ISSN:

1930-5346

eISSN:

1930-5338

All Issues

## Advances in Mathematics of Communications

May 2017 , Volume 11 , Issue 2

Select all articles

Export/Reference:

*+*[Abstract](1521)

*+*[HTML](8)

*+*[PDF](373.9KB)

**Abstract:**

Two skew cyclic codes can be equivalent for the Hamming metric only if they have the same length, and only the zero code is degenerate. The situation is completely different for the rank metric. We study rank equivalences between skew cyclic codes of different lengths and, with the aim of finding the skew cyclic code of smallest length that is rank equivalent to a given one, we define different types of length for a given skew cyclic code, relate them and compute them in most cases. We give different characterizations of rank degenerate skew cyclic codes using conventional polynomials and linearized polynomials. Some known results on the rank weight hierarchy of cyclic codes for some lengths are obtained as particular cases and extended to all lengths and to all skew cyclic codes. Finally, we prove that the smallest length of a linear code that is rank equivalent to a given skew cyclic code can be attained by a pseudo-skew cyclic code.

*+*[Abstract](1440)

*+*[HTML](2)

*+*[PDF](263.5KB)

**Abstract:**

In previous work [

*+*[Abstract](1323)

*+*[HTML](4)

*+*[PDF](245.8KB)

**Abstract:**

We construct a family of sextics from the Wiman and Edge sextics. We find a curve over $\mathbb{F}_{5^7}$ attaining the Serre bound, and update $9$ entries of genus $6$ in manYPoints.org by computer search on these sextics.

*+*[Abstract](1339)

*+*[HTML](7)

*+*[PDF](325.0KB)

**Abstract:**

We investigate explicit constructions of bent functions which are linear on elements of spreads. Our constructions are obtained from symplectic presemifields which are associated to pseudo-planar functions. The following diagram gives an indication of the main interconnections arising in this paper:

*+*[Abstract](1531)

*+*[HTML](6)

*+*[PDF](260.5KB)

**Abstract:**

Permutations of finite fields have important applications in cryptography and coding theory. Involutions are permutations that are its own inverse and are of particular interest because the implementation used for coding can also be used for decoding. We present explicit formulas for all the involutions of

*+*[Abstract](1365)

*+*[HTML](5)

*+*[PDF](267.2KB)

**Abstract:**

In this paper we study the structure of specific linear codes called DNA codes. The first attempts on studying such codes have been proposed over four element rings which are naturally matched with DNA four letters. Later, double (pair) DNA strings or more general

*+*[Abstract](1478)

*+*[HTML](5)

*+*[PDF](732.2KB)

**Abstract:**

We present a 3D array construction with application to video watermarking. This new construction uses two main ingredients: an extended rational cycle (ERC) as a shift sequence and a Legendre array as a base. This produces a family of 3D arrays with good auto and cross-correlation. We calculate exactly the values of the auto correlation and the cross-correlation function and their frequency. We present a unified method of obtaining multivariate recursion polynomials and their footprints for all finite multidimensional arrays. Also, we describe new results for arbitrary arrays and enunciate a result for arrays constructed using the method of composition. We also show that the size of the footprint is invariant under dimensional transformations based on the Chinese Remainder Theorem.

*+*[Abstract](1694)

*+*[HTML](2)

*+*[PDF](354.8KB)

**Abstract:**

We compute the covering radius of some families of binary cyclic codes. In particular, we compute the covering radius of cyclic codes with two zeros and minimum distance greater than 3. We also compute the covering radius of some binary primitive BCH codes over

*+*[Abstract](1368)

*+*[HTML](3)

*+*[PDF](285.3KB)

**Abstract:**

The paper presents methods for designing functions having many applications in particular to construct linear codes with few weights. The former codes have several applications in secret sharing, authentication codes, association schemes and strongly regular graphs. We firstly provide new secondary constructions of bent functions generalizing the well-known Rothaus' constructions as well as their dual functions. From our generalization, we show that we are able to compute the dual function of a bent function built from Rothaus' construction. Next we present a result leading to a new method for constructing semi-bent functions and few Walsh transform values functions built from bent functions.

*+*[Abstract](1335)

*+*[HTML](6)

*+*[PDF](273.6KB)

**Abstract:**

In this paper, we firstly compute the dual functions of elementary symmetric bent functions. Next, we derive a new secondary construction of bent functions (given with their dual functions) involving symmetric bent functions, leading to a generalization of the well-know Rothaus' construction.

*+*[Abstract](1464)

*+*[HTML](3)

*+*[PDF](265.4KB)

**Abstract:**

A code is said to be complementary dual if it meets its dual trivially. We give a sufficient condition for a special class of additive cyclic codes to be complementary dual.

*+*[Abstract](1310)

*+*[HTML](7)

*+*[PDF](370.8KB)

**Abstract:**

We consider two metrics decoding equivalent if they impose the same minimum distance decoding for every code. It is known that, up to this equivalence, every metric is isometrically embeddable into the Hamming cube.

We present an algorithm which for any translation invariant metric gives an upper bound on the minimum dimension of such an embedding. We also give lower and upper bounds for this embedding dimension over the set of all such metrics.

*+*[Abstract](1157)

*+*[HTML](6)

*+*[PDF](320.1KB)

**Abstract:**

We present an *N*-dimensional generalisation of the two-dimensional block-circulant perfect array construction by Blake et al. As in Blake et al, the families of *N*-dimensional arrays possess pairwise *good* zero correlation zone (ZCZ) cross-correlation. Both constructions use a perfect autocorrelation sequence with the array orthogonality property (AOP).

*+*[Abstract](1408)

*+*[HTML](8)

*+*[PDF](276.3KB)

**Abstract:**

Since 1970, Boolean functions have been the focus of a lot of attention in cryptography. An important topic in symmetric ciphers concerns the cryptographic properties of Boolean functions and constructions of Boolean functions with good cryptographic properties, that is, good resistance to known attacks. An important progress in cryptanalysis areas made in 2003 was the introduction by Courtois and Meier of algebraic attacks and fast algebraic attacks which are very powerful analysis concepts and can be applied to almost all cryptographic algorithms. To study the resistance against algebraic attacks, the notion of algebraic immunity has been introduced. In this paper, we use a parameter introduced by Liu and al., called *fast algebraic immunity*, as a tool to measure the resistance of a cryptosystem (involving Boolean functions) to fast algebraic attacks. We prove an upper bound on the fast algebraic immunity. Using our upper bound, we establish the weakness of trace inverse functions against fast algebraic attacks confirming a recent result of Feng and Gong.

*+*[Abstract](1194)

*+*[HTML](5)

*+*[PDF](330.8KB)

**Abstract:**

In this article we describe how to find the parameters of subfield subcodes of extended Norm-Trace codes (ENT codes). With a Gröbner basis of the ideal of the

*+*[Abstract](1290)

*+*[HTML](9)

*+*[PDF](332.5KB)

**Abstract:**

An almost perfect nonlinear (APN) function

*+*[Abstract](1401)

*+*[HTML](6)

*+*[PDF](373.0KB)

**Abstract:**

Vasiga and Shallit [

2017 Impact Factor: 0.564

## Readers

## Authors

## Editors

## Referees

## Librarians

## Email Alert

Add your name and e-mail address to receive news of forthcoming issues of this journal:

[Back to Top]