Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Henk D. L. Hollmann is active.

Publication


Featured researches published by Henk D. L. Hollmann.


Journal of Combinatorial Theory | 1998

On Codes with the Identifiable Parent Property

Henk D. L. Hollmann; Jack H. van Lint; Jean-Paul M. G. Linnartz; Ludo Tolhuizen

IfCis aq-ary code of lengthnandaandbare two codewords, thencis called a descendant ofaandbifci?{ai, bi} fori=1, ?, n. We are interested in codesCwith the property that, given any descendantc, one can always identify at least one of the “parent” codewords inC. We study bounds onF(n, q), the maximal cardinality of a codeCwith this property, which we call theidentifiable parent property. Such codes play a role in schemes that protect against piracy of software.


Designs, Codes and Cryptography | 2005

XOR-based Visual Cryptography Schemes

Pim Tuyls; Henk D. L. Hollmann; Jack van Lint; Ludo Tolhuizen

A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has goodresolution, contrast and colour properties.Mathematically, the VC system is described by the XOR operation (modulo two addition). In this paper we investigate Threshold Visual Secret Sharing schemes associated to XOR-based VC systems. Firstly, we show that n out of n schemes with optimal resolution and contrast exist, and that (2,n) schemes are equivalent to binary codes. It turns out that these schemes have much better resolution than their OR-based counterparts. Secondly, we provide two explicit constructions for general k out of n schemes. Finally, we derive bounds on the contrast and resolution of XOR-based schemes. It follows from these bounds that for k<n, the contrast is strictly smaller than one. Moreover, the bounds imply that XOR-based k out of n schemes for even k are fundamentally different from those for odd k.


selected areas in cryptography | 2009

Cryptanalysis of a Generic Class of White-Box Implementations

Wil Michiels; Paul Gorissen; Henk D. L. Hollmann

A white-box implementation of a block cipher is a software implementation from which it is difficult for an attacker to extract the cryptographic key. Chow et al. published white-box implementations for AES and DES. These implementations are based on ideas that can be used to derive white-box implementations for other block ciphers as well. In particular, the ideas can be used to derive a white-box implementation for any substitution linear-transformation (SLT) cipher. Although the white-box implementations of AES and DES have been cryptanalyzed, the cryptanalyses published use typical properties of AES and DES. It is therefore an open question whether an SLT cipher exists for which the techniques of Chow et al. result in a secure white-box implementation. In this paper we largely settle this question by presenting an algorithm that is able to extract the key from such an implementation under a mild condition on the diffusion matrix. The condition is, for instance, satisfied by all MDS matrices. Our result can serve as a basis to design block ciphers and to develop white-box techniques that result in secure white-box implementations.


IEEE Transactions on Information Theory | 2009

Proofs of Two Conjectures on Ternary Weakly Regular Bent Functions

Tor Helleseth; Henk D. L. Hollmann; Alexander Kholosha; Zeying Wang; Qing Xiang

In this paper, we study ternary monomial functions of the form <i>f</i>(<i>x</i>) = Tr<i>n</i>(<i>axd</i>), where <i>x</i> isin \BBF <sub>3</sub> <i>n</i> and <i>Trn</i>: \BBF <sub>3</sub> <i>n</i>rarr \BBF <sub>3</sub> is the absolute trace function. Using a lemma of Hou, Stickelbergers theorem on Gauss sums, and certain ternary weight inequalities, we show that certain ternary monomial functions arising in the 2006 <b>IEEE Transactions on Information Theory</b> paper (vol. 52, pp. 2018-2032, 2006) are weakly regular bent, thus settling a conjecture of Helleseth and Kholosha. We also prove that the Coulter-Matthews bent functions are weakly regular.


IEEE Transactions on Signal Processing | 1995

On the realizability of biorthogonal, m-dimensional two-band filter banks

Ludo Tolhuizen; Henk D. L. Hollmann; Ton Kalker

We show an algebraic approach for the design of ladder structures for causal biorthogonal filter banks. The key ingredient of the approach is known in literature as Euclids algorithm. Using this algorithm we derive some strong result on the design freedom for ladder structures. In particular we show that the dimensionality of the problem plays an important role. We end by with some conjectures concerning the extensions to multichannel and noncausal filter banks. >


IEEE Transactions on Information Theory | 1993

A relation between Levenshtein-type distances and insertion-and-deletion correcting capabilities of codes

Henk D. L. Hollmann

A code is a collection of words or strings, not necessarily all of the same length, over come fixed alphabet. A relation is established between the insertion-and-deletion correcting capability of a code and its minimum distance for suitable Levenshtein-type distance measures. >


IEEE Design & Test of Computers | 2003

Minimizing pattern count for interconnect test under a ground bounce constraint

Erik Jan Marinissen; Bart Vermeulen; Henk D. L. Hollmann; R. G. Bennetts

When testing the interconnect structures on a board, test programmers sometimes ask, How can I control the test pattern generation process to avoid ground bounce problems during Extest mode? Those wishing to satisfy a simultaneously-switching-outputs constraint will find several new solutions in this article.


Journal of Combinatorial Theory | 2006

Generic erasure correcting sets: bounds and constructions

Henk D. L. Hollmann; Ludo Tolhuizen

A generic (r, m)-erasure correcting set generates for each binary linear code of codimension r a collection of parity check equations that enables iterative decoding of all potentially correctable erasure patterns of size at most m. As we have shown earlier, such a set essentially is just a parity check collection with this property for the Hamming code of codimension r.We prove non-constructively that for fixed m the minimum size F(r, m) of a generic (r, m)-erasure correcting set is linear in r. Moreover, we show constructively that F(r, 3) ≤ 3(r - 1)log23 + 1, which is a major improvement on a previous construction showing that F(r, 3) ≤ 1 + 1/2;r(r - 1).In the course of this work we encountered the following problem that may be of independent interest: what is the smallest size of a collection C ⊆ F2n such that, given any set of s independent vectors in F2n, there is a vector c ∈ C that has inner product 1 with all of these vectors? We show non-constructively that, for fixed s, this number is linear in n.


Archive | 2001

On Binary Cyclic Codes With Few Weights

Henk D. L. Hollmann; Qing Xiang

Let \( {C_{{{t_{0}}}}}{,_{{{t_{1}}...,{t_{r}}}}} \) denote the binary cyclic code of length n = 2 m − 1 with defining zeros \( {\alpha ^{{{t_{0}}}}},{\alpha ^{{{t_{1}}}}}...,{a^{{{t_{r}}}}} \), where α is a primitive element of GF(2 m ). Using the method in [8], we determine the weight distribution of the following cyclic codes. (i) \( {C_{{1,{t_{1}},{t_{2}}}}}, \), where m = 2r + 1, t 1 = 2r + 1, t 2 = 2 r−1 + 1. (This code appeared in Research Problem 9.7 of MacWilhams and Sloane [14].) (ii) \( {C_{{1,t,{t^{2}}}}}, \) where m = 2r + l, t = l + 22r+1 (This code appeared in a conjecture of Chang, Gaal, Golomb, Gong, and Kumar [5].) (iii) Several cyclic codes in the paper of Van Lint and Wilson [12]. (iv) C 1,t, where \( m = 2r,t = \sum\nolimits_{{i = 0}}^{r} {{2^{{ik}}}} \), gcd(m, k) = 1.


IEEE Transactions on Information Theory | 1991

Performance of efficient balanced codes

Henk D. L. Hollmann; Kees A. Schouhamer Immink

The problem of appraising the spectral performance of codes based on a new algorithm for generating zero-disparity codewords presented by D.E. Knuth (1986) is addressed. In order to get some insight into the efficiency of Knuths construction technique, the authors evaluate the spectral properties of its code streams. The structure of Knuth codes allows the derivation a simple expression for (an approximation to) the sum of variance of these codes. This quantity plays a key role in the spectral performance characterization of DC-balanced codes. The authors evaluate this expression and compare the sum variance of Knuth codes with the sum variance of the polarity bit codes for fixed redundancy. Under the premise that the sum variance can serve as a quantity to judge the width of the spectral notch, the authors conclude that codes based on Knuths algorithm offer less spectral suppression than polarity bit codes with the same redundancy. >

Collaboration


Dive into the Henk D. L. Hollmann's collaboration.

Researchain Logo
Decentralizing Knowledge