Groebner basis techniques to compute weight distributions of shortened cyclic codes

Size: px
Start display at page:

Download "Groebner basis techniques to compute weight distributions of shortened cyclic codes"

Transcription

1 Groebner basis techniques to compute weight distributions of shortened cyclic codes 2nd February 2007 Massimiliano Sala Boole Centre for Research in Informatics, UCC Cork, Ireland. Abstract. Using Gröbner basis techniques, we can exhibit a method to get the distance and weight distribution of cyclic codes and shortened cyclic codes, improving earlier similar results for the distance of cyclic codes. Keywords: cyclic codes, distance, Gröbner bases, weight distribution. 1 Introduction Extensive work has been done to obtain the distance of cyclic codes and their weight distribution (see for example [1, 2, 5, 8, 10, 13, 14, 15, 19, 24]). The use of shortened cyclic codes in many applications has also pushed a parallel study on their properties (see for example [7, 9, 11, 12]). The author has proposed in [22] a method to get the distance of cyclic codes, via the computation of some Gröbner bases. We now show how this method can be improved (by presenting a system where useless solutions have been discarded a priori) and extended to get the weight distribution of cyclic codes. Moreover, a variation of this method allows the computation of the distance and the weight distribution also for shortened cyclic codes. The remainder of this paper is divided into three sections, as follows. Section 2, where we provide our notation. Section 3, where we provide our methods to compute distance and weight distribution for cyclic codes and their shortened codes. Section 4, where we draw some conclusions. 1

2 2 Notation and preliminaries For any a, b Z\{0}, (a, b) denotes their (positive) greatest common divisor. Let K be any field. We denote by χ(k) its characteristic and by K its algebraic closure. Let K[X 1,..., X N ] be any polynomial ring over K and I be any of its ideals. We denote by V(I) its variety, i.e. the set of its solutions V(I) = {ɛ (K) N p(ɛ) = 0, p I}. For any S (K) N, we denote by I K (S) the vanishing ideal on S, i.e. I K (S) = {p K[X 1,..., X N ] p(s) = 0, s S}. For any q we denote by F q the finite field with q elements (so that q is a power of prime χ(f q )). Let n 3 be any integer such that n and q are relatively prime. From now on, q, F q and n are understood. Let α be a primitive n-th root of unity in the splitting field F Q of x n 1 over F q, that is, n 1 (x n 1) = (x α i ). i=0 From now on, α, Q and F Q are understood. Let C be an F q [n, k, d] linear code, for some k 1 and d. Traditionally, integer set {A 0 (C), A 1 (C),..., A n (C)} is called the weight distribution of C, where A i = A i (C) is the number of codewords in C with (Hamming) weight i (0 i n). We recall that A 0 (C) = 1 for any C. Let C be a cyclic [n, k, d] code over F q. The generator polynomial of C will be denoted by g. A cyclic code with defining set S C = {h 1,..., h r } has a parity-check matrix H, which is the standard parity-check matrix, as follows 1 α h 1 α 2h 1 α (n 1)h 1 1 α h 2 α 2h 2 α (n 1)h 2 H = α hr α 2hr α (n 1)hr Observe that the entries of H lie in F Q. Definition 2.1. Let C be an F q cyclic code of length n. Let D be a subset of {0, 1,..., n 1}. Let l = D n 1. We denote by C(D) the code obtained from C by shortening in all positions in D. Clearly, the length of C(D) is n l and C(D) = C if and only if D =, which happens if and only if l = 0. Note that in the previous definition the first position is indicated by position 0 and the last position is indicated by position n 1. This is convenient, as it will be clear later on. 2

3 3 Computing the weight distribution In this section we present our method to compute the weight distribution (and hence the distance) of cyclic codes and their shortened codes. After a few definitions, we state our main result, Theorem 3.3 (without proof), and discuss it, providing some examples and applications. In Subsection 3.1 we give a proof of Theorem 3.3. Definition 3.1. For any i, j such that 1 i j n, we denote by p i,j the following polynomial in F q [z i, z j ]: n 1 p i,j (z i, z j ) = zi h zj n 1 h h=0 = zn i zn j z i z j Definition 3.2. Let C(D) be a shortened cyclic code with the notation adopted in Definition 2.1. Let S C = {h 1,..., h r }. Let w be an integer s.t. 1 w n l. We adopt the following notation: R w = F q [z 1,..., z w, y 1,..., y w ], R w = F Q [z 1,..., z w, y 1,..., y w ], P(D), for the set of w polynomials p i (z i ) = z n i 1 j D (z i α j ), 1 i w Ĵ C(D) (w), for the ideal in R w generated by P (D) and the following three sets of polynomials: {y q 1 1 1,..., y q 1 w 1} {p 1,2 (z 1, z 2 ),..., p i,j (z i, z j ),..., p w 1,w (z w 1, z w )} {y 1 z h y wz h 1 w,..., y 1 z hr y wz hr w } η(d)[w], for the number of solutions of ĴC(D)(w), i.e. for V(ĴC(D)(w)). We are ready for our main theorem. Theorem 3.3. Let C be an F q [n, k, d ] cyclic code. Let D be a subset of {0, 1,..., n 1} with 0 D = l n 1. Let C(D) be the corresponding shortened code. Let 1 w n l. Then A w (C(D)) = η(d)[w] w! When there is no shortening, we have D = and P (D) becomes P ( ) = {z n 1 1,..., zn w 1}, according to the standard convention that the product of a zero number of factors outputs 1 (Π = 1). In this case we denote by Ĵ C (w) the ideal Ĵ C( ) (w). Similarly, η[w] = η( )[w]. It is important to note that ideal ĴC(w) lies in the smaller ring R w and hence computations will be significantly easier. We thus get the following corollary for cyclic codes.. 3

4 Corollary 3.4. Let C be an F q [n, k, d] cyclic code. Let 1 w n. Then A w (C) = η[w] w! Since ĴC(D)(w) is clearly radical and the number of solutions of an ideal I are directly computed from any Groebner basis of I (see [3] for an efficient technique), we can easily describe an algorithm to compute the weight distribution (and hence the distance) of a (shortened) cyclic code.. Algorithm 3.5. Input An F q shortened cyclic code C(D) of length n l. An integer w s.t. 1 w n l. Output The element A w of the weight distribution of C(D). Step 1 Construct the associated system ĴC(D)(w). Step 2 Compute the Gröbner basis Ĝ(w) of the associated ideal. Step 3 Use Ĝ(w) to get the number η(d)[w] of solutions of ĴC(w). Finally output η(d)[w] w! In the binary case conditions {y q 1 i = 1} become trivial, since we get {y i = 1}, and so we can discard variables {y i }, rewriting ideal Ĵ C (D)(w) in polynomial ring T w = Z 2 [z 1,..., z w ] or T w = F Q [z 1,..., z w ], as generated by Ĵ C(D) (w) =< {z h zh 1 w,..., z hr zhr w } P (D) {p i,j (z i, z j )}, where as usual S C = {h 1,..., h r }. We now provide applications of this algorithm, with some remarks and improvements in some cases, as well as comparisons with previous results. For ease of presentation, we will only give examples in the binary case. We will always use degrevlex as the default ordering on polynomial rings, since it is well-known to be the most efficient. We start with a direct application of Theorem 3.3. Example 3.6. Let C be the binary cyclic code of length 15 which is the dual code of BCH(15, 5). We can take S C = {0, 5, 7} as a defining set for C. Suppose that D = {1, 2, 4}, so that the positions in D correspond to the roots of primitive polynomial x 4 + x + 1. With MAGMA ([16]) it is easy to compute the distance of C(D), which is 4, and the number A 4 (C(D)) of 4

5 its minimum weight words, A 4 (C(D)) = 5. We now want to check A 4, by constructing ideal J = ĴC(D)(4) and applying Algorithm 3.5. Polynomial set P (D) is formed by polynomials of kind p(z) = z15 1 z 4 + z + 1 = z11 + z 8 + z 7 + z 5 + z 3 + z 2 + z + 1, so that J is generated by the following polynomials z 1 5 +z 2 5 +z 3 5 +z 4 5, z 1 7 +z 2 7 +z 3 7 +z 4 7, z z 1 8 +z 1 7 +z 1 5 +z 1 3 +z 1 2 +z 1 +1, z z 2 8 +z 2 7 +z 2 5 +z 2 3 +z 2 2 +z 2 +1, z z 3 8 +z 3 7 +z 3 5 +z 3 3 +z 3 2 +z 3 +1, z z z z z z z 4 + 1, p 1,2 (z 1, z 2 ), p 1,3 (z 1, z 3 ), p 1,4 (z 1, z 4 ), p 2,3 (z 2, z 3 ), p 2,4 (z 2, z 4 ), p 3,4 (z 3, z 4 ). The leading terms of the Gröbner basis Ĝ(4) of J are: {z 1 z 2, z 1 z 3 2, z 2 2 z 3 2, z 1 4, z 1 2 z 4 3, z 2 5, z 2 3 z 4 3, z 3 6, z 4 7, z 3 4 z 4 3 } so that the number of solutions is η(d)[4] = 120 and A 4 is 120/4! = 5. Ideal Ĵ C(D) (4) in Example 3.6 has an interesting property: it lies in T w even if the code is a shortened cyclic code. This is due to the fact that we have shortened in positions exactly corresponding to roots of a polynomial with coefficients in Z 2, so that j D (z i α j ) Z 2 [z i ] and hence p i (z i ) Z 2 [z i ]. It is well-known that this happens if and only if D is a union of cyclotomic sets. If D contains only a portion of a conjugacy class, then we are forced to use equations P (D) with coefficients in F Q rather than in Z 2. This is unfortunate, because handling coefficients in a bigger field is more computationally costly and is equivalent to adding another variable to the Gröbner basis computation. However, there is a family of shortened cyclic codes, whose codewords can always be computed working in T w. Fact 3.7. Let C(D) be a shortened cyclic code such that D = 1. Then Algorithm 3.5 needs computations only with coefficients in F q. Proof. It is well-known in Coding theory that shortening once a cyclic code gives rise to equivalent codes. So, if D = 1, we can always suppose D = {0}. But {0} is a cyclotomic set for any q. We provide an example of application of Fact 3.7. Example 3.8. We compute the number A 5 of minimum weight word for code Ċ = C(D), which is the shortened code (in any position) of C = BCH(63, 5). We apply Algorithm 3.5 and Fact 3.7. Ideal ĴĊ(5) is generated by the {p i,j (z i, z j )} 1 i<j 5 and z 1 +z 2 +z 3 +z 4 +z 5, z1 3 +z2 3 +z3 3 +z4 3 +z5, 3 z1, l z2, l 5 l=0 l=0 62 l=0 z l 3, 62 l=0 62 z4, l z5 l. l=0

6 The leading terms of the reduced Gröbner basis w.r.t. degrevlex are: z 1 z 2 2 z 3 z 28 2 z 29 3 z 12 2 z32 4 z 13 3 z32 4 z 26 2 z30 4 z2 5 z3 27z30 4 z2 5 z4 58z2 5 z2 2z56 4 z2 5 z4 60 z2 4z56 4 z3 3z56 4 z2 5 z3 5z56 4 z5 62 z2 10z46 4 z6 5 z3 11z46 4 z6 5 z2 4z54 4 z6 5 z 5 z4 54z6 5 z2 10z30 4 z30 5 z3 11z30 4 z30 5 z2 2z54 4 z30 5 z3 3z54 4 z30 5 The number of solutions is η[5] = η({0})[5] = , the permutations are 5! and so the minimum weight codewords are A 5 = /120 = 1740 (fully compliant to known results). The argument presented so far are a generalization and improvements of arguments presented in [22], as we now show. Definition 3.9 ([22]). Let C be an F q [n, k, d] cyclic code with a defining set S C = {h 1,..., h r }. Let w be an integer 1 w n. We denote by J C (w) the ideal in R w generated by: J C (w) =< {y 1 z h y wz h 1 w,..., y 1 z hr y wz hr w } {z1 n+1 z 1,..., zw n+1 z w } {y q 1 1 1,..., yw q 1 1} >. It is clear that, for any C and any w, ideal J C (w) is larger than ideal Ĵ C (w), so that the former contains some spurious solutions. However, in some cases the author in [22] is able to count the spurious solutions with combinatorial arguments, so that ideal J C (w) can be used to determine the distance by checking the smallest w s.t. J C (w) contains some proper solutions. Unfortunately, no equivalent of Lemma 3.14 appears in said paper, so that J C (w) did not look useful for computing the weight distribution. By Lemma 3.14 we can now subtract from V(J C (w)) the number of spurious solutions and divide the result by w!. This is an alternative approach to Algorithm 3.5, but it can only be used in those cases where formulae for counting spurious solutions are known and it is not clear how similar combinatorial formulae might be obtained for shortened codes. In this sense, our results so far are an improvement and a generalization on results in [22]. We now provide an example, the computation of the full weight distribution of a small binary cyclic code, where we use both methods. Example We compute the weight distribution of C = BCH(15, 5). As it is a narrow-sense BCH code, it is enough to compute A i for 5 i 7 (A n i = A i and its distance is at least 5 for the BCH bound). The computation of J C (5) had already been made in [22], where it was shown that V(J C (5)) = 5536 and the number of spurious solutions is By Applying Lemma 3.14, we immediately get A 5 = ! = = 18. To compute A 6, we apply Theorem 3.3. We construct ĴC(6) and we compute its Gröbner basis Ĝ(6), whose leading terms are 6

7 {z 1, z 2 2z 3, z 4 2, z 5 3, z 2 2z 6 4z 2 5, z 3 3z 6 4z 2 5, z 10 4 z 2 5, z 12 4, z 14 5, z 15 6 }, so that η[6] = and hence A 6 = 21600/720 = 30. To compute A 7, we apply Theorem 3.3. We construct ĴC(7) and compute Ĝ(7), whose leading terms are {z 1, z2 2, z3 3, z4 4 z 5, z4 12, z13 5, z14 6, z15 7 }, so that η[7] = and hence A 7 = 75600/5040 = 15. We can summarize our results using the known symmetry of the weight distribution for classical BCH codes: A i = 0 for 1 i 4 and 11 i 14, A 0 = 1, A 5 = 18, A 6 = 30, A 7 = 15, A 8 = 15, A 9 = 30, A 10 = 18, A 15 = 1. For some C we can use a result from [22] in our new context, but only when we compute the number of minimum codewords, i.e. A d (C). We summarize these ideas in the following remark. Remark Let J be the ideal defined exactly as ĴC(d) except that polynomials {p i,j } are not included in its basis. If C is binary cyclic and 1 S C, it is proved in [22] that J contains no spurious solutions. This means that J contains the {p i,j } even if they are not added to the basis. From a computational point of view this is important, because sometimes the computation of the Groebner basis starting from the full basis of ĴC(d) can be too expensive, while the computation starting only from the basis of J can be lighter. Intermediate approaches are possible, by adding only some of the {p i,j }. We provide a table with some comparisons (Table 1), from which it is clear that sometimes it is convenient to use an approach, sometimes another. In Table 1 the comparison is between J C (δ), J C (δ) (obtained from J C (δ) by adding polynomial p δ 1,δ ) and J C (δ) (obtained from J C (δ) by adding polynomials {p δ 2,δ 1, p δ 2,δ, p δ 1,δ }). The comparison is done for some BCH(n, δ) codes, with varying lengths and designed distances. Table 1: Comparison Between J C (δ), J C (δ) and J C (δ) n δ A δ time J C time J C time J C (δ) < 1 sec < 1 sec < 1 sec < 1 sec < 1 sec < 1 sec sec 21 sec 1 sec sec 17 sec 8 sec sec 7 sec 8 sec sec 1116 sec 1202 sec sec 3 sec 5 sec sec 1116 sec 219 sec sec 454 sec 642 sec 7

8 3.1 Proof of Theorem 3.3 Let c = (c 0,..., c n 1 ) C be a codeword of weight w. There are w non-zero components in C. We may collect their positions in set {µ 1,..., µ w } and their values in set T = {ν 1,..., ν w } in such a way that c µi = ν i, for any 1 i w. Thus c = (0,..., 0, ν }{{} 1, 0,..., 0, ν i, 0,..., 0, ν w µ 1 1 µ 1 µ i µw, 0,..., 0). }{{} n 1 µ w However, we are not imposing any order on set {µ 1,..., µ w } and µ 1 is not necessarily the smallest of the {µ i }. Let H be the standard parity-check matrix of C. Since c C, we must have Hc = 0, i.e. (1) (α h 1 ) µ 1 ν (α hw ) µw ν w = 0,..., (α hr ) µ 1 ν (α hr ) µw ν w = 0. Let I 1 R w = F q [z 1,..., z w, y 1,..., y w ] be the ideal generated by {y 1 z h y wz h 1 w,..., y 1 z hr y wz hr w }. Let ɛ = (α µ 1,..., α µw, ν 1,..., ν w ) (F Q ) 2w. From equations (1) we immediately get that ɛ is a solution of I 1 corresponding to codeword c. Since I 1 depends only on w and not on c, we have that any codeword of weight w corresponds to at least one solution of I 1. In other words, we can say that variety V(I 1 ) contains points corresponding to codewords of C with weight w. We call this kind of points proper solutions. However, there are other points in V(I 1 ), apart from the proper solutions, and we call them spurious solutions. First of all, since α F Q and T F q, we can discard all points outside F w Q Fw q. Second, since α is a (primitive) n-th root of unity, we have that all its powers satisfy z n = 1. This means that we lose no proper solutions if we consider the smaller variety V(I 2 ), where I 2 is the ideal in R w generated by I 1 and the two polynomial sets {y q 1 1 1,..., y q 1 w 1}, {z n 1 1,..., z n w 1}. Observe that condition y q 1 i = 1 ensures that the value lies in F q but also that it cannot be zero (the y variables correspond to error values and any error value cannot be zero). Although we have removed some spurious solutions, we still have some of them, because a point of type ɛ = (α µ 1,..., α µw, ν 1,..., ν w ), with µ i = µ j for some i j, cannot correspond to a codeword, since µ i and µ j must correspond to different positions for the error values ν i and ν j. To remove these spurious solutions, we need to add polynomials {p i,j } introduced in Definition 3.1, as we are going to show. 8

9 Definition Let K be any field. Let w and n be two integers such that 1 w n. Let E be the splitting field of x n 1 over K. We denote by V w,n the algebraic variety defined in E w as V w,n = {( z 1,..., z w ) z n i 1 = 0 for 1 i w, z i z j for 1 i j w}. We denote by I the vanishing ideal I = I K (V w,n ) Observe that V(I) = V w,n (by definition) and that points of variety V w,n correspond exactly to sets of w different n-th roots of unity. In the following fact, we give an explicit description for I in the polynomial ring K[z 1,..., z w ], imposing only condition (n, χ(k)) = 1, which is actually a standard condition of non-degeneracy in cyclic code theory (and which arises in this more general setting). Proposition Let K be any field. Let w and n be two integers such that 1 w n and (n, χ(k)) = 1. Then we can take the following set of polynomials as a basis for I: F = {z n 1 1,..., z n w 1, } {p i,j } 1 i<j w. Proof. Let E be the splitting field of x n 1 over K. Let z = ( z 1,..., z w ) be any point in V w,n and let z = ( z 1,..., z w ) be any element in E n lying outside V w,n. We have to show that 1. z satisfies all polynomials in F and 2. there is at least a polynomial in F that is not annihilated by z. First, we deal with case 1. It is obvious that z annihilates every polynomial in F of kind z n i 1, by definition of V w,n. If we take i and j such that 1 i < j w, we have only to show that p i,j ( z i, z j ) = 0. As z n i = 1 = z n j, we have 0 = ( z n i z n j ) = ( z i z j ) p i,j ( z i, z j ), but z V w,n implies ( z i z j ) 0 and so p i,j ( z i, z j ) = 0. We now deal with case 2. If z has at least a component z i which is not an n-th root of unity, then polynomial zi n 1 in F does not vanish in z. If z has all components which are n-th roots of unity, but it has two components, z i and z j, which have the same non-zero value a, then polynomial p i,j does not vanish in (a, a), since and (χ(k), n) = 1. n 1 p i,j (a, a) = a h a n 1 h = na n 1 h=0 9

10 Returning to the proof of Theorem 3.3, by applying Proposition 3.13 it is now clear that we can consider ideal I 3 in R w generated by I 2 and F. It is also clear that I 3 = ĴC(w). Its variety V = V(I 3 ) does not contain spurious solutions of the previous type and we claim that actually it contains only points coming from codewords of C of weight w. To prove our claim, we take an arbitrary point ɛ = ( z 1,..., z w, ȳ 1,..., ȳ w ) in V. Since z n i 1 I 3 for any i, we can write any z i as z i = α µ i, for some 0 µ i n 1. Since z i z j for any i j and 0 µ i n 1 for any i, we have that µ i µ j for any i j. We now consider vector c in (F q ) n c = (0,..., 0, ȳ }{{} 1, 0,..., 0, ȳ i, 0,..., 0, ȳ w µ 1 1 µ 1 µ i µw, 0,..., 0). }{{} n 1 µ w A direct check shows that c is actually a codeword (because it satisfies H c = 0) and hence our claim has been proved. We now know that variety V(ĴC(w)) contains only proper solutions and that to any codeword of weight w corresponds at least a point in V(ĴC(w)). We can show more in the following lemma. Lemma Let (ȳ, z) = (ȳ 1,..., ȳ w, z 1,..., z w ) be a solution of system Ĵ C (w), which corresponds to a codeword x C. Let π S w, where S w is the symmetric group on w elements. Then any permutation (ȳ, z) π of (ȳ, z) of type (ȳ π(1),..., ȳ π(w), z π(1),..., z π(w) ) is a solution of ĴC(w) and corresponds to the same codeword x. Furthermore, the {(ȳ, z) π } are distinct as π varies. Proof. System ĴC(w) is obviously invariant under variable permutations of the following nature: (y 1,..., y w, z 1,..., z w ) (y π(1),..., y π(w), z π(1),..., z π(w) ), where π S w, so that any such permutation of any solution of Ĵ C (w) is again a solution of ĴC(w). As variables {z j } correspond to the positions of the non-zero coordinates of the codeword x, their ordering is inessential. Similarly for the {y j }, which correspond to the values of these non-zero coordinates, provided they follow their associated {z j } variables in the permutation. It is then clear that the {(ȳ, z) π } are distinct as π varies. Let c be a codeword of weight w in C(D). By definition of shortening this codeword can be seen as a codeword in C of weight w, such that it has zero components at least in positions of D. Since c is a codeword in C of weight w, it corresponds to w! solutions of ĴC(w). Since all its components in positions of D are zero, we have that its corresponding solutions satisfy also p i (z i ) = 0. But the adding of polynomials {p i } to ĴC(w) is exactly what is needed to obtain ĴC(D)(w). 10

11 In conclusion, to any codeword of weight w in C(D) there correspond w! solutions of ĴC(D)(w). Moreover, all solutions of ĴC(D)(w) are of this kind. These two facts and Lemma 3.14 prove Theorem Conclusions In this paper a method to compute the weight distribution of shortened (and non-shortened) cyclic codes has been shown, along with applications and some special cases. Our method depends on the computation of a Gröbner basis for a suitable polynomial ideal. This approach was pioneered in [6], where a related ideal (called the CRHT ideal ) was proposed in order to decode cyclic codes up to their actual distance (rather than up to the BCH bound or other similar bounds). In fact, the ideal used in [4, 18, 22, 23] is a natural application of the CRHT ideal and the ideal proposed in Definition 3.2 is a direct improvement of the latter. Moreover, an improvement on the structure of the ideal CRHT itself has led to new decoding algorithms for cyclic codes ([21, 20]). However, this paper does not deal uniquely with cyclic codes, but extends these Gröbner basis applications to other classes of codes. We have some work in progress for classical Goppa codes and other algebraic codes. 5 Acknowledgments The author wishes to thank Patrick Fitzpatrick, Teo Mora and Carlo Traverso, for many fruitful suggestions and hints. He also wishes to thank the anonymous referees, whose comments greatly improved the paper presentation. A special thank to Marc Giusti, for the use of the computation resources of MEDICIS [17], and to all the team of Singular, which has been the preferred software package for computing Gröbner bases. This work has been partially supported by STMicroelectronics contract Complexity issues in algebraic Coding Theory and Cryptography. References [1] A.M. Barg, I.I. Dumer, On Computing the Weight Spectrum of Cyclic Codes, IEEE Trans. on Inf. Th., vol. 38, no. 4, p , Jul [2] E. Betti, M. Sala, A new bound for the minimum distance of a cyclic code from its defining set, IEEE Trans. on Inf. Th., vol. 52, no. 8, p , [3] A.M. Bigatti, P. Conti, L. Robbiano, C. Traverso, A Divide and Conquer algorithm for Hilbert-Poincaré Series, Multiplicity and Dimension 11

12 of Monomial Ideals, Applied algebra, algebraic algorithms and errorcorrecting codes (San Juan, PR, 1993), Springer Verlag, p , [4] M. Caboara, T. Mora, The Chen-Reed-Helleseth-Truong decoding algorithm and the Gianni-Kalkbrenner Gröbner shape theorem, AAECC, vol. 13, no. 3, , [5] L. Carlitz, S. Uchiyama, Bounds for exponential sums, Duke Math. J., vol. 24, p , Dec [6] X. Chen, I.S. Reed, T. Helleseth, K. Truong, Use of Gröbner Bases to Decode Binary Cyclic Codes up to the True Minimum Distance, IEEE Trans. on Inf. Th., vol. 40, p , [7] F. Corr, A shortened cyclic code for multiple errors, IEEE Trans. on Inf. Th., vol. 12, no. 3, p , Jul [8] Y. Desaki, T. Fujiwara and T. Kasami, The Weight Distributions of Extended Binary Primitive BCH Codes of Length 128, IEEE Trans. on Inf. Th., vol. 43, no 4, p , Jul [9] A. Dur, A fast algorithm to determine the burst-correcting limit of cyclic or shortened cyclic codes, IEEE Trans. on Inf. Th., vol. 38, no. 2, p , Mar [10] T. Fujiwara, T. Kasami, The Weight Distributions of (256,k) Extended Binary Primitive BCH Codes with k 63 and k 207, Technical Report of IEICE, IT97-46 ( ), p [11] H. Hsu, A class of shortened cyclic codes for a compound channel, IEEE Trans. on Inf. Th., vol. 20, no. 1, p , Jan [12] J.M. Jensen, A class of constacyclic codes, IEEE Trans. on Inf. Th., vol. 40, no. 3, p , May [13] T. Kasami and S. Lin, Some Results on the Minimum Weight of BCH Codes, IEEE Trans. on Inf. Th., vol. 18, p , Nov [14] O. Keren, S. Litsyn, More on the Distance Distribution of BCH Codes, IEEE Trans. on Inf. Th., vol. 45, no 1, p , [15] I. Krasikov, S. Litsyn, On the Distance Distribution of Duals of BCH Codes, IEEE Trans. on Inf. Th., vol. 45, no. 1, p , January [16] MAGMA, [17] MEDICIS, 12

13 [18] T. Mora, M. Sala, On the Groebner bases for some symmetric systems and their application to Coding Theory, Journal of Symbolic Computation, vol. 35, no. 2, p , Feb [19] O. Moreno, C.J. Moreno, The MacWilliams-Sloane Conjecture on the Tightness of the Carlitz-Uchiyama Bound and the Weights of Duals of BCH Codes, IEEE Trans. on Inf. Th., vol. 40, no. 6, p , [20] E. Orsini, M. Sala, General error locator polynomials for binary cyclic codes with t 2 and n < 63, IEEE Trans. on Inf. Th., vol. 53, n.3, p. 1 14, MEGA2005, Alghero, Italy, 2005, accepted for publication on IEEE Trans. on Inf. Th., [21] E. Orsini, M. Sala, Correcting errors and erasures via the syndrome variety, J. Pure Appl. Algebra, vol. 200, p , [22] M. Sala, Gröbner bases and distance of cyclic codes, AAECC, vol. 13, no. 2, , [23] M. Sala, Gröbner bases, accelerator polynomials and binary cyclic codes with coincident distance, preprint, Dept. of Math. of Univ. of Pisa, [24] M. Sala, A. Tamponi, A Linear Programming Estimate of the Weight Distribution of BCH(255, k), IEEE Trans. on Inf. Th., vol. 46, no. 6, p ,

General error locator polynomials for binary cyclic codes with t 2 and n < 63

General error locator polynomials for binary cyclic codes with t 2 and n < 63 General error locator polynomials for binary cyclic codes with t 2 and n < 63 April 22, 2005 Teo Mora (theomora@disi.unige.it) Department of Mathematics, University of Genoa, Italy. Emmanuela Orsini (orsini@posso.dm.unipi.it)

More information

General error locator polynomials for nth-root codes

General error locator polynomials for nth-root codes General error locator polynomials for nth-root codes Marta Giorgetti 1 and Massimiliano Sala 2 1 Department of Mathematics, University of Milano, Italy 2 Boole Centre for Research in Informatics, UCC Cork,

More information

A classification of MDS binary systematic codes

A classification of MDS binary systematic codes A classification of MDS binary systematic codes Eleonora Guerrini (guerrini@science.unitn.it) Department of Mathematics, University of Trento, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre

More information

On the Weight Distribution of N-th Root Codes

On the Weight Distribution of N-th Root Codes Fabrizio Caruso Marta Giorgetti June 10, 2009 The Recurrence Proof by Generating Functions A Computer-Generated Proof Computing Some Steps of the Recurrence A Computer-Provable Identity Proving the Guessed

More information

A commutative algebra approach to linear codes

A commutative algebra approach to linear codes A commutative algebra approach to linear codes Marta Giorgetti (giorge@mat.unimi.it) Department of Mathematics, University of Milano, Italy. Massimiliano Sala (msala@bcri.ucc.ie) Boole Centre for Research

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013

Coding Theory and Applications. Solved Exercises and Problems of Cyclic Codes. Enes Pasalic University of Primorska Koper, 2013 Coding Theory and Applications Solved Exercises and Problems of Cyclic Codes Enes Pasalic University of Primorska Koper, 2013 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a collection of solved

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Codes over Subfields. Chapter Basics

Codes over Subfields. Chapter Basics Chapter 7 Codes over Subfields In Chapter 6 we looked at various general methods for constructing new codes from old codes. Here we concentrate on two more specialized techniques that result from writing

More information

A theory for the distance of cyclic codes

A theory for the distance of cyclic codes A theory for the distance of cyclic codes (msala@bcri.ucc.ie) Boole Centre for Research in Informatics, UCC Cork, Ireland (Part of this work is jointly with E. Betti and F. Ponchio) Workshop D1: Gröbner

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

Interesting Examples on Maximal Irreducible Goppa Codes

Interesting Examples on Maximal Irreducible Goppa Codes Interesting Examples on Maximal Irreducible Goppa Codes Marta Giorgetti Dipartimento di Fisica e Matematica, Universita dell Insubria Abstract. In this paper a full categorization of irreducible classical

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

EXPLICIT EVALUATIONS OF SOME WEIL SUMS. 1. Introduction In this article we will explicitly evaluate exponential sums of the form

EXPLICIT EVALUATIONS OF SOME WEIL SUMS. 1. Introduction In this article we will explicitly evaluate exponential sums of the form EXPLICIT EVALUATIONS OF SOME WEIL SUMS ROBERT S. COULTER 1. Introduction In this article we will explicitly evaluate exponential sums of the form χax p α +1 ) where χ is a non-trivial additive character

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES. 1. Introduction

ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES. 1. Introduction Bulletin of the Iranian Mathematical Society Vol 31 No 2 (2005), pp 13-32 ON THE GRÖBNER BASIS OF A FAMILY OF QUASI-CYCLIC LDPC CODES MARTA GIORGETTI*, MARTA ROSSI AND MASSIMILIANO SALA Abstract In [30]

More information

Repeated-Root Self-Dual Negacyclic Codes over Finite Fields

Repeated-Root Self-Dual Negacyclic Codes over Finite Fields Journal of Mathematical Research with Applications May, 2016, Vol. 36, No. 3, pp. 275 284 DOI:10.3770/j.issn:2095-2651.2016.03.004 Http://jmre.dlut.edu.cn Repeated-Root Self-Dual Negacyclic Codes over

More information

Math 40510, Algebraic Geometry

Math 40510, Algebraic Geometry Math 40510, Algebraic Geometry Problem Set 1, due February 10, 2016 1. Let k = Z p, the field with p elements, where p is a prime. Find a polynomial f k[x, y] that vanishes at every point of k 2. [Hint:

More information

HILBERT BASIS OF THE LIPMAN SEMIGROUP

HILBERT BASIS OF THE LIPMAN SEMIGROUP Available at: http://publications.ictp.it IC/2010/061 United Nations Educational, Scientific and Cultural Organization and International Atomic Energy Agency THE ABDUS SALAM INTERNATIONAL CENTRE FOR THEORETICAL

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

The cocycle lattice of binary matroids

The cocycle lattice of binary matroids Published in: Europ. J. Comb. 14 (1993), 241 250. The cocycle lattice of binary matroids László Lovász Eötvös University, Budapest, Hungary, H-1088 Princeton University, Princeton, NJ 08544 Ákos Seress*

More information

On sets without tangents and exterior sets of a conic

On sets without tangents and exterior sets of a conic On sets without tangents and exterior sets of a conic Geertrui Van de Voorde Abstract A set without tangents in PG(2, q) is a set of points S such that no line meets S in exactly one point. An exterior

More information

Open problems on cyclic codes

Open problems on cyclic codes Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

On Locating-Dominating Codes in Binary Hamming Spaces

On Locating-Dominating Codes in Binary Hamming Spaces Discrete Mathematics and Theoretical Computer Science 6, 2004, 265 282 On Locating-Dominating Codes in Binary Hamming Spaces Iiro Honkala and Tero Laihonen and Sanna Ranto Department of Mathematics and

More information

On formulas for decoding binary cyclic codes

On formulas for decoding binary cyclic codes On formulas for decoding binary cyclic codes Daniel Augot INRIA-Rocquencourt Domaine de Voluceau Le Chesnay, FRANCE Magali Bardet Laboratoire LITIS Université de Rouen Jean-Charles Faugère INRIA Rocquencourt,

More information

9. Integral Ring Extensions

9. Integral Ring Extensions 80 Andreas Gathmann 9. Integral ing Extensions In this chapter we want to discuss a concept in commutative algebra that has its original motivation in algebra, but turns out to have surprisingly many applications

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

Generalized hashing and applications to digital fingerprinting

Generalized hashing and applications to digital fingerprinting Generalized hashing and applications to digital fingerprinting Noga Alon, Gérard Cohen, Michael Krivelevich and Simon Litsyn Abstract Let C be a code of length n over an alphabet of q letters. An n-word

More information

IN this paper, we will introduce a new class of codes,

IN this paper, we will introduce a new class of codes, IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 44, NO 5, SEPTEMBER 1998 1861 Subspace Subcodes of Reed Solomon Codes Masayuki Hattori, Member, IEEE, Robert J McEliece, Fellow, IEEE, and Gustave Solomon,

More information

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields

Computing Minimal Polynomial of Matrices over Algebraic Extension Fields Bull. Math. Soc. Sci. Math. Roumanie Tome 56(104) No. 2, 2013, 217 228 Computing Minimal Polynomial of Matrices over Algebraic Extension Fields by Amir Hashemi and Benyamin M.-Alizadeh Abstract In this

More information

z -FILTERS AND RELATED IDEALS IN C(X) Communicated by B. Davvaz

z -FILTERS AND RELATED IDEALS IN C(X) Communicated by B. Davvaz Algebraic Structures and Their Applications Vol. 2 No. 2 ( 2015 ), pp 57-66. z -FILTERS AND RELATED IDEALS IN C(X) R. MOHAMADIAN Communicated by B. Davvaz Abstract. In this article we introduce the concept

More information

Alternant and BCH codes over certain rings

Alternant and BCH codes over certain rings Computational and Applied Mathematics Vol. 22, N. 2, pp. 233 247, 2003 Copyright 2003 SBMAC Alternant and BCH codes over certain rings A.A. ANDRADE 1, J.C. INTERLANDO 1 and R. PALAZZO JR. 2 1 Department

More information

On Weight Distributions of Homogeneous Metric Spaces Over GF (p m ) and MacWilliams Identity

On Weight Distributions of Homogeneous Metric Spaces Over GF (p m ) and MacWilliams Identity Global Journal of Mathematical Sciences: Theory and Practical. ISSN 0974-3200 Volume 4, Number 2 (2012), pp. 159-164 International Research Publication House http://www.irphouse.com On Weight Distributions

More information

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring

Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Decoding Procedure for BCH, Alternant and Goppa Codes defined over Semigroup Ring Antonio Aparecido de Andrade Department of Mathematics, IBILCE, UNESP, 15054-000, São José do Rio Preto, SP, Brazil E-mail:

More information

Counting and Gröbner Bases

Counting and Gröbner Bases J. Symbolic Computation (2001) 31, 307 313 doi:10.1006/jsco.2000.1575 Available online at http://www.idealibrary.com on Counting and Gröbner Bases K. KALORKOTI School of Computer Science, University of

More information

On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields

On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 47, NO 7, NOVEMBER 2001 2751 On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields San Ling Patrick Solé, Member, IEEE Abstract A new algebraic

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

LET be the finite field of cardinality and let

LET be the finite field of cardinality and let 128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,

More information

8. Prime Factorization and Primary Decompositions

8. Prime Factorization and Primary Decompositions 70 Andreas Gathmann 8. Prime Factorization and Primary Decompositions 13 When it comes to actual computations, Euclidean domains (or more generally principal ideal domains) are probably the nicest rings

More information

Binary construction of quantum codes of minimum distances five and six

Binary construction of quantum codes of minimum distances five and six Discrete Mathematics 308 2008) 1603 1611 www.elsevier.com/locate/disc Binary construction of quantum codes of minimum distances five and six Ruihu Li a, ueliang Li b a Department of Applied Mathematics

More information

On the BMS Algorithm

On the BMS Algorithm On the BMS Algorithm Shojiro Sakata The University of Electro-Communications Department of Information and Communication Engineering Chofu-shi, Tokyo 182-8585, JAPAN Abstract I will present a sketch of

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005

Chapter 7. Error Control Coding. 7.1 Historical background. Mikael Olofsson 2005 Chapter 7 Error Control Coding Mikael Olofsson 2005 We have seen in Chapters 4 through 6 how digital modulation can be used to control error probabilities. This gives us a digital channel that in each

More information

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials

Outline. MSRI-UP 2009 Coding Theory Seminar, Week 2. The definition. Link to polynomials Outline MSRI-UP 2009 Coding Theory Seminar, Week 2 John B. Little Department of Mathematics and Computer Science College of the Holy Cross Cyclic Codes Polynomial Algebra More on cyclic codes Finite fields

More information

DEPTH OF FACTORS OF SQUARE FREE MONOMIAL IDEALS

DEPTH OF FACTORS OF SQUARE FREE MONOMIAL IDEALS DEPTH OF FACTORS OF SQUARE FREE MONOMIAL IDEALS DORIN POPESCU Abstract. Let I be an ideal of a polynomial algebra over a field, generated by r-square free monomials of degree d. If r is bigger (or equal)

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM)

New Algebraic Decoding of (17,9,5) Quadratic Residue Code by using Inverse Free Berlekamp-Massey Algorithm (IFBM) International Journal of Computational Intelligence Research (IJCIR). ISSN: 097-87 Volume, Number 8 (207), pp. 205 2027 Research India Publications http://www.ripublication.com/ijcir.htm New Algebraic

More information

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014

Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Anna Dovzhik 1 Coding Theory: Linear-Error Correcting Codes Anna Dovzhik Math 420: Advanced Linear Algebra Spring 2014 Sharing data across channels, such as satellite, television, or compact disc, often

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

Section X.55. Cyclotomic Extensions

Section X.55. Cyclotomic Extensions X.55 Cyclotomic Extensions 1 Section X.55. Cyclotomic Extensions Note. In this section we return to a consideration of roots of unity and consider again the cyclic group of roots of unity as encountered

More information

Partial Permutation Decoding for abelian codes

Partial Permutation Decoding for abelian codes 1 Partial Permutation Decoding for abelian codes José Joaquín Bernal Juan Jacobo Simón Abstract In [3], we introduced a technique to construct an information set for every semisimple abelian code over

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

Reverse Berlekamp-Massey Decoding

Reverse Berlekamp-Massey Decoding Reverse Berlekamp-Massey Decoding Jiun-Hung Yu and Hans-Andrea Loeliger Department of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {yu, loeliger}@isi.ee.ethz.ch arxiv:1301.736v

More information

The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes

The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes C Designs, Codes and Cryptography, 24, 313 326, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. The Structure of 1-Generator Quasi-Twisted Codes and New Linear Codes NUH AYDIN Department

More information

PERIODIC POINTS OF THE FAMILY OF TENT MAPS

PERIODIC POINTS OF THE FAMILY OF TENT MAPS PERIODIC POINTS OF THE FAMILY OF TENT MAPS ROBERTO HASFURA-B. AND PHILLIP LYNCH 1. INTRODUCTION. Of interest in this article is the dynamical behavior of the one-parameter family of maps T (x) = (1/2 x

More information

Computing Error Distance of Reed-Solomon Codes

Computing Error Distance of Reed-Solomon Codes Computing Error Distance of Reed-Solomon Codes Guizhen Zhu Institute For Advanced Study Tsinghua University, Beijing, 100084, PR China Email:zhugz08@mailstsinghuaeducn Daqing Wan Department of Mathematics

More information

CHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998

CHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998 CHAPTER 0 PRELIMINARY MATERIAL Paul Vojta University of California, Berkeley 18 February 1998 This chapter gives some preliminary material on number theory and algebraic geometry. Section 1 gives basic

More information

Computation of the Minimal Associated Primes

Computation of the Minimal Associated Primes Computation of the Minimal Associated Primes Santiago Laplagne Departamento de Matemática, Universidad de Buenos Aires Buenos Aires, Argentina slaplagn@dm.uba.ar Abstract. We propose a new algorithm for

More information

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes

Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Constructions of Optimal Cyclic (r, δ) Locally Repairable Codes Bin Chen, Shu-Tao Xia, Jie Hao, and Fang-Wei Fu Member, IEEE 1 arxiv:160901136v1 [csit] 5 Sep 016 Abstract A code is said to be a r-local

More information

Möller s Algorithm. the algorithm developed in [14] was improved in [18] and applied in order to solve the FGLM-problem;

Möller s Algorithm. the algorithm developed in [14] was improved in [18] and applied in order to solve the FGLM-problem; Möller s Algorithm Teo Mora (theomora@disi.unige.it) Duality was introduced in Commutative Algebra in 1982 by the seminal paper [14] but the relevance of this result became clear after the same duality

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Lower bound of the covering radius of binary irreducible Goppa codes

Lower bound of the covering radius of binary irreducible Goppa codes Lower bound of the covering radius of binary irreducible Goppa codes Sergey Bezzateev, Natalia Shekhunova To cite this version: Sergey Bezzateev, Natalia Shekhunova. Lower bound of the covering radius

More information

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40 A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr

More information

MATH 326: RINGS AND MODULES STEFAN GILLE

MATH 326: RINGS AND MODULES STEFAN GILLE MATH 326: RINGS AND MODULES STEFAN GILLE 1 2 STEFAN GILLE 1. Rings We recall first the definition of a group. 1.1. Definition. Let G be a non empty set. The set G is called a group if there is a map called

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases

Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases MM Research Preprints, 42 48 No. 16, April 1998. Beijing Construction of a Class of Algebraic-Geometric Codes via Gröbner Bases Changyan Di, Zhuojun Liu Institute of Systems Science Academia Sinica, Beijing

More information

CYCLIC SIEVING FOR CYCLIC CODES

CYCLIC SIEVING FOR CYCLIC CODES CYCLIC SIEVING FOR CYCLIC CODES ALEX MASON, VICTOR REINER, SHRUTHI SRIDHAR Abstract. These are notes on a preliminary follow-up to a question of Jim Propp, about cyclic sieving of cyclic codes. We show

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

12. Hilbert Polynomials and Bézout s Theorem

12. Hilbert Polynomials and Bézout s Theorem 12. Hilbert Polynomials and Bézout s Theorem 95 12. Hilbert Polynomials and Bézout s Theorem After our study of smooth cubic surfaces in the last chapter, let us now come back to the general theory of

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

On the Gröbner basis of a family of quasi-cyclic LDPC codes

On the Gröbner basis of a family of quasi-cyclic LDPC codes On the Gröbner basis of a family of quasi-cyclic LDPC codes July 21, 2005 Marta Giorgetti (giorge@matunimiit) Department of Mathematics, University of Milan, Italy Marta Rossi (martarossi@possodmunipiit)

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 14 April. Binomial Ideals

MCS 563 Spring 2014 Analytic Symbolic Computation Monday 14 April. Binomial Ideals Binomial Ideals Binomial ideals offer an interesting class of examples. Because they occur so frequently in various applications, the development methods for binomial ideals is justified. 1 Binomial Ideals

More information

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm

Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm Fast Decoding Of Alternant Codes Using A Divison-Free Analog Of An Accelerated Berlekamp-Massey Algorithm MARC A. ARMAND WEE SIEW YEN Department of Electrical & Computer Engineering National University

More information

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1

On the minimum distance of LDPC codes based on repetition codes and permutation matrices 1 Fifteenth International Workshop on Algebraic and Combinatorial Coding Theory June 18-24, 216, Albena, Bulgaria pp. 168 173 On the minimum distance of LDPC codes based on repetition codes and permutation

More information

Decoding linear codes via systems solving: complexity issues and generalized Newton identities

Decoding linear codes via systems solving: complexity issues and generalized Newton identities Decoding linear codes via systems solving: complexity issues and generalized Newton identities Stanislav Bulygin (joint work with Ruud Pellikaan) University of Valladolid Valladolid, Spain March 14, 2008

More information

Journal of Algebra 226, (2000) doi: /jabr , available online at on. Artin Level Modules.

Journal of Algebra 226, (2000) doi: /jabr , available online at   on. Artin Level Modules. Journal of Algebra 226, 361 374 (2000) doi:10.1006/jabr.1999.8185, available online at http://www.idealibrary.com on Artin Level Modules Mats Boij Department of Mathematics, KTH, S 100 44 Stockholm, Sweden

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

Algebra for error control codes

Algebra for error control codes Algebra for error control codes EE 387, Notes 5, Handout #7 EE 387 concentrates on block codes that are linear: Codewords components are linear combinations of message symbols. g 11 g 12 g 1n g 21 g 22

More information

Succinct Representation of Codes with Applications to Testing

Succinct Representation of Codes with Applications to Testing Succinct Representation of Codes with Applications to Testing Elena Grigorescu elena-g@purdue.edu Tali Kaufman kaufmant@mit.edu February 4, 2013 Madhu Sudan madhu@mit.edu Abstract Motivated by questions

More information

Reed-Solomon codes. Chapter Linear codes over finite fields

Reed-Solomon codes. Chapter Linear codes over finite fields Chapter 8 Reed-Solomon codes In the previous chapter we discussed the properties of finite fields, and showed that there exists an essentially unique finite field F q with q = p m elements for any prime

More information

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1

DICKSON POLYNOMIALS OVER FINITE FIELDS. n n i. i ( a) i x n 2i. y, a = yn+1 a n+1 /y n+1 DICKSON POLYNOMIALS OVER FINITE FIELDS QIANG WANG AND JOSEPH L. YUCAS Abstract. In this paper we introduce the notion of Dickson polynomials of the k + 1)-th kind over finite fields F p m and study basic

More information

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble

Average Coset Weight Distributions of Gallager s LDPC Code Ensemble 1 Average Coset Weight Distributions of Gallager s LDPC Code Ensemble Tadashi Wadayama Abstract In this correspondence, the average coset eight distributions of Gallager s LDPC code ensemble are investigated.

More information

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x

Linear Cyclic Codes. Polynomial Word 1 + x + x x 4 + x 5 + x x + x Coding Theory Massoud Malek Linear Cyclic Codes Polynomial and Words A polynomial of degree n over IK is a polynomial p(x) = a 0 + a 1 x + + a n 1 x n 1 + a n x n, where the coefficients a 0, a 1, a 2,,

More information

INITIAL COMPLEX ASSOCIATED TO A JET SCHEME OF A DETERMINANTAL VARIETY. the affine space of dimension k over F. By a variety in A k F

INITIAL COMPLEX ASSOCIATED TO A JET SCHEME OF A DETERMINANTAL VARIETY. the affine space of dimension k over F. By a variety in A k F INITIAL COMPLEX ASSOCIATED TO A JET SCHEME OF A DETERMINANTAL VARIETY BOYAN JONOV Abstract. We show in this paper that the principal component of the first order jet scheme over the classical determinantal

More information

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy

Matrix characterization of linear codes with arbitrary Hamming weight hierarchy Linear Algebra and its Applications 412 (2006) 396 407 www.elsevier.com/locate/laa Matrix characterization of linear codes with arbitrary Hamming weight hierarchy G. Viswanath, B. Sundar Rajan Department

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Extending and lengthening BCH-codes

Extending and lengthening BCH-codes Extending and lengthening BCH-codes Jürgen Bierbrauer Department of Mathematical Sciences Michigan Technological University Houghton, Michigan 49931 (USA) Yves Edel Mathematisches Institut der Universität

More information

Euler s, Fermat s and Wilson s Theorems

Euler s, Fermat s and Wilson s Theorems Euler s, Fermat s and Wilson s Theorems R. C. Daileda February 17, 2018 1 Euler s Theorem Consider the following example. Example 1. Find the remainder when 3 103 is divided by 14. We begin by computing

More information

A short proof of Klyachko s theorem about rational algebraic tori

A short proof of Klyachko s theorem about rational algebraic tori A short proof of Klyachko s theorem about rational algebraic tori Mathieu Florence Abstract In this paper, we give another proof of a theorem by Klyachko ([?]), which asserts that Zariski s conjecture

More information

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1)

x n k m(x) ) Codewords can be characterized by (and errors detected by): c(x) mod g(x) = 0 c(x)h(x) = 0 mod (x n 1) Cyclic codes: review EE 387, Notes 15, Handout #26 A cyclic code is a LBC such that every cyclic shift of a codeword is a codeword. A cyclic code has generator polynomial g(x) that is a divisor of every

More information