Advances in Cryptography and Coding Theory

The field of cryptography and coding theory is rapidly advancing, with a focus on developing secure and efficient methods for protecting sensitive information. Recent research has led to the development of new public-key cryptography algorithms, such as those based on satisfiability problems and skew polynomial evaluation, which offer improved security and efficiency. Additionally, there have been significant advances in the analysis of pseudocodewords in low-density parity-check codes, which has implications for the development of robust and scalable coding schemes. The use of machine learning and SAT solving techniques has also become increasingly prevalent in the field, allowing for the efficient analysis and optimization of complex cryptographic systems. Furthermore, research on the lonely runner conjecture and the bottleneck birthday problem has led to new insights into the properties of random matrices and the behavior of complex systems. Notable papers in this area include the introduction of the Primitive Vector Cipher, a novel hybrid encryption scheme, and the cryptanalysis of Gleeok-128, a low latency keyed pseudorandom function. The proposed scheme and the cryptanalysis provide new insights into the security and efficiency of cryptographic systems.

Sources

The Bottleneck Birthday Problem

Stable Voting and the Splitting of Cycles

The Power Method for Non-Hermitian Dual Quaternion Matrices

The lonely runner conjecture holds for nine runners

A survey about Hidden Subgroup Problem from a mathematical and cryptographic perspective

Equilibrium SAT based PQC: New aegis against quantum computing

Semigroup action based on skew polynomial evaluation with applications to Cryptography

Decryption thorough polynomial ambiguity: noise-enhanced high-memory convolutional codes for post-quantum cryptography

Pseudocodewords of quantum, quasi-cyclic, and spatially-coupled LDPC codes: a fundamental cone perspective

Permanental rank versus determinantal rank of random matrices over finite fields

A User Centric Group Authentication Scheme for Secure Communication

Primitive Vector Cipher(PVC): A Hybrid Encryption Scheme based on the Vector Computational Diffie-Hellman (V-CDH) Problem

Cryptanalysis of Gleeok-128

Built with on top of