Displaying 41 – 60 of 105

Showing per page

Explicit form for the discrete logarithm over the field GF ( p , k )

Gerasimos C. Meletiou (1993)

Archivum Mathematicum

For a generator of the multiplicative group of the field G F ( p , k ) , the discrete logarithm of an element b of the field to the base a , b 0 is that integer z : 1 z p k - 1 , b = a z . The p -ary digits which represent z can be described with extremely simple polynomial forms.

Formalization of Integral Linear Space

Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama (2011)

Formalized Mathematics

In this article, we formalize integral linear spaces, that is a linear space with integer coefficients. Integral linear spaces are necessary for lattice problems, LLL (Lenstra-Lenstra-Lovász) base reduction algorithm that outputs short lattice base and cryptographic systems with lattice [8].

Formalization of the Advanced Encryption Standard. Part I

Kenichi Arai, Hiroyuki Okazaki (2013)

Formalized Mathematics

In this article, we formalize the Advanced Encryption Standard (AES). AES, which is the most widely used symmetric cryptosystem in the world, is a block cipher that was selected by the National Institute of Standards and Technology (NIST) as an official Federal Information Processing Standard for the United States in 2001 [12]. AES is the successor to DES [13], which was formerly the most widely used symmetric cryptosystem in the world. We formalize the AES algorithm according to [12]. We then verify...

Formalization of the Data Encryption Standard

Hiroyuki Okazaki, Yasunari Shidama (2012)

Formalized Mathematics

In this article we formalize DES (the Data Encryption Standard), that was the most widely used symmetric cryptosystem in the world. DES is a block cipher which was selected by the National Bureau of Standards as an official Federal Information Processing Standard for the United States in 1976 [15].

Generating quasigroups for cryptographic applications

Czesław Kościelny (2002)

International Journal of Applied Mathematics and Computer Science

A method of generating a practically unlimited number of quasigroups of a (theoretically) arbitrary order using the computer algebra system Maple 7 is presented. This problem is crucial to cryptography and its solution permits to implement practical quasigroup-based endomorphic cryptosystems. The order of a quasigroup usually equals the number of characters of the alphabet used for recording both the plaintext and the ciphertext. From the practical viewpoint, the most important quasigroups are of...

GLS: New class of generalized Legendre sequences with optimal arithmetic cross-correlation

Huijuan WANG, Qiaoyan WEN, Jie ZHANG (2013)

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

The Legendre symbol has been used to construct sequences with ideal cross-correlation, but it was never used in the arithmetic cross-correlation. In this paper, a new class of generalized Legendre sequences are described and analyzed with respect to their period, distributional, arithmetic cross-correlation and distinctness properties. This analysis gives a new approach to study the connection between the Legendre symbol and the arithmetic cross-correlation. In the end of this paper, possible application...

Left MQQs whose left parastrophe is also quadratic

Simona Samardjiska, Danilo Gligoroski (2012)

Commentationes Mathematicae Universitatis Carolinae

A left quasigroup ( Q , q ) of order 2 w that can be represented as a vector of Boolean functions of degree 2 is called a left multivariate quadratic quasigroup (LMQQ). For a given LMQQ there exists a left parastrophe operation q defined by: q ( u , v ) = w q ( u , w ) = v that also defines a left multivariate quasigroup. However, in general, ( Q , q ) is not quadratic. Even more, representing it in a symbolic form may require exponential time and space. In this work we investigate the problem of finding a subclass of LMQQs whose left parastrophe...

Linear spans of optimal sets of frequency hopping sequences

Gao Juntao, Hu Yupu, Li Xuelian (2012)

RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications

Frequency hopping sequences sets are required in frequency hopping code division multiple access systems. For the anti-jamming purpose, frequency hopping sequences are required to have a large linear span. In this paper, by using a permutation polynomial δ(x) over a finite field, we transform several optimal sets of frequency hopping sequences with small linear span into ones with large linear span. The exact values of the linear span are presented by using the methods of counting the terms of the...

Linear spans of optimal sets of frequency hopping sequences∗

Gao Juntao, Hu Yupu, Li Xuelian (2012)

RAIRO - Theoretical Informatics and Applications

Frequency hopping sequences sets are required in frequency hopping code division multiple access systems. For the anti-jamming purpose, frequency hopping sequences are required to have a large linear span. In this paper, by using a permutation polynomial δ(x) over a finite field, we transform several optimal sets of frequency hopping sequences with small linear span into ones with large linear span. The exact values of the linear span are presented by using the methods of counting the terms of the...

Modifying the tropical version of Stickel's key exchange protocol

Any Muanalifah, Sergei Sergeev (2020)

Applications of Mathematics

A tropical version of Stickel's key exchange protocol was suggested by Grigoriev and Shpilrain (2014) and successfully attacked by Kotov and Ushakov (2018). We suggest some modifications of this scheme that use commuting matrices in tropical algebra and discuss some possibilities of attacks on these new modifications. We suggest some simple heuristic attacks on one of our new protocols, and then we generalize the Kotov and Ushakov attack on tropical Stickel's protocol and discuss the application...

Currently displaying 41 – 60 of 105