A classification of MDS binary systematic codes
|
|
- Jeffery Carter
- 5 years ago
- Views:
Transcription
1 A classification of MDS binary systematic codes Eleonora Guerrini Department of Mathematics, University of Trento, Italy. Massimiliano Sala Boole Centre for Research in Informatics, UCC Cork, Ireland Abstract Binary MDS linear codes are well-known. We prove that any binary MDS systematic non-linear code is equivalent to a linear code and hence we classify them completely. Keywords: Non-linear, MDS codes, Hamming distance. 1 Introduction MDS codes are important because they are optimal w.r.t. their distance. However, binary MDS linear codes have been classified ([MS77]) and they are trivial. On the other hand, systematic non-linear codes can have higher distance than linear codes with the same parameters ([Pre68], [BvLW83]). The main result of this paper is to show that any binary MDS systematic non-linear code is actually equivalent to a binary MDS linear code, providing thus a complete classification. 2 Preliminaries and notation The following definitions and results are classical (see i.e. [MS77]). Definition 2.1. Let k, n N such that 1 k n, φ : (F 2 ) k (F 2 ) n be an injective function and C = Im(φ). We say that C is an (n, k) binary code. Any c C is called a word of the code. From now on code means binary code and k, n are understood. Definition 2.2. Let π be the projection π : (F 2 ) n (F 2 ) k such that π(a 1,..., a n ) = (a 1,..., a k ). We say that C is systematic if (π φ)(v) = v 26/IX/2006 BCRI preprint,
2 2 A classification of MDS binary systematic codes for any v (F 2 ) k. We say that a code C is linear, if C is a vector subspace of (F 2 ) n. We denote by C(n, k) the class of all systematic (n, k) codes, and we denote by C 0 (n, k) the subset of C(n, k) of codes containing the zero vector. Fact 2.3. Any linear code is equivalent to a code in C(n, k). Definition 2.4. For any two vectors v 1, v 2 (F 2 ) n, the Hamming distance, d(v 1, v 2 ), between v 1 and v 2 is the number of coordinates in which the two vectors differ. For any v (F 2 ) n, we denote by w(v) the weight of v, i.e the number of coordinates where v differs from zero. Let C C(n, k). The Hamming distance d of C is: d = min{d(a, b) a, b C, a b}. Let C, C C(n, k). We say that C is equivalent to C (C C ), if there exists α (F 2 ) n such that C = C + α = {c + α c C}. Fact 2.5. For C, C C(n, k), we have: If C C, then d(c) = d(c ), there is C in C 0 (n, k) such that C C. Definition 2.6. A code C in C(n, k) is MDS if d(c) = n k + 1. The following distance bound is known as the Singleton bound. Fact 2.7 ([Rom92]). Let C be a code in C(n, k). Then d(c) n k + 1. From Fact 2.7, if C is an MDS code, then C has the largest possible distance for its parameters k and n. Definition 2.8. Let C be a linear code in C(k + 1, k). We say that C is a parity-check code, if c C, where c = (c 1,..., c k+1 ), we have k+1 i=1 c i = 0. The following well-known theorem states that all the binary linear MDS codes are trivial. Theorem 2.9. There are MDS linear codes in C(n, k) only when: k = 1, i.e. C = {(0,..., 0), (1,..., 1)}, k = k + 1, i.e. C is the parity-check code, n = k, i.e. C is the whole (F 2 ) n.
3 E. Guerrini, M. Sala 3 We fix in F 2 [X, Z] = F 2 [x 1,..., x k, z 1,..., z n k ] the lexicographic order <, with x 1 < x 2... < x k < z 1 <... < z n k. If C C(n, k), then we can view C as a set of points in (F 2 ) n (F 2 ) n and we denote by I(C) its (0 dimensional) vanishing ideal in F 2 [X, Z]. We now recall the structure of the Gröbner basis of I(C). Theorem 2.10 ([GOS06], [Gue05]). Let C C(n, k) and G be the reduced Gröbner basis for I(C) w.r.t. <. Then G has the following structure: G = {x x 1,..., x 2 k + x k, z 1 f 1,..., z n k f n k }, for some f j F 2 [X], 1 j n k. Any set of polynomials endowed with the structure of Theorem 2.10 is a Gröbner basis for the ideal generated by itself, and its variety is a code in C(n, k). We can then identify such polynomial sets and codes in C(n, k), as follows. Theorem 2.11 ([GOS06],[Gue05]). Let A k,n be the set A k,n = {(f 1,..., f n k ) f j : (F 2 ) k (F 2 ), 1 j n k}. There is a bijection A k,n C(n, k), given by (f 1,..., f n k ) G = {x x 1,..., x 2 k + x k, z 1 f 1,..., z n k f n k }. 3 Characterisation of binary systematic MDS codes We begin with noting some simple facts. Let C be in C 0 (n, k), let G(C) be the reduced Gröbner basis of I(C). Then C = {(a, f 1 (a),..., f n k (a)) a (F 2 ) k }. Let F = (f 1,..., f n k ), for a code C in C(n, k) we clearly have: d(c) = n k + 1 c 1 c 2, d(c 1, c 2 ) = n k + 1 a b (Z 2 ) k, d([a, F (a)], [b, F (b)]) = n k + 1 a b (Z 2 ) k, d(a, b) + d(f (a), F (b)) = n k + 1 For a, b (Z 2 ) k such that d(a, b) = 1, we have d([f (a), F (b)]) = n k, hence f j (a) f j (b) for 1 i n k. (1) From elementary finite field theory (see i.e. [LN86]), we have that f j can be written in its Normal Form as f j = k ν=1 S {1,2,...,k} S =ν a S X S (2)
4 4 A classification of MDS binary systematic codes where X S = x i1 x i2...x is and a S = a i1 i 2...i S, if S = {i 1,..., i s }. The first result that we provide is when n = k + 1. In this case we will show that there is only one MDS code in C 0 (n, k). Lemma 3.1. If C is MDS in C 0 (k + 1, k), then C is the parity-check code. Proof. Since C is in C 0 (k + 1, k), G(C) = {x x 1,..., x 2 k + x k, z 1 + f 1 }, where f 1 is as in (2). It is easy to see that C is the parity-check code if and only if f 1 = k i=1 x i, thus we have to show that 1. a 1 = a 2 =... = a k = 1, 2. a S = 0 when S Fixed 1 j k, we consider a, b (F 2 ) k, where a = 0, and b = (b 1,..., b k ) is such that w(b) = 1, b j = 1. Since C is MDS, from (1), we have that f 1 (0) f 1 (b), i.e. f 1 (0)+f 1 (b)+1 = 0, and f 1 (b) = 1. Since w(b) = 1, f 1 (b) = a j, which implies a j = We have to prove that a S = 0 when S 1. We first show that a S = 0 in case S = 2. Let S = {s 1, s 2 }, where we have s 1, s 2 {1,..., k} and a, b (F 2 ) k such that supp(a) = S, supp(b) = {s 1 }. Since d(a, b) = 1, we have that f 1 (a) f 1 (b). As w(a) = 2 and w(b) = 1, then f 1 (b) = a s1 and f 1 (a) = a s1 + a s2 + a s1 s 2. This is equivalent to saying that a s1 + a s2 + a s1 + a s1 s 2 = 1, which means a s1 s 2 = 0. By induction on the cardinality of S, we now suppose that a S = 0 for S {1,..., k} such that S = i, and 2 i k 1. Then, we have to show that for S = S {h}, and h {1,..., k}, h S, we have a S = 0. We now consider a, b in (F 2 ) k such that supp(a) = {s 1,..., s i } = S and supp(b) = {s 1,..., s i, h} = S {h}. Since d(a, b) = 1, then f 1 (a) + f 1 (b) = 1. Since w(a) = i and w(b) = i + 1, we have f 1 (a) + f 1 (b) = ( = ( = i a T + a j ) + ( j S j S {h} a j + i+1 {h} i a T + a j ) + ( a j + a h + a S {h} + j S j S i a T + a h + a S {h} + = a h + a S {h} + i 1 l=1 i a T + a T {h}. i 1 a T ) i {h} a T {h} a T )
5 E. Guerrini, M. Sala 5 Then f 1 (a) + f 1 (b) = a S {h} + i 1 l=1 a T {h} + a h = 1. By induction hypothesis, as l 2, we have i 1 and a h = 1, so that a S {h} = 0. l=1 a T {h} = 0, The previous lemma can be restated in a more useful way. Lemma 3.2. If C C 0 (n, k) such that d(c) = 2 and C is MDS, then C is the parity-check code. We are ready for our main result. Theorem 3.3. Let C be in C 0 (n, k). If C is MDS, then C is linear. Proof. The cases k = 1 and k = n are obvious. Let now 2 k n 1. We apply (1) to a = 0 and b such that w(b) = 1. Since f j (0) = 0, then f j (b) = 1 for 1 j n k. On the other hand, since k 2, it is possible to find e (F 2 ) k such that e b and w(e) = 1. Thus d(0, e) = 1 and f j (e) = 1 for 1 j n k. Let now c 1 and c 2 be the codewords c 1 = (e, F (e)), c 2 = (b, F (b)) in (F 2 ) n. Since d(c 1, c 2 ) = 2, d(c) 2. There are two cases: either d = 2, and so C is the parity-check code by Lemma (3.1), or d = 1 and thus k = n. The following corollary is obvious. Corollary 3.4. Let C be in C(n, k). If C is MDS, then C is equivalent to a linear MDS code. 4 Conclusions We have shown that, surprisingly, the only binary MDS systematic codes are linear codes or their cosets. Binary MDS linear codes are non-interesting codes, but non-binary MDS linear codes are important in coding theory, for example the Reed-Solomon codes ([MS77]). The authors believe that there are non-binary MDS non-linear codes, which are not equivalent to a linear code and they think that this kind of techniques may be extended to attempt a classification for these codes.
6 6 A classification of MDS binary systematic codes 5 Acknowledgement Part of this work has been carried out in the Master s thesis of the first author. The first author would like to thank her supervisors: C. Traverso and the second author. For their comments and suggestions, the authors thank P. Fitzpatrick, T. Mora and J. Rosenthal. This work has been partially supported by STMicroelectronics contract Complexity issues in algebraic Coding Theory and Cryptography. References [BvLW83] Ronald D. Baker, Jacobus H. van Lint, and Richard M. Wilson, On the Preparata and Goethals codes, IEEE Trans. Inform. Theory 29 (1983), no. 3, MR MR (85c:94029) [GOS06] Eleonora Guerrini, Emmanuela Orsini, and Massimiliano Sala, Computing the distance distribution of systematic non-linear codes, BCRI preprint, 50, University College Cork, Cork, Ireland, [Gue05] [LN86] [MS77] [Pre68] [Rom92] Eleonora Guerrini, On distance and optimality in non-linear codes, Master s thesis (laurea), University of Pisa, Department of Mathematics, Rudolf Lidl and Harald Niederreiter, Introduction to finite fields and their applications, Cambridge University Press, Cambridge, MR MR (88c:11073) F. J. MacWilliams and N. J. A. Sloane, The theory of error-correcting codes. I, North-Holland Publishing Co., Amsterdam, 1977, North-Holland Mathematical Library, Vol. 16. MR MR (57 #5408a) Franco Preparata, A class of optimum nonlinear double-error correcting codes, Inform. Control 13 (1968), no. 13, Steven Roman, Coding and information theory, Graduate Texts in Mathematics, vol. 134, Springer-Verlag, New York, MR MR (93d:94002)
General error locator polynomials for binary cyclic codes with t 2 and n < 63
General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)
More informationGeneral error locator polynomials for nth-root codes
General error locator polynomials for nth-root codes Marta Giorgetti 1 and Massimiliano Sala 2 1 Department of Mathematics, University of Milano, Italy 2 Boole Centre for Research in Informatics, UCC Cork,
More informationA theory for the distance of cyclic codes
A theory for the distance of cyclic codes (msala@bcri.ucc.ie) Boole Centre for Research in Informatics, UCC Cork, Ireland (Part of this work is jointly with E. Betti and F. Ponchio) Workshop D1: Gröbner
More informationGroebner basis techniques to compute weight distributions of shortened cyclic codes
Groebner basis techniques to compute weight distributions of shortened cyclic codes 2nd February 2007 Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre for Research in Informatics, UCC Cork, Ireland.
More informationOn the Griesmer bound for nonlinear codes
On the Griesmer bound for nonlinear codes Emanuele Bellini, Alessio Meneghetti To cite this version: Emanuele Bellini, Alessio Meneghetti. On the Griesmer bound for nonlinear codes. Pascale Charpin, Nicolas
More informationA deterministic algorithm for the distance and weight distribution of binary nonlinear codes
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes Emanuele Bellini, and Massimiliano Sala. Abstract Given a binary nonlinear code, we provide a deterministic
More informationarxiv: v4 [cs.it] 14 May 2013
arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University
More informationInteresting Examples on Maximal Irreducible Goppa Codes
Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical
More informationOn Linear Subspace Codes Closed under Intersection
On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F
More informationON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES. 1. Introduction
Bulletin of the Iranian Mathematical Society Vol 31 No 2 (2005), pp 13-32 ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES MARTA GIORGETTI*, MARTA ROSSI AND MASSIMILIANO SALA Abstract In [30]
More informationConstruction of a (64, 2 37, 12) Code via Galois Rings
Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T
More informationNonlinear Cyclic Codes over Z 4 whose Nechaev-Gray Images are Binary Linear Cyclic Codes
International Mathematical Forum, 1, 2006, no. 17, 809-821 Nonlinear Cyclic Codes over Z 4 whose Nechaev-Gray Images are Binary Linear Cyclic Codes Gerardo Vega Dirección General de Servicios de Cómputo
More informationThird-order nonlinearities of some biquadratic monomial Boolean functions
Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this
More informationReed-Muller Codes. Sebastian Raaphorst Carleton University
Reed-Muller Codes Sebastian Raaphorst Carleton University May 9, 2003 Abstract This paper examines the family of codes known as Reed-Muller codes. We begin by briefly introducing the codes and their history
More information1-Resilient Boolean Function with Optimal Algebraic Immunity
1-Resilient Boolean Function with Optimal Algebraic Immunity Qingfang Jin Zhuojun Liu Baofeng Wu Key Laboratory of Mathematics Mechanization Institute of Systems Science, AMSS Beijing 100190, China qfjin@amss.ac.cn
More informationType I Codes over GF(4)
Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationElementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),
Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes
More informationOn Locating-Dominating Codes in Binary Hamming Spaces
Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More informationAn Application of Coding Theory into Experimental Design Construction Methods for Unequal Orthogonal Arrays
The 2006 International Seminar of E-commerce Academic and Application Research Tainan, Taiwan, R.O.C, March 1-2, 2006 An Application of Coding Theory into Experimental Design Construction Methods for Unequal
More informationOn the Weight Distribution of N-th Root Codes
Fabrizio Caruso Marta Giorgetti June 10, 2009 The Recurrence Proof by Generating Functions A Computer-Generated Proof Computing Some Steps of the Recurrence A Computer-Provable Identity Proving the Guessed
More informationRank and Kernel of binary Hadamard codes.
1 Rank and Kernel of binary Hadamard codes. K.T. Phelps, J. Rifà Senior Member IEEE, M. Villanueva Abstract In this paper the rank and the dimension of the kernel for (binary) Hadamard codes of length
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationA Combinatorial Bound on the List Size
1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu
More informationOn the Gröbner basis of a family of quasi-cyclic LDPC codes
On the Gröbner basis of a family of quasi-cyclic LDPC codes July 21, 2005 Marta Giorgetti (giorge@matunimiit) Department of Mathematics, University of Milan, Italy Marta Rossi (martarossi@possodmunipiit)
More informationDecomposing Bent Functions
2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationCoding Theory as Pure Mathematics
Coding Theory as Pure Mathematics Steven T. Dougherty July 1, 2013 Origins of Coding Theory How does one communicate electronic information effectively? Namely can one detect and correct errors made in
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationPAijpam.eu CONVOLUTIONAL CODES DERIVED FROM MELAS CODES
International Journal of Pure and Applied Mathematics Volume 85 No. 6 013, 1001-1008 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.173/ijpam.v85i6.3
More informationA commutative algebra approach to linear codes
A commutative algebra approach to linear codes Marta Giorgetti (giorge@mat.unimi.it) Department of Mathematics, University of Milano, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre for Research
More informationAlgebraic Characterization of Minimum Weight Codewords of Cyclic Codes
Algebraic Characterization of Minimum Weight Codewords of Cyclic Codes Daniel Augot Abstract We consider primitive cyclic codes of length n over GF (q), where n = q m 1, and for any such code with defining
More informationInternational Mathematical Forum, Vol. 6, 2011, no. 4, Manjusri Basu
International Mathematical Forum, Vol 6, 011, no 4, 185-191 Square Designs on New Binary ( 3n 1, 3 n ) Codes Manjusri Basu Department of Mathematics University of Kalyani Kalyani, WB, India, Pin-74135
More informationON PERTURBATION OF BINARY LINEAR CODES. PANKAJ K. DAS and LALIT K. VASHISHT
Math Appl 4 (2015), 91 99 DOI: 1013164/ma201507 ON PERTURBATION OF BINARY LINEAR CODES PANKAJ K DAS and LALIT K VASHISHT Abstract We present new codes by perturbation of rows of the generating matrix of
More informationMATH32031: Coding Theory Part 15: Summary
MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,
More informationSkew Cyclic Codes Of Arbitrary Length
Skew Cyclic Codes Of Arbitrary Length Irfan Siap Department of Mathematics, Adıyaman University, Adıyaman, TURKEY, isiap@adiyaman.edu.tr Taher Abualrub Department of Mathematics and Statistics, American
More informationThe cocycle lattice of binary matroids
Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*
More informationImproved Upper Bounds on Sizes of Codes
880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE
More informationMatrix characterization of linear codes with arbitrary Hamming weight hierarchy
Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department
More informationLecture B04 : Linear codes and singleton bound
IITM-CS6845: Theory Toolkit February 1, 2012 Lecture B04 : Linear codes and singleton bound Lecturer: Jayalal Sarma Scribe: T Devanathan We start by proving a generalization of Hamming Bound, which we
More informationThe BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes
S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding
More informationI. Duality. Macaulay F. S., The Algebraic Theory of Modular Systems, Cambridge Univ. Press (1916);
I. Duality Macaulay F. S., On the Resolution of a given Modular System into Primary Systems including some Properties of Hilbert Numbers, Math. Ann. 74 (1913), 66 121; Macaulay F. S., The Algebraic Theory
More informationLow-Power Cooling Codes with Efficient Encoding and Decoding
Low-Power Cooling Codes with Efficient Encoding and Decoding Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy, Hengjia Wei School of Physical and Mathematical Sciences, Nanyang Technological
More informationSOME DESIGNS AND CODES FROM L 2 (q) Communicated by Alireza Abdollahi
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 3 No. 1 (2014), pp. 15-28. c 2014 University of Isfahan www.combinatorics.ir www.ui.ac.ir SOME DESIGNS AND CODES FROM
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More informationChapter 6 Lagrange Codes
Chapter 6 Lagrange Codes 6. Introduction Joseph Louis Lagrange was a famous eighteenth century Italian mathematician [] credited with minimum degree polynomial interpolation amongst his many other achievements.
More informationNew Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting
New Traceability Codes against a Generalized Collusion Attack for Digital Fingerprinting Hideki Yagi 1, Toshiyasu Matsushima 2, and Shigeichi Hirasawa 2 1 Media Network Center, Waseda University 1-6-1,
More informationCirculant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv: v1 [math.co] 26 Nov 2017
Circulant Hadamard matrices as HFP-codes of type C 4n C 2. arxiv:1711.09373v1 [math.co] 26 Nov 2017 J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona October
More informationExtended Binary Linear Codes from Legendre Sequences
Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of
More informationMATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.
MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet
More informationCoset Decomposition Method for Decoding Linear Codes
International Journal of Algebra, Vol. 5, 2011, no. 28, 1395-1404 Coset Decomposition Method for Decoding Linear Codes Mohamed Sayed Faculty of Computer Studies Arab Open University P.O. Box: 830 Ardeya
More informationFinite Fields and Their Applications
Finite Fields and Their Applications 17 2011 205 219 Contents lists available at ScienceDirect Finite Fields and Their Applications www.elsevier.com/locate/ffa Codes over R k, Gray maps and their binary
More informationDISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES
DISTANCE COLORINGS OF HYPERCUBES FROM Z 2 Z 4 -LINEAR CODES GRETCHEN L. MATTHEWS Abstract. In this paper, we give distance-` colorings of the hypercube using nonlinear binary codes which are images of
More informationABSTRACT. Department of Mathematics. interesting results. A graph on n vertices is represented by a polynomial in n
ABSTRACT Title of Thesis: GRÖBNER BASES WITH APPLICATIONS IN GRAPH THEORY Degree candidate: Angela M. Hennessy Degree and year: Master of Arts, 2006 Thesis directed by: Professor Lawrence C. Washington
More informationarxiv: v1 [math.ac] 8 Jun 2010
REGULARITY OF CANONICAL AND DEFICIENCY MODULES FOR MONOMIAL IDEALS arxiv:1006.1444v1 [math.ac] 8 Jun 2010 MANOJ KUMMINI AND SATOSHI MURAI Abstract. We show that the Castelnuovo Mumford regularity of the
More informationEfficient representation of binary nonlinear codes: constructions and minimum distance computation
Noname manuscript No. (will be inserted by the editor) Efficient representation of binary nonlinear codes: constructions and minimum distance computation Mercè Villanueva Fanxuan Zeng Jaume Pujol Received:
More informationSolutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16
Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the
More informationConstructions of Quadratic Bent Functions in Polynomial Forms
1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence
More informationHypercube Coloring and the Structure of Binary Codes
Hypercube Coloring and the Structure of Binary Codes by James Gregory Rix A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE in The College of Graduate Studies
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationMeasurable Choice Functions
(January 19, 2013) Measurable Choice Functions Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ [This document is http://www.math.umn.edu/ garrett/m/fun/choice functions.pdf] This note
More informationNon-Standard Coding Theory
Non-Standard Coding Theory Steven T. Dougherty July 3, 2013 Rosenbloom-Tsfasman Metric Codes with the Rosenbloom-Tsfasman Metric Rosenbloom-Tsfasman Metric Mat n,s (F q ) denotes the linear space of all
More informationWell known bent functions satisfy both SAC and PC(l) for all l n, b not necessarily SAC(k) nor PC(l) of order k for k 1. On the other hand, balancedne
Design of SAC/PC(l) of order k Boolean functions and three other cryptographic criteria Kaoru Kurosawa 1 and Takashi Satoh?2 1 Dept. of Comper Science, Graduate School of Information Science and Engineering,
More informationDivision of Trinomials by Pentanomials and Orthogonal Arrays
Division of Trinomials by Pentanomials and Orthogonal Arrays School of Mathematics and Statistics Carleton University daniel@math.carleton.ca Joint work with M. Dewar, L. Moura, B. Stevens and Q. Wang
More informationA New Class of Bent Negabent Boolean Functions
A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com
More informationON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR. 1. Introduction
ON LINEAR CODES WHOSE WEIGHTS AND LENGTH HAVE A COMMON DIVISOR SIMEON BALL, AART BLOKHUIS, ANDRÁS GÁCS, PETER SZIKLAI, AND ZSUZSA WEINER Abstract. In this paper we prove that a set of points (in a projective
More informationOn Weight Distributions of Homogeneous Metric Spaces Over GF (p m ) and MacWilliams Identity
Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 4, Number 2 (2012), pp. 159-164 International Research Publication House http://www.irphouse.com On Weight Distributions
More informationLIFTED CODES OVER FINITE CHAIN RINGS
Math. J. Okayama Univ. 53 (2011), 39 53 LIFTED CODES OVER FINITE CHAIN RINGS Steven T. Dougherty, Hongwei Liu and Young Ho Park Abstract. In this paper, we study lifted codes over finite chain rings. We
More informationELEC 519A Selected Topics in Digital Communications: Information Theory. Hamming Codes and Bounds on Codes
ELEC 519A Selected Topics in Digital Communications: Information Theory Hamming Codes and Bounds on Codes Single Error Correcting Codes 2 Hamming Codes (7,4,3) Hamming code 1 0 0 0 0 1 1 0 1 0 0 1 0 1
More informationOn Perfect Codes and Related Concepts
Designs, Codes and Cryptography, 22, 221 237, 2001. c 2001 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. On Perfect Codes and Related Concepts R. AHLSWEDE H.K. AYDINIAN L.H. KHACHATRIAN
More informationAnalysis of Some Quasigroup Transformations as Boolean Functions
M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference
More informationSome error-correcting codes and their applications
Chapter 14 Some error-correcting codes and their applications J. D. Key 1 14.1 Introduction In this chapter we describe three types of error-correcting linear codes that have been used in major applications,
More informationAn Introduction to (Network) Coding Theory
An Introduction to (Network) Coding Theory Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland July 12th, 2018 1 Coding Theory Introduction Reed-Solomon codes 2 Introduction Coherent network
More informationSelf-Dual Codes over Commutative Frobenius Rings
Self-Dual Codes over Commutative Frobenius Rings Steven T. Dougherty Department of Mathematics University of Scranton Scranton, PA 18510, USA Email: doughertys1@scranton.edu Jon-Lark Kim Department of
More informationExploring the Exotic Setting for Algebraic Geometry
Exploring the Exotic Setting for Algebraic Geometry Victor I. Piercey University of Arizona Integration Workshop Project August 6-10, 2010 1 Introduction In this project, we will describe the basic topology
More informationA shortening of C on the coordinate i is the [n 1, k 1, d] linear code obtained by leaving only such codewords and deleting the ith coordinate.
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6a (draft; 9/21/03. Linear codes. Weights, supports, ranks. http://.enee.umd.edu/ abarg/enee739c/course.html
More informationOn Cryptographic Properties of the Cosets of R(1;m)
1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract
More informationADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP. Maria Bras-Amorós
Séminaires & Congrès 11, 2005, p. 21 28 ADDITION BEHAVIOR OF A NUMERICAL SEMIGROUP by Maria Bras-Amorós Abstract. In this work we study some objects describing the addition behavior of a numerical semigroup
More informationNew Families of Triple Error Correcting Codes with BCH Parameters
New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract
More informationLecture notes on coding theory
Lecture notes on coding theory Raymond van Bommel Curves over finite fields, Autumn 2017, Leiden 1 Introduction When one agent tries to transfer information to another agent through a noisy channel, errors
More informationMDS Codes over Finite Principal Ideal Rings
MDS Codes over Finite Principal Ideal Rings Steven T. Dougherty Department of Mathematics University of Scranton Scranton, PA 18510, USA Email: doughertys1@scranton.edu Jon-Lark Kim Department of Mathematics,
More informationThe decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t
The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t Wiebke S. Diestelkamp Department of Mathematics University of Dayton Dayton, OH 45469-2316 USA wiebke@udayton.edu
More informationOn the Arithmetic Walsh Coefficients of Boolean Functions
Designs, Codes, and Cryptography manuscript No. (will be inserted by the editor) On the Arithmetic Walsh Coefficients of Boolean Functions Claude Carlet Andrew Klapper Received: date / Accepted: date Abstract
More informationTHE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1
J. Appl. Math. & Informatics Vol. 31(2013), No. 1-2, pp. 179-188 Website: http://www.kcam.biz THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 JI-MI YIM, SUNG-JIN CHO, HAN-DOO KIM, UN-SOOK CHOI
More informationON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS
ON THE FIRST FALL DEGREE OF SUMMATION POLYNOMIALS STAVROS KOUSIDIS AND ANDREAS WIEMERS Abstract We improve on the first fall degree bound of polynomial systems that arise from a Weil descent along Semaev
More informationarxiv: v1 [cs.it] 27 May 2017
Volume xx No 0x 20xx xxx-xxx doi:xxx ON SHORTENED AND PUNCTURED CYCLIC CODES arxiv:170509859v1 csit 27 May 2017 Arti Yardi IRIT/INP-ENSEEIHT University of Toulouse Toulouse France Ruud Pellikaan Department
More informationExtended 1-perfect additive codes
Extended 1-perfect additive codes J.Borges, K.T.Phelps, J.Rifà 7/05/2002 Abstract A binary extended 1-perfect code of length n + 1 = 2 t is additive if it is a subgroup of Z α 2 Zβ 4. The punctured code
More informationIN this paper, we will introduce a new class of codes,
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,
More informationPolynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes
Polynomial interpolation over finite fields and applications to list decoding of Reed-Solomon codes Roberta Barbi December 17, 2015 Roberta Barbi List decoding December 17, 2015 1 / 13 Codes Let F q be
More informationHamming codes and simplex codes ( )
Chapter 6 Hamming codes and simplex codes (2018-03-17) Synopsis. Hamming codes are essentially the first non-trivial family of codes that we shall meet. We start by proving the Distance Theorem for linear
More informationREAL AND COMPLEX HOMOGENEOUS POLYNOMIAL ORDINARY DIFFERENTIAL EQUATIONS IN n-space AND m-ary REAL AND COMPLEX NON-ASSOCIATIVE ALGEBRAS IN n-space
Topological Methods in Nonlinear Analysis Journal of the Juliusz Schauder Center Volume 8, 1996, 327 333 REAL AND COMPLEX HOMOGENEOUS POLYNOMIAL ORDINARY DIFFERENTIAL EQUATIONS IN n-space AND m-ary REAL
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationGroup Ring Codes over a Dihedral Group ABSTRACT 1. INTRODUCTION
Malaysian Journal of Mathematical Sciences 9(S) June: 37-52 (2015) Special Issue: The 4 th International Cryptology and Information Security Conference 2014 (Cryptology 2014) MALAYSIAN JOURNAL OF MATHEMATICAL
More informationFast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm
Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University
More informationMINIMAL CODEWORDS IN LINEAR CODES. Yuri Borissov, Nickolai Manev
Serdica Math. J. 30 (2004, 303 324 MINIMAL CODEWORDS IN LINEAR CODES Yuri Borissov, Nickolai Manev Communicated by V. Brînzănescu Abstract. Cyclic binary codes C of block length n = 2 m 1 and generator
More informationLET be the finite field of cardinality and let
128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,
More informationOn permutation automorphism groups of q-ary Hamming codes
Eleventh International Workshop on Algebraic and Combinatorial Coding Theory June 16-22, 28, Pamporovo, Bulgaria pp. 119-124 On permutation automorphism groups of q-ary Hamming codes Evgeny V. Gorkunov
More informationIN [1] Kiermaier and Zwanzger construct the extended dualized Kerdock codes ˆK
New upper bounds on binary linear codes and a Z 4 -code with a better-than-linear Gray image Michael Kiermaier, Alfred Wassermann, and Johannes Zwanzger 1 arxiv:1503.03394v2 [cs.it] 16 Mar 2016 Abstract
More information11 Minimal Distance and the Parity Check Matrix
MATH32031: Coding Theory Part 12: Hamming Codes 11 Minimal Distance and the Parity Check Matrix Theorem 23 (Distance Theorem for Linear Codes) Let C be an [n, k] F q -code with parity check matrix H. Then
More information