-
The complexity of elliptic normal bases
Authors:
Daniel Panario,
Mohamadou Sall,
Qiang Wang
Abstract:
We study the complexity (that is, the weight of the multiplication table) of the elliptic normal bases introduced by Couveignes and Lercier. We give an upper bound on the complexity of these elliptic normal bases, and we analyze the weight of some special vectors related to the multiplication table of those bases. This analysis leads us to some perspectives on the search for low complexity normal…
▽ More
We study the complexity (that is, the weight of the multiplication table) of the elliptic normal bases introduced by Couveignes and Lercier. We give an upper bound on the complexity of these elliptic normal bases, and we analyze the weight of some special vectors related to the multiplication table of those bases. This analysis leads us to some perspectives on the search for low complexity normal bases from elliptic periods.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Infinitude of palindromic almost-prime numbers
Authors:
Aleksandr Tuxanidy,
Daniel Panario
Abstract:
It is proven that, in any given base, there are infinitely many palindromic numbers having at most six prime divisors, each relatively large. The work involves equidistribution estimates for the palindromes in residue classes to large moduli, offering upper bounds for moments and averages of certain products closely related to exponential sums over palindromes
It is proven that, in any given base, there are infinitely many palindromic numbers having at most six prime divisors, each relatively large. The work involves equidistribution estimates for the palindromes in residue classes to large moduli, offering upper bounds for moments and averages of certain products closely related to exponential sums over palindromes
△ Less
Submitted 16 November, 2023; v1 submitted 31 July, 2023;
originally announced July 2023.
-
A Construction of Permutation Polynomials Using Rédei Function in Even Characteristic
Authors:
Daniel Panario,
Nihal Uyar,
Qiang Wang
Abstract:
The Rédei function defined over a field of even characteristic has been introduced by Nöbauer in 1986 \cite{even}. In this paper, inspired by the work of Fu et al. \cite{wang} in odd characteristic, employing the AGW criterion \cite{agw}, we present a recursive construction of permutation polynomials in even characteristic using the Rédei function over a field of characteristic 2.
The Rédei function defined over a field of even characteristic has been introduced by Nöbauer in 1986 \cite{even}. In this paper, inspired by the work of Fu et al. \cite{wang} in odd characteristic, employing the AGW criterion \cite{agw}, we present a recursive construction of permutation polynomials in even characteristic using the Rédei function over a field of characteristic 2.
△ Less
Submitted 16 November, 2023; v1 submitted 5 May, 2023;
originally announced May 2023.
-
Functional graphs of generalized cyclotomic map**s of finite fields
Authors:
Alexander Bors,
Daniel Panario,
Qiang Wang
Abstract:
The functional graph of a function $g:X\rightarrow X$ is the directed graph with vertex set $X$ the edges of which are of the form $x\rightarrow g(x)$ for $x\in X$. Functional graphs are heavily studied because they allow one to understand the behavior of $g$ under iteration (i.e., to understand the discrete dynamical system $(X,g)$), which has various applications, especially when $X$ is a finite…
▽ More
The functional graph of a function $g:X\rightarrow X$ is the directed graph with vertex set $X$ the edges of which are of the form $x\rightarrow g(x)$ for $x\in X$. Functional graphs are heavily studied because they allow one to understand the behavior of $g$ under iteration (i.e., to understand the discrete dynamical system $(X,g)$), which has various applications, especially when $X$ is a finite field $\mathbb{F}_q$. This paper is an extensive study of the functional graphs of so-called index $d$ generalized cyclotomic map**s of $\mathbb{F}_q$, which are a natural and manageable generalization of monomial functions. We provide both theoretical results on the structure of their functional graphs and Las Vegas algorithms for solving fundamental problems, such as parametrizing the connected components of the functional graph by representative vertices, or describing the structure of a connected component given by a representative vertex. The complexity of these algorithms is analyzed in detail, and we make the point that for fixed index $d$ and most prime powers $q$ (in the sense of asymptotic density), suitable implementations of these algorithms have an expected runtime that is polynomial in $\log{q}$ on quantum computers, whereas their expected runtime is subexponential in $\log{q}$ on a classical computer. We also discuss four special cases in which one can devise Las Vegas algorithms with this kind of complexity behavior over most finite fields that solve the graph isomorphism problem for functional graphs of generalized cyclotomic map**s.
△ Less
Submitted 31 March, 2023;
originally announced April 2023.
-
Evaluating the generalized Buchshtab function and revisiting the variance of the distribution of the smallest components of combinatorial objects
Authors:
Claude Gravel,
Daniel Panario
Abstract:
Let $n\geq 1$ and $X_{n}$ be the random variable representing the size of the smallest component of a random combinatorial object made of $n$ elements. A combinatorial object could be a permutation, a monic polynomial over a finite field, a surjective map, a graph, and so on. By a random combinatorial object, we mean a combinatorial object that is chosen uniformly at random among all possible comb…
▽ More
Let $n\geq 1$ and $X_{n}$ be the random variable representing the size of the smallest component of a random combinatorial object made of $n$ elements. A combinatorial object could be a permutation, a monic polynomial over a finite field, a surjective map, a graph, and so on. By a random combinatorial object, we mean a combinatorial object that is chosen uniformly at random among all possible combinatorial objects of size $n$. It is understood that a component of a permutation is a cycle, an irreducible factor for a monic polynomial, a connected component for a graph, etc. Combinatorial objects are categorized into parametric classes. In this article, we focus on the exp-log class with parameter $K=1$ (permutations, derangements, polynomials over finite field, etc.) and $K=1/2$ (surjective maps, $2$-regular graphs, etc.) The generalized Buchstab function $Ω_{K}$ plays an important role in evaluating probabilistic and statistical quantities. For $K=1$, Theorem $5$ from \cite{PanRic_2001_small_explog} stipulates that $\mathrm{Var}(X_{n})=C(n+O(n^{-ε}))$ for some $ε>0$ and sufficiently large $n$. We revisit the evaluation of $C=1.3070\ldots$ using different methods: analytic estimation using tools from complex analysis, numerical integration using Taylor expansions, and computation of the exact distributions for $n\leq 4000$ using the recursive nature of the counting problem. In general for any $K$, Theorem $1.1$ from \cite{BenMasPanRic_2003} connects the quantity $1/Ω_{K}(x)$ for $x\geq 1$ with the asymptotic proportion of $n$-objects with large smallest components. We show how the coefficients of the Taylor expansion of $Ω_{K}(x)$ for $\lfloor x\rfloor \leq x < \lfloor x\rfloor+1$ depends on those for $\lfloor x\rfloor-1 \leq x-1 < \lfloor x\rfloor$. We use this family of coefficients to evaluate $Ω_{K}(x)$.
△ Less
Submitted 12 August, 2023; v1 submitted 24 December, 2022;
originally announced December 2022.
-
Bounds on Covering Codes in RT spaces using Ordered Covering Arrays
Authors:
André Guerino Castoldi,
Emerson Luiz do Monte Carmelo,
Lucia Moura,
Daniel Panario,
Brett Stevens
Abstract:
In this work, constructions of ordered covering arrays are discussed and applied to obtain new upper bounds on covering codes in Rosenbloom-Tsfasman spaces (RT spaces), improving or extending some previous results.
In this work, constructions of ordered covering arrays are discussed and applied to obtain new upper bounds on covering codes in Rosenbloom-Tsfasman spaces (RT spaces), improving or extending some previous results.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
Locating modifications in signed data for partial data integrity
Authors:
Thaís Bardini Idalino,
Lucia Moura,
Ricardo Felipe Custódio,
Daniel Panario
Abstract:
We consider the problem of detecting and locating modifications in signed data to ensure partial data integrity. We assume that the data is divided into $n$ blocks (not necessarily of the same size) and that a threshold $d$ is given for the maximum amount of modified blocks that the scheme can support. We propose efficient algorithms for signature and verification steps which provide a reasonably…
▽ More
We consider the problem of detecting and locating modifications in signed data to ensure partial data integrity. We assume that the data is divided into $n$ blocks (not necessarily of the same size) and that a threshold $d$ is given for the maximum amount of modified blocks that the scheme can support. We propose efficient algorithms for signature and verification steps which provide a reasonably compact signature size, for controlled sizes of $d$ with respect to $n$. For instance, for fixed $d$ the standard signature size gets multiplied by a factor of $O(\log n)$, while allowing the identification of up to $d$ modified blocks. Our scheme is based on nonadaptive combinatorial group testing and cover-free families.
△ Less
Submitted 31 July, 2022;
originally announced August 2022.
-
Ordered Covering Arrays and Upper Bounds on Covering Codes in NRT spaces
Authors:
André Guerino Castoldi,
Emerson L. Monte Carmelo,
Lucia Moura,
Daniel Panario,
Brett Stevens
Abstract:
This work shows several direct and recursive constructions of ordered covering arrays using projection, fusion, column augmentation, derivation, concatenation and cartesian product. Upper bounds on covering codes in NRT spaces are also obtained by improving a general upper bound. We explore the connection between ordered covering arrays and covering codes in NRT spaces, which generalize similar re…
▽ More
This work shows several direct and recursive constructions of ordered covering arrays using projection, fusion, column augmentation, derivation, concatenation and cartesian product. Upper bounds on covering codes in NRT spaces are also obtained by improving a general upper bound. We explore the connection between ordered covering arrays and covering codes in NRT spaces, which generalize similar results for the Hamming metric. Combining the new upper bounds for covering codes in NRT spaces and ordered covering arrays, we improve upper bounds on covering codes in NRT spaces for larger alphabets. We give tables comparing the new upper bounds for covering codes to existing ones.
△ Less
Submitted 31 July, 2022;
originally announced August 2022.
-
Ordered Orthogonal Array Construction Using LFSR Sequences
Authors:
André Guerino Castoldi,
Lucia Moura,
Daniel Panario,
Brett Stevens
Abstract:
We present a new construction of ordered orthogonal arrays (OOA) of strength $t$ with $(q + 1)t$ columns over a finite field $\mathbb{F}_{q}$ using linear feedback shift register sequences (LFSRs). OOAs are naturally related to $(t, m, s)$-nets, linear codes, and MDS codes. Our construction selects suitable columns from the array formed by all subintervals of length $\frac{q^{t}-1}{q-1}$ of an LFS…
▽ More
We present a new construction of ordered orthogonal arrays (OOA) of strength $t$ with $(q + 1)t$ columns over a finite field $\mathbb{F}_{q}$ using linear feedback shift register sequences (LFSRs). OOAs are naturally related to $(t, m, s)$-nets, linear codes, and MDS codes. Our construction selects suitable columns from the array formed by all subintervals of length $\frac{q^{t}-1}{q-1}$ of an LFSR sequence generated by a primitive polynomial of degree $t$ over $\mathbb{F}_{q}$. We prove properties about the relative positions of runs in an LFSR which guarantee that the constructed OOA has strength $t$. The set of parameters of our OOAs are the same as the ones given by Rosenbloom and Tsfasman (1997) and Skriganov (2002), but the constructed arrays are different. We experimentally verify that our OOAs are stronger than the Rosenbloom-Tsfasman-Skriganov OOAs in the sense that ours are "closer" to being a "full" orthogonal array. We also discuss how our OOA construction relates to previous techniques to build OOAs from a set of linearly independent vectors over $\mathbb{F}_{q}$, as well as to hypergraph homomorphisms.
△ Less
Submitted 30 July, 2022;
originally announced August 2022.
-
Comparing balanced $\mathbb{Z}_v$-sequences obtained from ElGamal function to random balanced sequences
Authors:
Daniel Panario,
Lucas Pandolfo Perin,
Brett Stevens
Abstract:
In this paper, we investigate the randomness properties of sequences in $\mathbb{Z}_v$ derived from permutations in $\mathbb{Z}_{p}^*$ using the remainder function modulo $v$, where $p$ is a prime integer. Motivated by earlier studies with a cryptographic focus we compare sequences constructed from the ElGamal function $x \to g^x$ for $x\in\mathbb{Z}_{>0}$ and $g$ a primitive element of…
▽ More
In this paper, we investigate the randomness properties of sequences in $\mathbb{Z}_v$ derived from permutations in $\mathbb{Z}_{p}^*$ using the remainder function modulo $v$, where $p$ is a prime integer. Motivated by earlier studies with a cryptographic focus we compare sequences constructed from the ElGamal function $x \to g^x$ for $x\in\mathbb{Z}_{>0}$ and $g$ a primitive element of $\mathbb{Z}_{p}^*$, to sequences constructed from random permutations of $\mathbb{Z}_{p}^*$. We prove that sequences obtained from ElGamal have maximal period and behave similarly to random permutations with respect to the balance and run properties of Golomb's postulates for pseudo-random sequences. Additionally we show that they behave similarly to random permutations for the tuple balance property. This requires some significant work determining properties of random balanced periodic sequences. In general, for these properties and excepting for very unlikely events, the ElGamal sequences behave the same as random balanced sequences.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
Trade-Based LDPC Codes
Authors:
Farzane Amirzade,
Daniel Panario,
Mohammad-Reza Sadeghi
Abstract:
LDPC codes based on multiple-edge protographs potentially have larger minimum distances compared to their counterparts, single-edge protographs. However, considering different features of their Tanner graph, such as short cycles, girth and other graphical structures, is harder than for Tanner graphs from single-edge protographs. In this paper, we provide a novel approach to construct the parity-ch…
▽ More
LDPC codes based on multiple-edge protographs potentially have larger minimum distances compared to their counterparts, single-edge protographs. However, considering different features of their Tanner graph, such as short cycles, girth and other graphical structures, is harder than for Tanner graphs from single-edge protographs. In this paper, we provide a novel approach to construct the parity-check matrix of an LDPC code which is based on trades obtained from block designs. We employ our method to construct two important categories of LDPC codes; quasi-cyclic (QC) LDPC and spatially-coupled LDPC (SC-LDPC) codes.
We use those trade-based matrices to define base matrices of multiple-edge protographs. The construction of exponent matrices corresponding to these base matrices has less complexity compared to the ones proposed in the literature. We prove that these base matrices result in QC-LDPC codes with smaller lower bounds on the lifting degree than existing ones.
There are three categories of SC-LDPC codes: periodic, time-invariant and time-varying. Constructing the parity-check matrix of the third one is more difficult because of the time dependency in the parity-check matrix. We use a trade-based matrix to obtain the parity-check matrix of a time-varying SC-LDPC code in which each downwards row displacement of the trade-based matrix yields syndrome matrices of a particular time. Combining the different row shifts the whole parity-check matrix is obtained.
Our proposed method to construct parity-check and base matrices from trade designs is applicable to any type of super-simple directed block designs. We apply our technique to directed designs with smallest defining sets containing at least half of the blocks. To demonstrate the significance of our contribution, we provide a number of numerical and simulation results.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Construction of protograph-based LDPC codes with chordless short cycles
Authors:
Farzane Amirzade,
Mohammad-Reza~Sadeghi,
Daniel Panario
Abstract:
Controlling small size trap** sets and short cycles can result in LDPC codes with large minimum distance $d_{\min}$. We prove that short cycles with a chord are the root of several trap** sets and eliminating these cycles increases $d_{\min}$. We show that the lower bounds on $d_{\min}$ of an LDPC code with chordless short cycles, girths 6 (and 8), and column weights $γ$ (and 3), respectively,…
▽ More
Controlling small size trap** sets and short cycles can result in LDPC codes with large minimum distance $d_{\min}$. We prove that short cycles with a chord are the root of several trap** sets and eliminating these cycles increases $d_{\min}$. We show that the lower bounds on $d_{\min}$ of an LDPC code with chordless short cycles, girths 6 (and 8), and column weights $γ$ (and 3), respectively, are $2γ$ (and 10), which is a significant improvement compared to the existing bounds $γ+1$ (and 6). Necessary and sufficient conditions for exponent matrices of protograph-based LDPC codes with chordless short cycles are proposed for any type of protographs, single-edge and multiple-edge, regular and irregular. The application of our method to girth-6 QC-LDPC codes shows that the removal of those cycles improves previous results in the literature.
△ Less
Submitted 4 August, 2020;
originally announced August 2020.
-
Design and Practical Decoding of Full-Diversity Construction A Lattices for Block-Fading Channels
Authors:
Hassan Khodaiemehr,
Daniel Panario,
Mohammad-Reza Sadeghi
Abstract:
Block-fading channel (BF) is a useful model for various wireless communication channels in both indoor and outdoor environments. The design of lattices for BF channels offers a challenging problem, which differs greatly from its counterparts like AWGN channels. Recently, the original binary Construction A for lattices, due to Forney, has been generalized to a lattice construction from totally real…
▽ More
Block-fading channel (BF) is a useful model for various wireless communication channels in both indoor and outdoor environments. The design of lattices for BF channels offers a challenging problem, which differs greatly from its counterparts like AWGN channels. Recently, the original binary Construction A for lattices, due to Forney, has been generalized to a lattice construction from totally real and complex multiplication (CM) fields. This generalized algebraic Construction A of lattices provides signal space diversity, intrinsically, which is the main requirement for the signal sets designed for fading channels. In this paper, we construct full-diversity algebraic lattices for BF channels using Construction A over totally real number fields. We propose two new decoding methods for these lattices which have complexity that grows linearly in the dimension of the lattice. The first decoder is proposed for generalized Construction A lattices with a binary LDPC code as underlying code. This decoding method contains iterative and non-iterative phases. In order to implement the iterative phase, we propose the definition of a parity-check matrix and Tanner graph for Construction A lattices. We also prove that using an underlying LDPC code that achieves the outage probability limit over one-BF channel, the constructed algebraic LDPC lattices together with the proposed decoding method admit diversity order n. Then, we modify the proposed algorithm by removing its iterative phase which enables full-diversity practical decoding of all generalized Construction A lattices without any assumption about their underlying code. We provide some instances showing that algebraic Construction A lattices obtained from binary codes outperform the ones based on non-binary codes in BF channels. We generalize algebraic Construction A lattices over a wider family of number fields namely monogenic number fields.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Finding linearly generated subsequences
Authors:
Claude Gravel,
Daniel Panario,
Bastien Rigault
Abstract:
We develop a new algorithm to compute determinants of all possible Hankel matrices made up from a given finite length sequence over a finite field. Our algorithm fits within the dynamic programming paradigm by exploiting new recursive relations on the determinants of Hankel matrices together with new observations concerning the distribution of zero determinants among the possible matrix sizes allo…
▽ More
We develop a new algorithm to compute determinants of all possible Hankel matrices made up from a given finite length sequence over a finite field. Our algorithm fits within the dynamic programming paradigm by exploiting new recursive relations on the determinants of Hankel matrices together with new observations concerning the distribution of zero determinants among the possible matrix sizes allowed by the length of the original sequence. The algorithm can be used to isolate \emph{very} efficiently linear shift feedback registers hidden in strings with random prefix and random postfix for instance and, therefore, recovering the shortest generating vector. Our new mathematical identities can be used also in any other situations involving determinants of Hankel matrices. We also implement a parallel version of our algorithm. We compare our results empirically with the trivial algorithm which consists of computing determinants for each possible Hankel matrices made up from a given finite length sequence. Our new accelerated approach on a single processor is faster than the trivial algorithm on 160 processors for input sequences of length 16384 for instance.
△ Less
Submitted 5 August, 2020; v1 submitted 4 March, 2020;
originally announced March 2020.
-
Feedback linearly extended discrete functions
Authors:
Claude Gravel,
Daniel Panario
Abstract:
We study a new flexible method to extend linearly the graph of a non-linear, and usually not bijective, function so that the resulting extension is a bijection. Our motivation comes from cryptography. Examples from symmetric cryptography are given as how the extension was used implicitly in the construction of some well-known block ciphers. The method heavily relies on ideas brought from linear co…
▽ More
We study a new flexible method to extend linearly the graph of a non-linear, and usually not bijective, function so that the resulting extension is a bijection. Our motivation comes from cryptography. Examples from symmetric cryptography are given as how the extension was used implicitly in the construction of some well-known block ciphers. The method heavily relies on ideas brought from linear coding theory and secret sharing. We are interested in the behaviour of the composition of many extensions, and especially the space of parameters that defines a family of equations based on finite differences or linear forms. For any linear extension, we characterize entirely the space of parameters for which such equations are solvable in terms of the space of parameters that render those equations for the corresponding non-linear extended functions solvable. Conditions are derived to assess the solvability of those kind of equations in terms of the number of compositions or iterations. We prove a relation between the number of compositions and the dimensions of vector spaces that appear in our results. The proofs of those properties rely mostly on tools from linear algebra.
△ Less
Submitted 9 October, 2021; v1 submitted 25 August, 2019;
originally announced August 2019.
-
A Lattice Based Joint Encryption, Encoding and Modulation Scheme
Authors:
Khadijeh Bagheri,
Taraneh Eghlidos,
Mohammad-Reza Sadeghi,
Daniel Panario
Abstract:
A new nonlinear Rao-Nam like symmetric key encryption scheme is presented in this paper. QC-LDPC lattices that are practically implementable in high dimensions due to their low complexity encoding and decoding algorithms, are used in our design. Then, a joint scheme is proposed which is capable of encrypting, encoding and data modulation simultaneously. The proposed cryptosystem withstands all var…
▽ More
A new nonlinear Rao-Nam like symmetric key encryption scheme is presented in this paper. QC-LDPC lattices that are practically implementable in high dimensions due to their low complexity encoding and decoding algorithms, are used in our design. Then, a joint scheme is proposed which is capable of encrypting, encoding and data modulation simultaneously. The proposed cryptosystem withstands all variants of chosen plaintext attacks applied on Rao-Nam like cryptosystems due to its nonlinearity. The sparseness of the parity-check matrix of QC-LDPC lattices, quasi-cyclic nature of their generator and parity-check matrices, simple hardware structure for generating intentional error vector, permutation and nonlinear functions, result in a small key size for our scheme. The lattice codes related to the lattices used in this paper have high rate which are suitable for bandlimited AWGN channels. Therefore, the joint scheme based on these lattices facilitates secure, reliable and efficient data transmission in bandlimited AWGN channels.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
Construction of irreducible polynomials through rational transformations
Authors:
Daniel Panario,
Lucas Reis,
Qiang Wang
Abstract:
Let $\mathbb F_q$ be the finite field with $q$ elements, where $q$ is a power of a prime. We discuss recursive methods for constructing irreducible polynomials over $\mathbb F_q$ of high degree using rational transformations. In particular, given a divisor $D>2$ of $q+1$ and an irreducible polynomial $f\in \mathbb F_{q}[x]$ of degree $n$ such that $n$ is even or $D\not \equiv 2\pmod 4$, we show ho…
▽ More
Let $\mathbb F_q$ be the finite field with $q$ elements, where $q$ is a power of a prime. We discuss recursive methods for constructing irreducible polynomials over $\mathbb F_q$ of high degree using rational transformations. In particular, given a divisor $D>2$ of $q+1$ and an irreducible polynomial $f\in \mathbb F_{q}[x]$ of degree $n$ such that $n$ is even or $D\not \equiv 2\pmod 4$, we show how to obtain from $f$ a sequence $\{f_i\}_{i\ge 0}$ of irreducible polynomials over $\mathbb F_q$ with $\mathrm{deg}(f_i)=n\cdot D^{i}$.
△ Less
Submitted 19 May, 2019;
originally announced May 2019.
-
Unicyclic Strong Permutations
Authors:
Claude Gravel,
Daniel Panario,
David Thomson
Abstract:
In this paper, we study some properties of a certain kind of permutation $σ$ over $\mathbb{F}_{2}^{n}$, where $n$ is a positive integer. The desired properties for $σ$ are: (1) the algebraic degree of each component function is $n-1$; (2) the permutation is unicyclic; (3) the number of terms of the algebraic normal form of each component is at least $2^{n-1}$. We call permutations that satisfy the…
▽ More
In this paper, we study some properties of a certain kind of permutation $σ$ over $\mathbb{F}_{2}^{n}$, where $n$ is a positive integer. The desired properties for $σ$ are: (1) the algebraic degree of each component function is $n-1$; (2) the permutation is unicyclic; (3) the number of terms of the algebraic normal form of each component is at least $2^{n-1}$. We call permutations that satisfy these three properties simultaneously unicyclic strong permutations. We prove that our permutations $σ$ always have high algebraic degree and that the average number of terms of each component function tends to $2^{n-1}$. We also give a condition on the cycle structure of $σ$. We observe empirically that for $n$ even, our construction does not provide unicylic permutations. For $n$ odd, $n \leq 11$, we conduct an exhaustive search of all $σ$ given our construction for specific examples of unicylic strong permutations. We also present some empirical results on the difference tables and linear approximation tables of $σ$.
△ Less
Submitted 11 July, 2019; v1 submitted 10 September, 2018;
originally announced September 2018.
-
A Neural Network Lattice Decoding Algorithm
Authors:
Mohammad-Reza Sadeghi,
Farzane Amirzade,
Daniel Panario,
Amin Sakzad
Abstract:
Neural network decoding algorithms are recently introduced by Nachmani et al. to decode high-density parity-check (HDPC) codes. In contrast with iterative decoding algorithms such as sum-product or min-sum algorithms in which the weight of each edge is set to $1$, in the neural network decoding algorithms, the weight of every edge depends on its impact in the transmitted codeword. In this paper, w…
▽ More
Neural network decoding algorithms are recently introduced by Nachmani et al. to decode high-density parity-check (HDPC) codes. In contrast with iterative decoding algorithms such as sum-product or min-sum algorithms in which the weight of each edge is set to $1$, in the neural network decoding algorithms, the weight of every edge depends on its impact in the transmitted codeword. In this paper, we provide a novel \emph{feed-forward neural network lattice decoding algorithm} suitable to decode lattices constructed based on Construction A, whose underlying codes have HDPC matrices. We first establish the concept of feed-forward neural network for HDPC codes and improve their decoding algorithms compared to Nachmani et al. We then apply our proposed decoder for a Construction A lattice with HDPC underlying code, for which the well-known iterative decoding algorithms show poor performances. The main advantage of our proposed algorithm is that instead of assigning and training weights for all edges, which turns out to be time-consuming especially for high-density parity-check matrices, we concentrate on edges which are present in most of $4$-cycles and removing them gives a girth-$6$ Tanner graph. This approach, by slight modifications using updated LLRs instead of initial ones, simultaneously accelerates the training process and improves the error performance of our proposed decoding algorithm.
△ Less
Submitted 13 September, 2018; v1 submitted 8 July, 2018;
originally announced July 2018.
-
A new class of irreducible pentanomials for polynomial based multipliers in binary fields
Authors:
Gustavo Banegas,
Ricardo Custodio,
Daniel Panario
Abstract:
We introduce a new class of irreducible pentanomials over $\mathbb{F}_2$ of the form $f(x) = x^{2b+c} + x^{b+c} + x^b + x^c + 1$. Let $m=2b+c$ and use $f$ to define the finite field extension of degree $m$. We give the exact number of operations required for computing the reduction modulo $f$. We also provide a multiplier based on Karatsuba algorithm in $\mathbb{F}_2[x]$ combined with our reductio…
▽ More
We introduce a new class of irreducible pentanomials over $\mathbb{F}_2$ of the form $f(x) = x^{2b+c} + x^{b+c} + x^b + x^c + 1$. Let $m=2b+c$ and use $f$ to define the finite field extension of degree $m$. We give the exact number of operations required for computing the reduction modulo $f$. We also provide a multiplier based on Karatsuba algorithm in $\mathbb{F}_2[x]$ combined with our reduction process. We give the total cost of the multiplier and found that the bit-parallel multiplier defined by this new class of polynomials has improved XOR and AND complexity. Our multiplier has comparable time delay when compared to other multipliers based on Karatsuba algorithm.
△ Less
Submitted 10 November, 2018; v1 submitted 1 June, 2018;
originally announced June 2018.
-
A general construction of Ordered Orthogonal Arrays using LFSRs
Authors:
Daniel Panario,
Mark Saaltink,
Brett Stevens,
Daniel Wevrick
Abstract:
In \cite{Castoldi}, $q^t \by (q+1)t$ ordered orthogonal arrays (OOAs) of strength $t$ over the alphabet $\FF_q$ were constructed using linear feedback shift register sequences (LFSRs) defined by {\em primitive} polynomials in $\FF_q[x]$. In this paper we extend this result to all polynomials in $\FF_q[x]$ which satisfy some fairly simple restrictions, restrictions that are automatically satisfied…
▽ More
In \cite{Castoldi}, $q^t \by (q+1)t$ ordered orthogonal arrays (OOAs) of strength $t$ over the alphabet $\FF_q$ were constructed using linear feedback shift register sequences (LFSRs) defined by {\em primitive} polynomials in $\FF_q[x]$. In this paper we extend this result to all polynomials in $\FF_q[x]$ which satisfy some fairly simple restrictions, restrictions that are automatically satisfied by primitive polynomials. While these restrictions sometimes reduce the number of columns produced from $(q+1)t$ to a smaller multiple of $t$, in many cases we still obtain the maximum number of columns in the constructed OOA when using non-primitive polynomials. For small values of $q$ and $t$, we generate OOAs in this manner for all permissible polynomials of degree $t$ in $\FF_q[x]$ and compare the results to the ones produced in \cite{Castoldi}, \cite{Rosenbloom} and \cite{Skriganov} showing how close the arrays are to being "full" orthogonal arrays. Unusually for finite fields, our arrays based on non-primitive irreducible and even reducible polynomials are closer to orthogonal arrays than those built from primitive polynomials.
△ Less
Submitted 8 January, 2019; v1 submitted 25 May, 2018;
originally announced May 2018.
-
The Graph Structure of Chebyshev Polynomials over Finite Fields and Applications
Authors:
Claudio Qureshi,
Daniel Panario
Abstract:
We completely describe the functional graph associated to iterations of Chebyshev polynomials over finite fields. Then, we use our structural results to obtain estimates for the average rho length, average number of connected components and the expected value for the period and preperiod of iterating Chebyshev polynomials.
We completely describe the functional graph associated to iterations of Chebyshev polynomials over finite fields. Then, we use our structural results to obtain estimates for the average rho length, average number of connected components and the expected value for the period and preperiod of iterating Chebyshev polynomials.
△ Less
Submitted 17 March, 2018;
originally announced March 2018.
-
A Non-commutative Cryptosystem Based on Quaternion Algebras
Authors:
Khadijeh Bagheri,
Mohammad-Reza Sadeghi,
Daniel Panario
Abstract:
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring. The multiplication operation in our cryptosystem can be performed with high speed using quaternions algebras over finite rings. As a consequence, the key generation and encryption process of our cryptosystem is faster than NTRU in comparable param…
▽ More
We propose BQTRU, a non-commutative NTRU-like cryptosystem over quaternion algebras. This cryptosystem uses bivariate polynomials as the underling ring. The multiplication operation in our cryptosystem can be performed with high speed using quaternions algebras over finite rings. As a consequence, the key generation and encryption process of our cryptosystem is faster than NTRU in comparable parameters. Typically using Strassen's method, the key generation and encryption process is approximately $16/7$ times faster than NTRU for an equivalent parameter set. Moreover, the BQTRU lattice has a hybrid structure that makes inefficient standard lattice attacks on the private key. This entails a higher computational complexity for attackers providing the opportunity of having smaller key sizes. Consequently, in this sense, BQTRU is more resistant than NTRU against known attacks at an equivalent parameter set. Moreover, message protection is feasible through larger polynomials and this allows us to obtain the same security level as other NTRU-like cryptosystems but using lower dimensions.
△ Less
Submitted 7 September, 2017;
originally announced September 2017.
-
Periods of iterations of functions with restricted preimage sizes
Authors:
Rodrigo S. V. Martins,
Daniel Panario,
Claudio Qureshi,
Eric Schmutz
Abstract:
We consider random map**s on n = kr nodes with preimage sizes restricted to a set of the form {0,k}, where k = k(r) is greater than 1. We prove that T, the least common multiple of the cycle lengths, and B= the product of the cycle lengths, are both asymptotically lognormal. The expected values of these random variables are also also estimated and compared with numerical results. This work is mo…
▽ More
We consider random map**s on n = kr nodes with preimage sizes restricted to a set of the form {0,k}, where k = k(r) is greater than 1. We prove that T, the least common multiple of the cycle lengths, and B= the product of the cycle lengths, are both asymptotically lognormal. The expected values of these random variables are also also estimated and compared with numerical results. This work is motivated, in part, by the use of these map**s as heuristic models for polynomials of the form x^k + a over the integers modulo p with p congruent to 1 mod k.
△ Less
Submitted 8 October, 2018; v1 submitted 31 January, 2017;
originally announced January 2017.
-
Construction of Full-Diversity LDPC Lattices for Block-Fading Channels
Authors:
Hassan Khodaiemehr,
Mohammad-Reza Sadeghi,
Daniel Panario
Abstract:
LDPC lattices were the first family of lattices which have an efficient decoding algorithm in high dimensions over an AWGN channel. Considering Construction D' of lattices with one binary LDPC code as underlying code gives the well known Construction A LDPC lattices or 1-level LDPC lattices. Block-fading channel (BF) is a useful model for various wireless communication channels in both indoor and…
▽ More
LDPC lattices were the first family of lattices which have an efficient decoding algorithm in high dimensions over an AWGN channel. Considering Construction D' of lattices with one binary LDPC code as underlying code gives the well known Construction A LDPC lattices or 1-level LDPC lattices. Block-fading channel (BF) is a useful model for various wireless communication channels in both indoor and outdoor environments. Frequency-hop** schemes and orthogonal frequency division multiplexing (OFDM) can conveniently be modelled as block-fading channels. Applying lattices in this type of channel entails dividing a lattice point into multiple blocks such that fading is constant within a block but changes, independently, across blocks. The design of lattices for BF channels offers a challenging problem, which differs greatly from its counterparts like AWGN channels. Recently, the original binary Construction A for lattices, due to Forney, have been generalized to a lattice construction from totally real and complex multiplication fields. This generalized Construction A of lattices provides signal space diversity intrinsically, which is the main requirement for the signal sets designed for fading channels. In this paper we construct full diversity LDPC lattices for block-fading channels using Construction A over totally real number fields. We propose a new iterative decoding method for these family of lattices which has complexity that grows linearly in the dimension of the lattice. In order to implement our decoding algorithm, we propose the definition of a parity check matrix and Tanner graph for full diversity Construction A lattices. We also prove that the constructed LDPC lattices together with the proposed decoding method admit diversity order n-1 over an n-block-fading channel.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
An asymptotic formula for the number of irreducible transformation shift registers
Authors:
Stephen D. Cohen,
Sartaj Ul Hasan,
Daniel Panario,
Qiang Wang
Abstract:
We consider the problem of enumerating the number of irreducible transformation shift registers. We give an asymptotic formula for the number of irreducible transformation shift registers in some special cases. Moreover, we derive a short proof for the exact number of irreducible transformation shift registers of order two using a recent generalization of a theorem of Carlitz.
We consider the problem of enumerating the number of irreducible transformation shift registers. We give an asymptotic formula for the number of irreducible transformation shift registers in some special cases. Moreover, we derive a short proof for the exact number of irreducible transformation shift registers of order two using a recent generalization of a theorem of Carlitz.
△ Less
Submitted 8 June, 2015;
originally announced June 2015.
-
On the Heuristic of Approximating Polynomials over Finite Fields by Random Map**s
Authors:
Rodrigo S. V. Martins,
Daniel Panario
Abstract:
The study of iterations of functions over a finite field and the corresponding functional graphs is a growing area of research with connections to cryptography. The behaviour of such iterations is frequently approximated by what is know as the Brent-Pollard heuristic, where one treats functions as random map**s. We aim at understanding this heuristic and focus on the expected rho length of a nod…
▽ More
The study of iterations of functions over a finite field and the corresponding functional graphs is a growing area of research with connections to cryptography. The behaviour of such iterations is frequently approximated by what is know as the Brent-Pollard heuristic, where one treats functions as random map**s. We aim at understanding this heuristic and focus on the expected rho length of a node of the functional graph of a polynomial over a finite field. Since the distribution of indegrees (preimage sizes) of a class of functions appears to play a central role in its average rho length, we survey the known results for polynomials over finite fields giving new proofs and improving one of the cases for quartic polynomials. We discuss the effectiveness of the heuristic for many classes of polynomials by comparing our experimental results with the known estimates for random map** models defined by different restrictions on their distribution of indegrees. We prove that the distribution of indegrees of general polynomials and map**s have similar asymptotic properties, including the same asymptotic average coalescence. The combination of these results and our experiments suggests that these polynomials behave like random map**s, extending a heuristic that was known only for degree $2$. We show numerically that the behaviour of Chebyshev polynomials of degree $d \geq 2$ over finite fields present a sharp contrast when compared to other polynomials in their respective classes.
△ Less
Submitted 6 April, 2016; v1 submitted 12 May, 2015;
originally announced May 2015.
-
Turbo Lattices: Construction and Error Decoding Performance
Authors:
Amin Sakzad,
Mohammad-Reza Sadeghi,
Daniel Panario
Abstract:
In this paper a new class of lattices called turbo lattices is introduced and established. We use the lattice Construction D to produce turbo lattices. This method needs a set of nested linear codes as its underlying structure. We benefit from turbo codes as our basis codes. Therefore, a set of nested turbo codes based on nested interleavers (block interleavers) and nested convolutional codes is b…
▽ More
In this paper a new class of lattices called turbo lattices is introduced and established. We use the lattice Construction D to produce turbo lattices. This method needs a set of nested linear codes as its underlying structure. We benefit from turbo codes as our basis codes. Therefore, a set of nested turbo codes based on nested interleavers (block interleavers) and nested convolutional codes is built. To this end, we employ both tail-biting and zero-tail convolutional codes. Using these codes, along with construction D, turbo lattices are created. Several properties of Construction D lattices and fundamental characteristics of turbo lattices including the minimum distance, coding gain and kissing number are investigated. Furthermore, a multi-stage turbo lattice decoding algorithm based on iterative turbo decoding algorithm is given. We show, by simulation, that turbo lattices attain good error performance within $\sim1.25 dB$ from capacity at block length of $n=1035$. Also an excellent performance of only $\sim.5 dB$ away from capacity at SER of $10^{-5}$ is achieved for size $n=10131$.
△ Less
Submitted 27 September, 2012; v1 submitted 9 August, 2011;
originally announced August 2011.
-
Cycle structure of permutation functions over finite fields and their applications
Authors:
Amin Sakzad,
Mohammad-Reza Sadeghi,
Daniel Panario
Abstract:
In this work we establish some new interleavers based on permutation functions. The inverses of these interleavers are known over a finite field $\mathbb{F}_q$. For the first time Möbius and Rédei functions are used to give new deterministic interleavers. Furthermore we employ Skolem sequences in order to find new interleavers with known cycle structure. In the case of Rédei functions an exact for…
▽ More
In this work we establish some new interleavers based on permutation functions. The inverses of these interleavers are known over a finite field $\mathbb{F}_q$. For the first time Möbius and Rédei functions are used to give new deterministic interleavers. Furthermore we employ Skolem sequences in order to find new interleavers with known cycle structure. In the case of Rédei functions an exact formula for the inverse function is derived. The cycle structure of Rédei functions is also investigated. The self-inverse and non-self-inverse versions of these permutation functions can be used to construct new interleavers.
△ Less
Submitted 27 September, 2012; v1 submitted 6 November, 2010;
originally announced November 2010.
-
A Hybrid of Darboux's Method and Singularity Analysis in Combinatorial Asymptotics
Authors:
Philippe Flajolet,
Eric Fusy,
Xavier Gourdon,
Daniel Panario,
Nicolas Pouyanne
Abstract:
A ``hybrid method'', dedicated to asymptotic coefficient extraction in combinatorial generating functions, is presented, which combines Darboux's method and singularity analysis theory. This hybrid method applies to functions that remain of moderate growth near the unit circle and satisfy suitable smoothness assumptions--this, even in the case when the unit circle is a natural boundary. A prime…
▽ More
A ``hybrid method'', dedicated to asymptotic coefficient extraction in combinatorial generating functions, is presented, which combines Darboux's method and singularity analysis theory. This hybrid method applies to functions that remain of moderate growth near the unit circle and satisfy suitable smoothness assumptions--this, even in the case when the unit circle is a natural boundary. A prime application is to coefficients of several types of infinite product generating functions, for which full asymptotic expansions (involving periodic fluctuations at higher orders) can be derived. Examples relative to permutations, trees, and polynomials over finite fields are treated in this way.
△ Less
Submitted 15 June, 2006;
originally announced June 2006.