## Journals

- Advances in Mathematics of Communications
- Big Data & Information Analytics
- Communications on Pure & Applied Analysis
- Discrete & Continuous Dynamical Systems - A
- Discrete & Continuous Dynamical Systems - B
- Discrete & Continuous Dynamical Systems - S
- Evolution Equations & Control Theory
- Inverse Problems & Imaging
- Journal of Computational Dynamics
- Journal of Dynamics & Games
- Journal of Geometric Mechanics
- Journal of Industrial & Management Optimization
- Journal of Modern Dynamics
- Kinetic & Related Models
- Mathematical Biosciences & Engineering
- Mathematical Control & Related Fields
- Mathematical Foundations of Computing
- Networks & Heterogeneous Media
- Numerical Algebra, Control & Optimization
- Electronic Research Announcements
- Conference Publications
- AIMS Mathematics

AMC

In this paper we study spread codes: a family of constant-dimension
codes for random linear network coding. In other words, the codewords
are full-rank matrices of size $k\times n$ with entries in a finite
field $\mathbb F_q$. Spread codes are a family of optimal codes with
maximal minimum distance. We give a minimum-distance decoding
algorithm which requires $\mathcal{O}((n-k)k^3)$ operations over
an extension field $\mathbb F_{q^k}$. Our algorithm is more
efficient than the previous ones in the literature, when the dimension $k$ of the codewords is small with respect to $n$.
The decoding algorithm takes advantage of the algebraic structure
of the code, and it uses original results on minors of a matrix
and on the factorization of polynomials over finite fields.

AMC

It is known that the expansion property of a graph influences the performance of the corresponding code when decoded using iterative algorithms. Certain graph products may be used to obtain larger expander graphs from smaller ones. In particular, the zig-zag product and replacement product may be used to construct infinite families of constant degree expander graphs. This paper investigates the use of zig-zag and replacement product graphs for the construction of codes on graphs. A modification of the zig-zag product is also introduced, which can operate on two unbalanced biregular bipartite graphs, and a proof of the expansion property of this modified zig-zag product is presented.

keywords:
expander graphs
,
Codes on graphs
,
replacement product of a graph
,
LDPC codes
,
zig-zag product

AMC

The paper analyzes CFVZ, a new public key cryptosystem whose security is based on a matrix version of the discrete logarithm problem over an elliptic curve. It is shown that the complexity of solving the underlying problem for the proposed system is dominated by the complexity of solving a fixed number of discrete logarithm problems in the group of an elliptic curve. Using an adapted Pollard rho algorithm it is shown that this problem is essentially as hard as solving one discrete logarithm problem in the group of an elliptic curve. Hence, the CFVZ cryptosystem has no advantages over traditional elliptic curve cryptography and should not be used in practice.

AMC

A generalization of the original Diffie-Hellman key exchange in
$(\mathbb Z$∕$p\mathbb Z)$

In Section 5 a concrete practical semigroup action built from simple semirings is presented. It will require further research to analyse this system.

^{*}found a new depth when Miller [27] and Koblitz [16] suggested that such a protocol could be used with the group over an elliptic curve. In this paper, we propose a further vast generalization where abelian semigroups act on finite sets. We define a Diffie-Hellman key exchange in this setting and we illustrate how to build interesting semigroup actions using finite (simple) semirings. The practicality of the proposed extensions rely on the orbit sizes of the semigroup actions and at this point it is an open question how to compute the sizes of these orbits in general and also if there exists a square root attack in general.In Section 5 a concrete practical semigroup action built from simple semirings is presented. It will require further research to analyse this system.

## Year of publication

## Related Authors

## Related Keywords

[Back to Top]