galois rings
Recently Published Documents


TOTAL DOCUMENTS

184
(FIVE YEARS 28)

H-INDEX

16
(FIVE YEARS 2)

2022 ◽  
Vol 77 ◽  
pp. 101946
Author(s):  
Markel Epelde ◽  
Ignacio F. Rúa

2021 ◽  
Vol 28 (04) ◽  
pp. 581-600
Author(s):  
Hai Q. Dinh ◽  
Hualu Liu ◽  
Roengchai Tansuchat ◽  
Thang M. Vo

Negacyclic codes of length [Formula: see text] over the Galois ring [Formula: see text] are linearly ordered under set-theoretic inclusion, i.e., they are the ideals [Formula: see text], [Formula: see text], of the chain ring [Formula: see text]. This structure is used to obtain the symbol-pair distances of all such negacyclic codes. Among others, for the special case when the alphabet is the finite field [Formula: see text] (i.e., [Formula: see text]), the symbol-pair distance distribution of constacyclic codes over [Formula: see text] verifies the Singleton bound for such symbol-pair codes, and provides all maximum distance separable symbol-pair constacyclic codes of length [Formula: see text] over [Formula: see text].


2021 ◽  
Author(s):  
Sven Puchinger ◽  
Julian Renner ◽  
Antonia Wachter-Zeh ◽  
Jens Zumbragel

Mathematics ◽  
2021 ◽  
Vol 9 (9) ◽  
pp. 942
Author(s):  
Juan Carlos Ku-Cauich ◽  
Miguel Angel Márquez-Hidalgo

We provide three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is based on Galois rings. The main achievement in this work is to obtain optimal impersonation and substitution probabilities in the schemes. Additionally, in the first and second scheme, we simplify the source space and obtain a better relationship between the size of the message space and the key space than the one given in a recent paper. Finally, we provide a third scheme on Galois rings.


Author(s):  
Juan Carlos Ku-Cauich ◽  
Miguel Angel Márquez-Hidalgo

We give three new authentication schemes without secrecy. The first two on finite fields and Galois rings, using Gray map for this link. The third construction is given on Galois rings. The main achievement in this work is to obtain optimal impersonation and substitution probabilities in the schemes. Additionally, in the first and second scheme, we simplify the source space and bring a better relationship between the size of the message space and the key space than the given in [8]. Finally, we provide a third scheme on Galois rings, which generalizes the scheme over finite fields constructed in [9].


Author(s):  
Julian Renner ◽  
Alessandro Neri ◽  
Sven Puchinger

AbstractLow-rank parity-check (LRPC) codes are rank-metric codes over finite fields, which have been proposed by Gaborit et al. (Proceedings of the workshop on coding and cryptography WCC, vol 2013, 2013) for cryptographic applications. Inspired by a recent adaption of Gabidulin codes to certain finite rings by Kamche et al. (IEEE Trans Inf Theory 65(12):7718–7735, 2019), we define and study LRPC codes over Galois rings—a wide class of finite commutative rings. We give a decoding algorithm similar to Gaborit et al.’s decoder, based on simple linear-algebraic operations. We derive an upper bound on the failure probability of the decoder, which is significantly more involved than in the case of finite fields. The bound depends only on the rank of an error, i.e., is independent of its free rank. Further, we analyze the complexity of the decoder. We obtain that there is a class of LRPC codes over a Galois ring that can decode roughly the same number of errors as a Gabidulin code with the same code parameters, but faster than the currently best decoder for Gabidulin codes. However, the price that one needs to pay is a small failure probability, which we can bound from above.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Mehmet Sever ◽  
Ahmet Şükrü Özdemir

Abstract As a cryptosystem, Nth Truncated Polynomial Ring (NTRU) is established on the fast and easy calculation. Improving the security is aimed by enlarging a ring where the processes execute and enhancing the number of a private key and a public key. In this study, NTRU takes over the Galois rings and is analysed by adding a new private key.


2020 ◽  
Vol 280 ◽  
pp. 156-161 ◽  
Author(s):  
Jasbir Kaur ◽  
Sucheta Dutt ◽  
Ranjeet Sehmi
Keyword(s):  

2020 ◽  
Vol 280 ◽  
pp. 162-170
Author(s):  
Jasbir Kaur ◽  
Ranjeet Sehmi ◽  
Sucheta Dutt
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document