Hadamard ideals and Hadamard matrices with two circulant cores

نویسندگان

  • Ilias S. Kotsireas
  • Christos Koukouvinos
  • Jennifer Seberry
چکیده

We apply Computational Algebra methods to the construction of Hadamard matrices with two circulant cores, given by Fletcher, Gysin and Seberry. We introduce the concept of Hadamard ideal for this construction to systematize the application of Computational Algebra methods. Our approach yields an exhaustive search construction of Hadamard matrices with two circulant cores for this construction for the ten first admissible values 3, 5, 7, 9, 11, 13, 15, 17, 19, 21. For each of these ten parameter values, the number of non-equivalent such Hadamard matrices is proportional to the square of the parameter.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hadamard ideals and Hadamard matrices with circulant core

Computational Algebra methods have been used successfully in various problems in many fields of Mathematics. Computational Algebra encompasses a set of powerful algorithms for studying ideals in polynomial rings and solving systems of nonlinear polynomial equations efficiently. The theory of Gröbner bases is a cornerstone of Computational Algebra, since it provides us with a constructive way of...

متن کامل

Heuristic algorithms for Hadamard matrices with two circulant cores

We design heuristic algorithms to construct Hadamard matrices with two circulant cores. This hard combinatorial problem can be formulated in terms of objective functions of several binary variables, so that heuristic methodologies can be used. Our algorithms are based on local and tabu search and they use information on the geometry of the objective function landscapes. In addition, we use the ...

متن کامل

Encryption Schemes based on Hadamard Matrices with Circulant Cores

In this paper, we propose two encryption schemes based on Hadamard matrices with one and two circulant cores, which are classes of combinatorial designs. A cryptanalysis of the proposed schemes against some popular attacks, brute force, plaintext attacks and ciphertext attacks is explored and our study shows that these attacks does not compromise the security of the system. Furthermore, we make...

متن کامل

Weaknesses in Hadamard Based Symmetric Key Encryption Schemes

In this paper security aspects of the existing symmetric key encryption schemes based on Hadamard matrices are examined. Hadamard matrices itself have symmetries like one circulant core or two circulant core. Here, we are exploiting the inherent symmetries of Hadamard matrices and are able to perform attacks on these encryption schemes. It is found that entire key can be obtained by observing t...

متن کامل

A Note on the Circulant Hadamard Conjecture

This note reports work in progress in connection with Ryser’s conjecture on circulant Hadamard matrices.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Eur. J. Comb.

دوره 27  شماره 

صفحات  -

تاریخ انتشار 2006