(1) : 157-164 doi: 10.3934/amc.2019009 +[Abstract](210) +[HTML](73) +[PDF](335.28KB)

In this paper, we construct cyclic DNA codes over the ring \begin{document} $R = \mathbb{F}_2[u,v]/\langle u^3, v^2-v, vu-uv\rangle$ \end{document}. The correspondence between the elements of \begin{document} $R$ \end{document} and the alphabet \begin{document} $\{A,T,G,C\}^{3}$ \end{document} is obtained by a given Gray map. Moreover, some properties of binary images of the Condons under the Gray map are also discussed. Finally, two examples of cyclic DNA codes over \begin{document} $R$ \end{document} are presented to illustrate the obtained results.

New 2-designs over finite fields from derived and residual designs
Michael Braun, Michael Kiermaier and Reinhard Laue
2019, 13(1) : 165-170 doi: 10.3934/amc.2019010 +[Abstract](150) +[HTML](66) +[PDF](293.88KB)

Based on the existence of designs for the derived and residual parameters of admissible parameter sets of designs over finite fields we obtain a new infinite series of designs over finite fields for arbitrary prime powers \begin{document}$q$\end{document} with parameters \begin{document}$2\text{-}(8,4,\frac{(q^6-1)(q^3-1)}{(q^2-1)(q-1)};q)$\end{document} as well as designs with parameters \begin{document}$2\text{-}(10,4,85λ;2)$\end{document}, \begin{document}$2\text{-}(10,5,765λ;2)$\end{document}, \begin{document}$2\text{-}(11,5,6205λ;2)$\end{document}, \begin{document}$2\text{-}(11,5,502605λ;2)$\end{document}, and \begin{document}$2\text{-}(12,6,423181λ;2)$\end{document} for \begin{document}$λ = 7,12,19,21,22,24,31,36,42,43,48,49,55,60,63$\end{document}.

Double circulant self-dual and LCD codes over Galois rings
Minjia Shi, Daitao Huang, Lin Sok and Patrick Solé
2019, 13(1) : 171-183 doi: 10.3934/amc.2019011 +[Abstract](136) +[HTML](62) +[PDF](367.28KB)

This paper investigates the existence, enumeration, and asymptotic performance of self-dual and LCD double circulant codes over Galois rings of characteristic \begin{document} $p^2$ \end{document} and order \begin{document} $p^4$ \end{document} with \begin{document} $p$ \end{document} an odd prime. When \begin{document} $p \equiv 3 \ ({\rm mod} \ 4),$ \end{document} we give a method to construct a duality preserving bijective Gray map from such a Galois ring to \begin{document} $\mathbb{Z}_{p^2}^2.$ \end{document} Closed formed enumeration formulas for double circulant codes that are self-dual (resp. LCD) are derived as a function of the length of these codes. Using random coding, we obtain families of asymptotically good self-dual and LCD codes over \begin{document} $\mathbb{Z}_{p^2}$ \end{document} with respect to the metric induced by the standard \begin{document} ${\mathbb{F}}_p$ \end{document}-valued Gray maps.

On the security of the WOTS-PRF signature scheme
Philip Lafrance and Alfred Menezes
2019, 13(1) : 185-193 doi: 10.3934/amc.2019012 +[Abstract](138) +[HTML](60) +[PDF](357.76KB)

We identify a flaw in the security proof and a flaw in the concrete security analysis of the WOTS-PRF variant of the Winternitz one-time signature scheme, and discuss the implications to its concrete security.

Some two-weight and three-weight linear codes
Chengju Li, Sunghan Bae and Shudi Yang
2019, 13(1) : 195-211 doi: 10.3934/amc.2019013 +[Abstract](147) +[HTML](63) +[PDF](412.73KB)

Let \begin{document}$\Bbb F_q$\end{document} be the finite field with \begin{document}$q = p^m$\end{document} elements, where \begin{document}$p$\end{document} is an odd prime and \begin{document}$m$\end{document} is a positive integer. For a positive integer \begin{document}$t$\end{document}, let \begin{document}$D \subset \Bbb F_q^t$\end{document} and let \begin{document}$\mbox{Tr}_m$\end{document} be the trace function from \begin{document}$\Bbb F_q$\end{document} onto \begin{document}$\Bbb F_p$\end{document}. We define a \begin{document}$p$\end{document}-ary linear code \begin{document}$\mathcal C_D$\end{document} by


In this paper, we will present the weight enumerators of the linear codes \begin{document}$\mathcal C_D$\end{document} in the following two cases:

1. \begin{document}$D = \{(x_1,x_2, ..., x_t) ∈ \Bbb F_q^t \setminus \{(0,0, ..., 0)\}: \mbox{Tr}_m(x_1^2+x_2^2+···+x_t^2) = 0\}$\end{document};

2. \begin{document}$D = \{(x_1,x_2, ..., x_t) ∈ \Bbb F_q^t: \mbox{Tr}_m(x_1^2+x_2^2+···+x_t^2) = 1\}$\end{document}.

It is shown that \begin{document}$\mathcal C_D$\end{document} is a two-weight code if \begin{document}$tm$\end{document} is even and three-weight code if \begin{document}$tm$\end{document} is odd in both cases. The weight enumerators of \begin{document}$\mathcal C_D$\end{document} in the first case generalize the results in [17] and [18]. The complete weight enumerators of \begin{document}$\mathcal C_D$\end{document} are also investigated.

A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](1370) +[PDF](288.3KB) Cited By(42)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](1311) +[PDF](247.3KB) Cited By(28)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](1516) +[PDF](323.1KB) Cited By(24)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](1188) +[PDF](218.2KB) Cited By(22)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](1441) +[PDF](248.6KB) Cited By(22)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](1688) +[PDF](390.1KB) Cited By(19)
On the order bounds for one-point AG codes
Olav Geil, Carlos Munuera, Diego Ruano and Fernando Torres
2011, 5(3) : 489-504 doi: 10.3934/amc.2011.5.489 +[Abstract](1242) +[PDF](378.6KB) Cited By(18)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](1504) +[PDF](304.4KB) Cited By(17)
Geometric constructions of optimal optical orthogonal codes
T. L. Alderson and K. E. Mellinger
2008, 2(4) : 451-467 doi: 10.3934/amc.2008.2.451 +[Abstract](1258) +[PDF](239.2KB) Cited By(16)
Linear nonbinary covering codes and saturating sets in projective spaces
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and Fernanda Pambianco
2011, 5(1) : 119-147 doi: 10.3934/amc.2011.5.119 +[Abstract](1727) +[PDF](566.6KB) Cited By(15)
\begin{document}$np^s$\end{document} over \begin{document}$\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$\end{document}" >Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](1198) +[HTML](359) +[PDF](555.31KB) PDF Downloads(182)
Characterization of extended Hamming and Golay codes as perfect codes in poset block spaces
B. K. Dass, Namita Sharma and Rashmi Verma
2018, 12(4) : 629-639 doi: 10.3934/amc.2018037 +[Abstract](604) +[HTML](300) +[PDF](366.18KB) PDF Downloads(145)
New families of strictly optimal frequency hopping sequence sets
Jingjun Bao
2018, 12(2) : 387-413 doi: 10.3934/amc.2018024 +[Abstract](1089) +[HTML](241) +[PDF](613.0KB) PDF Downloads(118)
\begin{document}$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$\end{document}-additive cyclic codes" >$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$-additive cyclic codes
Tingting Wu, Jian Gao, Yun Gao and Fang-Wei Fu
2018, 12(4) : 641-657 doi: 10.3934/amc.2018038 +[Abstract](521) +[HTML](304) +[PDF](409.5KB) PDF Downloads(114)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](696) +[HTML](188) +[PDF](543.19KB) PDF Downloads(108)
Indiscreet logarithms in finite fields of small characteristic
Robert Granger, Thorsten Kleinjung and Jens Zumbrägel
2018, 12(2) : 263-286 doi: 10.3934/amc.2018017 +[Abstract](1321) +[HTML](297) +[PDF](541.54KB) PDF Downloads(99)
New constructions of systematic authentication codes from three classes of cyclic codes
Yunwen Liu, Longjiang Qu and Chao Li
2018, 12(1) : 1-16 doi: 10.3934/amc.2018001 +[Abstract](1200) +[HTML](244) +[PDF](422.32KB) PDF Downloads(99)
A class of skew-cyclic codes over $\mathbb{Z}_4+u\mathbb{Z}_4$ with derivation
Amit Sharma and Maheshanand Bhaintwal
2018, 12(4) : 723-739 doi: 10.3934/amc.2018043 +[Abstract](479) +[HTML](439) +[PDF](463.68KB) PDF Downloads(91)
Reduced access structures with four minimal qualified subsets on six participants
Motahhareh Gharahi and Shahram Khazaei
2018, 12(1) : 199-214 doi: 10.3934/amc.2018014 +[Abstract](1343) +[HTML](242) +[PDF](447.58KB) PDF Downloads(87)
The average dimension of the Hermitian hull of constacyclic codes over finite fields of square order
Somphong Jitman and Ekkasit Sangwisut
2018, 12(3) : 451-463 doi: 10.3934/amc.2018027 +[Abstract](457) +[HTML](176) +[PDF](377.03KB) PDF Downloads(87)

2017  Impact Factor: 0.564




Email Alert

[Back to Top]