We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 61-80 of 10,000 results
  1. Combinatorial constructions of optimal low-power error-correcting cooling codes

    High temperatures have dramatic negative effects on interconnect performance. In a bus, whenever the state transitions from “0” to “1”, or “0” to...

    Shuangqing Liu, Lijun Ji in Designs, Codes and Cryptography
    Article 04 April 2024
  2. Construction of quantum codes from multivariate polynomial rings

    In this paper, we use multivariate polynomial rings to construct quantum error-correcting codes (QECCs) via Hermitian construction. We establish a...

    Cong Yu, Shixin Zhu, Fuyin Tian in Designs, Codes and Cryptography
    Article 02 April 2024
  3. Optimal binary signed-digit representations of integers and the Stern polynomial

    The binary signed-digit (BSD) representation of integers is used for efficient integer computation in various settings. The Stern polynomial is a...

    Article 02 April 2024
  4. Preimage attacks on reduced-round Ascon-Xof

    Ascon , a family of algorithms that supports authenticated encryption and hashing, has been selected as the new standard for lightweight cryptography...

    Seungjun Baek, Giyoon Kim, Jongsung Kim in Designs, Codes and Cryptography
    Article 30 March 2024
  5. Classifying pseudo-ovals, translation generalized quadrangles, and elation Laguerre planes of small order

    We provide classification results for translation generalized quadrangles of order less than or equal to 64, and hence, for all incidence geometries...

    Giusy Monzillo, Tim Penttila, Alessandro Siciliano in Designs, Codes and Cryptography
    Article Open access 29 March 2024
  6. Efficient secure multi-party computation for proof of custody in Ethereum sharding

    Ethereum, one of the most prominent and widely deployed blockchain systems, is undergoing a significant upgrade that adopts sharding for capacity...

    Yuxin Tong, **ang **e, ... Rui Xue in Designs, Codes and Cryptography
    Article 27 March 2024
  7. PERK: compact signature scheme based on a new variant of the permuted kernel problem

    In this work we introduce PERK a compact digital signature scheme based on the hardness of a new variant of the permuted kernel problem (PKP). PERK...

    Slim Bettaieb, Loïc Bidoux, ... Marco Palumbi in Designs, Codes and Cryptography
    Article 27 March 2024
  8. CCA security for contracting (quasi-)Feistel constructions with tight round complexity

    Feistel constructions using contracting round functions were introduced in 1990s and generalized by Yun et al. (Des Codes Cryptogr 58(1):45–72, 2011)...

    Chun Guo, Ling Song in Designs, Codes and Cryptography
    Article 23 March 2024
  9. Negacyclic BCH codes of length \(\frac{q^{2m}-1}{q+1}\) and their duals

    Negacyclic BCH codes are an important subclass of negacyclic codes and have good parameters. Inspired by the recent work on cyclic codes published in...

    Zhonghua Sun, **nyue Liu, ... Yongsheng Tang in Designs, Codes and Cryptography
    Article 19 March 2024
  10. On Bose distance of a class of BCH codes with two types of designed distances

    BCH codes are an interesting class of cyclic codes with good error-correcting capability and have wide applications in communication and storage...

    Chunyu Gan, Chengju Li, ... Xueying Shi in Designs, Codes and Cryptography
    Article 19 March 2024
  11. Balanced reconstruction codes for single edits

    Motivated by the sequence reconstruction problem initiated by Levenshtein, reconstruction codes were introduced by Cai et al. to combat errors when a...

    Rongsheng Wu, **ande Zhang in Designs, Codes and Cryptography
    Article 16 March 2024
  12. Impossibility of efficient information-theoretic fuzzy extraction

    Fuzzy extractors convert noisy signals from the physical world into reliable cryptographic keys. Fuzzy min-entropy measures the limit of the length...

    Benjamin Fuller in Designs, Codes and Cryptography
    Article 14 March 2024
  13. Efficient computation of \((2^n,2^n)\)-isogenies

    Elliptic curves are abelian varieties of dimension one; the two-dimensional analogues are abelian surfaces. In this work we present an algorithm to...

    Article Open access 12 March 2024
  14. Square root computation in finite fields

    In this paper, we present a review of three widely-used practical square root algorithms. We then describe a unifying framework where each of these...

    Ebru Adiguzel-Goktas, Enver Ozdemir in Designs, Codes and Cryptography
    Article Open access 12 March 2024
Did you find what you were looking for? Share feedback.