# Cryptography and Communications

Publisher: Springer Verlag

## Description

• Impact factor
0.00
• 5-year impact
0.00
• Cited half-life
0.00
• Immediacy index
0.00
• Eigenfactor
0.00
• Article influence
0.00
• ISSN
1936-2447
• OCLC
85825471
• Material type
Periodical, Internet resource
• Document type
Journal / Magazine / Newspaper, Internet Resource

## Publisher details

• Pre-print
• Author can archive a pre-print version
• Post-print
• Author can archive a post-print version
• Conditions
• Authors own final version only can be archived
• Publisher's version/PDF cannot be used
• On author's website or institutional repository
• On funders designated website/repository after 12 months at the funders request or as a result of legal obligation
• Published source must be acknowledged
• Must link to publisher version
• Set phrase to accompany link to published version (The original publication is available at www.springerlink.com)
• Articles in some journals can be made Open Access on payment of additional charge
• Classification
​ green

## Publications in this journal

• ##### Article: Asymptotic nonlinearity of vectorial Boolean functions
[hide abstract]
ABSTRACT: The nonlinearity of a Boolean function $F: \mathbb{F}_{2}^{m}\rightarrow \mathbb{F}_{2}$ is the minimum Hamming distance between f and all affine functions. The nonlinearity of a S-box $f: \mathbb{F}_{2}^{m}\rightarrow \mathbb{F}_{2}^{n}$ is the minimum nonlinearity of its component (Boolean) functions $v\cdot f,\, v\in \mathbb{F}_{2}^{n}\,\backslash \{0\}$ . This notion quantifies the level of resistance of the S-box to the linear attack. In this paper, the distribution of the nonlinearity of (m, n)-functions is investigated. When n = 1, it is known that asymptotically, almost all m-variable Boolean functions have high nonlinearities. We extend this result to (m, n)-functions.
Cryptography and Communications 06/2014; 6(2).
• ##### Article: Perfect arrays of unbounded sizes over the basic quaternions
[hide abstract]
ABSTRACT: We show the existence of perfect arrays, of unbounded sizes, over the basic quaternions {1, − 1,i, − i,j, − j,k, − k}. We translate the algorithm of Arasu and de Launey, to inflate perfect arrays over the four roots of unity, from a polynomial, into a simple matrix approach. Then, we modify this algorithm to inflate perfect arrays over the basic quaternions {1, − 1,i, − i,j, − j,k, − k}. We show that all modified Lee Sequences (in the sense of Barrera Acevedo and Hall, Lect Notes Comput Sci 159–167, 2012) of length m = p + 1 ≡ 2 (mod 4), where p is a prime number, can be folded into a perfect two-dimensional array (with only one occurrence of the element j) of size $2\times \frac{m}{2}$ , with $GCD(2,\frac{m}{2})=1$ . Then, each of these arrays can be inflated into perfect arrays of sizes $2p\times \frac{m}{2}p$ (previously unknown sizes), with a random appearance of all the elements 1, − 1,i, − i,j, − j,k, − k.
Cryptography and Communications 03/2014;
• ##### Article: Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector
[hide abstract]
ABSTRACT: We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These include message authentication code (MAC), authenticated encryption (AE), authenticated encryption with associated data (AEAD) and deterministic authenticated encryption (DAE) with associated data. Several schemes are presented and rigourously analysed. A major component of the constructions is a keyed hash function having provably low collision and differential probabilities. Methods are described to efficiently extend such hash functions to take multiple inputs. In particular, double-input hash functions are required for the construction of AEAD schemes. An important practical aspect of our work is that a designer can combine off-the-shelf stream ciphers with off-the-shelf hash functions to obtain secure primitives for MAC, AE, AEAD and DAE(AD).
Cryptography and Communications 01/2014;
• ##### Article: A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
[hide abstract]
ABSTRACT: We give easy proofs of some recent results concerning threshold gaps in ramp schemes. We then generalise a construction method for ramp schemes employing error-correcting codes so that it can be applied using nonlinear (as well as linear) codes. Finally, as an immediate consequence of these results, we provide a new explicit bound on the minimum length of a code having a specified distance and dual distance.
Cryptography and Communications 12/2013;
• ##### Article: Resilience to distinguishing attacks on WG-7 cipher and their generalizations
[hide abstract]
ABSTRACT: The stream cipher WG-7 is a lightweight variant of the well-known Welch- Gong (WG) stream cipher family, targeted to resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. Recently, a distinguishing attack was discovered against the stream cipher WG-7 by Orumiehchiha, Pieprzyk and Steinfeld. In this paper, we extend their work to a general distinguishing attack and suggest criteria to protect the WG stream cipher family from this attack. Our analysis shows that by properly choosing the minimal polynomial of the linear feedback shift register for a WG stream cipher, the general distinguishing attack can be easily thwarted.
Cryptography and Communications 12/2013; 5(4).
• ##### Conference Proceeding: On Selection of Optimal Parameters for the WG Stream Cipher Family
[hide abstract]
ABSTRACT: In this paper, we first present some new results about the Welch-Gong (WG) transformations, followed by a description of the WG stream cipher family which is built upon an LFSR and a WG transformation over an extension field. The randomness properties of keystreams produced by a decimated WG cipher are derived based on the new results. We also discuss the selection criteria for choosing the optimal parameters for a WG cipher in order to achieve the maximum level of security. Finally, we present the optimal parameters for the WG transformations over GF(2m); 7 <=m<=16 based on the proposed criteria.
2013 13th Canadian Workshop on Information Theory (CWIT'13); 06/2013
• ##### Article: The resistance of PRESENT-80 against related-key differential attacks
[hide abstract]
ABSTRACT: We examine the security of the 64-bit lightweight block cipher PRESENT-80 against related-key differential attacks. With a computer search we are able to prove that for any related-key differential characteristic on full-round PRESENT-80, the probability of the characteristic only in the 64-bit state is not higher than 2−64. To overcome the exponential (in the state and key sizes) computational complexity of the search we use truncated differences, however as the key schedule is not nibble oriented, we switch to actual differences and apply early abort techniques to prune the tree-based search. With a new method called extended split approach we are able to make the whole search feasible and we implement and run it in real time. Our approach targets the PRESENT-80 cipher however,with small modifications can be reused for other lightweight ciphers as well.
Cryptography and Communications 01/2013;
• Source
##### Article: Second weight codewords of generalized Reed-Muller codes
[hide abstract]
ABSTRACT: In this paper we give the second weight codewords of the generalized Reed-Muller code of order r and length $q^m$.
Cryptography and Communications 03/2012;
• Source
##### Article: Multidimensional linear distinguishing attacks and Boolean functions.
[hide abstract]
ABSTRACT: Linear cryptanalysis and linear approximation methods in general are among the most important cryptanalysis methods of symmetric ciphers and their components. Recently, these methods have been extended to efficiently exploit multiple linear approximations simultaneously. It is known that high nonlinearity of Boolean functions and S-boxes is a desirable property and that the bent functions offer the strongest resistance against cryptanalysis using single linear approximations. The goal of this paper is to investigate to which extent resistance against the multidimensional extension of the linear cryptanalysis method can be achieved. For this purpose some common highly nonlinear Boolean functions as well as a basic LFSR based key stream generator using a nonlinear filter function are investigated.
Cryptography and Communications 01/2012; 4:47-64.
• ##### Article: A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation.
[hide abstract]
ABSTRACT: In this paper the possibilities of an iterative concatenation method towards construction of Boolean functions resistant to algebraic cryptanalysis are investigated. The notion of $\mathcal{AAR}$ (Algebraic Attack Resistant) function is introduced as a unified measure of protection against classical algebraic attacks as well as fast algebraic attacks. Then, it is shown that functions that posses the highest resistance to fast algebraic attacks are necessarily of maximum algebraic immunity, thus opposing a maximum resistance to algebraic cryptanalysis in general. The developed theoretical framework allows us to iteratively construct functions with maximum $\mathcal{AI}$ , and of almost optimized resistance to fast algebraic cryptanalysis. This infinite class for the first time, apart from almost optimal resistance to algebraic cryptanalysis, in addition generates functions that allow an extremely efficient hardware implementation, possess high nonlinearity and maximum algebraic degree; thus unifying most of the relevant cryptographic criteria.
Cryptography and Communications 01/2012; 4:25-45.
• ##### Article: A new construction of highly nonlinear S-boxes.
[hide abstract]
ABSTRACT: In this paper we give a new construction of highly nonlinear vectorial Boolean functions. This construction is based on coding theory, more precisely we use concatenation to construct Boolean functions from codes over containing a first-order generalized Reed–Muller code. As it turns out this construction has a very compact description in terms of Boolean functions, which is of independent interest. The construction allows one to design functions with better nonlinearities than known before.
Cryptography and Communications 01/2012; 4:65-77.
• ##### Article: Designing Integrated Accelerator for Stream Ciphers with Structural Similarities.
[hide abstract]
ABSTRACT: To date, the basic idea for implementing stream ciphers has been confined to individual standalone designs. In this paper, we introduce the notion of integrated implementation of multiple stream ciphers within a single architecture, where the goal is to achieve area and throughput efficiency by exploiting the structural similarities of the ciphers at an algorithmic level. We present two case studies to support our idea. First, we propose the merger of SNOW 3G and ZUC stream ciphers, which constitute a part of the 3GPP LTE-Advanced security suite. We propose HiPAcc-LTE, a high performance integrated design that combines the two ciphers in hardware, based on their structural similarities. The integrated architecture reduces the area overhead significantly compared to two distinct cores, and also provides almost double throughput in terms of keystream generation, compared with the state-of-the-art implementations of the individual ciphers. As our second case study, we present IntAcc-RCHC, an integrated accelerator for the stream ciphers RC4 and HC-128. We show that the integrated accelerator achieves a slight reduction in area without any loss in throughput compared to our standalone implementations. We also achieve at least 1.5 times better throughput compared to general purpose processors. Long term vision of this hardware integration approach for cryptographic primitives is to build a flexible core supporting multiple designs having similar algorithmic structures.
Cryptography and Communications 01/2012; 2012:48.
• ##### Article: Functions of degree 4e that are not APN infinitely often.
[hide abstract]
ABSTRACT: We prove a necessary condition for some polynomials of degree 4e (e an odd number) to be APN over for large n, and we investigate the polynomials f of degree 12.
Cryptography and Communications 01/2011; 3:227-240.
• Source
##### Article: Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums.
[hide abstract]
ABSTRACT: The crosscorrelation of maximal length linear shift register sequences is a well-studied problem that has many applications in sequence designs. This problem is known to have many important connections to exponential sums. In recent years, the study of p-ary bent functions has received a lot of attention and several new functions have been found that are related to the crosscorrelation function and that lead to new connections and problems on Jacobsthal sums. This paper gives a survey of some of these connections.
Cryptography and Communications 01/2011; 3:281-291.
• ##### Article: A lattice-based minimal partial realization algorithm for matrix sequences of varying length.
[hide abstract]
ABSTRACT: In this paper we first extend a minimal partial realization algorithm from vector sequences to matrix sequences of equal length by means of a lattice basis reduction algorithm over polynomial rings. We also give all minimal partial realizations for such matrix sequences and a sufficient and necessary condition for the uniqueness issue. Then we improve the above algorithm to solve the minimal partial realization problem for matrix sequences of varying length.
Cryptography and Communications 01/2011; 3:29-42.
• Source
##### Article: Quadratic forms of codimension 2 over certain finite fields of even characteristic.
[hide abstract]
ABSTRACT: Let be a finite field of characteristic 2, not containing . Let k ≥ 2 be an even integer. We give a full classification of quadratic forms over of codimension 2 provided that certain three coefficients are from . We apply this to the classification of maximal and minimal curves over finite fields.
Cryptography and Communications 01/2011; 3:241-257.
• ##### Article: Linear complexity for sequences with characteristic polynomial ƒv
[hide abstract]
ABSTRACT: We present several generalisations of the Games–Chan algorithm. For a fixed monic irreducible polynomial f we consider the sequences s that have as a characteristic polynomial a power of f. We propose an algorithm for computing the linear complexity of s given a full (not necessarily minimal) period of s. We give versions of the algorithm for fields of characteristic 2 and for arbitrary finite characteristic p, the latter generalising an algorithm of Ding et al. We also propose an algorithm which computes the linear complexity given only a finite portion of s (of length greater than or equal to the linear complexity), generalising an algorithm of Meidl. All our algorithms have linear computational complexity. The proposed algorithms can be further generalised to sequences for which it is known a priori that the irreducible factors of the minimal polynomial belong to a given small set of polynomials.
Cryptography and Communications 01/2011; 5(2):688-692.
• Source
##### Article: Permutation polynomials EA-equivalent to the inverse function over GF (2
[hide abstract]
ABSTRACT: In this paper, a proof is given that there does not exist a linearized polynomial $L(x)\in\mathbb{F}_{2^n}[x]$ such that x − 1 + L(x) is a permutation on $\mathbb{F}_{2^n}$ when n ≥ 5, which is proposed as a conjecture in Li and Wang (Des Codes Cryptogr 58(3):259–269, 2011). As a consequence of this result, if a permutation is EA-equivalent to the inverse function over $\mathbb{F}_{2^n}$ , then it is affine equivalent to the inverse mapping when n ≥ 5.
Cryptography and Communications 01/2011; 3:175-186.

#### Related Journals

• ##### The Annals of Applied Statistics

Institute of Mathematical...

ISSN: 1932-6157, Impact factor: 2.24

• ##### Biomaterials

Elsevier

ISSN: 1878-5905, Impact factor: 7.6

• ##### International Journal of Approximate Reasoning

ISSN: 1873-4731, Impact factor: 1.73

• ##### Optimization Letters

Springer Verlag

ISSN: 1862-4472, Impact factor: 1.65

• ##### Bulletin of the Australian Mathematical Society

Australian Mathematical Society,...

ISSN: 1755-1633, Impact factor: 0.48

• ##### Sciece China. Information Sciences

ISSN: 1674-733X, Impact factor: 0.71

• ##### Handbook of Algebra

ISSN: 1570-7954

• ##### Journal of Combinatorial Designs

Wiley InterScience (Online service),...

ISSN: 1520-6610, Impact factor: 0.69