Bounds and spectrum results in Galois geometry and coding theory. Eötvös Loránd University

Size: px
Start display at page:

Download "Bounds and spectrum results in Galois geometry and coding theory. Eötvös Loránd University"

Transcription

1 Synopsis of the Ph.D. thesis Bounds and spectrum results in Galois geometry and coding theory Szabolcs Levente Fancsali Eötvös Loránd University Institute of Mathematics Doctoral School: Mathematics Director: Miklós Laczkovich Doctoral Program: Applied Mathematics Director: György Michaletzky Supervisor: Péter Sziklai Department of Computer Science Eötvös Loránd University 2011

2 Budapest, 29th May 2011

3 1 In my Ph.D. thesis, I discuss some spectrum results in Galois geometries. Here, spectrum usually means the set of possible sizes of a special set having a nice (or almost nice ) structure. Notation In my dissertation, p always denotes an arbitrary prime and q = p n (n 1) always denotes an arbitrary prime power (that can also be a prime). GF(q) denotes the finite field with q elements, and F can denote an arbitrary field (or also a Euclidean ring). PG(d, q) denotes the projective Galois geometry of dimension d over the finite field GF(q). AG(d,q) denotes the affine geometry of dimension d over GF(q) that corresponds to the co-ordinate space GF(q) d of rank d over GF(q). 1. Linear sets Definition (Affine linear set). A GF(s)-linear affine set is the GF(s)-linear span of some vectors in AG(n,q) = GF(s log s q ) n = GF(s) nlog s q (or possibly a translate of such a span). The rank of the affine linear set is the rank of this span over GF(s). The affine space AG(n,q) and its ideal hyperplane Π = PG(n 1,q) of directions together constitute a projective space PG(n,q). We say that the point P Π is a direction determined by the affine set U AG(n,q) if there exists at least one line through P that meets U in at least two points. Definition (Projective linear set). A projective GF(s)-linear set B of rank d + 1 is a projected image of the canonical subgeometry PG(d,s) PG(d,s n log s q ) from a center disjoint to this subgeometry. The projection can yield multiple points. Proposition 1.3. Suppose that U is an affine GF(s)-linear set of rank d+1 in AG(n,q) and let D denote the set of directions determined by U. The set U D is a projective GF(s)-linear set of rank d + 1 in PG(n,q) and all the multiple points are in D. The proposition above says that the set of directions determined by an affine linear set is a projective linear set. The converse of this proposition is also true: each projective linear set is a direction set. Theorem 1.6. Embed PG(n, q) into PG(n+1, q) as the ideal hyperplane and let AG(n+ 1,q) = PG(n+1,q) \ PG(n,q) denote the affine part. For each projective GF(s)-linear set D of rank d + 1 in PG(n,q), there exists an affine GF(q)-linear set U of rank d + 1 in AG(n+1,q) such that the set of directions determined by U is D. Definition (Club). Let L = PG(1,q h ) be a line of the projective plane PG(2,q h ), h 2. Let C denote a set of q points in the line L. We say that C is a club of L if there exists a subplane = PG(2,q) of order q in PG(2,q h ), and there exists a point C on an extended line of but not in, such that C is the projected image of onto L from the center C.

4 2 By this projection, C has a special ( multiple ) point H called the head of the club, which is the projected image of the line of whose extension contains the center of projection. From now on, by a subline (without any attribute) we always mean a PG(1,q) contained in L. Definition (Regular and irregular sublines). A subline completely contained in the club C will be called regular (according to this particular construction) if it is the image of a line of. The sublines completely contained by the club C that cannot be got as an image of any subline of will be called irregular or deviant (according to this particular construction). Proposition & Let l be a subline of order q (and let an arbitrary construction of the club C be fixed). If the intersection l C contains the head of the club C and two other points of C, then l must be a regular subline of the club. If l C contains four (non-head) points, then l must be completely contained in the club C. If the club C is not equal to a subline PG(1,q 2 ) of order q 2 (that automatically holds when h is odd), then each subline completely contained by the club C is regular according to each possible construction of the club. If the club C equals to a subline PG(1,q 2 ) of order q 2 then the club, with the (regular and deviant) sublines it contains, forms a Moebius plane. I.e. for any 3 points of C there is a unique subline containing them, and this subline is contained in C as well. Corollary A club and a subline intersect in 0, 1, 2, 3 or q + 1 points. 2. Directions determined by less than q points If U denotes an arbitrary set of points in the affine plane AG(2,q) then we say that the set { } b d D = a c (a,b), (c,d) U, (a,b) (c,d) is the set of directions determined by U. We define a 0 as if a 0, thus D l = GF(q) { }. Definition. If y D, then let s(y) denote the greatest power of p such that each line l of direction y meets U in zero modulo s(y) points. In other words, s(y) = gcd ({ l U l l = {y} } { p h}). Let s be the greatest power of p such that each line l of direction in D meets U in zero modulo s points. In other words, s = gcd s(y) = min s(y) y D y D Note that s(y) and thus also s might equal to 1.

5 3 Theorem 1.17 (Blokhuis, Ball, Brouwer, Storme and Szőnyi; Ball). Let U = q and / D. Using the notation s defined above, one of the followings holds: either s = 1 and q D q + 1; or GF(s) is a subfield of GF(q) and q s + 1 D q 1 s 1 ; or s = q and D = 1. Moreover, if s > 2 then U is a GF(s)-linear affine set (of rank log s q). Using the pigeon hole principle, one can easily prove that if U > q then it determines all the q+1 directions. So we can restrict our research to affine sets of less than q points. Notation. Let U be a set of less than q affine points in AG(2,q) and let D denote the set of directions determined by U. Let n = U and let R(X,Y ) be the inhomogeneous affine Rédei polynomial of the affine set U, that is, R(X,Y ) = (a,b) U n 1 (X + ay + b) = X n + σ n i (Y )X i where the abbreviation σ k (Y ) means the k-th elementary symmetric polynomial of the set {ay + b (a,b) U} of linear polynomials. Proposition If y D then R(X,y) GF(q)[X s(y) ] \ GF(q)[X p s(y) ]. If y / D then R(X,y) X q X. Notation. Let F be the polynomial ring GF(q)[Y ] and consider R(X,Y ) as the element of the univariate polynomial ring F[X]. Divide X q X by R(X,Y ) as a univariate polynomial over F and let Q denote the quotient and let H + X be the negative of the remainder. So Q(X,Y ) = (X q X) div R(X,Y ) over F X H(X,Y ) (X q X) mod R(X,Y ) over F q 1 R(X,Y )Q(X,Y ) = X q + H(X,Y ) = X q + X q 1 i h i (Y ) where deg X H < deg X R. Let σ denote the coefficients of Q, and so Q(X,Y ) = X q n + h j (Y ) = q n 1 σ q n i(y )X i j σ i (Y )σj i(y )

6 4 Proposition If y D then Q(X,y),H(X,y) GF(q)[X s(y) ] and if deg R deg Q then Q(X,y) GF(q)[X s(y) ] \ GF(q)[X p s(y) ]. If y / D then R(X,y)Q(X,y) = X q + H(X,y) = X q X. In this case Q(X,y) is also a totally reducible polynomial. Definition. Suppose that D 2. For each y D, let t(y) denote the maximal power of p such that H(X,y) = f y (X) t(y) for some f y (X) / GF(q)[X p ]. H(X,y) GF(q)[X t(y) ] \ GF(q)[X t(y)p ] Let t be the greatest common divisor of the numbers t(y). t = gcd t(y) = min t(y). y D y D If H(X,y) a (i.e. D = {y}) then we define t = t(y) = q. Proposition Using the notation above, R(X,Y )Q(X,Y ) = X q + H(X,Y ) Span F 1,X,X t,x 2t,X 3t,...,X q. Theorem Let U AG(2,q) be an arbitrary set of points and let D denote the directions determined by U. We use the notation s and t defined above geometrically and algebraically, respectively. Suppose that D. One of the followings holds: either D = { } and s t = q, U 1 U 1 or D > 1 and + 2 D t + 1 s 1 If s = 1 then the upper bound is q Maximal partial 2-spreads and s t < q. A set of t-dimensional subspaces partitioning the points of PG(m,q) is called a t- spread. If t = 1 or t = 2 one may call it a line-spread or plane-spread, respectively. A partial t-spread in PG(m, q) is a set of pairwise disjoint t-dimensional subspaces. A partial t-spread is maximal if it is not contained in a larger partial t-spread. There exists a t-spread in PG(m,q) if and only if t+1 is a divisor of m+1. In this case one can define the deficiency of a partial t-spread of PG(m,q) which is the difference of the cardinalities of a t-spread and the partial t-spread considered. We constructed maximal partial plane-spreads of various deficiencies and we get the following results. Theorem If q 16 then there exist maximal partial 2-spreads in PG(8,q) of deficiency δ = (k 1)q 2 where 1 k min { q 4 48 q 2 (log q + 1 4), q 2 + q + 1 }. Theorem There exist maximal partial 2-spreads in PG(8, q) of deficiency δ = k q 2 + l (q 2 1) + 1, where k + l q 2.

7 5 Theorem There exist maximal partial 2-spreads in PG(8, q) of deficiency δ = (k+1) q 2 + l (q 2 1) + m (q 2 2) + 1, where k + l + m q 2. Our fourth construction produces a partial 2-spread of various deficiencies. Theorem In PG(3m 1,q), m 4, there are maximal partial 2-spreads of deficiency δ = ( x (k x 1) + y k y + z (k z + 1) ) q 2 + ( ) y l y + z l z (q 2 1) + z m z (q 2 2) + { y + z, where k x q 2 + q + 1, k y + l y } q 2, k z + l z + m z q 2 and x + y + z max q 2 q 3(m 2) 1, q2 3 (3m 7) log q. q 3 1 q Multiple blocking sets and the Griesmer Bound A q-ary linear code C of length n, dimension k and minimum distance d, is a rank-k subspace of GF(q) n in which the Hamming distance between any two distinct vectors is at least d. If the dual minimum distance of the code C is at least three then the linear code C is called a projective code. Definition (Multiple blocking set). A t-fold blocking set with respect to the hyperplanes of PG(k 1,q) is a set of points B with the property that every hyperplane is incident with at least t points of B. A projective code of length n, dimension k and minimum distance d corresponds to a t-fold blocking set with respect to the hyperplanes of PG(k 1,q), where t = qk 1 1 q 1 n+d. Definition (Notation). Let q (t) denote the maximum number such that a t-fold blocking set in PG(2,q) has at least t(q + 1) + q (t) points. Griesmer bound. A k-dimensional projective code of minimum distance d has length n at least the Griesmer bound, k 1 d n g(k,d) := Definition (Bracket notation). If (s n,...,s 1 ) is an arbitrary n-tuple then let the expression θ q [s n,...,s 1 ] mean the following sum q i. θ q [s n,...,s 1 ] = n i=1 s i q i 1 q 1. Theorem & If B PG(δ,q) is a t = θ q [t δ 2,...,t 0 ]-fold blocking set with respect to hyperplanes such that there exists a t-secant hyperplane Π < PG(δ,q) then δ 2 B θ q [t δ 2,...,t 1,t 0, 0] = qt + t i

8 6 Let B PG(δ,q) be a t-fold blocking set with respect to hyperplanes such that there exists a t-secant hyperplane. If t δ 4,...,t 1,t 0 q 1 and t δ 2 1 and t δ 3 q (t δ 2 ) 1 then k 2 B θ q [t δ 2,...,t 1,t 0,q] = qt + t i + q. In what follows we assume that θ q [t δ 2,...,t 2,t 1 + 1] = t and θ q [t δ 2,...,t 2 ] = 0 if δ = 3. Theorem Let δ 3 and suppose that B PG(δ,p) is a t-fold blocking set with respect to hyperplanes and that t 0 1. If there exists a θ q [t δ 2,...,t 2,t 1 + 1]-secant (δ 2)-dimensional subspace, contained in a t-secant hyperplane but not contained in any hyperplane incident with at least p+t points of B, then δ 2 { } p + 1 B pt + t i + min 2,p t 0. Finally, we translate these results into their corresponding results in terms of linear codes meeting the Griesmer bound. Theorem Let C be a k-dimensional linear code over GF(p) with minimum distance d < p k 1 which meets the Griesmer bound. Suppose there are codewords m 1,...,m m, where 2 m k 2, with the property that for j = 1,...,m 1 j j 1 supp(m i ) = d and If any of the following occurs, i=1 p i m m 1 supp(m i ) = d + 1. i=1 (1) p m 2 does not divide d and d m 2 max( p 1 2,p d m 1 1) and d m 2 p 1; (2) p m 2 does not divide d and d m 2 = p 1 and d m 1 p 1; (3) p m 2 divides d and d m 2 max( p+1 2,p d m 1); (4) p m 2 divides d and d m 2 = 0 and d m 1 0; then there is a codeword in Span m 1,...,m m of weight at least d + p. p i 5. Small weight codewords We define the incidence matrix A = [a ij ] of the projective plane PG(2,q), q = p h, p prime, h 1, as the matrix whose rows are indexed by lines of the plane and whose columns are indexed by points of the plane, and with entry a ij = { 1 if point j belongs to line i, 0 otherwise.

9 7 The p-ary code C of the projective plane PG(2,q), q = p h, p prime, h 1, is the GF(p)-span of the rows of the incidence matrix A. { } C = wa w GF(p) q2 +q+1 In [7], it is proven that the scalar multiples of the incidence vectors of the lines are the only codewords of minimal weight q + 1 in the code arising from PG(2,q). Kevin L. Chouinard [8] proved that for the code arising from PG(2,p), p prime, there are no codewords of weight in the interval [p + 2, 2p 1] and that the only codewords of weight 2p are the scalar multiples of the differences of the incidence vectors of two distinct lines. We prove the same result for q = p 3 where p is prime. Theorem 4.9. In the p-ary linear code of PG(2,p 3 ), p prime, p 7, there are no codewords with weight in the interval [p 3 + 2, 2p 3 1]. In general we can prove weaker results. Theorem The p-ary linear code C arising from to the plane PG(2,q 3 0), q 0 = p h, p 7 prime, h 1, does not have codewords of weight q q or of weight q q q 0 + 1; and if q 0 is a square, C has no codewords of weight q q 3/ We know that a codeword m with weight in the interval [q + 2, 2q 1] defines a minimal blocking set of PG(2,q), q = p h, p prime, h 1, intersecting every line in 1 (mod p) points. We wish to exclude as many values as possible as weights for the codewords in the general case q = p h, with p prime, h 4. Consider a minimal blocking set B of size B < 2q in PG(2,q), q = p h, p prime, h 1, intersecting every line in 1 (mod p e ) points, with e the maximal integer for which this is true. Let p e = E. Theorem There are no codewords with weight in [ 3 2 q, 2q 1] in the p-ary linear code of PG(2,q), q = p h, corresponding to a minimal blocking set intersecting every line in 1 (mod E) points when E = p e 4. Theorem When B is a minimal blocking set in PG(2,q = p h ), p prime, h 1, of size B 2q 1, intersecting every line in 1 (mod p e ) points with e the maximal integer for which this is valid, then for large prime numbers p, q B q + a 0 p + a q e 1 p + + a h/e 2p e + 1, 2e with a i the i-th Motzkin number. 6. Network coding A communication network consists of a finite directed graph G = (V, E) with source node s V and sink nodes t 1,...,t k V, such that information (one element of a given field GF(q) in every time step) can be sent noiselessly via all e E. Our aim is to

10 8 send a message m GF(q) d of length d via the network. The multicast network coding problem for a given communication network and message length is to give functions f e : GF(q) (e) GF(q) for all edge e E (where (e) denotes the in-degree of the tail of the edge e), such that the character sent on the edge e = (u,v) is the value of f e applied to the incoming characters of u = Tail(e), and every sink node t i must be able to recover the original message m from its incoming characters. Definition (Linear network). Let G = (V, E) be a directed graph and let Φ : E U be a function such that each co-vector Φ(e) U is the linear combination of the co-vectors {Φ(f) f E : Head(f) = Tail(e)} and for each cut C E the set {Φ(e) e C} U is a generator system of U. Then the pair (G, Φ) is a linear network. Let (G, Φ) be a linear network. Consider the problem of security against a wire-tap adversary who can eavesdrop k fixed edges. The idea of secure network coding is that the source mixes the original message with some random noise, such that the mutual information between the original message and the eavesdropped characters is zero. Adversaries. The adversary who eavesdrops the edges {e 1,...,e k } E can be represented by the linear operator A = [ Φ(e 1 ),...,Φ(e k ) ] Hom ( U, GF(q) k). Adversary A knows exactly that in which translate of kera = {Φ(e 1 ),...,Φ(e k )} U the message m U lies. Source process. Let Σ be a finite alphabet (or vocabulary). The source stochastic process is a series X = ( X 1,...,X T ) of Σ-valued probability variables. Our aim is to give a correspondence between Σ and U such that certain wire-tap adversaries cannot get any information about the source process; but each sink node can recover the whole original source process. Encryption and decryption. Let be another finite alphabet (or vocabulary) and let the random noise be the stochastic process W = ( W 1,...,W T ) of -valued probability variables. Definition (Encryption). The pair of functions Enc : Σ U and Dec : U Σ is called an encryption system or briefly an encryption from Σ to U, if Dec(Enc(σ, δ)) = σ. If the mutual information I ( Y(A);X ) = 0 for each matrix A consisting of k elements of RanΦ then the encryption system is called a k-encryption. Corollary 5.8. Let K = min{ ker A A A}. If the encryption system makes the source process secure against each adversary in A, then Σ K. We know that K = q d k where k = max{ranka A A} and d = rank U. Thus, the inequality above yields the upper bound m = log q Σ d k.

11 9 Definition. We call an encryption optimal if Σ = K; (using the notation above) let the number δ = rank U log q Σ k = d m k be called the deficiency of a k-encryption (of Σ into U). Definition (Linear encryption). If the encryption function is linear in its first variable then the encryption is called linear encryption. If Σ can be coordinatized (or recoordinatized ) such that the encryption becomes linear then we say that this encryption is an essentially linear encryption. Of course, a linear encryption is essentially linear as well. Definition. A universal k-encryption of Σ into U is a pair of an encryption and decryption function such that for every linear network coding Φ : E U and for every adversary A, with ranka = k, the mutual information I ( Y(A);X ) is zero. Theorem Let G = (V,E) be a network and let U = GF(q) d be a vector space such that there exist linear network codings for G using U. For any Σ ( Σ 2) and for any k {1,..., d 1}, there does not exist universal k-encryption from Σ to U. Now suppose that both the communication network G = (V,E) and the linear coding Φ : E U are given. Let δ k denote the minimal deficiency of all the uniform linear k-encryptions in the given linear network (G, Φ). Since the deficiency δ of a k-encryption is less than rank U k, let the cases δ k d k mean linear k-encryption does not exist. Let K k denote K k = Span(f1,...,f k). f1,...,f k RanΦ Let the linear space U coordinatize the projective space PG(d 1,q) and let K k be considered as a projective point set in PG(d 1,q), so K 1 is the projective point set coordinatized by RanΦ. Let R = {P(f ) f RanΦ} = K 1, where P(f ) denotes the projective point coordinatized by the vector f. Theorem The minimal possible deficiency δ k is equal to d k r if and only if K k meets each projective subspace of dimension r but there exists at least one projective subspace of dimension (r 1) disjoint from K k. A subset H of points of PG(d 1,q) is called a blocking set with respect to hyperplanes iff H meets every hyperplane of PG(d 1,q) in at least one point. Proposition There exists an optimal linear 1-encryption using uniform noise if and only if the projective point set coordinatized by RanΦ U is not a blocking set w.r.t. projective hyperplane of U. Proposition If there exists linear k-encryption of deficiency δ for k 2 then R qk+δ 1 q 1.

12 10 Corollary If there exists optimal linear k-encryption for k 2, then R qk 1 q 1. Remember that K k is a generator system and is a union of some projective subspaces of dimension k 1. Moreover, K k is a blocking set with respect to projective subspaces of dimension d k δ k. Sometimes we can suppose that K k does not contain projective subspace of dimension k. These facts explain the following Proposition Let s = δ+1 k. If ( R k) q δ s k+1 s j=0 qj k then there exists a uniform linear k-encryption of deficiency δ, especially if ( R k) q then there exists an optimal uniform linear k-encryption. As a consequence of this proposition we can get a bound for the size of the field similar to Feldman et al. [9]. Corollary If R k δ+1 < q then there exists a uniform linear k-encryption of deficiency δ. Proposition If k j=0 ( R j) (q 1) j < q k+1 then there exists an optimal linear k-encryption. Corollary ( R k) k + 1 < q then there exists an optimal uniform linear k- encryption. The Ph.D. thesis is based on [1] S. Ball and Sz. L. Fancsali Multiple blocking sets in finite projective spaces and improvements to the Griesmer bound for linear codes. Des. Codes Cryptogr. 53, 2 (2009), [2] V. Fack, Sz. L. Fancsali, L. Storme, G. Van de Voorde and J. Winne Small weight codewords in the codes arising from Desarguesian projective planes. Des. Codes Cryptogr. 46, 1 (2008), [3] Sz. L. Fancsali and P. Ligeti Some applications of finite geometry for secure network coding. J. Math. Cryptol. 2, 3 (2008), [4] Sz. L. Fancsali and P. Sziklai About maximal partial 2-spreads in PG(3m 1,q). Innov. Incidence Geom. 4 (2006), [5] Sz. L. Fancsali and P. Sziklai Description of the clubs. Ann. Univ. Sci. Budapest. Eötvös Sect. Math. 51 (2008), (2009). [6] Sz. L. Fancsali, P. Sziklai and M. Takáts The number of directions determined by less than q points. Submitted to the J. Algebraic Combin. Further references [7] E. F. Assmus, Jr. and J. D. Key Designs and their codes, vol. 103 of Cambridge Tracts in Mathematics. Cambridge University Press, Cambridge, [8] K. L. Chouinard Weight distributions of codes from planes. Ph.D. thesis, University of Virginia, [9] J. T. M. Feldman, C. Stein and R. A. Servedio On the capacity of secure network coding. In Proc. 42nd Annual Allerton Conference on Communication, Control and Computing (2004).

The number of directions determined by less than q points

The number of directions determined by less than q points The number of directions determined by less than q points arxiv:1407.5638v1 [math.co] 21 Jul 2014 Szabolcs L. Fancsali, Péter Sziklai and Marcella Takáts February 28, 2012 NOTICE: this is the author s

More information

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q)

Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) Codewords of small weight in the (dual) code of points and k-spaces of P G(n, q) M. Lavrauw L. Storme G. Van de Voorde October 4, 2007 Abstract In this paper, we study the p-ary linear code C k (n, q),

More information

About Maximal Partial 2-Spreads in PG(3m 1, q)

About Maximal Partial 2-Spreads in PG(3m 1, q) Innovations in Incidence Geometry Volume 00 (XXXX), Pages 000 000 ISSN 1781-6475 About Maximal Partial 2-Spreads in PG(3m 1, q) Sz. L. Fancsali and P. Sziklai Abstract In this article we construct maximal

More information

On the structure of the directions not determined by a large affine point set

On the structure of the directions not determined by a large affine point set On the structure of the directions not determined by a large affine point set Jan De Beule, Peter Sziklai, and Marcella Takáts January 12, 2011 Abstract Given a point set U in an n-dimensional affine space

More information

Linear Point Sets and Rédei Type k-blocking

Linear Point Sets and Rédei Type k-blocking Journal of Algebraic Combinatorics 14 (2001), 221 228 c 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Linear Point Sets and Rédei Type k-blocking Sets in PG(n, q) L. STORME ls@cage.rug.ac.be

More information

Lacunary polynomials and finite geometry

Lacunary polynomials and finite geometry Tamás Szőnyi ELTE, CAI HAS June 24th, 2013, Lille, France Fully reducible, and lacunary polynomials Definition A polynomial over a field F is called fully reducible if it factors into linear factors over

More information

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction

ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR SIMEON BALL, AART BLOKHUIS, ANDRÁS GÁCS, PETER SZIKLAI, AND ZSUZSA WEINER Abstract. In this paper we prove that a set of points (in a projective

More information

Value sets of special polynomials and blocking sets

Value sets of special polynomials and blocking sets Value sets of special polynomials and blocking sets Tamás Szőnyi Eötvös Loránd University and MTA-ELTE GAC Research Group Budapest 29th June, 2016 PhD Summer School in Discrete Mathematics, Rogla This

More information

On linear sets on a projective line

On linear sets on a projective line On linear sets on a projective line M. Lavrauw G. Van de Voorde August 14, 2013 Abstract Linear sets generalise the concept of subgeometries in a projective space. They have many applications in finite

More information

A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd

A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd C. Rößing L. Storme January 12, 2010 Abstract This article presents a spectrum result on minimal blocking sets with

More information

The 2-blocking number and the upper chromatic number of PG(2, q)

The 2-blocking number and the upper chromatic number of PG(2, q) The 2-blocking number and the upper chromatic number of PG(2, q) Tamás Szőnyi Joint work with Gábor Bacsó and Tamás Héger Eötvös Loránd University, MTA-ELTE GAC Research Group and Ghent University Budapest

More information

Two Remarks on Blocking Sets and Nuclei in Planes of Prime Order

Two Remarks on Blocking Sets and Nuclei in Planes of Prime Order Designs, Codes and Cryptography, 10, 9 39 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Two Remarks on Blocking Sets and Nuclei in Planes of Prime Order ANDRÁS GÁCS

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Pure Mathematics and Computer Algebra Krijgslaan 281 - S22 9000 Ghent Belgium Thurnau, April 15, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 EXTENDABILITY RESULTS

More information

Galois geometries contributing to coding theory

Galois geometries contributing to coding theory Ghent University Dept. of Mathematics Krijgslaan 281 - S22 9000 Ghent Belgium Opatija, 2010 OUTLINE 1 CODING THEORY 2 GRIESMER BOUND AND MINIHYPERS 3 COVERING RADIUS AND SATURATING SETS 4 LINEAR MDS CODES

More information

1 Lacunary Polynomials over Finite Fields.

1 Lacunary Polynomials over Finite Fields. 1 Lacunary Polynomials over Finite Fields. 1.1 Introduction In 1970 Rédei published his treatise Lückenhafte Polynome über endlichen Körpern [34], soon followed by the English translation Lacunary Polynomials

More information

The minimum weight of dual codes from projective planes

The minimum weight of dual codes from projective planes The minimum weight of dual codes from projective planes J. D. Key Department of Mathematical Sciences Clemson University, University of Wales Aberystwyth, University of the Western Cape and University

More information

Extending MDS Codes. T. L. Alderson

Extending MDS Codes. T. L. Alderson Extending MDS Codes T. L. Alderson Abstract A q-ary (n,k)-mds code, linear or not, satisfies n q + k 1. A code meeting this bound is said to have maximum length. Using purely combinatorial methods we show

More information

On two-intersection sets with respect to hyperplanes in projective spaces

On two-intersection sets with respect to hyperplanes in projective spaces with respect to hyperplanes in projective spaces Aart Blokhuis Technische Universiteit Eindhoven, Postbox 513, 5600 MB Eindhoven, The Netherlands and Michel Lavrauw Technische Universiteit Eindhoven, Postbox

More information

The 2-blocking number and the upper chromatic number of PG(2, q)

The 2-blocking number and the upper chromatic number of PG(2, q) The 2-blocking number and the upper chromatic number of PG(2, q) Tamás Héger Joint work with Gábor Bacsó and Tamás Szőnyi Eötvös Loránd University Budapest September 18, 2012 The problem Color the vertices

More information

Generalized Quadrangles Weakly Embedded in Finite Projective Space

Generalized Quadrangles Weakly Embedded in Finite Projective Space Generalized Quadrangles Weakly Embedded in Finite Projective Space J. A. Thas H. Van Maldeghem Abstract We show that every weak embedding of any finite thick generalized quadrangle of order (s, t) in a

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. 9 (2006), No. 1, pp

Journal of Discrete Mathematical Sciences & Cryptography Vol. 9 (2006), No. 1, pp Some generalizations of Rédei s theorem T. Alderson Department of Mathematical Sciences University of New Brunswick Saint John, New Brunswick Canada EL 4L5 Abstract By the famous theorems of Rédei, a set

More information

arxiv: v1 [math.co] 23 Nov 2015

arxiv: v1 [math.co] 23 Nov 2015 arxiv:1511.0753v1 [math.co] 3 Nov 015 New results on maximal partial line spreads in PG(5, q) Maurizio Iurlo Abstract In this work, we prove the existence of maximal partial line spreads in PG(5,q) of

More information

On the stability of small blocking sets

On the stability of small blocking sets J Algebr Comb (04) 40:79 9 DOI 0.007/s080-03-0487-0 On the stability of small blocking sets Tamás Szőnyi Zsuzsa Weiner Received: April 0 / Accepted: 6 November 03 / Published online: 3 December 03 Springer

More information

Generalized Veronesean embeddings of projective spaces, Part II. The lax case.

Generalized Veronesean embeddings of projective spaces, Part II. The lax case. Generalized Veronesean embeddings of projective spaces, Part II. The lax case. Z. Akça A. Bayar S. Ekmekçi R. Kaya J. A. Thas H. Van Maldeghem Abstract We classify all embeddings θ : PG(n, K) PG(d, F),

More information

Polynomials and Codes

Polynomials and Codes TU/e Eindhoven 13 September, 2012, Trieste ICTP-IPM Workshop and Conference in Combinatorics and Graph Theory. Reza and Richard: Thanks for a wonderful meeting. From now on: p is prime and q is a power

More information

Lacunary Polynomials over Finite Fields Course notes

Lacunary Polynomials over Finite Fields Course notes Lacunary Polynomials over Finite Fields Course notes Javier Herranz Abstract This is a summary of the course Lacunary Polynomials over Finite Fields, given by Simeon Ball, from the University of London,

More information

Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces

Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces Lax Embeddings of Generalized Quadrangles in Finite Projective Spaces J. A. Thas H. Van Maldeghem 1 Introduction Definition 1.1 A (finite) generalized quadrangle (GQ) S = (P, B, I) is a point-line incidence

More information

Complete arcs on the parabolic quadric Q(4,q)

Complete arcs on the parabolic quadric Q(4,q) Finite Fields and Their Applications 14 (008) 14 1 http://www.elsevier.com/locate/ffa Complete arcs on the parabolic quadric Q(4,q) Jan De Beule a,,1, András Gács b, a Department of Pure Mathematics and

More information

Orthogonal Arrays & Codes

Orthogonal Arrays & Codes Orthogonal Arrays & Codes Orthogonal Arrays - Redux An orthogonal array of strength t, a t-(v,k,λ)-oa, is a λv t x k array of v symbols, such that in any t columns of the array every one of the possible

More information

Tactical Decompositions of Steiner Systems and Orbits of Projective Groups

Tactical Decompositions of Steiner Systems and Orbits of Projective Groups Journal of Algebraic Combinatorics 12 (2000), 123 130 c 2000 Kluwer Academic Publishers. Manufactured in The Netherlands. Tactical Decompositions of Steiner Systems and Orbits of Projective Groups KELDON

More information

On the chromatic number of q-kneser graphs

On the chromatic number of q-kneser graphs On the chromatic number of q-kneser graphs A. Blokhuis & A. E. Brouwer Dept. of Mathematics, Eindhoven University of Technology, P.O. Box 53, 5600 MB Eindhoven, The Netherlands aartb@win.tue.nl, aeb@cwi.nl

More information

Group theoretic characterizations of Buekenhout Metz unitals in PG(2,q 2 )

Group theoretic characterizations of Buekenhout Metz unitals in PG(2,q 2 ) J Algebr Comb (2011) 33: 401 407 DOI 10.1007/s10801-010-0250-8 Group theoretic characterizations of Buekenhout Metz unitals in PG(2,q 2 ) Giorgio Donati Nicola Durante Received: 1 March 2010 / Accepted:

More information

On the intersection of Hermitian surfaces

On the intersection of Hermitian surfaces On the intersection of Hermitian surfaces Nicola Durante and Gary Ebert Abstract In [6] and [3] the authors determine the structure of the intersection of two Hermitian surfaces of PG(3, q 2 ) under the

More information

Characterizations of the finite quadric Veroneseans V 2n

Characterizations of the finite quadric Veroneseans V 2n Characterizations of the finite quadric Veroneseans V 2n n J. A. Thas H. Van Maldeghem Abstract We generalize and complete several characterizations of the finite quadric Veroneseans surveyed in [3]. Our

More information

Lines in higgledy-piggledy arrangement

Lines in higgledy-piggledy arrangement Lines in higgledy-piggledy arrangement Szabolcs L. Fancsali MTA ELTE Geometric and Algebraic Combinatorics Research Group Budapest, Hungary nudniq@cs.elte.hu Péter Sziklai MTA ELTE Geometric and Algebraic

More information

Some graph theoretic aspects of finite geometries

Some graph theoretic aspects of finite geometries Eötvös Loránd University Institute of Mathematics Ph.D. thesis Some graph theoretic aspects of finite geometries Tamás Héger Doctoral School: Mathematics Director: Miklós Laczkovich, D.Sc. Professor, Member

More information

ARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions

ARCS IN FINITE PROJECTIVE SPACES. Basic objects and definitions ARCS IN FINITE PROJECTIVE SPACES SIMEON BALL Abstract. These notes are an outline of a course on arcs given at the Finite Geometry Summer School, University of Sussex, June 26-30, 2017. Let K denote an

More information

Arcs and blocking sets in non-desarguesian planes

Arcs and blocking sets in non-desarguesian planes Arcs and blocking sets in non-desarguesian planes Tamás Szőnyi Eötvös Loránd University and MTA-ELTE GAC Research Group Budapest June 3, 2016 General overview First we summarize results about arcs, blocking

More information

Design Theory Notes 1:

Design Theory Notes 1: ----------------------------------------------------------------------------------------------- Math 6023 Topics in Discrete Math: Design and Graph Theory Fall 2007 ------------------------------------------------------------------------------------------------

More information

APPLICATIONS OF POLYNOMIALS OVER FINITE FIELDS. Péter Sziklai

APPLICATIONS OF POLYNOMIALS OVER FINITE FIELDS. Péter Sziklai APPLICATIONS OF POLYNOMIALS OVER FINITE FIELDS Péter Sziklai A doctoral dissertation submitted to the Hungarian Academy of Sciences Budapest, 2013 2 Foreword 3 0 Foreword A most efficient way of investigating

More information

Blocking sets in PG(2, q n ) from cones of PG(2n, q)

Blocking sets in PG(2, q n ) from cones of PG(2n, q) J Algebr Comb (2006) 24:61 81 DOI 10.1007/s10801-006-9102-y Blocking sets in PG(2, q n ) from cones of PG(2n, q) Francesco Mazzocca Olga Polverino Received: 11 February 2004 / Accepted: 12 December 2005

More information

On sets without tangents and exterior sets of a conic

On sets without tangents and exterior sets of a conic On sets without tangents and exterior sets of a conic Geertrui Van de Voorde Abstract A set without tangents in PG(2, q) is a set of points S such that no line meets S in exactly one point. An exterior

More information

Lax embeddings of the Hermitian Unital

Lax embeddings of the Hermitian Unital Lax embeddings of the Hermitian Unital V. Pepe and H. Van Maldeghem Abstract In this paper, we prove that every lax generalized Veronesean embedding of the Hermitian unital U of PG(2, L), L a quadratic

More information

Applications of Galois Geometries to Coding Theory and Cryptography

Applications of Galois Geometries to Coding Theory and Cryptography Applications of Galois Geometries to Coding Theory and Cryptography Ghent University Dept. of Mathematics Krijgslaan 281 - Building S22 9000 Ghent Belgium Albena, July 1, 2013 1. Affine spaces 2. Projective

More information

A Proposed Quantum Low Density Parity Check Code

A Proposed Quantum Low Density Parity Check Code arxiv:quant-ph/83v 29 Aug 2 A Proposed Quantum Low Density Parity Check Code Michael S. Postol National Security Agency 98 Savage Road Fort Meade, MD 2755 Email: msposto@zombie.ncsc.mil June 3, 28 2 LOW

More information

Some new results on semiarcs in finite projective planes and on inverse-closed subsets in fields

Some new results on semiarcs in finite projective planes and on inverse-closed subsets in fields Universitá degli Studi della Basilicata Some new results on semiarcs in finite projective planes and on inverse-closed subsets in fields Dottorato di Ricerca in Matematica János Bolyai MAT 03 Coordinatore

More information

On small minimal blocking sets in classical generalized quadrangles

On small minimal blocking sets in classical generalized quadrangles On small minimal blocking sets in classical generalized quadrangles Miroslava Cimráková a Jan De Beule b Veerle Fack a, a Research Group on Combinatorial Algorithms and Algorithmic Graph Theory, Department

More information

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena,

On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing Xiang Dept. of Mathematics, California Institute of Technology, Pasadena, On GMW designs and a conjecture of Assmus and Key Thomas E. Norwood and Qing iang Dept. of Mathematics, California Institute of Technology, Pasadena, CA 91125 June 24, 1998 Abstract We show that a family

More information

Embeddings of Small Generalized Polygons

Embeddings of Small Generalized Polygons Embeddings of Small Generalized Polygons J. A. Thas 1 H. Van Maldeghem 2 1 Department of Pure Mathematics and Computer Algebra, Ghent University, Galglaan 2, B 9000 Ghent, jat@cage.rug.ac.be 2 Department

More information

Shult Sets and Translation Ovoids of the Hermitian Surface

Shult Sets and Translation Ovoids of the Hermitian Surface Shult Sets and Translation Ovoids of the Hermitian Surface A. Cossidente, G. L. Ebert, G. Marino, and A. Siciliano Abstract Starting with carefully chosen sets of points in the Desarguesian affine plane

More information

Two-intersection sets with respect to lines on the Klein quadric

Two-intersection sets with respect to lines on the Klein quadric Two-intersection sets with respect to lines on the Klein quadric F. De Clerck N. De Feyter N. Durante Abstract We construct new examples of sets of points on the Klein quadric Q + (5, q), q even, having

More information

Subcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors

Subcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors Subcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors Peng Ding Fair Isaac and Company, Inc. 200 Smith Ranch Road San Rafael CA 94903-1996 Jennifer D. Key Department

More information

Mathematical Foundations of Cryptography

Mathematical Foundations of Cryptography Mathematical Foundations of Cryptography Cryptography is based on mathematics In this chapter we study finite fields, the basis of the Advanced Encryption Standard (AES) and elliptical curve cryptography

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Derivation Techniques on the Hermitian Surface

Derivation Techniques on the Hermitian Surface Derivation Techniques on the Hermitian Surface A. Cossidente, G. L. Ebert, and G. Marino August 25, 2006 Abstract We discuss derivation like techniques for transforming one locally Hermitian partial ovoid

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network

More information

Finite fields: some applications Michel Waldschmidt 1

Finite fields: some applications Michel Waldschmidt 1 Ho Chi Minh University of Science HCMUS Update: 16/09/2013 Finite fields: some applications Michel Waldschmidt 1 Exercises We fix an algebraic closure F p of the prime field F p of characteristic p. When

More information

Some open conjectures on codes from planes

Some open conjectures on codes from planes Some open conjectures on codes from planes J. D. Key keyj@clemson.edu www.math.clemson.edu/ keyj - ICM 2014 Satellite Conference Algebraic Coding Theory Aug. 11 - Aug. 12 J. D. Key (keyj@clemson.edu) Codes

More information

RABIN PUBLIC-KEY CRYPTOSYSTEM IN RINGS OF POLYNOMIALS OVER FINITE FIELDS

RABIN PUBLIC-KEY CRYPTOSYSTEM IN RINGS OF POLYNOMIALS OVER FINITE FIELDS RABIN PUBLIC-KEY CRYPTOSYSTEM IN RINGS OF POLYNOMIALS OVER FINITE FIELDS A. N. El-Kassar * Ramzi Haraty Y. A. Awad Department of Division of Computer Department of Mathematics Science and Mathematics Mathematics

More information

Codes from generalized hexagons

Codes from generalized hexagons Codes from generalized hexagons A. De Wispelaere H. Van Maldeghem 1st March 2004 Abstract In this paper, we construct some codes that arise from generalized hexagons with small parameters. As our main

More information

arxiv: v1 [math.co] 1 May 2017

arxiv: v1 [math.co] 1 May 2017 arxiv:1705.00731v1 [math.co] 1 May 2017 Maximum scattered F q -linear sets of PG(1,q 4 ) Bence Csajbók and Corrado Zanella May 3, 2017 Abstract There are two known families of maximum scattered F q -linear

More information

Generalized quadrangles and the Axiom of Veblen

Generalized quadrangles and the Axiom of Veblen Geometry, Combinatorial Designs and Related Structures (ed. J. W. P. Hirschfeld), Cambridge University Press, London Math. Soc. Lecture Note Ser. 245 (1997), 241 -- 253 Generalized quadrangles and the

More information

3. Coding theory 3.1. Basic concepts

3. Coding theory 3.1. Basic concepts 3. CODING THEORY 1 3. Coding theory 3.1. Basic concepts In this chapter we will discuss briefly some aspects of error correcting codes. The main problem is that if information is sent via a noisy channel,

More information

1. A brief introduction to

1. A brief introduction to 1. A brief introduction to design theory These lectures were given to an audience of design theorists; for those outside this class, the introductory chapter describes some of the concepts of design theory

More information

THE NUMBER OF POINTS IN A COMBINATORIAL GEOMETRY WITH NO 8-POINT-LINE MINORS

THE NUMBER OF POINTS IN A COMBINATORIAL GEOMETRY WITH NO 8-POINT-LINE MINORS THE NUMBER OF POINTS IN A COMBINATORIAL GEOMETRY WITH NO 8-POINT-LINE MINORS JOSEPH E. BONIN AND JOSEPH P. S. KUNG ABSTRACT. We show that when n is greater than 3, the number of points in a combinatorial

More information

Semiarcs with a long secant in PG(2,q)

Semiarcs with a long secant in PG(2,q) Innovations in Incidence Geometry Volume 14 (2015), Pages 1 26 ISSN 1781-6475 Semiarcs with a long secant in PG(2,q) Bence Csajbók Tamás Héger György Kiss Abstract At-semiarc is a point sets t with the

More information

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi

SOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM

More information

Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2

Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures p. 1/2 Finite geometry codes, generalized Hadamard matrices, and Hamada and Assmus conjectures Vladimir D. Tonchev a Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931,

More information

Sets. We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth

Sets. We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth Sets We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth century. Most students have seen sets before. This is intended

More information

Low Rank Co-Diagonal Matrices and Ramsey Graphs

Low Rank Co-Diagonal Matrices and Ramsey Graphs Low Rank Co-Diagonal Matrices and Ramsey Graphs Vince Grolmusz Department of Computer Science Eötvös University, H-1053 Budapest HUNGARY E-mail: grolmusz@cs.elte.hu Submitted: March 7, 000. Accepted: March

More information

Finite affine planes in projective spaces

Finite affine planes in projective spaces Finite affine planes in projective spaces J. A.Thas H. Van Maldeghem Ghent University, Belgium {jat,hvm}@cage.ugent.be Abstract We classify all representations of an arbitrary affine plane A of order q

More information

arxiv: v1 [math.co] 14 Jan 2016

arxiv: v1 [math.co] 14 Jan 2016 The Cameron-Liebler problem for sets Maarten De Boec, Leo Storme and Andrea Švob arxiv:1601.03628v1 [math.co] 14 Jan 2016 Abstract Cameron-Liebler line classes and Cameron-Liebler -classes in PG(2 + 1,

More information

Introduction to finite fields

Introduction to finite fields Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in

More information

Theorems of Erdős-Ko-Rado type in polar spaces

Theorems of Erdős-Ko-Rado type in polar spaces Theorems of Erdős-Ko-Rado type in polar spaces Valentina Pepe, Leo Storme, Frédéric Vanhove Department of Mathematics, Ghent University, Krijgslaan 28-S22, 9000 Ghent, Belgium Abstract We consider Erdős-Ko-Rado

More information

Orthogonal diagonal sudoku solutions: an approach via linearity

Orthogonal diagonal sudoku solutions: an approach via linearity AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 51 (2011), Pages 139 145 Orthogonal diagonal sudoku solutions: an approach via linearity John Lorch Department of Mathematical Sciences Ball State University

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

Michel Lavrauw. Scattered Spaces with respect to Spreads, and Eggs in Finite Projective Spaces

Michel Lavrauw. Scattered Spaces with respect to Spreads, and Eggs in Finite Projective Spaces Michel Lavrauw Scattered Spaces with respect to Spreads, and Eggs in Finite Projective Spaces Scattered Spaces with respect to Spreads, and Eggs in Finite Projective Spaces PROEFSCHRIFT ter verkrijging

More information

. Here the flats of H(2d 1, q 2 ) consist of all nonzero totally isotropic

. Here the flats of H(2d 1, q 2 ) consist of all nonzero totally isotropic NEW BOUNDS FOR PARTIAL SPREADS OF H(d 1, ) AND PARTIAL OVOIDS OF THE REE-TITS OCTAGON FERDINAND IHRINGER, PETER SIN, QING XIANG ( ) Abstract Our first result is that the size of a partial spread of H(,

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

The geometry of quantum codes. Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda Pambianco

The geometry of quantum codes. Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda Pambianco Innovations in Incidence Geometry Volume 6 (2007), Pages 289 307 ISSN 1781-6475 ACADEMIA PRESS The geometry of quantum codes Jürgen Bierbrauer Giorgio Faina Massimo Giulietti Stefano Marcugini Fernanda

More information

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2000 2013 Contents 9 Introduction to Number Theory 63 9.1 Subgroups

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Functional codes arising from quadric intersections with Hermitian varieties

Functional codes arising from quadric intersections with Hermitian varieties Functional codes arising from quadric intersections with Hermitian varieties A. Hallez L. Storme June 16, 2010 Abstract We investigate the functional code C h (X) introduced by G. Lachaud [10] in the special

More information

Odd order flag-transitive affine planes of dimension three over their kernel

Odd order flag-transitive affine planes of dimension three over their kernel Special Issue (2003), S215-S223 Advances in Geometry de Gruyter 2003 Odd order flag-transitive affine planes of dimension three over their kernel Ronald D. Baker, C. Culbert*, Gary L. Ebert* and Keith

More information

Mathematics Department

Mathematics Department Mathematics Department Matthew Pressland Room 7.355 V57 WT 27/8 Advanced Higher Mathematics for INFOTECH Exercise Sheet 2. Let C F 6 3 be the linear code defined by the generator matrix G = 2 2 (a) Find

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Partial geometries pg(s, t, 2 ) with an abelian Singer group and a characterization of the van Lint-Schrijver partial geometry

Partial geometries pg(s, t, 2 ) with an abelian Singer group and a characterization of the van Lint-Schrijver partial geometry J Algebr Comb (2006) 24:285 297 DOI 10.1007/s10801-006-0019-2 Partial geometries pg(s, t, 2 ) with an abelian Singer group and a characterization of the van Lint-Schrijver partial geometry S. De Winter

More information

Classifications of blocking set related structures in Galois geometries

Classifications of blocking set related structures in Galois geometries Vakgroep Zuivere Wiskunde en Computeralgebra Classifications of blocking set related structures in Galois geometries Patrick Govaerts Promotor: Prof. Dr. Leo Storme Proefschrift voorgelegd aan de Faculteit

More information

Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35

Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35 Honors Algebra 4, MATH 371 Winter 2010 Assignment 4 Due Wednesday, February 17 at 08:35 1. Let R be a commutative ring with 1 0. (a) Prove that the nilradical of R is equal to the intersection of the prime

More information

Square 2-designs/1. 1 Definition

Square 2-designs/1. 1 Definition Square 2-designs Square 2-designs are variously known as symmetric designs, symmetric BIBDs, and projective designs. The definition does not imply any symmetry of the design, and the term projective designs,

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

Network Coding and Schubert Varieties over Finite Fields

Network Coding and Schubert Varieties over Finite Fields Network Coding and Schubert Varieties over Finite Fields Anna-Lena Horlemann-Trautmann Algorithmics Laboratory, EPFL, Schweiz October 12th, 2016 University of Kentucky What is this talk about? 1 / 31 Overview

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 1, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

Affine designs and linear orthogonal arrays

Affine designs and linear orthogonal arrays Affine designs and linear orthogonal arrays Vladimir D. Tonchev Department of Mathematical Sciences, Michigan Technological University, Houghton, Michigan 49931, USA, tonchev@mtu.edu Abstract It is proved

More information

D-bounded Distance-Regular Graphs

D-bounded Distance-Regular Graphs D-bounded Distance-Regular Graphs CHIH-WEN WENG 53706 Abstract Let Γ = (X, R) denote a distance-regular graph with diameter D 3 and distance function δ. A (vertex) subgraph X is said to be weak-geodetically

More information

Linear maps. Matthew Macauley. Department of Mathematical Sciences Clemson University Math 8530, Spring 2017

Linear maps. Matthew Macauley. Department of Mathematical Sciences Clemson University  Math 8530, Spring 2017 Linear maps Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 8530, Spring 2017 M. Macauley (Clemson) Linear maps Math 8530, Spring 2017

More information

Math 121 Homework 5: Notes on Selected Problems

Math 121 Homework 5: Notes on Selected Problems Math 121 Homework 5: Notes on Selected Problems 12.1.2. Let M be a module over the integral domain R. (a) Assume that M has rank n and that x 1,..., x n is any maximal set of linearly independent elements

More information

PROJECTIVE DIVISIBLE BINARY CODES

PROJECTIVE DIVISIBLE BINARY CODES PROJECTIVE DIVISIBLE BINARY CODES DANIEL HEINLEIN, THOMAS HONOLD, MICHAEL KIERMAIER, SASCHA KURZ, AND ALFRED WASSERMANN Abstract. For which positive integers n, k, r does there exist a linear [n, k] code

More information