42 results on '"Charpin, Nicolas"'
Search Results
2. Fish conservation: importance of DNA reference library based on accurately identified specimens. The case of New Caledonian freshwater fish.
- Author
-
MENNESSON, Marion I., CHARPIN, Nicolas, and KEITH, Philippe
- Subjects
- *
FISH conservation , *FRESHWATER fishes , *DNA sequencing , *RESEARCH personnel , *TAXONOMISTS - Abstract
DNA tools are increasingly used for identifying species, however, successful DNA-based identification requires a reference library of DNA sequences from accurately identified specimens. Here we present a reference library of COI and 12S sequences for New Caledonian freshwater fish. Our library contains 523 MNHN voucher specimens, representing 84 valid species compared to type specimens, including 11 new records. The development of this DNA library will allow managers and researchers to explore the ichthyodiversity of New Caledonia, to manage the species and to promote action or conservation plans. We encourage taxonomists to build and publish molecular libraries linked to species accurately identified and museum voucher specimens. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Current knowledge of New Caledonian marine and freshwater ichthyofauna, SW Pacific Ocean: diversity, exploitation, threats and management actions
- Author
-
Letourneur, Yves, Charpin, Nicolas, Mennesson, Marion, Keith, Philippe, Ecologie marine tropicale des océans Pacifique et Indien (ENTROPIE [Nouvelle-Calédonie]), Institut de Recherche pour le Développement (IRD [Nouvelle-Calédonie])-Ifremer - Nouvelle-Calédonie, Institut Français de Recherche pour l'Exploitation de la Mer (IFREMER)-Institut Français de Recherche pour l'Exploitation de la Mer (IFREMER)-Université de la Nouvelle-Calédonie (UNC), Biologie des Organismes et Ecosystèmes Aquatiques (BOREA), Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-Muséum national d'Histoire naturelle (MNHN)-Institut de Recherche pour le Développement (IRD)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Université des Antilles (UA), and Muséum national d'Histoire naturelle (MNHN)
- Subjects
Aquaculture, Conservation measures, Current threats, Fish species richness, Fisheries, New Caledonia ,new Caledonia ,aquaculture ,[SDE]Environmental Sciences ,Fisheries ,Conservation measures ,Current threats ,Fish species richness - Abstract
International audience; Located in the Southwest Pacific Ocean, the New Caledonian archipelago hosts a diversified and original ichthyofauna. Marine ecosystems host 2,339 species of fish, including ~1,450 for coral reefs alone and a total of 94 endemics, especially in deep environments. the proximity of the centre of biodiversity (the "coral triangle"), as well as a great variety of coastal habitats and their relatively good "state of health" are probably major reasons for this high species richness. Freshwaters (excluding estuaries and brackish water) have 94 species, including 12 introduced and 8 endemics. Most of these species are diadromous, essentially amphidromous, and illustrate biological traits adapted to local rivers. new Caledonian ichthyofauna is subject to various disturbances of varying intensity and/or frequency. some disturbances are natural and affect habitats rather than the fish species, such as cyclones, which can affect both coastal ecosystems (coral reefs, seagrass beds, mangroves) and freshwater ecosystems. anthropogenic pressures on ichthyofauna are of several natures. Fishing is widely practiced, both in rivers and in coastal environments and in the EEZ, but does not currently seem to pose a serious threat to targeted populations. New Caledonian aquaculture is largely focused on shrimp farming, but fish farming (currently marginal) could develop in the near future. Mining activities related to the extraction of nickel ore (and cobalt to a lesser extent) are however a much more serious problem. the potential impacts of these mining activities differ from those of cyclones, in particular by their regular (if not permanent) and non-punctual nature on the one hand, and by the fact that they considerably increase the risk of contamination of freshwater and coastal environments by metallic trace elements on the other hand. these metallic elements as well as various organic contaminants (pesticides and PCBs) are indeed found in coral reef fish. Other more specific threats concern freshwater fish, such as hydraulic developments or the proliferation of certain introduced and invasive species. For all new Caledonian aquatic ecosystems, the major issue of climate change cannot be ignored, but its impacts still remain poorly documented. About 15,000 km² of coral reef and lagoon areas have been listed as UNESCO World heritage since 2008 and are therefore protected and regulated, with regard to the activities authorized within these areas. in addition, there are more informal protections in other coastal areas where the Melanesian tribes have a customary management. Finally, various regulations exist at local authority level (environmental codes) to protect certain sensitive species.; Situé dans le sud-ouest de l’océan Pacifique, l’archipel néo-calédonien héberge une ichtyofaune diversifiée et originale. Les milieux marins rassemblent 2339 espèces de poissons, dont ~1450 pour les seuls récifs coralliens et un total de 94 endémiques, surtout en milieux profonds. La proximité du centre de biodiversité (le “triangle de corail”), ainsi que la très grande variété des habitats côtiers et leur relatif bon “état de santé” sont probablement des raisons majeures pour expliquer cette richesse spécifique élevée. Les eaux douces (hors estuaires et eaux saumâtres) comptent 94 espèces, dont 12 introduites et 8 endémiques. La plupart de ces espèces sont diadromes et surtout amphidromes et illustrent un mode de vie adapté aux rivières locales. L’ichtyofaune néo-calédonienne est soumise à différentes perturbations d’intensité et/ou de fréquence variables. Certaines perturbations sont naturelles et vont affecter les habitats plus que les espèces de poissons elles-mêmes, comme par exemple les cyclones qui peuvent affecter à la fois les écosystèmes côtiers (récifs coralliens, herbiers de phanérogames, mangroves) et d’eaux douces. Les pressions anthropiques sur l’ichtyofaune sont de plusieurs natures. La pêche est largement pratiquée, tant en rivière qu’en milieux côtiers et dans la ZEE, mais ne semble pas actuellement constituer une grave menace pour les populations ciblées. L’aquaculture néo-calédonienne est très largement focalisée sur la crevetticulture, mais la pisciculture (actuellement marginale) pourrait se développer dans les années à venir. Les activités minières en lien avec l’extraction du nickel (et accessoirement du cobalt) sont une problématique nettement plus sérieuse. Les impacts potentiels de ces activités minières diffèrent de ceux des cyclones notamment par leur côté régulier (sinon permanent) et non ponctuel d’une part, et par le fait qu’ils accroissent considérablement le risque de contamination des milieux dulçaquicoles et côtiers par des éléments traces métalliques d’autre part. Ces éléments métalliques ainsi que divers contaminants organiques (pesticides et PCBs) sont en effet retrouvés dans les poissons coralliens. D’autres menaces plus spécifiques concernent les poissons d’eau douce, comme les aménagements hydrauliques ou encore la prolifération de certaines espèces introduites et invasives. Pour tous les écosystèmes aquatiques néo-calédoniens, l’enjeu majeur du changement climatique ne peut être ignoré, mais ses impacts restent encore peu documentés. Environ 15 000 km² de zones récifo-lagonaires sont inscrites au Patrimoine Mondial de l’UNESCO depuis 2008 et sont, de ce fait, protégées et règlementées. À ceci s’ajoute des protections plus informelles dans d’autres secteurs côtiers où les tribus mélanésiennes assurent une gestion coutumière. Enfin, diverses règlementations existent au niveau des collectivités locales (codes de l’environnement) pour protéger certaines espèces sensibles.
- Published
- 2023
- Full Text
- View/download PDF
4. Premier signalement d’Hippichthys albomaculosus Jen- kins & Mailautoka, 2010 (syngnathidae) en Nouvelle-Calédonie
- Author
-
Haÿ, Vincent, Charpin, Nicolas, Keith, Philippe, Lord, Clara, Mennesson, Marion I., Biologie des Organismes et Ecosystèmes Aquatiques (BOREA), Université de Caen Normandie (UNICAEN), and Normandie Université (NU)-Normandie Université (NU)-Muséum national d'Histoire naturelle (MNHN)-Institut de Recherche pour le Développement (IRD)-Sorbonne Université (SU)-Centre National de la Recherche Scientifique (CNRS)-Université des Antilles (UA)
- Subjects
New Caledonia ,[SDV.BA.ZV]Life Sciences [q-bio]/Animal biology/Vertebrate Zoology ,Syngnathidae ,Hippichthys albomaculosus ,Syngnathidae, Hippichthys albomaculosus, New record, New Caledonia ,[SDV.BID.SPT]Life Sciences [q-bio]/Biodiversity/Systematics, Phylogenetics and taxonomy ,New record - Abstract
International audience; Three specimens of Hippichthys albomaculosus Jenkins and Mailautoka, 2010, only known from Fiji, were recently collected from the North Province of New Caledonia. Morphomeristic values confirm the identity of specimens. This study constitutes the first record of this species in New Caledonia and outside of its type locality.; Trois spécimens d'Hippichthys albomaculosus Jenkins & Mailautoka, 2010, connu uniquement des Fidji, ont été récemment collectés dans la province Nord de la Nouvelle-Calédonie. Les valeurs morpho-méristiques confirment l'identité des spécimens. Cette étude constitue le premier signalement de cette espèce en Nouvelle-Calédonie et hors de sa localité type.
- Published
- 2022
- Full Text
- View/download PDF
5. FISHMORPH: A global database on morphological traits of freshwater fishes
- Author
-
Brosse, Sébastien, Charpin, Nicolas, Su, Guohuan, Toussaint, Aurèle, Herrera‐r, Guido A., Tedesco, Pablo A, Villeger, Sébastien, Blowes, Shane, MARine Biodiversity Exploitation and Conservation (UMR MARBEC), and Institut de Recherche pour le Développement (IRD)-Institut Français de Recherche pour l'Exploitation de la Mer (IFREMER)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
body shape ,Global and Planetary Change ,Ecology ,biology ,Actinopterygii ,Biodiversity ,conservation ,biology.organism_classification ,locomotion ,Geography ,eye size ,mouth size ,fin size ,functional traits ,[SDE.BE]Environmental Sciences/Biodiversity and Ecology ,Ecology, Evolution, Behavior and Systematics ,feeding ,biodiversity - Abstract
Motivation Global freshwater fish biodiversity and the responses of fishes to global changes have been explored intensively using taxonomic data, whereas functional aspects remain understudied owing to the lack of knowledge for most species. To fill this gap, we compiled morphological traits related to locomotion and feeding for the world freshwater fish fauna based on pictures and scientific drawings available from the literature. Main types of variables contained The database includes 10 morphological traits measured on 8,342 freshwater fish species, covering 48.69% of the world freshwater fish fauna. Spatial location and grain Global. Major taxa and level of measurement The database considers ray-finned fishes (class Actinopterygii). Measurements were made at the species level. Software format .csv. Main conclusion The FISHMORPH database provides the most comprehensive database on fish morphological traits to date. It represents an essential source of information for ecologists and environmental managers seeking to consider morphological patterns of fish faunas throughout the globe, and for those interested in current and future impacts of human activities on the morphological structure of fish assemblages. Given the high threat status of freshwater environments and the biodiversity they host, we believe this database will be of great interest for future studies on freshwater ecology research and conservation.
- Published
- 2021
- Full Text
- View/download PDF
6. First record of Hippichthys albomaculosus Jenkins & Mailautoka, 2010 (Syngnathidae) in New Caledonia.
- Author
-
HAY, Vincent, CHARPIN, Nicolas, KEITH, Philippe, LORD, Clara, and MENNESSON, Marion I.
- Subjects
- NEW Caledonia
- Abstract
Trois spécimens d'Hippichthys albomaculosus Jenkins & Mailautoka, 2010, connu uniquement des Fidji, ont été récemment collectés dans la Province Nord de la Nouvelle-Calédonie. Les valeurs morpho-méristiques confirment l'identité des spécimens. Cette étude constitue le premier signalement de cette espèce en Nouvelle-Calédonie et hors de sa localité type. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
7. Non-native species led to marked shifts in functional diversity of the world freshwater fish faunas
- Author
-
Toussaint, Aurèle, primary, Charpin, Nicolas, additional, Beauchard, Olivier, additional, Grenouillet, Gaël, additional, Oberdorff, Thierry, additional, Tedesco, Pablo A., additional, Brosse, Sébastien, additional, and Villéger, Sébastien, additional
- Published
- 2018
- Full Text
- View/download PDF
8. Non‐native species led to marked shifts in functional diversity of the world freshwater fish faunas.
- Author
-
Vila, Montserrat, Charpin, Nicolas, Grenouillet, Gaël, Oberdorff, Thierry, Tedesco, Pablo A., Brosse, Sébastien, Toussaint, Aurèle, Beauchard, Olivier, and Villéger, Sébastien
- Subjects
- *
BIOTIC communities , *BIOLOGICAL extinction , *MACROECOLOGY , *FRESHWATER fishes , *ECOSYSTEM management - Abstract
Global spread of non‐native species profoundly changed the world biodiversity patterns, but how it translates into functional changes remains unanswered at the world scale. We here show that while in two centuries the number of fish species per river increased on average by 15% in 1569 basins worldwide, the diversity of their functional attributes (i.e. functional richness) increased on average by 150%. The inflation of functional richness was paired with changes in the functional structure of assemblages, with shifts of species position toward the border of the functional space of assemblages (i.e. increased functional divergence). Non‐native species moreover caused shifts in functional identity toward higher body sized and less elongated species for most of assemblages throughout the world. Although varying between rivers and biogeographic realms, such changes in the different facets of functional diversity might still increase in the future through increasing species invasion and may further modify ecosystem functioning. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
9. Genetic variability of New Caledonian BoeckellaDe Guerne & Richard, 1889 (Copepoda: Calanoida), with the description of a new species
- Author
-
Royaux, Coline, Charpin, Nicolas, and Rabet, Nicolas
- Abstract
Thirteen new freshwater populations of the copepod genus BoeckellaDe Guerne & Richard, 1889were found during three expeditions to New Caledonia (‘La Planète Revisitée,’ 2016-2018). The 12 populations from the Plaine des Lacs, which show remarkable genetic diversity among themselves, were identified as B. spinogibbaDefaye, 1998, the only species of its genus known from New Caledonia until now. The sole exception, the population from Mont-Dore 22 km further east, appeared genetically and morphologically distinct from the others and is described herein as a new species. The two species are distinguished from each other by the shapes of the male and female P5, female Th5, and body colour. A previously published key is amended to separate the species. Our concatenated COI+28S phylogeny places the two New Caledonia species as a new branch within Boeckella, distinct from the branches consisting of South American, Antarctic and Australasian species. All 13 Boeckellapopulations inhabit the extreme south of New Caledonia, an area known for endemism and high heavy metal concentrations in the soil. Extensive mining activity in this metal-rich area, begun in 1873, is now leading to conflict with conservation goals. By using aerial photographs to trace the fate of the pond that is the type locality of B. spinogibba, we confirmed that it disappeared between 2007 and 2014 as a result of the expansion of the Goro nickel mine.
- Published
- 2024
- Full Text
- View/download PDF
10. Towards a general construction of recursive MDS diffusion layers
- Author
-
Ayineedi Venkateswarlu, Sumit Kumar Pandey, Kishan Chand Gupta, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Companion matrix ,Hash function ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Shortened BCH code ,Software ,0202 electrical engineering, electronic engineering, information engineering ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] ,Computer Science::Information Theory ,Block cipher ,Mathematics ,Discrete mathematics ,Gabidulin code ,business.industry ,Applied Mathematics ,020206 networking & telecommunications ,Computer Science Applications ,010201 computation theory & mathematics ,MDS matrix ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,business ,Algorithm ,Recursive MDS matrix ,BCH code ,Coding (social sciences) - Abstract
MDS matrices are of great importance in the design of block ciphers and hash functions. MDS matrices are not sparse and have a large description and thus induce costly implementation in software/hardware. To overcome this problem, in particular for applications in light-weight cryptography, it was proposed by Guo et al. to use recursive MDS matrices. A recursive MDS matrix is an MDS matrix which can be expressed as a power of some companion matrix. Following the work of Guo et al., some ad-hoc search techniques are proposed to find recursive MDS matrices which are suitable for hardware/software implementation. In another direction, coding theoretic techniques are used to directly construct recursive MDS matrices: Berger technique uses Gabidulin codes and Augot et al. technique uses shortened BCH codes. In this paper, we first characterize the polynomials that yield recursive MDS matrices in a more general setting. Based on this we provide three methods for obtaining such polynomials. Moreover, the recursive MDS matrices obtained using shortened BCH codes can also be obtained with our first method. In fact we get a larger set of polynomials than the method which uses shortened BCH codes. Our other methods appear similar to the method which uses Gabidulin codes. We get a new infinite class of recursive MDS matrices from one of the proposed methods. Although we propose three methods for the direct construction of recursive MDS matrices, our characterization results pave the way for new direct constructions.
- Published
- 2016
- Full Text
- View/download PDF
11. On the direct construction of recursive MDS matrices
- Author
-
Kishan Chand Gupta, Ayineedi Venkateswarlu, Sumit Kumar Pandey, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Shortened Codes ,Companion matrix ,Hash function ,0102 computer and information sciences ,02 engineering and technology ,Characterization (mathematics) ,BCH codes ,01 natural sciences ,Combinatorics ,Matrix (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Cyclic Codes ,Recursive MDS matrices ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] ,Mathematics ,Discrete mathematics ,Diffusion layer ,Degree (graph theory) ,Applied Mathematics ,Computer Science Applications ,010201 computation theory & mathematics ,MDS matrix ,MDS codes ,020201 artificial intelligence & image processing ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,Companion matrices ,Monic polynomial ,BCH code - Abstract
MDS matrices allow to build optimal linear diffusion layers in the design of block ciphers and hash functions. There has been a lot of study in designing efficient MDS matrices suitable for software and/or hardware implementations. In particular recursive MDS matrices are considered for resource constrained environments. Such matrices can be expressed as a power of simple companion matrices, i.e., an MDS matrix $$M = C_g^k$$M=Cgk for some companion matrix corresponding to a monic polynomial $$g(X) \in \mathbb {F}_q[X]$$g(X)źFq[X] of degree k. In this paper, we first show that for a monic polynomial g(X) of degree $$k\ge 2$$kź2, the matrix $$M = C_g^k$$M=Cgk is MDS if and only if g(X) has no nonzero multiple of degree $$\le 2k-1$$≤2k-1 and weight $$\le k$$≤k. This characterization answers the issues raised by Augot et al. in FSE-2014 paper to some extent. We then revisit the algorithm given by Augot et al. to find all recursive MDS matrices that can be obtained from a class of BCH codes (which are also MDS) and propose an improved algorithm. We identify exactly what candidates in this class of BCH codes yield recursive MDS matrices. So the computation can be confined to only those potential candidate polynomials, and thus greatly reducing the complexity. As a consequence we are able to provide formulae for the number of such recursive MDS matrices, whereas in FSE-2014 paper, the same numbers are provided by exhaustively searching for some small parameter choices. We also present a few ideas making the search faster for finding efficient recursive MDS matrices in this class. Using our approach, it is possible to exhaustively search this class for larger parameter choices which was not possible earlier. We also present our search results for the case $$k=8$$k=8 and $$q=2^{16}$$q=216.
- Published
- 2016
- Full Text
- View/download PDF
12. Security proof of the canonical form of self-synchronizing stream ciphers
- Author
-
Gilles Millérioux, Brandon Dravie, Philippe Guillot, Centre de Recherche en Automatique de Nancy (CRAN), Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL), Laboratoire Analyse, Géométrie et Applications (LAGA), Université Paris 8 Vincennes-Saint-Denis (UP8)-Centre National de la Recherche Scientifique (CNRS)-Institut Galilée-Université Paris 13 (UP13), ANR-13-INSE-0005,THE CASCADE,THEorie du Contrôle Appliquée à la Synchronisation des CommunicAtions DiscrEtes(2013), Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Theoretical computer science ,business.industry ,Applied Mathematics ,Stream cipher attack ,Cryptography ,Plaintext ,0102 computer and information sciences ,02 engineering and technology ,16. Peace & justice ,01 natural sciences ,Computer Science Applications ,Pseudorandom function family ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Ciphertext indistinguishability ,Cipher ,010201 computation theory & mathematics ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Algorithm ,Stream cipher ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] ,Mathematics - Abstract
International audience; This paper studies the security level expected by the canon-ical form of the Self-Synchronizing Stream Cipher (SSSC). A SSSC can be viewed as the combination of a shift register together with a filtering function. The maximum security of such a cipher is reached when the filtering function is random. However, in practice, Pseudo Random Functions (PRF) are used as filtering functions. In this case, we show that the security against chosen ciphertext attacks (IND-CCA security) cannot be reached for the canonical form of the SSSC, but it is however secure against chosen plaintext attacks (IND-CPA secure). Then, a weaker property than pseudo-randomness is introduced in order to characterize the security of the canonical SSSC from its filtering function. A connection with the left-or-right indistinguishability (LOR-IND) is made. This property provides a necessary and sufficient condition to characterize the indistinguishablity of SSSC.
- Published
- 2017
- Full Text
- View/download PDF
13. Improving the security and efficiency of block ciphers based on LS-designs
- Author
-
Anthony Journault, Kerem Varici, François-Xavier Standaert, UCL - SST/ICTM/ELEN - Pôle en ingénierie électrique, Groupe Crypto, Institute of Information and Communication Technologies, Electronics and Applied Mathematics (ICTEAM), Université Catholique de Louvain = Catholic University of Louvain (UCL)-Université Catholique de Louvain = Catholic University of Louvain (UCL), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
S-box ,Theoretical computer science ,Differential cryptanalysis ,Design ,business.industry ,Applied Mathematics ,T-function ,Cryptography ,02 engineering and technology ,020202 computer hardware & architecture ,Computer Science Applications ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Physical security ,Linear cryptanalysis ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Side channel analysis ,Correlation attack ,business ,Key schedule ,Block cipher ,Avalanche effect ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] ,Mathematics - Abstract
International audience; LS-designs are a family of bitslice ciphers aiming at efficient masked implementations against side-channel analysis. This paper discusses their security against invariant subspace attacks, and describes an alternative family of eXtended LS-designs (XLS-designs), that enables additional options to prevent such attacks. LS-and XLS-designs provide a large family of ciphers from which efficient implementations can be obtained, possibly enhanced with countermeasures against physical attacks. We argue that they are interesting primitives in order to discuss the general question of " how simple can block ciphers be? " .
- Published
- 2017
14. Cover-Free Codes and Frequency Hopping Multiple Access
- Author
-
Nyirenda, Mwawi, Ng, Siaw-Lynn, Martin, Keith, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
In a frequency hopping multiple access (FHMA) system a set of users communicates simultaneously using frequency hopping sequences defined on the same set of frequency channels. A frequency hopping sequence is comprised of frequency channels used to switch channels as communication progresses. Much of the research on the performance of FHMA systems is based on either pairwise mutual interference or adver-sarial interference but not both. In this paper, we evaluate the performance of an FHMA system with respect to both group-wise mutual interference and adversarial interference (jamming), bearing in mind that more than two users may be transmitting simultaneously in the presence of an adversary. Our main contributions are as follows. We point out a correspondence between a cover-free code and a frequency hopping scheme. Cover-free codes give a well defined structure on the transmission capacity of a frequency hopping multiple access system. Further, we specify a jammer model for an FHMA. Considering the resources and knowledge of a jammer, we look at the possible mitigation strategies to be employed by a frequency hopping scheme against the jammer, and determine necessary and desirable additional properties of cover-free codes such that they may be used in the presence of adversarial interference.
- Published
- 2016
15. On one class of permutation polynomials over finite fields of characteristic two *
- Author
-
Bassalygo, Leonid, Zinoviev , Victor A., Tillich, Jean-Pierre, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Institute for Information Transmission Problems, Russian Academy of Sciences [Moscow] (RAS), Pascale Charpin, Nicolas Sendrier, and Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
International audience; Polynomials of type x^{q^3 +q^2 +q+2} +bx over the field F_{q^4} , where q = 2^m , m ≥ 2, are considered. All cases when these polynomials are permutation polynomials are classified.
- Published
- 2016
16. Almost Cover-Free Codes and Designs
- Author
-
D Yachkov, A. G., Ilya Vorobyev, Polyanskii, N. A., Shchukin, V. Yu, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
capacity ,Almost cover-free codes and designs ,random coding bound ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
An s-subset of codewords of a binary code X is said to be (s,l)-bad in X if the code X contains a subset of other l codewords such that the conjunction of the l codewords is covered by the disjunctive sum of the s codewords. Otherwise, the s-subset of codewords of X is called (s,l)-good in X. A binary code X is said to be a cover-free (CF) (s,l)-code if the code X does not contain (s,l)-bad subsets. In this paper, we introduce a natural probabilistic generalization of CF (s,l)-codes, namely: a binary code X is said to be an almost CF (s,l)-code if the relative number of its (s,l)-good s-subsets is close to 1. We develop a random coding method based on the ensemble of binary constant weight codes to obtain lower bounds on the capacity of such codes. Our main result shows that the capacity for almost CF (s,l)-codes is essentially greater than the rate for ordinary CF (s,l)-codes.
- Published
- 2016
17. On asymptotically good ramp secret sharing schemes
- Author
-
Umberto Martínez-Peñas, Olav Geil, Diego Ruano, Ryutaroh Matsumoto, Stefano Martin, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
FOS: Computer and information sciences ,media_common.quotation_subject ,Computer Science - Information Theory ,02 engineering and technology ,01 natural sciences ,Secret sharing ,Combinatorics ,0202 electrical engineering, electronic engineering, information engineering ,Fraction (mathematics) ,94A62, 94B27, 94B65 ,0101 mathematics ,Electrical and Electronic Engineering ,media_common ,Mathematics ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] ,Discrete mathematics ,Applied Mathematics ,Information Theory (cs.IT) ,010102 general mathematics ,020206 networking & telecommunications ,Code rate ,Function (mathematics) ,Infinity ,Computer Graphics and Computer-Aided Design ,Term (time) ,Signal Processing ,Information leakage ,Hamming code - Abstract
Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstruction giving a more complete picture of the access structure for sequences of linear ramp secret sharing schemes. Our study involves a detailed treatment of the (relative) generalized Hamming weights of the considered codes., The Danish Council for Independent Research (DFF-4002-00367), the Spanish MINECO/FEDER (MTM2015-65764-C3-2-P), Japan Society for the Promotion of Science (23246071 and 26289116), the Villum Foundation through their VELUX Visiting Professor Programme 2013-2014, and the "Program for Promoting the Enhancement of Research Universities'' at Tokyo Institute of Technology.
- Published
- 2016
- Full Text
- View/download PDF
18. Finite Field Power Permutations and Three-Valued Weil Sums of Binomials
- Author
-
Katz, Daniel J., Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
Let k be the finite field of characteristic p and order q = p e , and suppose that gcd(d, q − 1) = 1. Then the map x → x d is a permutation of k, known as a power permutation. If Tr is the absolute trace from k to the prime field F p , then x → Tr(x d) is a p-ary function that is of interest in differential cryptanalysis. The Walsh transform compares our p-ary function with all the F p-linear functionals, which have the form x → Tr(ax) with a ∈ F p. Thus the Walsh transform is used to determine the nonlinearity of our p-ary function. If we let ψ k (x) = e 2πiTr(x)/p be the canonical additive character of k, then the spectrum of the Walsh transform is given by the values of a Weil sum with ψ k applied to a binomial argument, W k,d (a) = x∈k ψ k (x d − ax), where k and d are fixed, and we let a run through k. In fact, since W k,d (0) = 0 trivially, our interest is in the distribution of values as a runs through k ×. The values of W k,d give not only the Walsh transform of a power permutation , but also to the cross-correlation spectrum of a pair of maximal linear recursive sequences of length q − 1 and relative decimation d, as well as the weight distribution of the dual of the cyclic code of length q −1 whose zeroes are two primitive elements α and α d of the field k. If d is a power of p modulo q − 1, then the canonical additive character ψ k has the same value when applied to the binomial x d − ax as it does when applied to the monomial (1 − a)x, and we obtain W k,d (1) = q and W k,d (a) = 0 for all a = 1. Thus the Weil sum can only take two distinct values, and we say that d is degenerate over k. In 1976, Helleseth proved that if d is nondegenerate over k, then W k,d assumes at least three values. We are interested in the case whenWk,d takes exactly three values for a ∈ k ×, in which case we say that Wk,d is three-valued.We shall examine all the known infinite families of fields k and exponents d that produce three-valued Weil sums. Then we shall indicate patterns, both conjectured and proved, that have been observed in the three-valued spectra. We review recent progress on these conjectures, and conclude with some open problems.
- Published
- 2016
19. On algebraic cryptanalysis of ciphers with low multiplicative complexity
- Author
-
Zajac, Pavol, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
algebraic cryptanalysis ,multiplicative complexity ,Data_CODINGANDINFORMATIONTHEORY ,Computer Science::Cryptography and Security ,MRHS ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
In this article we study the application of multiple righthand sides (MRHS) equations in algebraic attacks against ciphers with low multiplicative complexity. Each AND gate in the circuit description is converted to a corresponding MRHS equation. The resulting system is transformed into a syndrome decoding problem. The complexity of the decoding problem then depends on the number of AND gates, and on the relative number of known output bits with respect to the number of unknown key bits. This allows us to apply results from coding theory, and explicitly connect the complexity of algebraic cryptanalysis to the multiplicative complexity of the cipher.
- Published
- 2016
20. Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles
- Author
-
Maitra, Subhamoy, Paul, Goutam, Meier, Willi, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
ARX Cipher ,Stream Cipher ,Round Re-versal ,Salsa20 ,Probabilistic Neutral Bit (PNB) ,Non-Randomness ,Salsa20/12 ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
In this paper, we revisit some existing techniques in Salsa20 cryptanalysis, and provide some new ideas as well. As a new result, we explain how a valid initial state can be obtained from a Salsa20 state after one round. This helps in studying the non-randomness of Salsa20 after 5 rounds. In particular, it can be seen that the 5-round bias reported by Fischer et al. (Indocrypt 2006) is a special case of our analysis. Towards improving the existing results, we revisit the idea of Probabilistic Neutral Bit (PNB) and how a proper choice of certain parameters reduce the complexity of the existing attacks. For cryptanalysis against 8-round Salsa20, we could achieve the key search complexity of 2 247.2 compared to the earlier results of 2 251 (FSE 2008) and 2 250 (ICISC 2012).
- Published
- 2016
21. Better Algorithms for MSB-side RSA Reconstruction
- Author
-
Jagnere, Pratibha, Sanket, Srijan, Chauhan, Anuj, Jaiswal, Ragesh, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
In this work, we extend research in the area of reconstruction of private RSA keys using few random bits made available through partial key exposure attacks such as the Cold Boot Attack. Our work discusses an approach to reconstruct private components of RSA from the most significant bit (MSB) side given only 26% of the secret bits. Our approach shows significant improvement over previous works on reconstruction from the MSB side. Our results closely match those of the Heninger and Shacham that gives reconstruction from the LSB side.
- Published
- 2016
22. Lower bound of the covering radius of binary irreducible Goppa codes
- Author
-
Bezzateev, Sergey, Shekhunova, Natalia, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Physics::Popular Physics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,MathematicsofComputing_NUMERICALANALYSIS ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,Mathematics::Representation Theory ,Computer Science::Computers and Society ,Computer Science::Information Theory ,Computer Science::Cryptography and Security - Abstract
The lower bound of the covering radius of binary irreducible Goppa codes is obtained.
- Published
- 2016
23. Symmetric Disjunctive List-Decoding Codes
- Author
-
D Yachkov, A. G., Ilya Vorobyev, Polyanskii, N. A., Shchukin, V. Yu, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Symmetric disjunctive codes ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,nonadaptive symmetric group testing ,random coding bounds - Abstract
In this paper, we consider symmetric disjunctive list-decoding (SLD) codes, which are a class of binary codes based on a symmetric disjunctive sum (SDS) of binary symbols. By definition, the SDS takes values from the ternary alphabet {0, 1, * }, where the symbol * denotes " erasure ". Namely: SDS is equal to 0 (1) if all its binary symbols are equal to 0 (1), otherwise SDS is equal to *. The main purpose of this work is to obtain bounds on the rate of these codes.
- Published
- 2016
24. Revisiting Roos Bias in RC4 Key Scheduling Algorithm
- Author
-
Sarkar, Santanu, Venkateswarlu, Ayineedi, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Cryptanalysis ,Stream Cipher ,Roos Bias ,RC4 ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
RC4 is one of the most popular stream cipher with wide industrial applications, it has received serious attention in cryptology literature in the last two decades. In 1995, Roos pointed out that the elements SN [y] of the permutation SN after the Key Scheduling Algorithm for the first few values of y are biased to certain combinations of secret key bytes. These correlations were theoretically studied by Paul and Maitra (SAC 2007). The formula for the correlation probabilities provided by them gives a wrong impression that the probabilities decrease as the value of y becomes larger, which is not true. In this paper, we point out some gaps in their analysis and present a detailed analysis of Roos Bias. We provide a more accurate formula for the correlation probabilities.
- Published
- 2016
25. Optimal software-implemented Itoh–Tsujii inversion for F 2 m
- Author
-
Maitin-Shepard, Jeremy, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
Field inversion in F2m dominates the cost of modern software implementations of certain elliptic curve cryptographic operations, such as point encoding/hashing into elliptic curves. [7, 6, 2] Itoh–Tsujii inversion using a polynomial basis and precomputed table-based multi-squaring has been demonstrated to be highly effective for software implementations [19, 14, 2], but the performance and memory use depend critically on the choice of addition chain and multi-squaring tables, which in prior work have been determined only by suboptimal ad-hoc methods and manual selection. We thoroughly investigated the performance/memory tradeoff for table-based linear transforms used for efficient multi-squaring. Based upon the results of that investigation, we devised a comprehensive cost model for Itoh–Tsujii inversion and a corresponding optimization procedure that is empirically fast and provably finds globally-optimal solutions. We tested this method on 8 binary fields commonly used for elliptic curve cryptography; our method found lower-cost solutions than the ad-hoc methods used previously, and for the first time enables a principled exploration of the time/memory tradeoff of inversion implementations.
- Published
- 2016
26. Artin-Schreier extensions of normal bases
- Author
-
Thomson, David, Weir, Colin, Tillich, Jean-Pierre, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Carleton University, Department of Mathematics [Burnaby] (SFU), Simon Fraser University (SFU.ca), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, and Jean-Pierre Tillich
- Subjects
Mathematics::Group Theory ,Artin-Schreier extensions ,[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,Finite fields ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,normal bases ,complexity - Abstract
International audience; This manuscript deals with extending a normal basis to a new basis which permits both computationally inexpensive exponentia-tion and multiplication. These new bases are motivated by Artin-Schreier theory, and are particularly useful when creating bases in Artin-Schreier extensions of finite fields.
- Published
- 2016
27. On Some Permutation Binomials and Trinomials Over F 2 n
- Author
-
Bhattacharya, Srimanta, Sarkar, Sumanta, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
In this work, we completely characterize (i) permutation bi-nomials of the form f (x) = x^{( 2^n −1)/( 2^k −1) +1} + ax ∈ F2^n [x], k odd and n = 2^r k(r ≥ 1), a ∈ F *_{2^{2k}} , and (ii) permutation trinomials of the form x^{ 2^r +1} +x^{ 2^r−1} +1 +αx ∈ F _{2^k} [x], k odd. First result, which was our primary motivation, is a consequence of the second result. Second result may be of independent interest.
- Published
- 2016
28. On codes for multiple access adder channel with noise and feedback
- Author
-
Gritsenko, Vladimir, Kabatiansky, Grigory, Lebedev, Vladimir, Maevskiy, Alexey, Tillich, Jean-Pierre, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Institute for Information Transmission Problems, Russian Academy of Sciences [Moscow] (RAS), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, and Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
International audience; We prove a better than previously known lower bound on the rate of codes for multiple access adder channel with noise and discuss its application to well-known coin weighing problem with not exact measurements.
- Published
- 2016
29. Powers of Subfield Polynomials, Cyclic Codes and Algebraic Attacks with Applications to the WG Stream Ciphers
- Author
-
Rønjom, Sondre, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
In this paper we investigate univariate algebraic attacks on filter generators over extension fields F_q = F_{2^n} with focus on the Welch-Gong (WG) family of stream ciphers. Our main contribution is to break WG-5,WG-7,WG-8 and WG-16 by combining results on the so-called spectral immunity (minimum distance of certain cyclic codes) with properties of the WG type stream cipher construction.The spectral immunity is the univariate analog of algebraic immunity and instead of measuring degree of multiples of a multivariate polynomial, it measures the minimum number of nonzero coecients of a multiple of a univariate polynomial. Based on the structure of the general WG-construction, we deduce better bounds for the spectral immunity and the univariate analog of algebraic attacks.
- Published
- 2016
30. The Main Conjecture for Near-MDS Codes
- Author
-
Landjev, Ivan, Rousseva, Assia, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
3)-arcs ,n-tracks ,elliptic curves ,MDS codes ,(n ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,near-MDS codes ,projective geometries ,ComputingMilieux_MISCELLANEOUS - Abstract
No abstract provided by the authors.
- Published
- 2016
31. Cryptanalysis of an RSA variant with Moduli N = p r q
- Author
-
Lu, Yao, Peng, Liqiang, Sarkar, Santanu, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
RSA ,Coppersmith's method ,Lattices ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,RSA variants - Abstract
We study an RSA variant with moduli of the form N = p r q l with r > l ≥ 2. This variant was mentioned by Boneh et al. (Crypto 1999). Later Kim et al. (Indocrypt 2000) showed that this variant is much faster than standard RSA moduli in the decryption process. In this paper, for the first time, we give some cryptanalysis results on this RSA variant. Our analysis show that in some cases, this cryptosystem can be totally broken.
- Published
- 2016
32. Multicomponent Network Codes for a Channel with Random Linear Transformations and Packet Errors
- Author
-
Shishkin, Alexander, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,Computer Science::Information Theory - Abstract
This work is related to new multicomponent network codes for a channel with random linear transformations and packet errors. New code construction is a generalization of Gabidulin-Pilipchuk codes, and similarly uses rank codes with restrictions as subcodes. Usage of a greedy algorithm, when selecting the code components, allows us to increase code cardinality compared with the previously known constructions. We provide the conditions under which the described multicomponent code can correct both erasures and packet errors in the channel. Finally, we present an efficient algorithm of decoding both types of errors and give some examples.
- Published
- 2016
33. On the Griesmer bound for nonlinear codes
- Author
-
Bellini, Emanuele, Meneghetti, Alessio, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
Most bounds on the size of codes hold for any code, whether linear or nonlinear. Notably, the Griesmer bound holds only in the linear case. In this paper we identify code parameters (q, d, k) for which the Griesmer bound holds also in the (systematic) nonlinear case. Moreover, we show that the Griesmer bound does not necessarily hold for a systematic code by showing explicit counterexamples. On the other hand, we are also able to provide some versions of the Griesmer bound holding for all systematic codes.
- Published
- 2016
34. On the typical values of the cross-correlation measure
- Author
-
László Mérai, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Physics ,Mathematics - Number Theory ,General Mathematics ,010102 general mathematics ,Order (ring theory) ,0102 computer and information sciences ,01 natural sciences ,Measure (mathematics) ,Pseudorandom sequence ,Combinatorics ,010201 computation theory & mathematics ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,0101 mathematics ,11K45, 68R15 - Abstract
Gyarmati, Mauduit and Sarkozy introduced the cross-correlation measure $$\Phi _k(\mathcal {F})$$ to measure the randomness of families of binary sequences $$\mathcal {F}\subset \{-1,1\}^N$$ . In this paper we study the order of magnitude of the cross-correlation measure $$\Phi _k(\mathcal {F})$$ for typical families. We prove that, for most families $$\mathcal {F}\subset \{-1,1\}^N$$ of size $$2\le |\mathcal {F}
- Published
- 2016
35. New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers
- Author
-
Baksi, Anubhab, Maitra, Subhamoy, Sarkar, Santanu, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Cryptanalysis ,Stream Cipher ,Trivium ,Trivia-SC ,Cube Tester ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
In this paper we experiment with cube testers on reduced round Trivium that can act as a distinguisher. Using heuristics, we obtain several distinguishers for Trivium running more than 800 rounds (maximum 829) with cube sizes not exceeding 27. In the process, we also exploit state biases that has not been explored before. Further, we apply our techniques to analyse Trivia-SC, a stream cipher proposed by modifying the parameters of Trivium and used as a building block for TriviA-ck (an AEAD scheme, which is submitted to the ongoing CAE-SAR competition). We obtain distinguishers till 900 rounds of Trivia-SC with a cube size of 21 only and our results refute certain claims made by the designers. These are the best results reported so far, though our work does not affect the security claims for the ciphers with full initialization rounds, namely 1152.
- Published
- 2016
36. Fast decoding of dual multipoint codes from algebraic curves up to the Kirfel-Pellikaan bound
- Author
-
Fujisawa, Masaya, Sakata, Shojiro, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
Multipoint codes are a broad class of algebraic geometry codes derived from algebraic functions which have multiple poles/zeros on their defining curves. The one-point codes which are viewed as its subclass can be decoded efficiently up to the Feng-Rao bound by using the BMS algorithm with majority logic [1]. Recently we published [2] a fast method for decoding primal multipoint codes from curves based on the vectorial BMS algorithm [3]. Although the simulation shows that the method can correct most error patterns of weight up to 1/2 d_G, it is guaranteed theoretically that every error of weight only up to 1/2 (d_G − g) can be corrected, where g is the genus of the defining curve. In this paper we present a fast method for decoding dual multipoint codes from algebraic curves up to the Kirfel-Pellikaan bound, based on the vectorial BMS algorithm with majority logic.
- Published
- 2016
37. On Distinct Known Plaintext Attacks
- Author
-
Blondeau, Céline, Nyberg, Kaisa, Aalto University, Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
multidimensional linear attack ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,key-difference-invariant-bias attack ,statistical model ,known plaintext ,zero-correlation linear attack ,Data_CODINGANDINFORMATIONTHEORY ,distinct known plaintext ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
International audience; Among statistical attacks, we often make a distinction between attacks in the linear context, for which the knowledge of plaintexts and corresponding ciphertexts is enough to perform the attack, and attacks in the differential context, for which the plaintexts are chosen. Such attacks are usually referred as known-or chosen-plaintext attacks. It is commonly believed that attacks in the known-plaintext model are more practical than attacks in the chosen-plaintext model. Nevertheless , it is usual in the literature, to only compare the data, time and memory complexity of these attacks without considering the model. In this paper, we reconsider some known-plaintext attacks, by considering them in the distinct-known-plaintext model. We explain and develop the statistical model for the multiple zero-correlation linear cryptanalysis, multidimensional linear cryptanalysis, as well as for the key-difference-invariant-bias related-key attack introduced at ASIACRYPT 2013. Based on these models validated by experiments, we improve attacks on some ciphers.
- Published
- 2015
38. A new constellation for space-time coding
- Author
-
Robert , Gwezheneg, Institut de Recherche Mathématique de Rennes (IRMAR), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-École normale supérieure - Rennes (ENS Rennes)-Université de Rennes 2 (UR2)-Centre National de la Recherche Scientifique (CNRS)-INSTITUT AGRO Agrocampus Ouest, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro), Geometry, arithmetic, algorithms, codes and encryption (GRACE), Laboratoire d'informatique de l'École polytechnique [Palaiseau] (LIX), École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, ANR-11-LABX-0020,LEBESGUE,Centre de Mathématiques Henri Lebesgue : fondements, interactions, applications et Formation(2011), AGROCAMPUS OUEST, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Université de Rennes 2 (UR2), Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA), Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X)-Inria Saclay - Ile de France, Institut de Recherche Mathématique de Rennes ( IRMAR ), Université de Rennes 1 ( UR1 ), Université de Rennes ( UNIV-RENNES ) -Université de Rennes ( UNIV-RENNES ) -AGROCAMPUS OUEST-École normale supérieure - Rennes ( ENS Rennes ) -Institut National de Recherche en Informatique et en Automatique ( Inria ) -Institut National des Sciences Appliquées ( INSA ) -Université de Rennes 2 ( UR2 ), Université de Rennes ( UNIV-RENNES ) -Centre National de la Recherche Scientifique ( CNRS ), Inria Saclay - Ile de France, Institut National de Recherche en Informatique et en Automatique ( Inria ), Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, and Tillich, Jean-Pierre
- Subjects
[ INFO.INFO-IT ] Computer Science [cs]/Information Theory [cs.IT] ,space-time coding ,[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,Gabidulin codes ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,number fields - Abstract
International audience; In this paper, we propose a new encoding scheme for space-time coding. This encoding relies on the generalisation [2] of Gabidulin codes to innite elds. This enables to make use of the properties of Gabidulin codes, namely, we can use algebraic decoding algorithms.
- Published
- 2015
39. Hasse-Weil Bound for Additive Cyclic Codes
- Author
-
Funda Özdemir, Cem Güneri, Ferruh Özbudak, Faculty of Engineering and Natural Sciences (Sabanci University), Sabanci University [Istanbul], Department of Mathematics and Institute of Applied Mathematics, Middle East Technical University [Ankara] (METU), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
algebraic curve over a finite field ,Cryptography ,02 engineering and technology ,01 natural sciences ,Combinatorics ,0202 electrical engineering, electronic engineering, information engineering ,0101 mathematics ,Special case ,Mathematics ,Discrete mathematics ,Bch bound ,additive cyclic code ,business.industry ,Applied Mathematics ,010102 general mathematics ,Minimum distance ,020206 networking & telecommunications ,Extension (predicate logic) ,Computer Science Applications ,Finite field ,[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,Hasse-Weil bound ,QA150-272.5 Algebra ,Algebraic curve ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,business ,BCH code - Abstract
We obtain a bound on the minimum distance of additive cyclic codes via the number of rational points on certain algebraic curves over finite fields. This is an extension of the analogous bound in the case of classical cyclic codes. Our result is the only general bound on such codes aside from Bierbrauer's BCH bound. We compare our bounds' performance against the BCH bound for additive cyclic codes in a special case and provide examples where it yields better results.
- Published
- 2015
40. Explicit Maximal and Minimal Curves over Finite Fields of Odd Characteristics
- Author
-
ZULFUKAR SAYGI, Ferruh Ozbudak, Zülfükar SAYGI, Department of Mathematics and Institute of Applied Mathematics, Middle East Technical University [Ankara] (METU), TOBB University of Economics and Technology, Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, TOBB ETU, Faculty of Science and Literature, Depertment of Mathematics, TOBB ETÜ, Fen Edebiyat Fakültesi, Matematik Bölümü, Saygı, Zülfükar, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
Discrete mathematics ,Work (thermodynamics) ,Algebra and Number Theory ,Conjecture ,Applied Mathematics ,Algebraic curves ,010102 general mathematics ,General Engineering ,[MATH.MATH-AG] Mathematics [math]/Algebraic Geometry [math.AG] ,0102 computer and information sciences ,01 natural sciences ,Theoretical Computer Science ,Finite field ,010201 computation theory & mathematics ,[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT] ,Maximal curves ,Family of curves ,Algebraic curve ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] ,Rational points ,[MATH.MATH-AG]Mathematics [math]/Algebraic Geometry [math.AG] ,0101 mathematics ,Minimal curves ,Type curve ,Mathematics - Abstract
In this work we present explicit classes of maximal and minimal Artin-Schreier type curves over finite fields having odd characteristics. Our results include the proof of Conjecture 5.9 given in [1] as a very special subcase. We use some techniques developed in [2], which were not used in [1]. (C) 2016 Elsevier Inc. All rights reserved.
- Published
- 2015
41. Computing Discrete Logarithms in Small Characteristic Finite Fields in Quasi-Polynomial Time
- Author
-
Emmanuel Thomé, Cryptology, Arithmetic: Hardware and Software (CARAMEL), Inria Nancy - Grand Est, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Algorithms, Computation, Image and Geometry (LORIA - ALGO), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Anne Canteaut, Gaëtan Leurent, Maria Naya-Plasencia, Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
International audience; The advent of a heuristic quasi-polynomial complexity algorithm in 2013 for solving the discrete logarithm problem over small characteristic finite fields has had the consequence that this problem can no longer be considered as being sufficiently hard for cryptographic needs. We will describe the idea of the algorithm, its more recent modifications, and consider directions for extensions to other contexts.
42. Cover-Free Codes and Separating System Codes
- Author
-
D Yachkov, A. G., Ilya Vorobyev, Polyanskii, N. A., Shchukin, V. Yu, Tillich, Jean-Pierre, and Pascale Charpin, Nicolas Sendrier, Jean-Pierre Tillich
- Subjects
completely separating system codes ,Cover-free (CF) codes ,separating system codes ,bounds on the rate ,fixed relative weight CF codes ,[INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT] - Abstract
We discover some important properties of cover-free (CF) codes, separating system (SS) codes and completely separating system (CSS) codes connected with the concept of constant weight CF codes. New upper and lower bounds on the rate of CF and SS codes based on the known results for CF and CSS codes are obtained. Tables of numerical values for the improved upper and lower bounds are presented.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.