The Feng Rao bounds. KIAS International Conference on Coding Theory and Applications Olav Geil, Aalborg University, Denmark

Size: px
Start display at page:

Download "The Feng Rao bounds. KIAS International Conference on Coding Theory and Applications Olav Geil, Aalborg University, Denmark"

Transcription

1 Olav Geil Aalborg University Denmark KIAS International Conference on Coding Theory and Applications 2012

2 Linear code = a subspace. Operations are: Vector addition. Scalar multiplication. [n, k, d] the usual parameters. To deal with d (and k and even n) the compontwise product is useful: (c 1,..., c n ) (d 1,..., d n ) = (c 1 d 1,..., c n d n ).

3 Linear code = a subspace. Operations are: Vector addition. Scalar multiplication. [n, k, d] the usual parameters. To deal with d (and k and even n) the compontwise product is useful: (c 1,..., c n ) (d 1,..., d n ) = (c 1 d 1,..., c n d n ).

4 Claim: Code constructions with a supporting algebra: algebraic geometric codes, Reed Muller codes and relatives, affine variety codes, are about getting information on the componentwise product. Multiplication in higher algebra ( ) Multiplication in quotient ring Componentwise product at code level

5 Claim: Code constructions with a supporting algebra: algebraic geometric codes, Reed Muller codes and relatives, affine variety codes, are about getting information on the componentwise product. Multiplication in higher algebra ( ) Multiplication in quotient ring Componentwise product at code level

6 Dual code Parity check matrix Primary code Generator matrix The usual Feng Rao bound (Feng Rao bound for dual codes) Order bound The Andersen G bound (Feng Rao bound for primary codes) Footprint bound

7 Dual code Parity check matrix Primary code Generator matrix The usual Feng Rao bound (Feng Rao bound for dual codes) Order bound The Andersen G bound (Feng Rao bound for primary codes) Footprint bound

8 Dual code Parity check matrix Primary code Generator matrix The usual Feng Rao bound (Feng Rao bound for dual codes) Order bound The Andersen G bound (Feng Rao bound for primary codes) Footprint bound

9 This talk: connection between the levels of description, connection between dual and primary Results: Consequences of the above connections. Information derived from medium and low level descriptions. Important results that are not covered: Higher level results such as Beelen bound, Duursma Kirov Park bound and list decoding of algebraic geometric codes by Lee Bras-Amorós O Sullivan s method.

10 This talk: connection between the levels of description, connection between dual and primary Results: Consequences of the above connections. Information derived from medium and low level descriptions. Important results that are not covered: Higher level results such as Beelen bound, Duursma Kirov Park bound and list decoding of algebraic geometric codes by Lee Bras-Amorós O Sullivan s method.

11 This talk: connection between the levels of description, connection between dual and primary Results: Consequences of the above connections. Information derived from medium and low level descriptions. Important results that are not covered: Higher level results such as Beelen bound, Duursma Kirov Park bound and list decoding of algebraic geometric codes by Lee Bras-Amorós O Sullivan s method.

12 Ideal J F[ X ] The footprint: (J) = { X α X α is not a leading monomial of any polynomial in J} I F q [ X ], I q = I + X q 1 X 1,..., X q m X m. The footprint bound in a special case: #V Fq (I q ) = # (I q ).

13 Ideal J F[ X ] The footprint: (J) = { X α X α is not a leading monomial of any polynomial in J} I F q [ X ], I q = I + X q 1 X 1,..., X q m X m. The footprint bound in a special case: #V Fq (I q ) = # (I q ).

14 I q = X q X, Y q Y (I q ) = {X i Y j 0 i, j < q} #V Fq (I q ) = q 2 I q 2 = X q+1 Y q Y, X q2 X, Y q2 Y. Choose monomial ordering with x q+1 Y q, (I q 2) {X i Y j 0 i < q 2, 0 j < q} #V (I Fq 2 q 2) q q2 = q 3 Study of norm/trace gives q 3 zeros.

15 I q = X q X, Y q Y (I q ) = {X i Y j 0 i, j < q} #V Fq (I q ) = q 2 I q 2 = X q+1 Y q Y, X q2 X, Y q2 Y. Choose monomial ordering with x q+1 Y q, (I q 2) {X i Y j 0 i < q 2, 0 j < q} #V (I Fq 2 q 2) q q2 = q 3 Study of norm/trace gives q 3 zeros.

16 Gröbner basis for J w.r.t. is a basis for J such that (J) can easily be read off. G = {G 1,..., G s } J is Gröbner basis for J w.r.t. iff any monomial in lm(j) is divisible by some lm(g i ). Gröbner basis for I q gives exact information on #V Fq (I q ).

17 Gröbner basis for J w.r.t. is a basis for J such that (J) can easily be read off. G = {G 1,..., G s } J is Gröbner basis for J w.r.t. iff any monomial in lm(j) is divisible by some lm(g i ). Gröbner basis for I q gives exact information on #V Fq (I q ).

18 V Fq (I q ) = {P 1,..., P n }. Codeword c = (F (P 1 ),..., F (P n )). w H ( c) = n # (I q + F ) (n minus number of commen zeros). Information on which leading monomials occour in the code construction gives information on minimum distance. Improved code construction straight forward.

19 V Fq (I q ) = {P 1,..., P n }. Codeword c = (F (P 1 ),..., F (P n )). w H ( c) = n # (I q + F ) (n minus number of commen zeros). Information on which leading monomials occour in the code construction gives information on minimum distance. Improved code construction straight forward.

20 V Fq (I q ) = {P 1,..., P n }. Codeword c = (F (P 1 ),..., F (P n )). w H ( c) = n # (I q + F ) (n minus number of commen zeros). Information on which leading monomials occour in the code construction gives information on minimum distance. Improved code construction straight forward.

21 {M + J M (J)} is a basis for F[ X ]/J as a vectorspace over F. G = M 1 (P 1 ) M 1 (P n ) M 2 (P 1 ) M 2 (P n )..... M k (P 1 ) M k (P n ), M 1,..., M k (I q ), M i M j is a code of dimension k

22 {M + J M (J)} is a basis for F[ X ]/J as a vectorspace over F. G = M 1 (P 1 ) M 1 (P n ) M 2 (P 1 ) M 2 (P n )..... M k (P 1 ) M k (P n ), M 1,..., M k (I q ), M i M j is a code of dimension k

23 Reed Muller codes: Let I 5 = X 5 X, Y 5 Y and c = (F (P 1 ),..., F (P n=25 )), with lm(f ) = X i Y j. We get w H ( c) = n # (I 5 + F ) (5 i)(5 j). Y 4 XY 4 X 2 Y 4 X 3 Y 4 X 4 Y 4 Y 3 XY 3 X 2 Y 3 X 3 Y 3 X 4 Y 3 Y 2 XY 2 X 2 Y 2 X 3 Y 2 X 4 Y 2 Y XY X 2 Y X 3 Y X 4 Y 1 X X 2 X 3 X RM 5 (4, 2) is [25, 15, 5] Improved code construction gives [25, 17, 5]

24 Reed Muller codes: Let I 5 = X 5 X, Y 5 Y and c = (F (P 1 ),..., F (P n=25 )), with lm(f ) = X i Y j. We get w H ( c) = n # (I 5 + F ) (5 i)(5 j). Y 4 XY 4 X 2 Y 4 X 3 Y 4 X 4 Y 4 Y 3 XY 3 X 2 Y 3 X 3 Y 3 X 4 Y 3 Y 2 XY 2 X 2 Y 2 X 3 Y 2 X 4 Y 2 Y XY X 2 Y X 3 Y X 4 Y 1 X X 2 X 3 X RM 5 (4, 2) is [25, 15, 5] Improved code construction gives [25, 17, 5]

25 Reed Muller codes: Let I 5 = X 5 X, Y 5 Y and c = (F (P 1 ),..., F (P n=25 )), with lm(f ) = X i Y j. We get w H ( c) = n # (I 5 + F ) (5 i)(5 j). Y 4 XY 4 X 2 Y 4 X 3 Y 4 X 4 Y 4 Y 3 XY 3 X 2 Y 3 X 3 Y 3 X 4 Y 3 Y 2 XY 2 X 2 Y 2 X 3 Y 2 X 4 Y 2 Y XY X 2 Y X 3 Y X 4 Y 1 X X 2 X 3 X RM 5 (4, 2) is [25, 15, 5] Improved code construction gives [25, 17, 5]

26 Hermitian codes: I = X q+1 Y q Y, I q 2 = I + X q2 X, Y q2 Y. w(x i Y j ) = iq + j(q + 1) X s Y t w X u Y v if w(x s Y t ) < w(x u Y v ) or w(x s Y t ) = w(x u Y v ) and t < v Weighted degree lexicographic ordering.

27 I 4 = X 3 Y 2 Y, X 4 X, Y 4 Y. w (I 4 ) Y XY X 2 Y X 3 Y X X 2 X c = (F (P 1 ),..., F (P 8 )) lm(f ) = Y w H ( c) = #{M w (I 4 ) M / w (I 4 + F )}. YF rem X 3 Y 2 Y = Y (Y + ) rem X 3 Y 2 Y = X 3 + w H ( c) #w ( w (I 4 )) (w(y ) + w( w (I 4 ))). (what we hit is what we get).

28 I 4 = X 3 Y 2 Y, X 4 X, Y 4 Y. w (I 4 ) Y XY X 2 Y X 3 Y X X 2 X c = (F (P 1 ),..., F (P 8 )) lm(f ) = Y w H ( c) = #{M w (I 4 ) M / w (I 4 + F )}. YF rem X 3 Y 2 Y = Y (Y + ) rem X 3 Y 2 Y = X 3 + w H ( c) #w ( w (I 4 )) (w(y ) + w( w (I 4 ))). (what we hit is what we get).

29 I 9 = X 4 Y 3 Y, X 9 X, Y 9 Y. w(x ) = 3, w(y ) = 4. Y 2 XY 2 X 2 Y 2 x 3 Y 2 X 4 Y 2 X 5 Y 2 X 6 Y 2 X 7 Y 2 X 8 Y 2 Y XY X 2 Y x 3 Y X 4 Y X 5 Y X 6 Y X 7 Y X 8 Y 1 X X 2 x 3 X 4 X 5 X 6 X 7 X

30 One point algebraic geometric codes: P 1,..., P n, Q rational places of function field over F q. To construct C L (D = P P n, vq) we need basis for: v s=0 L(sQ) s=0 L(sQ). Everything, can be translated into affine variety description: s=0 L(sQ) = F q[x 1,..., X m ]/I {P 1,..., P n } V Fq (I ). Affine variety description includes determination of minimum distance via footprint bound.

31 One point algebraic geometric codes: P 1,..., P n, Q rational places of function field over F q. To construct C L (D = P P n, vq) we need basis for: v s=0 L(sQ) s=0 L(sQ). Everything, can be translated into affine variety description: s=0 L(sQ) = F q[x 1,..., X m ]/I {P 1,..., P n } V Fq (I ). Affine variety description includes determination of minimum distance via footprint bound.

32 Weierstrass semigroup: H(Q) = ν Q ( s=0 L(sQ) ) = w 1,..., w m. Definition: Given weights w 1,..., w m define w( X α ) = α 1 w α m w m. Define w by X α w X β if w( X α ) < w( X β ) or w( X α ) = w( X β ) but X α M X β ( M can be anything, for instance lex ) Example: w(x ) = q, w(y ) = q + 1, M = lex with X lex Y. F (X, Y ) = X q+1 Y q Y, w(x q+1 ) = w(y q ) = q(q + 1) and lm(f ) = Y q.

33 Weierstrass semigroup: H(Q) = ν Q ( s=0 L(sQ) ) = w 1,..., w m. Definition: Given weights w 1,..., w m define w( X α ) = α 1 w α m w m. Define w by X α w X β if w( X α ) < w( X β ) or w( X α ) = w( X β ) but X α M X β ( M can be anything, for instance lex ) Example: w(x ) = q, w(y ) = q + 1, M = lex with X lex Y. F (X, Y ) = X q+1 Y q Y, w(x q+1 ) = w(y q ) = q(q + 1) and lm(f ) = Y q.

34 Order domain conditions: I = F 1 ( X ),..., F s ( X ) F[ X ] and w 1,..., w m satisfy ODC if: 1. {F 1,..., F s } is a Gröbner basis w.r.t. w. 2. F i, i = 1,..., s contains exactly two monomials of highest weight. 3. No two monomials in w ( F 1,..., F s ) are of the same weight. Example: I = X q+1 Y q Y F q 2[X, Y ] 1. OK 2. OK 3. w (I ) = {X i Y j 0 j < q, 0 i} OK

35 Order domain conditions: I = F 1 ( X ),..., F s ( X ) F[ X ] and w 1,..., w m satisfy ODC if: 1. {F 1,..., F s } is a Gröbner basis w.r.t. w. 2. F i, i = 1,..., s contains exactly two monomials of highest weight. 3. No two monomials in w ( F 1,..., F s ) are of the same weight. Example: I = X q+1 Y q Y F q 2[X, Y ] 1. OK 2. OK 3. w (I ) = {X i Y j 0 j < q, 0 i} OK

36 Theorem (Miura 1997, Pellikaan 2001): s=0 L(sQ) = F[ X ]/I where I and corresponding weights satisfy order domain conditions. Corollary: C L (P P n, vq) = Span Fq {(M(P 1 ),..., M(P n )) M w (I q ), w(m) v}. Footprint method better than Goppa bound. (Andersen-G)

37 Theorem (Miura 1997, Pellikaan 2001): s=0 L(sQ) = F[ X ]/I where I and corresponding weights satisfy order domain conditions. Corollary: C L (P P n, vq) = Span Fq {(M(P 1 ),..., M(P n )) M w (I q ), w(m) v}. Footprint method better than Goppa bound. (Andersen-G)

38 Theorem (Miura 1997, Pellikaan 2001): s=0 L(sQ) = F[ X ]/I where I and corresponding weights satisfy order domain conditions. Corollary: C L (P P n, vq) = Span Fq {(M(P 1 ),..., M(P n )) M w (I q ), w(m) v}. Footprint method better than Goppa bound. (Andersen-G)

39 Weierstrass semigroup Λ = λ 1,..., λ m. Corollary: (G Matsumoto 2009) A function field having Λ as a Weierstrass semigroup can at most have ( ) # Λ\ m i=1 (qλ i + Λ) + 1 rational places. Term qλ i comes from X q i X i. Term +1 corresponds to the place with Weierstrass semigroup Λ. Better than Serre bound for small q. Gives a way for excluding possible Weierstrass semigroups when genus and number of zeros are known.

40 Order domains are generalizations of s=0 L(sQ). For transcendence degree r, weights are in N r 0 (when finitely generated) G Pellikaan Gives a way of generalizing algebraic geometric codes to higher transcendence degree. Think of Reed Muller code as higher transcendence degree version of Reed Solomon code. Order domain conditions and Pellikaan Miura correspondence also work for higher transcendence degrees G Pellikaan So does methods for estimating parameters. Descriptions can be abstract or be given as concrete quotient ring.

41 Order domains are generalizations of s=0 L(sQ). For transcendence degree r, weights are in N r 0 (when finitely generated) G Pellikaan Gives a way of generalizing algebraic geometric codes to higher transcendence degree. Think of Reed Muller code as higher transcendence degree version of Reed Solomon code. Order domain conditions and Pellikaan Miura correspondence also work for higher transcendence degrees G Pellikaan So does methods for estimating parameters. Descriptions can be abstract or be given as concrete quotient ring.

42 Order domains are generalizations of s=0 L(sQ). For transcendence degree r, weights are in N r 0 (when finitely generated) G Pellikaan Gives a way of generalizing algebraic geometric codes to higher transcendence degree. Think of Reed Muller code as higher transcendence degree version of Reed Solomon code. Order domain conditions and Pellikaan Miura correspondence also work for higher transcendence degrees G Pellikaan So does methods for estimating parameters. Descriptions can be abstract or be given as concrete quotient ring.

43 Order domains are generalizations of s=0 L(sQ). For transcendence degree r, weights are in N r 0 (when finitely generated) G Pellikaan Gives a way of generalizing algebraic geometric codes to higher transcendence degree. Think of Reed Muller code as higher transcendence degree version of Reed Solomon code. Order domain conditions and Pellikaan Miura correspondence also work for higher transcendence degrees G Pellikaan So does methods for estimating parameters. Descriptions can be abstract or be given as concrete quotient ring.

44 Order domains are generalizations of s=0 L(sQ). For transcendence degree r, weights are in N r 0 (when finitely generated) G Pellikaan Gives a way of generalizing algebraic geometric codes to higher transcendence degree. Think of Reed Muller code as higher transcendence degree version of Reed Solomon code. Order domain conditions and Pellikaan Miura correspondence also work for higher transcendence degrees G Pellikaan So does methods for estimating parameters. Descriptions can be abstract or be given as concrete quotient ring.

45 The footprint-method applied to order domain conditions: I = F 1 ( X,..., F s ( X ), w (I q ) = {M 1,..., M n }. c = ev(f ), lm(f ) = M i. w H ( c) = # ( w (I q )\ w (I q + F ) ) = #{M w (I q ) M is a leading monomial of a polynomial in I q + F } # monomials in w (I q ) hit by M i (using F 1,..., F s ) = # ( w( w (I q )) ( w(m i ) + w( w (I q )) )).

46 Linear code level: B = { b 1,..., b n } and U = { u 1,..., u n } bases for F n q. { 0} = L 0 L 1 = Span{ b 1 } L 2 = Span{ b 1, b 2 } L n = F n q. ρ B ( c) = i, if c L i \L i 1. (i, j) is OWB if ρ B ( b i u j ) < ρ B ( b i u j ) for i = 1,..., i 1. If a supporting algebra is given then information can be extracted regarding above. Think of B = U corresponding to {1, X, X 2,..., X q 1 }. ev(x i ) ev(x j ) = ev(x i+j ) applied when i + j < q.

47 Linear code level: B = { b 1,..., b n } and U = { u 1,..., u n } bases for F n q. { 0} = L 0 L 1 = Span{ b 1 } L 2 = Span{ b 1, b 2 } L n = F n q. ρ B ( c) = i, if c L i \L i 1. (i, j) is OWB if ρ B ( b i u j ) < ρ B ( b i u j ) for i = 1,..., i 1. If a supporting algebra is given then information can be extracted regarding above. Think of B = U corresponding to {1, X, X 2,..., X q 1 }. ev(x i ) ev(x j ) = ev(x i+j ) applied when i + j < q.

48 Linear code level: B = { b 1,..., b n } and U = { u 1,..., u n } bases for F n q. { 0} = L 0 L 1 = Span{ b 1 } L 2 = Span{ b 1, b 2 } L n = F n q. ρ B ( c) = i, if c L i \L i 1. (i, j) is OWB if ρ B ( b i u j ) < ρ B ( b i u j ) for i = 1,..., i 1. If a supporting algebra is given then information can be extracted regarding above. Think of B = U corresponding to {1, X, X 2,..., X q 1 }. ev(x i ) ev(x j ) = ev(x i+j ) applied when i + j < q.

49 To hit: σ(i) = #{l j such that (i, j) is OWB and ρ B ( b i u j ) = l} Theorem: If ρ B ( c) = i then w H ( c) σ(i). Proof: Assume (i, j 1 ), (i, j 2 ),..., (i, j σ ) hits l 1, l 2,..., l σ. { c u j1,, c u jσ } is linearly independent. Hence, c Span{ u j1, u jσ } is of dimension σ. But { c d d F n q} is of dimension w H ( c).

50 To hit: σ(i) = #{l j such that (i, j) is OWB and ρ B ( b i u j ) = l} Theorem: If ρ B ( c) = i then w H ( c) σ(i). Proof: Assume (i, j 1 ), (i, j 2 ),..., (i, j σ ) hits l 1, l 2,..., l σ. { c u j1,, c u jσ } is linearly independent. Hence, c Span{ u j1, u jσ } is of dimension σ. But { c d d F n q} is of dimension w H ( c).

51 To hit: σ(i) = #{l j such that (i, j) is OWB and ρ B ( b i u j ) = l} Theorem: If ρ B ( c) = i then w H ( c) σ(i). Proof: Assume (i, j 1 ), (i, j 2 ),..., (i, j σ ) hits l 1, l 2,..., l σ. { c u j1,, c u jσ } is linearly independent. Hence, c Span{ u j1, u jσ } is of dimension σ. But { c d d F n q} is of dimension w H ( c).

52 To be hit: µ(l) = #{i j such that (i, j) is OWB Theorem: and ρ B ( b i u j ) = l} Let l be such that c b l 0 but c b l = 0 for all l < l. Then w H ( c) µ(l). Proof: Same type of arguments as before. Primary code: minimum distance smallest σ(i) value among generating vectors. Dual code: minimum distance smallest µ value among non-parity-check vectors.

53 To be hit: µ(l) = #{i j such that (i, j) is OWB Theorem: and ρ B ( b i u j ) = l} Let l be such that c b l 0 but c b l = 0 for all l < l. Then w H ( c) µ(l). Proof: Same type of arguments as before. Primary code: minimum distance smallest σ(i) value among generating vectors. Dual code: minimum distance smallest µ value among non-parity-check vectors.

54 To be hit: µ(l) = #{i j such that (i, j) is OWB Theorem: and ρ B ( b i u j ) = l} Let l be such that c b l 0 but c b l = 0 for all l < l. Then w H ( c) µ(l). Proof: Same type of arguments as before. Primary code: minimum distance smallest σ(i) value among generating vectors. Dual code: minimum distance smallest µ value among non-parity-check vectors.

55 Recent results (with Matsumoto and Ruano): G = { g 1,..., g n }, H = { h 1,..., h n } and U = { u 1,..., u n } with g T ] 1. [ hn h 1 = I g T n then very nice translation between ρ G, σ with respect to (G, U) on the one side and ρ H, µ with respect to (H, U) on the other side. Primary code description dual code description. Feng Rao majority decoding algorithm for dual codes (usually described by means of algebra) can be formulated in linear code set-up (Matsumoto Miura 2000). Works for WB. Decoding of algebraically defined primary codes: Go to linear code level. Detect dual description and use linear version of decoding algorithm. Feng Rao bound for dual codes strongly related to footprint bound.

56 Recent results (with Matsumoto and Ruano): G = { g 1,..., g n }, H = { h 1,..., h n } and U = { u 1,..., u n } with g T ] 1. [ hn h 1 = I g T n then very nice translation between ρ G, σ with respect to (G, U) on the one side and ρ H, µ with respect to (H, U) on the other side. Primary code description dual code description. Feng Rao majority decoding algorithm for dual codes (usually described by means of algebra) can be formulated in linear code set-up (Matsumoto Miura 2000). Works for WB. Decoding of algebraically defined primary codes: Go to linear code level. Detect dual description and use linear version of decoding algorithm. Feng Rao bound for dual codes strongly related to footprint bound.

57 Recent results (with Matsumoto and Ruano): G = { g 1,..., g n }, H = { h 1,..., h n } and U = { u 1,..., u n } with g T ] 1. [ hn h 1 = I g T n then very nice translation between ρ G, σ with respect to (G, U) on the one side and ρ H, µ with respect to (H, U) on the other side. Primary code description dual code description. Feng Rao majority decoding algorithm for dual codes (usually described by means of algebra) can be formulated in linear code set-up (Matsumoto Miura 2000). Works for WB. Decoding of algebraically defined primary codes: Go to linear code level. Detect dual description and use linear version of decoding algorithm. Feng Rao bound for dual codes strongly related to footprint bound.

58 Recent results (with Matsumoto and Ruano): G = { g 1,..., g n }, H = { h 1,..., h n } and U = { u 1,..., u n } with g T ] 1. [ hn h 1 = I g T n then very nice translation between ρ G, σ with respect to (G, U) on the one side and ρ H, µ with respect to (H, U) on the other side. Primary code description dual code description. Feng Rao majority decoding algorithm for dual codes (usually described by means of algebra) can be formulated in linear code set-up (Matsumoto Miura 2000). Works for WB. Decoding of algebraically defined primary codes: Go to linear code level. Detect dual description and use linear version of decoding algorithm. Feng Rao bound for dual codes strongly related to footprint bound.

59 R = F 5 [X, Y ]. {P 1 = (1, 1), P 2 = (1, 2), P 3 = (1, 3), P 4 = (2, 1),..., P 9 = (3, 3)} F 2 5 g 1 = ev(1), g 2 = ev(x ), g 3 = ev(y ), g 4 = ev(x 2 ), g 5 = ev(xy ), g 6 = ev(y 2 ), g 7 = ev(x 2 Y ), g 8 = ev(xy 2 ), g 9 = ev(x 2 Y 2 ). h1 = ev(x 2 Y 2 + XY 2 + X 2 Y + XY ), h2 = ev(x 2 Y 2 + 3XY 2 + X 2 Y + Y 2 + 3XY + Y ), h3 = ev(x 2 Y 2 + XY 2 + 3X 2 Y + 3XY + X 2 + X ), h4 = ev(xy 2 + Y 2 + XY + Y ), h5 = ev(x 2 Y 2 + 3XY 2 + 3X 2 Y + Y 2 + 4XY + X 2 + 3Y + 3X + 1), h6 = ev(x 2 Y + XY + X 2 + X ), h7 = ev(xy 2 + Y 2 + 3XY + 3Y + X + 1), h8 = ev(x 2 Y + 3XY + X 2 + Y + 3X + 1), h9 = ev(xy + Y + X + 1).

60 R = F 5 [X, Y ]. {P 1 = (1, 1), P 2 = (1, 2), P 3 = (1, 3), P 4 = (2, 1),..., P 9 = (3, 3)} F 2 5 g 1 = ev(1), g 2 = ev(x ), g 3 = ev(y ), g 4 = ev(x 2 ), g 5 = ev(xy ), g 6 = ev(y 2 ), g 7 = ev(x 2 Y ), g 8 = ev(xy 2 ), g 9 = ev(x 2 Y 2 ). h1 = ev(x 2 Y 2 + XY 2 + X 2 Y + XY ), h2 = ev(x 2 Y 2 + 3XY 2 + X 2 Y + Y 2 + 3XY + Y ), h3 = ev(x 2 Y 2 + XY 2 + 3X 2 Y + 3XY + X 2 + X ), h4 = ev(xy 2 + Y 2 + XY + Y ), h5 = ev(x 2 Y 2 + 3XY 2 + 3X 2 Y + Y 2 + 4XY + X 2 + 3Y + 3X + 1), h6 = ev(x 2 Y + XY + X 2 + X ), h7 = ev(xy 2 + Y 2 + 3XY + 3Y + X + 1), h8 = ev(x 2 Y + 3XY + X 2 + Y + 3X + 1), h9 = ev(xy + Y + X + 1).

61 Information from function field theory, Gröbner basis theory, algebra, order domain theory translates easily to information on ρ and OWB, WWB or WB. Multiplication corresponds to componentwise product. Recent list decoding algorithms for algebraic geometric codes decode beoyond the bound for primary codes. (Lee Bras-Amorós O Sullivan 2011, G Matsumoto Ruano 2012, Lee Bras-Amorós O Sullivan 2012).

62 Information from function field theory, Gröbner basis theory, algebra, order domain theory translates easily to information on ρ and OWB, WWB or WB. Multiplication corresponds to componentwise product. Recent list decoding algorithms for algebraic geometric codes decode beoyond the bound for primary codes. (Lee Bras-Amorós O Sullivan 2011, G Matsumoto Ruano 2012, Lee Bras-Amorós O Sullivan 2012).

63 Everything said so far regarding minimum distance can be lifted to generalized Hamming weights. Supp(D) = {i {1,..., n} c i 0 for some c D}. d i (C) = min{#supp(d) D C, dim(d) = i} Give information about behaviour of Wiretap channel of type II. Secret sharing schemes.

64 Everything said so far regarding minimum distance can be lifted to generalized Hamming weights. Supp(D) = {i {1,..., n} c i 0 for some c D}. d i (C) = min{#supp(d) D C, dim(d) = i} Give information about behaviour of Wiretap channel of type II. Secret sharing schemes.

65 Generalized Reed Muller codes: Y 4 XY 4 X 2 Y 4 X 3 Y 4 X 4 Y 4 Y 3 XY 3 X 2 Y 3 X 3 Y 3 X 4 Y 3 Y 2 XY 2 X 2 Y 2 X 3 Y 2 X 4 Y 2 Y XY X 2 Y X 3 Y X 4 Y 1 X X 2 X 3 X Minimum distance corresponds to value on border (can be realized as product of linear factors). Second smallest weight: What happens if leading monomial is on the border, but minimal value is not realized? Use Buchberger s algorithm at a theoretical level. Second smallest weigth IS second smallest number above for degrees up to q m 1. G-2008 For m = 2 the degrees > q are easily solved. G-2008 Ericson-1974, Enough to know the case with two variables.

66 Generalized Reed Muller codes: Y 4 XY 4 X 2 Y 4 X 3 Y 4 X 4 Y 4 Y 3 XY 3 X 2 Y 3 X 3 Y 3 X 4 Y 3 Y 2 XY 2 X 2 Y 2 X 3 Y 2 X 4 Y 2 Y XY X 2 Y X 3 Y X 4 Y 1 X X 2 X 3 X Minimum distance corresponds to value on border (can be realized as product of linear factors). Second smallest weight: What happens if leading monomial is on the border, but minimal value is not realized? Use Buchberger s algorithm at a theoretical level. Second smallest weigth IS second smallest number above for degrees up to q m 1. G-2008 For m = 2 the degrees > q are easily solved. G-2008 Ericson-1974, Enough to know the case with two variables.

67 Conclusion: The variety of levels can sometimes help in realizing what is really going on. Lower level descriptions often captures what is going on, but might appear technical.

Affine variety codes are better than their reputation

Affine variety codes are better than their reputation Affine variety codes are better than their reputation Olav Geil Aalborg University (joint with Stefano Martin) Special Semester on Applications of Algebra and Number Theory Algebraic Curves over Finite

More information

Published in: Proceedings of the 21st Symposium on Mathematical Theory of Networks and Systems

Published in: Proceedings of the 21st Symposium on Mathematical Theory of Networks and Systems Aalborg Universitet Affine variety codes are better than their reputation Geil, Hans Olav; Martin, Stefano Published in: Proceedings of the 21st Symposium on Mathematical Theory of Networks and Systems

More information

Bounding the number of affine roots

Bounding the number of affine roots with applications in reliable and secure communication Inaugural Lecture, Aalborg University, August 11110, 11111100000 with applications in reliable and secure communication Polynomials: F (X ) = 2X 2

More information

Algebraic geometry codes from order domains

Algebraic geometry codes from order domains Algebraic geometry codes from order domains Olav Geil Department of Mathematical Sciences Aalborg University Abstract In this tutorial we introduce order domains and study the related codes. Special attention

More information

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes

Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be

More information

Evaluation Codes from Order Domain Theory

Evaluation Codes from Order Domain Theory Evaluation Codes from Order Domain Theory Henning E. Andersen and Olav Geil Department of Mathematical Sciences Aalborg University The celebrated Feng-Rao bound estimates the minimum distance of codes

More information

Generalization of the Lee-O Sullivan List Decoding for One-Point AG Codes

Generalization of the Lee-O Sullivan List Decoding for One-Point AG Codes arxiv:1203.6129v2 [cs.it] 5 Apr 2012 Generalization of the Lee-O Sullivan List Decoding for One-Point AG Codes Olav Geil Ryutaroh Matsumoto Diego Ruano April 5, 2012 Abstract We generalize the list decoding

More information

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower

Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth s second tower arxiv:5.0630v [cs.it] 9 Nov 05 Olav Geil, Stefano Martin, Umberto Martínez-Peñas, Diego Ruano Abstract Asymptotically

More information

ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES

ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES ON WEIERSTRASS SEMIGROUPS AND THE REDUNDANCY OF IMPROVED GEOMETRIC GOPPA CODES RUUD PELLIKAAN AND FERNANDO TORRES Appeared in: IEEE Trans. Inform. Theory, vol. 45, pp. 2512-2519, Nov. 1999 Abstract. Improved

More information

Semigroup Ideals and Generalized Hamming Weights

Semigroup Ideals and Generalized Hamming Weights Semigroup Ideals and Generalized Hamming Weights Maria Bras-Amorós CIMPA Research School Algebraic Methods in Coding Theory Ubatuba, July 3-7, 2017 Contents 1 Maximum integer not in an ideal Maximum integer

More information

Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases

Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases MM Research Preprints, 42 48 No. 16, April 1998. Beijing Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases Changyan Di, Zhuojun Liu Institute of Systems Science Academia Sinica, Beijing

More information

Asymptotically good sequences of codes and curves

Asymptotically good sequences of codes and curves Asymptotically good sequences of codes and curves Ruud Pellikaan Technical University of Eindhoven Soria Summer School on Computational Mathematics July 9, 2008 /k 1/29 Content: 8 Some algebraic geometry

More information

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding. Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,

More information

The extended coset leader weight enumerator

The extended coset leader weight enumerator The extended coset leader weight enumerator Relinde Jurrius Ruud Pellikaan Eindhoven University of Technology, The Netherlands Symposium on Information Theory in the Benelux, 2009 1/14 Outline Codes, weights

More information

Algebraic geometry codes

Algebraic geometry codes Algebraic geometry codes Tom Høholdt, Jacobus H. van Lint and Ruud Pellikaan In the Handbook of Coding Theory, vol 1, pp. 871-961, (V.S. Pless, W.C. Huffman and R.A. Brualdi Eds.), Elsevier, Amsterdam

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems

A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Alain Couvreur 1, Irene Márquez-Corbella 1, and Ruud Pellikaan 1 INRIA Saclay & LIX, CNRS UMR 7161 École Polytechnique,

More information

LET be the finite field of cardinality and let

LET be the finite field of cardinality and let 128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes HMC Algebraic Geometry Final Project Dmitri Skjorshammer December 14, 2010 1 Introduction Transmission of information takes place over noisy signals. This is the case in satellite

More information

Smooth models for Suzuki and Ree Curves

Smooth models for Suzuki and Ree Curves Smooth models for Suzuki and Ree Curves Abdulla Eid RICAM Workshop Algebraic curves over finite fields Linz, Austria, November 11-15, 2013 DL curves 1 / 35 Introduction Three important examples of algebraic

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n

ABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington

More information

Asymptotically good sequences of curves and codes

Asymptotically good sequences of curves and codes Asymptotically good sequences of curves and codes Ruud Pellikaan Appeared in in Proc 34th Allerton Conf on Communication, Control, and Computing, Urbana-Champaign, October 2-4, 1996, 276-285 1 Introduction

More information

Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes

Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes Cryptanalysis of the McEliece Public Key Cryptosystem Based on Polar Codes Magali Bardet 1 Julia Chaulet 2 Vlad Dragoi 1 Ayoub Otmani 1 Jean-Pierre Tillich 2 Normandie Univ, France; UR, LITIS, F-76821

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

arxiv: v1 [cs.it] 26 Apr 2007

arxiv: v1 [cs.it] 26 Apr 2007 EVALUATION CODES DEFINED BY PLANE VALUATIONS AT INFINITY C. GALINDO AND F. MONSERRAT arxiv:0704.3536v1 [cs.it] 26 Apr 2007 Abstract. We introduce the concept of δ-sequence. A δ-sequence generates a wellordered

More information

M3P23, M4P23, M5P23: COMPUTATIONAL ALGEBRA & GEOMETRY REVISION SOLUTIONS

M3P23, M4P23, M5P23: COMPUTATIONAL ALGEBRA & GEOMETRY REVISION SOLUTIONS M3P23, M4P23, M5P23: COMPUTATIONAL ALGEBRA & GEOMETRY REVISION SOLUTIONS (1) (a) Fix a monomial order. A finite subset G = {g 1,..., g m } of an ideal I k[x 1,..., x n ] is called a Gröbner basis if (LT(g

More information

The minimum distance of codes in an array coming from telescopic semigroups

The minimum distance of codes in an array coming from telescopic semigroups The minimum distance of codes in an array coming from telescopic semigroups Christoph Kirfel and Ruud Pellikaan in IEEE Transactions Information Theory, vol. 41, pp. 1720 1732, (1995) Abstract The concept

More information

MSRI-UP 2009 PROJECT TOPIC IDEAS. 1. Toric Codes. A first group of project topics deals with a class of codes known as toric codes.

MSRI-UP 2009 PROJECT TOPIC IDEAS. 1. Toric Codes. A first group of project topics deals with a class of codes known as toric codes. MSRI-UP 2009 PROJECT TOPIC IDEAS JOHN LITTLE COLLEGE OF THE HOLY CROSS 1 Toric Codes A first group of project topics deals with a class of codes known as toric codes General Background In [6], [7], J Hansen

More information

Math 40510, Algebraic Geometry

Math 40510, Algebraic Geometry Math 40510, Algebraic Geometry Problem Set 1, due February 10, 2016 1. Let k = Z p, the field with p elements, where p is a prime. Find a polynomial f k[x, y] that vanishes at every point of k 2. [Hint:

More information

4 Hilbert s Basis Theorem and Gröbner basis

4 Hilbert s Basis Theorem and Gröbner basis 4 Hilbert s Basis Theorem and Gröbner basis We define Gröbner bases of ideals in multivariate polynomial rings and see how they work in tandem with the division algorithm. We look again at the standard

More information

CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS

CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS CAYLEY-BACHARACH AND EVALUATION CODES ON COMPLETE INTERSECTIONS LEAH GOLD, JOHN LITTLE, AND HAL SCHENCK Abstract. In [9], J. Hansen uses cohomological methods to find a lower bound for the minimum distance

More information

Polynomials, Ideals, and Gröbner Bases

Polynomials, Ideals, and Gröbner Bases Polynomials, Ideals, and Gröbner Bases Notes by Bernd Sturmfels for the lecture on April 10, 2018, in the IMPRS Ringvorlesung Introduction to Nonlinear Algebra We fix a field K. Some examples of fields

More information

ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós

ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós Séminaires & Congrès 11, 2005, p. 21 28 ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP by Maria Bras-Amorós Abstract. In this work we study some objects describing the addition behavior of a numerical semigroup

More information

From Gauss. to Gröbner Bases. John Perry. The University of Southern Mississippi. From Gauss to Gröbner Bases p.

From Gauss. to Gröbner Bases. John Perry. The University of Southern Mississippi. From Gauss to Gröbner Bases p. From Gauss to Gröbner Bases p. From Gauss to Gröbner Bases John Perry The University of Southern Mississippi From Gauss to Gröbner Bases p. Overview Questions: Common zeroes? Tool: Gaussian elimination

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

Two-point codes on Norm-Trace curves

Two-point codes on Norm-Trace curves Two-point codes on Norm-Trace curves C. Munuera 1, G. C. Tizziotti 2 and F. Torres 2 1 Dept. of Applied Mathematics, University of Valladolid Avda Salamanca SN, 47012 Valladolid, Castilla, Spain 2 IMECC-UNICAMP,

More information

Error-correcting Pairs for a Public-key Cryptosystem

Error-correcting Pairs for a Public-key Cryptosystem Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and

More information

Lecture 15: Algebraic Geometry II

Lecture 15: Algebraic Geometry II 6.859/15.083 Integer Programming and Combinatorial Optimization Fall 009 Today... Ideals in k[x] Properties of Gröbner bases Buchberger s algorithm Elimination theory The Weak Nullstellensatz 0/1-Integer

More information

Algebraic Codes and Invariance

Algebraic Codes and Invariance Algebraic Codes and Invariance Madhu Sudan Harvard April 30, 2016 AAD3: Algebraic Codes and Invariance 1 of 29 Disclaimer Very little new work in this talk! Mainly: Ex- Coding theorist s perspective on

More information

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department

More information

Applications of Algebraic Geometric Codes to Polar Coding

Applications of Algebraic Geometric Codes to Polar Coding Clemson University TigerPrints All Dissertations Dissertations 5-015 Applications of Algebraic Geometric Codes to Polar Coding Sarah E Anderson Clemson University Follow this and additional works at: https://tigerprintsclemsonedu/all_dissertations

More information

Local correctability of expander codes

Local correctability of expander codes Local correctability of expander codes Brett Hemenway Rafail Ostrovsky Mary Wootters IAS April 4, 24 The point(s) of this talk Locally decodable codes are codes which admit sublinear time decoding of small

More information

Reversely Well-Ordered Valuations on Polynomial Rings in Two Variables

Reversely Well-Ordered Valuations on Polynomial Rings in Two Variables Reversely Well-Ordered Valuations on Polynomial Rings in Two Variables Edward Mosteig Loyola Marymount University Los Angeles, California, USA Workshop on Valuations on Rational Function Fields Department

More information

5 The existence of Gröbner basis

5 The existence of Gröbner basis 5 The existence of Gröbner basis We use Buchberger s criterion from the previous section to give an algorithm that constructs a Gröbner basis of an ideal from any given set of generators Hilbert s Basis

More information

Vector spaces. EE 387, Notes 8, Handout #12

Vector spaces. EE 387, Notes 8, Handout #12 Vector spaces EE 387, Notes 8, Handout #12 A vector space V of vectors over a field F of scalars is a set with a binary operator + on V and a scalar-vector product satisfying these axioms: 1. (V, +) is

More information

Problem Set 1 Solutions

Problem Set 1 Solutions Math 918 The Power of Monomial Ideals Problem Set 1 Solutions Due: Tuesday, February 16 (1) Let S = k[x 1,..., x n ] where k is a field. Fix a monomial order > σ on Z n 0. (a) Show that multideg(fg) =

More information

PREMUR Seminar Week 2 Discussions - Polynomial Division, Gröbner Bases, First Applications

PREMUR Seminar Week 2 Discussions - Polynomial Division, Gröbner Bases, First Applications PREMUR 2007 - Seminar Week 2 Discussions - Polynomial Division, Gröbner Bases, First Applications Day 1: Monomial Orders In class today, we introduced the definition of a monomial order in the polyomial

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

arxiv: v3 [cs.it] 16 Jul 2015

arxiv: v3 [cs.it] 16 Jul 2015 NEW QUANTUM CODES FROM EVALUATION AND MATRIX-PRODUCT CODES arxiv:1406.0650v3 [cs.it] 16 Jul 2015 CARLOS GALINDO, FERNANDO HERNANDO INSTITUTO UNIVERSITARIO DE MATEMÁTICAS Y APLICACIONES DE CASTELLÓN AND

More information

Code-Based Cryptography Error-Correcting Codes and Cryptography

Code-Based Cryptography Error-Correcting Codes and Cryptography Code-Based Cryptography Error-Correcting Codes and Cryptography I. Márquez-Corbella 0 1. Error-Correcting Codes and Cryptography 1. Introduction I - Cryptography 2. Introduction II - Coding Theory 3. Encoding

More information

POLYNOMIAL DIVISION AND GRÖBNER BASES. Samira Zeada

POLYNOMIAL DIVISION AND GRÖBNER BASES. Samira Zeada THE TEACHING OF MATHEMATICS 2013, Vol. XVI, 1, pp. 22 28 POLYNOMIAL DIVISION AND GRÖBNER BASES Samira Zeada Abstract. Division in the ring of multivariate polynomials is usually not a part of the standard

More information

On the BMS Algorithm

On the BMS Algorithm On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of

More information

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)

And for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x) Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials

More information

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y]

Lecture 1. (i,j) N 2 kx i y j, and this makes k[x, y] Lecture 1 1. Polynomial Rings, Gröbner Bases Definition 1.1. Let R be a ring, G an abelian semigroup, and R = i G R i a direct sum decomposition of abelian groups. R is graded (G-graded) if R i R j R i+j

More information

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016

MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 MATH/MTHE 406 Homework Assignment 2 due date: October 17, 2016 Notation: We will use the notations x 1 x 2 x n and also (x 1, x 2,, x n ) to denote a vector x F n where F is a finite field. 1. [20=6+5+9]

More information

(II.B) Basis and dimension

(II.B) Basis and dimension (II.B) Basis and dimension How would you explain that a plane has two dimensions? Well, you can go in two independent directions, and no more. To make this idea precise, we formulate the DEFINITION 1.

More information

Algebraic Feedback Shift Registers Based on Function Fields

Algebraic Feedback Shift Registers Based on Function Fields Algebraic Feedback Shift Registers Based on Function Fields Andrew Klapper 1 University of Kentucky Department of Computer Science, 779 A Anderson Hall Lexington, KY 40506-0046, USA klapper@cs.uky.edu

More information

Lecture 2: Gröbner Basis and SAGBI Basis

Lecture 2: Gröbner Basis and SAGBI Basis Lecture 2: Gröbner Basis and SAGBI Basis Mohammed Tessema Suppose we have a graph. Suppose we color the graph s vertices with 3 colors so that if the vertices are adjacent they are not the same colors.

More information

1 Hilbert function. 1.1 Graded rings. 1.2 Graded modules. 1.3 Hilbert function

1 Hilbert function. 1.1 Graded rings. 1.2 Graded modules. 1.3 Hilbert function 1 Hilbert function 1.1 Graded rings Let G be a commutative semigroup. A commutative ring R is called G-graded when it has a (weak direct sum decomposition R = i G R i (that is, the R i are additive subgroups,

More information

Lesson 14 Properties of Groebner Bases

Lesson 14 Properties of Groebner Bases Lesson 14 Properties of Groebner Bases I. Groebner Bases Yield Unique Remainders Theorem Let be a Groebner basis for an ideal, and let. Then there is a unique with the following properties (i) No term

More information

Math 4370 Exam 1. Handed out March 9th 2010 Due March 18th 2010

Math 4370 Exam 1. Handed out March 9th 2010 Due March 18th 2010 Math 4370 Exam 1 Handed out March 9th 2010 Due March 18th 2010 Problem 1. Recall from problem 1.4.6.e in the book, that a generating set {f 1,..., f s } of I is minimal if I is not the ideal generated

More information

c 2010 by Radoslav Mihailov Kirov. All rights reserved.

c 2010 by Radoslav Mihailov Kirov. All rights reserved. c 2010 by Radoslav Mihailov Kirov. All rights reserved. IMPROVED BOUNDS FOR CODES AND SECRET SHARING SCHEMES FROM ALGEBRAIC CURVES BY RADOSLAV MIHAILOV KIROV DISSERTATION Submitted in partial fulfillment

More information

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 27 January. Gröbner bases Gröbner bases In this lecture we introduce Buchberger s algorithm to compute a Gröbner basis for an ideal, following [2]. We sketch an application in filter design. Showing the termination of Buchberger

More information

Attacks in code based cryptography: a survey, new results and open problems

Attacks in code based cryptography: a survey, new results and open problems Attacks in code based cryptography: a survey, new results and open problems J.-P. Tillich Inria, team-project SECRET April 9, 2018 1. Code based cryptography introduction Difficult problem in coding theory

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

A finite universal SAGBI basis for the kernel of a derivation. Osaka Journal of Mathematics. 41(4) P.759-P.792

A finite universal SAGBI basis for the kernel of a derivation. Osaka Journal of Mathematics. 41(4) P.759-P.792 Title Author(s) A finite universal SAGBI basis for the kernel of a derivation Kuroda, Shigeru Citation Osaka Journal of Mathematics. 4(4) P.759-P.792 Issue Date 2004-2 Text Version publisher URL https://doi.org/0.890/838

More information

Proof: Let the check matrix be

Proof: Let the check matrix be Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information

Bases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places

Bases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places Clemson University TigerPrints All Dissertations Dissertations 12-2011 Bases and applications of Riemann-Roch Spaces of Function Fields with Many Rational Places Justin Peachey Clemson University, jpeache@clemson.edu

More information

Letterplace ideals and non-commutative Gröbner bases

Letterplace ideals and non-commutative Gröbner bases Letterplace ideals and non-commutative Gröbner bases Viktor Levandovskyy and Roberto La Scala (Bari) RWTH Aachen 13.7.09, NOCAS, Passau, Niederbayern La Scala, Levandovskyy (RWTH) Letterplace ideals 13.7.09

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

Codes over Subfields. Chapter Basics

Codes over Subfields. Chapter Basics Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing

More information

Lecture notes on coding theory

Lecture notes on coding theory Lecture notes on coding theory Raymond van Bommel Curves over finite fields, Autumn 2017, Leiden 1 Introduction When one agent tries to transfer information to another agent through a noisy channel, errors

More information

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY

ADVANCED TOPICS IN ALGEBRAIC GEOMETRY ADVANCED TOPICS IN ALGEBRAIC GEOMETRY DAVID WHITE Outline of talk: My goal is to introduce a few more advanced topics in algebraic geometry but not to go into too much detail. This will be a survey of

More information

Finite Fields and Their Applications

Finite Fields and Their Applications Finite Fields and Their Applications 18 (2012) 865 885 Contents lists available at SciVerse ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa Delta sets for divisors supported

More information

Quantum codes from two-point Hermitian codes

Quantum codes from two-point Hermitian codes Clemson University TigerPrints All Theses Theses 8-2010 Quantum codes from two-point Hermitian codes Justine Hyde-volpe Clemson University, jchasma@clemson.edu Follow this and additional works at: https://tigerprints.clemson.edu/all_theses

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

Linear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this:

Linear Algebra. F n = {all vectors of dimension n over field F} Linear algebra is about vectors. Concretely, vectors look like this: 15-251: Great Theoretical Ideas in Computer Science Lecture 23 Linear Algebra Linear algebra is about vectors. Concretely, vectors look like this: They are arrays of numbers. fig. by Peter Dodds # of numbers,

More information

Outline. Linear maps. 1 Vector addition is commutative: summands can be swapped: 2 addition is associative: grouping of summands is irrelevant:

Outline. Linear maps. 1 Vector addition is commutative: summands can be swapped: 2 addition is associative: grouping of summands is irrelevant: Outline Wiskunde : Vector Spaces and Linear Maps B Jacobs Institute for Computing and Information Sciences Digital Security Version: spring 0 B Jacobs Version: spring 0 Wiskunde / 55 Points in plane The

More information

I. Duality. Macaulay F. S., The Algebraic Theory of Modular Systems, Cambridge Univ. Press (1916);

I. Duality. Macaulay F. S., The Algebraic Theory of Modular Systems, Cambridge Univ. Press (1916); I. Duality Macaulay F. S., On the Resolution of a given Modular System into Primary Systems including some Properties of Hilbert Numbers, Math. Ann. 74 (1913), 66 121; Macaulay F. S., The Algebraic Theory

More information

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9

MATH3302 Coding Theory Problem Set The following ISBN was received with a smudge. What is the missing digit? x9139 9 Problem Set 1 These questions are based on the material in Section 1: Introduction to coding theory. You do not need to submit your answers to any of these questions. 1. The following ISBN was received

More information

Toric Varieties in Coding Theory. Math in the Mountains Tutorial

Toric Varieties in Coding Theory. Math in the Mountains Tutorial Toric Varieties in Error-Control Coding Theory Math in the Mountains Tutorial Department of Mathematics and Computer Science College of the Holy Cross July 29-31, 2013 A bit of history Beginning of coding

More information

Skew cyclic codes: Hamming distance and decoding algorithms 1

Skew cyclic codes: Hamming distance and decoding algorithms 1 Skew cyclic codes: Hamming distance and decoding algorithms 1 J. Gómez-Torrecillas, F. J. Lobillo, G. Navarro Department of Algebra and CITIC, University of Granada Department of Computer Sciences and

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this

More information

Polytopes and Algebraic Geometry. Jesús A. De Loera University of California, Davis

Polytopes and Algebraic Geometry. Jesús A. De Loera University of California, Davis Polytopes and Algebraic Geometry Jesús A. De Loera University of California, Davis Outline of the talk 1. Four classic results relating polytopes and algebraic geometry: (A) Toric Geometry (B) Viro s Theorem

More information

MATH 167: APPLIED LINEAR ALGEBRA Chapter 2

MATH 167: APPLIED LINEAR ALGEBRA Chapter 2 MATH 167: APPLIED LINEAR ALGEBRA Chapter 2 Jesús De Loera, UC Davis February 1, 2012 General Linear Systems of Equations (2.2). Given a system of m equations and n unknowns. Now m n is OK! Apply elementary

More information

Applications of results from commutative algebra to the study of certain evaluation codes

Applications of results from commutative algebra to the study of certain evaluation codes Applications of results from commutative algebra to the study of certain evaluation codes Cícero Carvalho 1. Introduction This is the text of a short course given at the meeting CIMPA School on Algebraic

More information

ERROR CORRECTING CODES

ERROR CORRECTING CODES ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A

More information

Two-Point Codes for the Generalized GK Curve

Two-Point Codes for the Generalized GK Curve Two-Point Codes for the Generalized GK Curve Elise Barelli, Peter Beelen, Mrinmoy Datta, Vincent Neiger, Johan Rosenkilde To cite this version: Elise Barelli, Peter Beelen, Mrinmoy Datta, Vincent Neiger,

More information

The generic Gröbner walk

The generic Gröbner walk The generic Gröbner walk K. Fukuda, A. N. Jensen, N. Lauritzen, R. Thomas arxiv:math/0501345v1 [math.ac] 21 Jan 2005 February 28, 2008 Abstract The Gröbner walk is an algorithm for conversion between Gröbner

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network

More information

A decoding algorithm for binary linear codes using Groebner bases

A decoding algorithm for binary linear codes using Groebner bases A decoding algorithm for binary linear codes using Groebner bases arxiv:1810.04536v1 [cs.it] 9 Oct 2018 Harinaivo ANDRIATAHINY (1) e-mail : hariandriatahiny@gmail.com Jean Jacques Ferdinand RANDRIAMIARAMPANAHY

More information

Math 550 Notes. Chapter 2. Jesse Crawford. Department of Mathematics Tarleton State University. Fall 2010

Math 550 Notes. Chapter 2. Jesse Crawford. Department of Mathematics Tarleton State University. Fall 2010 Math 550 Notes Chapter 2 Jesse Crawford Department of Mathematics Tarleton State University Fall 2010 (Tarleton State University) Math 550 Chapter 2 Fall 2010 1 / 20 Linear algebra deals with finite dimensional

More information

Computing syzygies with Gröbner bases

Computing syzygies with Gröbner bases Computing syzygies with Gröbner bases Steven V Sam July 2, 2008 1 Motivation. The aim of this article is to motivate the inclusion of Gröbner bases in algebraic geometry via the computation of syzygies.

More information

On the minimal free resolution of a monomial ideal.

On the minimal free resolution of a monomial ideal. On the minimal free resolution of a monomial ideal. Caitlin M c Auley August 2012 Abstract Given a monomial ideal I in the polynomial ring S = k[x 1,..., x n ] over a field k, we construct a minimal free

More information

Presentation 1

Presentation 1 18.704 Presentation 1 Jesse Selover March 5, 2015 We re going to try to cover a pretty strange result. It might seem unmotivated if I do a bad job, so I m going to try to do my best. The overarching theme

More information

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May

Coding Theory. Ruud Pellikaan MasterMath 2MMC30. Lecture 11.1 May Coding Theory Ruud Pellikaan g.r.pellikaan@tue.nl MasterMath 2MMC30 /k Lecture 11.1 May 12-2016 Content lecture 11 2/31 In Lecture 8.2 we introduced the Key equation Now we introduce two algorithms which

More information

CHAPTER 5. Higher Order Linear ODE'S

CHAPTER 5. Higher Order Linear ODE'S A SERIES OF CLASS NOTES FOR 2005-2006 TO INTRODUCE LINEAR AND NONLINEAR PROBLEMS TO ENGINEERS, SCIENTISTS, AND APPLIED MATHEMATICIANS DE CLASS NOTES 2 A COLLECTION OF HANDOUTS ON SCALAR LINEAR ORDINARY

More information