We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Search Results

Showing 1-20 of 1,445 results
  1. Article

    On the circulant matrix MDS testing and the search for circulant MDS matrices

    MDS matrices are used in symmetric cryptography to hinder differential and linear cryptanalysis. This article proposes and examines a new...

    Stanislav S. Malakhov in Cryptography and Communications
    02 October 2024
  2. Article

    Two party key exchange protocol based on duo circulant matrices for the IoT environment

    This paper proposes a new two-party key exchange protocol based on the max-plus semiring, which is the set of matrices over the set of integers along...

    04 June 2024
  3. Conference paper

    Time-Aware Circulant Matrices for Question-Based Temporal Localization

    Episodic memory involves the ability to recall specific events, experiences, and locations from one’s past. Humans use this ability to understand the...
    Pierfrancesco Bruni, Alex Falcon, Petia Radeva in Image Analysis and Processing – ICIAP 2023
    2023
  4. Article

    On the counting of involutory MDS matrices

    The optimal branch number of MDS matrices has established their importance in designing diffusion layers for various block ciphers and hash...

    Susanta Samanta in Cryptography and Communications
    21 November 2024
  5. Article
    Full access

    An algebraic approach to circulant column parity mixers

    Circulant Column Parity Mixers (CCPMs) are a particular type of linear maps, used as the mixing layer in permutation-based cryptographic primitives...

    Robert Christian Subroto in Designs, Codes and Cryptography
    21 August 2024 Open access
  6. Article

    New nonexistence results on circulant weighing matrices

    A weighing matrix W = ( w i , j ) is a square matrix of order n and entries w i , j in {0,± 1} such that W W T = k I n . In his thesis, Strassler gave a table of...

    K. T. Arasu, Daniel M. Gordon, Yiran Zhang in Cryptography and Communications
    07 July 2021
  7. Article

    New Digital Signature Scheme Based on RSA Using Circulant Matrix

    One of the most important outcomes of public key cryptography is digital signature methods. These digital signature techniques allow digital...

    Umaprasada Rao Bodasingi, Siva Gunupuru in SN Computer Science
    23 March 2023
  8. Article

    On the construction of near-MDS matrices

    The optimal branch number of MDS matrices makes them a preferred choice for designing diffusion layers in many block ciphers and hash functions....

    Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta in Cryptography and Communications
    14 August 2023
  9. Article

    Quaternary Hermitian self-dual codes of lengths 26, 32, 36, 38 and 40 from modifications of well-known circulant constructions

    In this work, we give three new techniques for constructing Hermitian self-dual codes over commutative Frobenius rings with a non-trivial involutory...

    22 December 2022
  10. Conference paper

    Canonization of a Random Circulant Graph by Counting Walks

    It is well known that almost all graphs are canonizable by a simple combinatorial routine known as color refinement. With high probability, this...
    Oleg Verbitsky, Maksim Zhukovskii in WALCOM: Algorithms and Computation
    2024
  11. Article

    On optimal constant weight codes derived from \(\omega \)-circulant balanced generalized weighing matrices

    Balanced generalized weight matrices are used to construct optimal constant weight codes that are monomially inequivalent to codes derived from the...

    Hadi Kharaghani, Thomas Pender, Vladimir Tonchev in Designs, Codes and Cryptography
    14 May 2024
  12. Article

    Fast newton method to solve KLR based on multilevel circulant matrix with log-linear complexity

    Kernel logistic regression (KLR) is a conventional nonlinear classifier in machine learning. With the explosive growth of data size, the storage and...

    Junna Zhang, Shuisheng Zhou, ... Feng Ye in Applied Intelligence
    03 June 2023
  13. Article
    Full access

    New families of quaternionic Hadamard matrices

    Santiago Barrera Acevedo, Heiko Dietrich, Corey Lionis in Designs, Codes and Cryptography
    18 June 2024 Open access
  14. Article
    Full access

    Structured Matrices and Their Application in Neural Networks: A Survey

    Modern neural network architectures are becoming larger and deeper, with increasing computational resources needed for training and inference. One...

    Matthias Kissel, Klaus Diepold in New Generation Computing
    26 July 2023 Open access
  15. Article

    Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes

    The security requirements of new applications such as cloud computing, big data, and the Internet of Things have promoted the development and...

    Bolin Wang, Wenling Wu in Designs, Codes and Cryptography
    21 July 2024
  16. Conference paper

    Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices

    The problem of Isomorphism of Polynomials (IP problem) is known to be important to study the security of multivariate public key cryptosystems, one...
    2021
Did you find what you were looking for? Share feedback.