Optimal Ternary Cyclic Codes From Monomials

Size: px
Start display at page:

Download "Optimal Ternary Cyclic Codes From Monomials"

Transcription

1 5898 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 Optimal Ternary Cyclic Codes From Monomials Cunsheng Ding, Senior Member, IEEE, and Tor Helleseth, Fellow, IEEE Abstract Cyclic codes are a subclass of linear codes and have applications in consumer electronics, data storage systems, and communication systems as they have efficient encoding and decoding algorithms Perfect nonlinear monomials were employed to construct optimal ternary cyclic codes with by Carlet, Ding, and Yuan in 2005 In this paper, almost perfect nonlinear monomials, and a number of other monomials over are used to construct optimal ternary cyclic codes with the same Nine open problems on such codes are also presented Index Terms Almost perfect nonlinear (APN) functions, cyclic codes, monomials, perfect nonlinear functions, planar functions I INTRODUCTION L ET be a power of a prime A linear code over is a -dimensional subspace of with minimum (Hamming) nonzero weight A linear code over the finite field is called cyclic implies Let By identying any vector with any code of length over corresponds to a subset of The linear code is cyclic and only the corresponding subset in is an ideal of the ring It is well known that every ideal of is principal Let be a cyclic code, where is monic and has the least degree Then is called the generator polynomial and is referred to as the parity-check polynomial of The error correcting capability of cyclic codes may not be as good as some other linear codes in general However, cyclic codes have wide applications in storage and communication systems because they have efficient encoding and decoding algorithms [10], [17], [25] For example, Reed Solomon codes have found important applications from deep-space communication to consumer electronics They are prominently used in consumer electronics such as CDs, DVDs, Blu-ray Discs, in data transmission technologies such as DSL & WiMAX, in broadcast Manuscript received November 28, 2012; revised April 13, 2013; accepted April 21, 2013 Date of publication April 30, 2013; date of current version August 14, 2013 C Ding was supported by The Hong Kong Research Grants Council Project T Helleseth was supported by the Norwegian Research Council C Ding is with the Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Kowloon, Hong Kong ( cding@usthk) T Helleseth is with the Department of Informatics, The University of Bergen, N-5020 Bergen, Norway ( TorHelleseth@iiuibno) Communicated by N Kashyap, Associate Editor for Coding Theory Digital Object Identier /TIT systems such as DVB and ATSC, and in computer applications such as RAID 6 systems Perfect nonlinear monomials were employed to construct optimal ternary cyclic codes with by Carlet et al [8] In this paper, almost perfect nonlinear (APN) monomials and a number of classes of monomials over will be used to construct many classes of optimal ternary cyclic codes with the same Nine open problems on such codes are also presented II PRELIMINARIES In this section, we fix some basic notation for this paper and introduce APN and planar functions, and -cyclotomic cosets that will be employed in subsequent sections A Some Notation Fixed Throughout This Paper Throughout this paper, we adopt the following notation unless otherwise stated: 1) is an odd prime, and for Section IV and subsequent sections 2) is a positive integer 3) 4) associated with the integer addition modulo and integer multiplication modulo operations 5) is a generator of 6) is the minimal polynomial of over 7) is the trace function from to 8) By the database, we mean the collection of the tables of best linear codes known maintained by Markus Grassl at B -Cyclotomic Cosets Modulo The -cyclotomic coset modulo containing is defined by where is the smallest positive integer such that, and is called the size of Itisknownthat divides The smallest integer in is called the coset leader of Let denote the set of all coset leaders By definition, we have The following lemma is useful in the sequel Lemma 21: Let and Forany with, the length of the -cyclotomic coset is equal to IEEE

2 DING AND HELLESETH: OPTIMAL TERNARY CYCLIC CODES FROM MONOMIALS 5899 Proof: By definition, is the smallest positive integer such that Hence, is the smallest positive integer such that Since, is the smallest positive integer such that It then follows that This completes the proof C Perfect and APN Functions on A function is called APN and is referred to as perfect nonlinear or planar C2: the equation has the only solution in ;and C3: the equation has the only solution in Proof: Clearly, the minimum distance of the code cannot be 1 The code has a codeword of Hamming weight 2 and only there exist two elements and in and two distinct elements and in such that Note that Wehavethat Hence, (1) is equivalent to the following set of equations: (1) There is no perfect nonlinear (planar) function on Known APN polynomials over can be found in [1] [5], [15], [16], [18] [20], and [24] However, there are both planar and APN functions over for odd primes Inthesequel, planar and APN monomials over will be employed to construct optimal ternary cyclic codes The results of this paper will be a nice demonstration of applications of APN functions in engineering III CODES DEFINED BY PAIRS OF MONOMIALS Let be a prime and let is a positive integer Let denote the minimal polynomial over of, where is a generator of In this paper, we consider the cyclic code of length over with generator polynomial, denoted by and The condition that is to make sure that and are distinct The dimension of is equal to and is the -cyclotomic coset modulo containing The cyclic code is defined by the pair of monomials and over, it was proved in [6], [7], and [23] that the binary code has and only is an APN monomial over is odd and is a planar monomial over, the codes were dealt with in [8] and [26] and,thecode has minimum distance 2 or 3 which may not be interesting In this paper, we study the case that only and prove that the ternary cyclic code is optimal for many classes of monomials over IV BASIC THEOREM ABOUT THE TERNARY CYCLIC CODES From now on, we consider only the code for We are mostly interested in the case that and In this case, the dimension of the code is equal to The following theorem is the fundamental result of this paper and will be used frequently in subsequent sections Theorem 41: Let and The cyclic code has and only the following conditions are satisfied: C1: is even; It then follows that does not have a codeword of Hamming weight two and only is even The code has a codeword of Hamming weight 3 and only there exist three elements,,and in and three distinct elements,,and in such that Due to symmetry, it is sufficient to consider the following two cases Case A, Where : In this case, (2) becomes Putting and Then, Hence, (3) has a desired solution and only the equation has a solution Case B, Where and : In this case, (2) becomes Putting and Then, Hence, (4) has a desired solution and only the equation has a solution By the Sphere Packing bound [21, Th 1121], the minimum distance is at most 4 Hence, Conditions C1, C2, and C3 are satisfied This completes the proof of this theorem Any ternary linear code with is optimal in the sense that the minimum distance is maximal for the fixed length and the fixed dimension In subsequent sections, we will present many classes of optimal ternary cyclic codes with these (2) (3) (4)

3 5900 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 V OPTIMAL CYCLIC CODES DEFINED BY PLANAR MONOMIALS OVER We first prove the following lemma, where the first and the last conclusion should be known Lemma 51: If is APN or planar over,then must be even; ; ;and Proof: If is odd, then the equation will have three solutions and Bydefinition is not planar and APN This proves the first conclusion Let be planar or APN Then, must be even In this case, the equation has already one solution If,then In this case, the equation has at least four distinct solutions, 1,, and Define for all Then,,,and are three distinct solutions of the equation This is contrary to the assumption that is planar or APN Hence, We now prove the third conclusion Since, must divide Hence, Note that is odd for any and is even We have Hence, The following theorem was proved by Carlet et al in [8] For completeness, we report it here and present a proof for it Theorem 52 [8]: If is planar over,then is an optimal ternary cyclic code with Proof: Let be planar By Lemma 51, is even Notice that is already a solution of the equation Bythedefinition of planar functions, this equation cannot have other solutions Hence, Condition C3 in Theorem 41 is met We now prove that Condition C2 in Theorem 41 holds Suppose on the contrary that for some Then that is Note that as Thisiscontrarytotheassumption that is planar Therefore, Condition C2 in Theorem 41 is also satisfied By Lemma 51 and Lemma 21, the dimension of this code is equal to The desired conclusions then follow from Theorem 41 The following is a list of known planar monomials over : 1) 2) is odd ([12]) 3) and is odd ([11]) Each of these planar monomials gives a class of optimal ternary cyclic codes with More planar functions can be found in [11], [13], [27], and [28] Example 53: Let and let Let be the generator of with Then, is a ternary cyclic code with and generator polynomial The dual of is a ternary cyclic code with This dual code has the same as the best known ternary linear code with in the database The upper bound on the minimum distance of any ternary linear code of length 80 and dimension 8 is 49 The following theorem is the partial inverse conclusion of Theorem 52 when is of a special form Theorem 54: Let Then, the ternary cyclic code has andonly is odd and, ie, and only is planar over Proof: In the proof of Theorem 41, we see that has no codeword of Hamming weight 2 and only is even Hence, must be odd Notice that multiplying the left-hand sides of the two equations in Conditions C2 and C3 leads to It then follows that the equation does not have a solution and only which is equivalent to that is odd and is odd and,wehave It then follows from Lemma 21 that Since, the dimension of this code is equal to We shall need the following lemma later Lemma 55: Let is odd, is even Proof: First of all, we have It is also known that Since,wehave,wehave is odd is even (5) (6) (7)

4 DING AND HELLESETH: OPTIMAL TERNARY CYCLIC CODES FROM MONOMIALS 5901 It then follows that for all Hence for all Therefore,,let Then, It then follows from the discussions above that Theorem 56: Let Then, the ternary cyclic code has and only is odd, ie, and only is planar over Proof: We first prove the necessity of the condition Notice that We have We now prove that Condition C2 of Theorem 41 is satisfied To this end, we need to prove that there does not exist two distinct elements and in such that Suppose on the contrary that (8) has such a solution Then, adding 1 to both sides of both equations in (8) yields Define and It then follows from (9) that (8) (9) (10) Adding and to the first and second equation of (8) gives (11) It then follows that (12) is odd is even Suppose first that is even Then, divides Let be a generator of Define then Then, It is easily checked that Hence is a solution of This means that Condition C3 in Theorem 41 is not met So we have reached a contradiction This proves the necessity of the condition in this theorem We now prove the sufficiency of this condition is odd, it was proved in [11] that is planar It then follows from Theorem 52 that has This completes the proof of this theorem VI OPTIMAL CYCLIC CODES DEFINED BY APN MONOMIALS OVER In this section, we present seven classes of optimal cyclic codes defined by APN monomials over Theorem 61: The ternary cyclic code has is APN over Proof: Let be APN over Itthen follows from Lemma 51 that ByLemma 21, the dimension of this code is equal to Hence, the equation has three distinct solutions,and This is contrary to the assumption that is APN Note that hasatmosttwosolutions for any according to the definition of APN functions This completes the proof of Condition C2 in Theorem 41 Finally, we prove that Condition C3 is also satisfied Suppose on the contrary that the equation has a solution Then, ce and thus Dividing both sides of the equation with yields Therefore, is also a solution of the equation So this equation has three distinct solutions,and Thisis contrary to the assumption that is APN over Hence, Condition C3 in Theorem 41 is indeed met The desired conclusions of this theorem then follow from Theorem 41 The following is a summary of known APN monomials over Each of them gives a class of optimal ternary cyclic codes with 1), is odd 2), is odd 3), and is odd ([14]) 4), and is odd ([14]) 5), [28] 6) The exponent is defined by 7) The exponent is defined by

5 5902 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 There are other APN monomials over for The reader is referred to [14] and [28] for details Example 62: Let and let Let be the generator of with Then, is a ternary cyclic code with and generator polynomial The dual of is a ternary cyclic code with This code is also optimal, while the optimal ternary cyclic code with the same in the database is not known to be cyclic VII OPTIMAL CYCLIC CODES DEFINED BY OTHER MONOMIALS OVER In the previous sections, optimal ternary cyclic codes from planar and APN monomials over were presented In this section, we construct several classes of optimal ternary cyclic codes with using monomials over that are neither planar nor APN We prove first the following theorem Theorem 71: Let The ternary cyclic code has andonly (a) is odd; (b) is even; (c) ;and (d) Proof: The code does not have a codeword of Hamming weight two and only is even Clearly, is even andonly is even Obviously, Conditions C2 and C3 in Theorem 41 are simultaneously satisfied and only the equation does not have a solution Let Notethat Conditions (a), (b), (13) and (14) together are equivalent to Conditions (a), (b), (c) and (d) together all the conditions of this theorem are met, we have It then follows from Lemma 21 that Note that Hence, for any Thus, The desired conclusions in this theorem then follow from Theorem 41 Example 72: Let and let Let be the generator of with Then, is a ternary cyclic code with and generator polynomial The dual of is a ternary cyclic code with This code has the same as the best known ternary linear code with in the database The upper bound on the minimum distance of any ternary linear code of length 242 and dimension 10 is 155 Lemma 73: Let is odd, is even (15) Proof: The proof is similar to that of Lemma 55 and is omitted Theorem 74: Let,andlet be even Then, the ternary cyclic code has The equation and only does not have a solution Proof: It is easily seen that The conclusions on the dimension then follow from Lemma 73 Since is even, the minimum distance We now prove that Tothis end, we prove that Conditions C2 or C3 in Theorem 41 are not satisfied Since is even, is even Define, where is a generator of Then, is even, we have (13) and It is easily seen that for any (14) In this case, Condition C3 in Theorem 41 is not met, and hence is odd, we have

6 DING AND HELLESETH: OPTIMAL TERNARY CYCLIC CODES FROM MONOMIALS 5903 In this case, Condition C3 in Theorem 41 is not met, and hence, The code of Theorem 74 is almost optimal when, and is optimal when and Open Problem 75: Let,andlet be odd Does the ternary cyclic code have? and confirmed by Magma Theorem 76: Let The ternary cyclic code has andonly (A) ;and (B) Proof: Let Conditions (A) and (B) be met We first prove that To this end, we prove that there is no such that divides Note that Hence, Clearly, Thus, the dimension of the code is equal to It is now time to prove that the minimum distance Suppose on the contrary that the equation has a solution Then, we have Multiplying both sides of this equation with yields whence It then follows from Condition (A) that This is contrary to the assumption that Therefore, Condition C2 in Theorem 41 is met Now suppose on the contrary that the equation has a solution Then,we have Multiplying both sides of this equation with gives whence and It then follows from Condition (B) that This is contrary to the assumption that Therefore, Condition C3 in Theorem 41 is satisfied Note that is even It then follows from Theorem 41 that Example 77: Let and let Let be the generator of with Then, is a ternary cyclic code with and generator polynomial The dual of is a ternary cyclic code with In the following, we list a number of open problems on the ternary cyclic codes Open Problem 78: Let Does the ternary cyclic code have and is prime? and confirmed by Magma Open Problem 79: Let Is it true that the ternary cyclic code has 1) is odd and ; 2) is odd; and 3)? For all and confirmed by Magma Open Problem 710: Let Let be odd and Isittruethattheternary cyclic code has is even? For all and confirmed by Magma Open Problem 711: Let Let be even What are the conditions on and under which the ternary cyclic code has? Open Problem 712: Let Let be even Is it true that the ternary cyclic code has one of the following conditions is met? 1), and 2), and For and confirmed by Magma Open Problem 713: Let Let and let be a prime Is it true that the ternary cyclic code has for all with? For, the answer to this question is positive and confirmed by Magma Open Problem 714: Let Let be an odd prime What are the conditions on under which the ternary cyclic code has? Open Problem 715: Let, where What are the conditions on and under which the ternary cyclic code has? VIII CONCLUDING REMARKS is planar or APN over, the code has andisthusoptimalhow-

7 5904 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 59, NO 9, SEPTEMBER 2013 ever, as demonstrated in this paper, the code may have the same when is neither planar nor APN It looks hard to completely characterize the ternary cyclic codes with In this paper, we presented nine open problems on the codes It would be nice some of these open problems could be settled Finally, we inform the reader that there are other examples of monomials that define optimal cyclic codes according to our Magma experimental data ACKNOWLEDGMENT The authors are grateful to the reviewers for their comments that improved the presentation and quality of this paper REFERENCES [1] T Beth and C Ding, On almost perfect nonlinear permutations, in Proc Adv Cryptol EUROCRYPT, NewYork,NY,USA, 1993, vol 765, Lecture Notes Comput Sci, pp [2] L Budaghyan and C Carlet, Classes of quadratic APN trinomials and hexanomials and related structures, IEEE Trans Inf Theory, vol54, no 5, pp , May 2008 [3] LBudaghyan,CCarlet, and G Leander, Two classes of quadratic APN binomials inequivalent to power functions, IEEE Trans Inf Theory, vol 54, no 9, pp , Sep 2008 [4] L Budaghyan, C Carlet, and G Leander, Constructing new APN functions from known ones, Finite Fields Appl, vol 15, no 2, pp , Apr 2009 [5] L Budaghyan, C Carlet, and A Pott, New classes of almost bent and almost perfect nonlinear functions, IEEE Trans Inf Theory, vol 52, no 3, pp , Mar 2006 [6] A Canteaut, P Charpin, and H Dobbertin, Weight divisibility of cyclic codes, highly nonlinear functions on, and crosscorrelation of maximum-length sequences, SIAMJDiscr Math,vol13,no1, pp , 2000 [7] C Carlet, P Charpin, and V Zinoviev, Codes, bent functions and permutations suitable for DES-like cryptosystems, Des Codes Cryptogr, vol 15, pp , 1998 [8] C Carlet, C Ding, and J Yuan, Linear codes from highly nonlinear functions and their secret sharing schemes, IEEE Trans Inf Theory, vol 51, no 6, pp , Jun 2005 [9] P Charpin, Open problems on cyclic codes, in Handbook of Coding Theory, Part 1: Algebraic Coding,VSPless,WCHuffman,andR A Brualdi, Eds Amsterdam, The Netherlands: Elsevier, 1998, ch 11 [10] R T Chien, Cyclic decoding procedure for the Bose Chaudhuri Hocquenghem codes, IEEE Trans Inf Theory, vol10,no4, pp , Oct 1964 [11] R S Coulter and R W Matthews, Planar functions and planes of Lenz Barlotti class II, Des Codes Cryptogr, vol 10, pp , 1997 [12] P Dembowski and T G Ostrom, Planes oforder with collineation groups of order, Math Z, vol 193, pp , 1968 [13] C Ding and J Yuan, A family of skew Hadamard dference sets, J Combin Theory, ser A, vol 113, pp , 2006 [14] T Helleseth, C Rong, and D Sandberg, New families of almost perfect nonlinear power mappings, IEEE Trans Inf Theory, vol 45, no 2, pp , Mar 1999 [15] H Dobbertin, Almost perfect nonlinear power functions on : The Welch case, IEEE Trans Inf Theory, vol 45, no 4, pp , May 1999 [16] H Dobbertin, Almost perfect nonlinear power functions on : The Niho case, Inf Comput, vol151, pp 57 72, 1999 [17] G D Forney, On decoding BCH codes, IEEE Trans Inf Theory, vol 11, no 4, pp , Oct 1995 [18] R Gold, Maximal recursive sequences with 3-valued recursive crosscorrelation functions, IEEE Trans Inf Theory, vol 14, no 1, pp , Jan 1968 [19] T Kasami, The weight enumerators for several classes of subcodes of the second order binary Reed Muller codes, Inf Control, vol 18, pp , 1971 [20] H D L Hollmanna and Q Xiang, A proof of the Welch and Niho conjectures on cross-correlations of binary m-sequences, Finite Fields Appl, vol 7, no 2, pp , Apr 2001 [21] W C Huffman and V Pless, Fundamentals of Error-Correcting Codes Cambridge, UK: Cambridge Univ Press, 2003 [22] L Lidl and H Niederreiter, Finite Fields Cambridge, UK: Cambridge Univ Press, 1997 [23] J H van Lint and R M Wilson, On the minimum distance of cyclic codes, vol 32, no 1, pp 23 40, Jan 1986 [24] K Nyberg, Dferentially unorm mappings for cryptography, in Proc Adv Cryptol EUROCRYPT, New York, NY, USA, 1993, vol 765, Lecture Notes in Comput Sci, pp [25] E Prange, Some cyclic error-correcting codes with simple decoding algorithms Cambridge, MA, USA, 1958, Air Force Cambridge Research Center-TN [26] J Yuan, C Carlet, and C Ding, The weight distribution of a class of linear codes from perfect nonlinear functions, IEEE Trans Inf Theory, vol 52, no 2, pp , Feb 2006 [27] Z Zha, G M Kyureghyan, and X Wang, Perfect nonlinear binomials and their semields, Finite Fields Appl, vol 15, pp , 2009 [28] Z Zha and X Wang, Almost perfect nonlinear power functions in odd characteristic, IEEE Trans Inf Theory, vol 57, no 7, pp , Jul 2011 Cunsheng Ding (M 98 SM 05) was born in 1962 in Shaanxi, China He received the MSc degree in 1988 from the Northwestern Telecommunications Engineering Institute, Xian, China; and the PhD in 1997 from the University of Turku, Turku, Finland From 1988 to 1992 he was a Lecturer of Mathematics at Xidian University, China Before joining the Hong Kong University of Science and Technology in 2000, where he is currently Professor of Computer Science and Engineering, he was Assistant Professor of Computer Science at the National University of Singapore His research fields are cryptography and coding theory He has coauthored four research monographs, and served as a guest editor or editor for ten journals Dr Ding co-received the State Natural Science Award of China in 1989 Tor Helleseth (M 89 SM 96 F 97) received the Cand Real and Dr Philos degrees in mathematics from the University of Bergen, Bergen, Norway, in 1971 and 1979, respectively From , he was a Research Assistant at the Department of Mathematics, University of Bergen From , he was at the Chief Headquarters of Defense in Norway Since 1984, he has been a Professor in the Department of Informatics, University of Bergen During the academic years and , he was on sabbatical leave at the University of Southern Calornia, Los Angeles, and during , he was a Research Fellow at the Eindhoven University of Technology, Eindhoven, The Netherlands His research interests include coding theory and cryptology Prof Helleseth served as an Associate Editor for Coding Theory for the IEEE TRANSATIONS ON INFORMATION THEORY from 1991 to 1993 He was Program Chairman for Eurocrypt 1993 and for the Information Theory Workshop in 1997 in Longyearbyen, Norway He was a Program Co-Chairman for SETA04 in Seoul, Korea, and SETA06 in Beijing, China He was also a Program Co-Chairman for the IEEE Information Theory Workshop in Solstrand, Norway in 2007 During he served on the Board of Governors for the IEEE Information Theory Society In 1997 he was elected an IEEE Fellow for his contributions to coding theory and cryptography In 2004 he was elected a member of Det Norske Videnskaps-Akademi

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012

6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 9, SEPTEMBER 2012 6054 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 9, SEPTEMBER 2012 A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Fellow,

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

DIFFERENTIAL cryptanalysis is the first statistical attack

DIFFERENTIAL cryptanalysis is the first statistical attack IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 12, DECEMBER 2011 8127 Differential Properties of x x 2t 1 Céline Blondeau, Anne Canteaut, Pascale Charpin Abstract We provide an extensive study of

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes

The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes 1 The Dimension and Minimum Distance of Two Classes of Primitive BCH Codes Cunsheng Ding, Cuiling Fan, Zhengchun Zhou Abstract arxiv:1603.07007v1 [cs.it] Mar 016 Reed-Solomon codes, a type of BCH codes,

More information

Constructions of Quadratic Bent Functions in Polynomial Forms

Constructions of Quadratic Bent Functions in Polynomial Forms 1 Constructions of Quadratic Bent Functions in Polynomial Forms Nam Yul Yu and Guang Gong Member IEEE Department of Electrical and Computer Engineering University of Waterloo CANADA Abstract In this correspondence

More information

Quadratic Almost Perfect Nonlinear Functions With Many Terms

Quadratic Almost Perfect Nonlinear Functions With Many Terms Quadratic Almost Perfect Nonlinear Functions With Many Terms Carl Bracken 1 Eimear Byrne 2 Nadya Markin 3 Gary McGuire 2 School of Mathematical Sciences University College Dublin Ireland Abstract We introduce

More information

Nonlinear Functions A topic in Designs, Codes and Cryptography

Nonlinear Functions A topic in Designs, Codes and Cryptography Nonlinear Functions A topic in Designs, Codes and Cryptography Alexander Pott Otto-von-Guericke-Universität Magdeburg September 21, 2007 Alexander Pott (Magdeburg) Nonlinear Functions September 21, 2007

More information

Almost Difference Sets and Their Sequences With Optimal Autocorrelation

Almost Difference Sets and Their Sequences With Optimal Autocorrelation 2934 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001 Almost Difference Sets Their Sequences With Optimal Autocorrelation K. T. Arasu, Cunsheng Ding, Member, IEEE, Tor Helleseth,

More information

I. INTRODUCTION. A. Definitions and Notations

I. INTRODUCTION. A. Definitions and Notations IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 7, JULY 2010 3605 Optimal Sets of Frequency Hopping Sequences From Linear Cyclic Codes Cunsheng Ding, Senior Member, IEEE, Yang Yang, Student Member,

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin INRIA, Codes Domaine de Voluceau-Rocquencourt BP 105-78153, Le Chesnay France Email: pascale.charpin@inria.fr Guang Gong Department

More information

arxiv: v1 [cs.it] 12 Jun 2016

arxiv: v1 [cs.it] 12 Jun 2016 New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic arxiv:606.03768v [cs.it] 2 Jun 206 Nian Li and Tor Helleseth Abstract In this paper, a class of permutation trinomials

More information

Fourier Spectra of Binomial APN Functions

Fourier Spectra of Binomial APN Functions Fourier Spectra of Binomial APN Functions arxiv:0803.3781v1 [cs.dm] 26 Mar 2008 Carl Bracken Eimear Byrne Nadya Markin Gary McGuire March 26, 2008 Abstract In this paper we compute the Fourier spectra

More information

A matrix approach for constructing quadratic APN functions

A matrix approach for constructing quadratic APN functions Noname manuscript No (will be inserted by the editor) A matrix approach for constructing quadratic APN functions Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract We find a

More information

c 2013 Society for Industrial and Applied Mathematics

c 2013 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 27, No. 4, pp. 1977 1994 c 2013 Society for Industrial and Applied Mathematics CYCLIC CODES FROM SOME MONOMIALS AND TRINOMIALS CUNSHENG DING Abstract. Cyclic codes are a subclass

More information

Four classes of permutation polynomials of F 2 m

Four classes of permutation polynomials of F 2 m Finite Fields and Their Applications 1 2007) 869 876 http://www.elsevier.com/locate/ffa Four classes of permutation polynomials of F 2 m Jin Yuan,1, Cunsheng Ding 1 Department of Computer Science, The

More information

Constructing differential 4-uniform permutations from know ones

Constructing differential 4-uniform permutations from know ones Noname manuscript No. (will be inserted by the editor) Constructing differential 4-uniform permutations from know ones Yuyin Yu Mingsheng Wang Yongqiang Li Received: date / Accepted: date Abstract It is

More information

On a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code

On a Conjectured Ideal Autocorrelation Sequence and a Related Triple-Error Correcting Cyclic Code 680 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 2, MARCH 2000 [13] B. R. McDonald, Finite Rings with Identity. New York: Marcel Dekker, 1974. [14] F. J. MacWilliams and N. J. A. Sloane, The Theory

More information

Third-order nonlinearities of some biquadratic monomial Boolean functions

Third-order nonlinearities of some biquadratic monomial Boolean functions Noname manuscript No. (will be inserted by the editor) Third-order nonlinearities of some biquadratic monomial Boolean functions Brajesh Kumar Singh Received: April 01 / Accepted: date Abstract In this

More information

Some Results on the Known Classes of Quadratic APN Functions

Some Results on the Known Classes of Quadratic APN Functions Some Results on the Known Classes of Quadratic APN Functions Lilya Budaghyan, Tor Helleseth, Nian Li, and Bo Sun Department of Informatics, University of Bergen Postboks 7803, N-5020, Bergen, Norway {Lilya.Budaghyan,Tor.Helleseth,Nian.Li,Bo.Sun}@uib.no

More information

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice

Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Noname manuscript No. (will be inserted by the editor) Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice Chunming Tang Yanfeng Qi Received: date

More information

Explicit classes of permutation polynomials of F 3

Explicit classes of permutation polynomials of F 3 Science in China Series A: Mathematics Apr., 2009, Vol. 53, No. 4, 639 647 www.scichina.com math.scichina.com www.springerlink.com Explicit classes of permutation polynomials of F 3 3m DING CunSheng 1,XIANGQing

More information

The simplest method for constructing APN polynomials EA-inequivalent to power functions

The simplest method for constructing APN polynomials EA-inequivalent to power functions The siplest ethod for constructing APN polynoials EA-inequivalent to power functions Lilya Budaghyan Abstract The first APN polynoials EA-inequivalent to power functions have been constructed in [7, 8]

More information

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125

COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 COMMUTATIVE SEMIFIELDS OF ORDER 243 AND 3125 ROBERT S. COULTER AND PAMELA KOSICK Abstract. This note summarises a recent search for commutative semifields of order 243 and 3125. For each of these two orders,

More information

Céline Blondeau, Anne Canteaut and Pascale Charpin*

Céline Blondeau, Anne Canteaut and Pascale Charpin* Int. J. Information and Coding Theory, Vol. 1, No. 2, 2010 149 Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin* INRIA Paris-Rocquencourt, Project-Team SECRET,

More information

BENT POLYNOMIALS OVER FINITE FIELDS

BENT POLYNOMIALS OVER FINITE FIELDS BENT POLYNOMIALS OVER FINITE FIELDS ROBERT S COULTER AND REX W MATTHEWS Abstract. The definition of bent is redefined for any finite field. Our main result is a complete description of the relationship

More information

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property

On Binary Cyclic Codes with Codewords of Weight Three and Binary Sequences with the Trinomial Property IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 1, JANUARY 2001 421 [4] A. A. Davydov, Constructions and families of covering codes and saturated sets of points in projective geometry, IEEE Trans.

More information

Improved Upper Bounds on Sizes of Codes

Improved Upper Bounds on Sizes of Codes 880 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 4, APRIL 2002 Improved Upper Bounds on Sizes of Codes Beniamin Mounits, Tuvi Etzion, Senior Member, IEEE, and Simon Litsyn, Senior Member, IEEE

More information

A New Class of Bent Negabent Boolean Functions

A New Class of Bent Negabent Boolean Functions A New Class of Bent Negabent Boolean Functions Sugata Gangopadhyay and Ankita Chaturvedi Department of Mathematics, Indian Institute of Technology Roorkee Roorkee 247667 INDIA, {gsugata, ankitac17}@gmail.com

More information

50 Years of Crosscorrelation of m-sequences

50 Years of Crosscorrelation of m-sequences 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

On values of vectorial Boolean functions and related problems in APN functions

On values of vectorial Boolean functions and related problems in APN functions On values of vectorial Boolean functions and related problems in APN functions George Shushuev Sobolev Institute of Mathematics, Novosibirsk, Russia Novosibirsk State University, Novosibirsk, Russia E-mail:

More information

Hyperbent functions, Kloosterman sums and Dickson polynomials

Hyperbent functions, Kloosterman sums and Dickson polynomials Hyperbent functions, Kloosterman sums and Dickson polynomials Pascale Charpin Guang Gong INRIA, B.P. 105, 78153 Le Chesnay Cedex, France, Pascale.Charpin@inria.fr Department of Electrical and Computer

More information

Constructing new APN functions from known ones

Constructing new APN functions from known ones Constructing new APN functions from known ones Lilya Budaghyan a, Claude Carlet b, and Gregor Leander c a Department of Mathematics University of Trento ITALY b Department of Mathematics University of

More information

THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1

THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 J. Appl. Math. & Informatics Vol. 31(2013), No. 1-2, pp. 179-188 Website: http://www.kcam.biz THE NUMBER OF SOLUTIONS TO THE EQUATION (x + 1) d = x d + 1 JI-MI YIM, SUNG-JIN CHO, HAN-DOO KIM, UN-SOOK CHOI

More information

CCZ-equivalence and Boolean functions

CCZ-equivalence and Boolean functions CCZ-equivalence and Boolean functions Lilya Budaghyan and Claude Carlet Abstract We study further CCZ-equivalence of (n, m)-functions. We prove that for Boolean functions (that is, for m = 1), CCZ-equivalence

More information

A class of quadratic APN binomials inequivalent to power functions

A class of quadratic APN binomials inequivalent to power functions A class of quadratic APN binomials inequivalent to power functions Lilya Budaghyan, Claude Carlet, Gregor Leander November 30, 2006 Abstract We exhibit an infinite class of almost perfect nonlinear quadratic

More information

IN this paper, we exploit the information given by the generalized

IN this paper, we exploit the information given by the generalized 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 10, OCTOBER 2006 A New Upper Bound on the Block Error Probability After Decoding Over the Erasure Channel Frédéric Didier Abstract Motivated by

More information

Complete characterization of generalized bent and 2 k -bent Boolean functions

Complete characterization of generalized bent and 2 k -bent Boolean functions Complete characterization of generalized bent and k -bent Boolean functions Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng 1 Abstract In this paper we investigate properties of generalized bent Boolean

More information

New Families of Triple Error Correcting Codes with BCH Parameters

New Families of Triple Error Correcting Codes with BCH Parameters New Families of Triple Error Correcting Codes with BCH Parameters arxiv:0803.3553v1 [cs.it] 25 Mar 2008 Carl Bracken School of Mathematical Sciences University College Dublin Ireland May 30, 2018 Abstract

More information

arxiv: v1 [cs.dm] 20 Jul 2009

arxiv: v1 [cs.dm] 20 Jul 2009 New Binomial Bent Function over the Finite Fields of Odd Characteristic Tor Helleseth and Alexander Kholosha arxiv:0907.3348v1 [cs.dm] 0 Jul 009 The Selmer Center Department of Informatics, University

More information

On Cryptographic Properties of the Cosets of R(1;m)

On Cryptographic Properties of the Cosets of R(1;m) 1494 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 4, MAY 2001 On Cryptographic Properties of the Cosets of R(1;m) Anne Canteaut, Claude Carlet, Pascale Charpin, and Caroline Fontaine Abstract

More information

Extended Binary Linear Codes from Legendre Sequences

Extended Binary Linear Codes from Legendre Sequences Extended Binary Linear Codes from Legendre Sequences T. Aaron Gulliver and Matthew G. Parker Abstract A construction based on Legendre sequences is presented for a doubly-extended binary linear code of

More information

Sequences and Linear Codes from Highly Nonlinear Functions

Sequences and Linear Codes from Highly Nonlinear Functions Sequences and Linear Codes from Highly Nonlinear Functions Chunlei Li Dissertation for the degree of philosophiae doctor(phd) at the University of Bergen 2014 Dissertation date: June 16th A C K N O W

More information

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

THROUGHOUT this paper, let q be a power of a prime p.

THROUGHOUT this paper, let q be a power of a prime p. 4344 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO. 7, JULY 017 LCD Cyclic Codes Over Finite Fields Chengju Li, Cunsheng Ding, Shuxing Li Abstract In addition to their applications in data storage,

More information

Special Monomial Maps: Examples, Classification, Open Problems

Special Monomial Maps: Examples, Classification, Open Problems Special Monomial Maps: Examples, Classification, Open Problems Gohar Kyureghyan Otto-von-Guericke University of Magdeburg, Germany Fq12 - Saratoga July 14, 2015 Outline Special maps yielding small Kakeya

More information

Differential properties of power functions

Differential properties of power functions Differential properties of power functions Céline Blondeau, Anne Canteaut and Pascale Charpin SECRET Project-Team - INRIA Paris-Rocquencourt Domaine de Voluceau - B.P. 105-8153 Le Chesnay Cedex - France

More information

Open problems on cyclic codes

Open problems on cyclic codes Open problems on cyclic codes Pascale Charpin Contents 1 Introduction 3 2 Different kinds of cyclic codes. 4 2.1 Notation.............................. 5 2.2 Definitions............................. 6

More information

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes

The BCH Bound. Background. Parity Check Matrix for BCH Code. Minimum Distance of Cyclic Codes S-723410 BCH and Reed-Solomon Codes 1 S-723410 BCH and Reed-Solomon Codes 3 Background The algebraic structure of linear codes and, in particular, cyclic linear codes, enables efficient encoding and decoding

More information

Construction of a (64, 2 37, 12) Code via Galois Rings

Construction of a (64, 2 37, 12) Code via Galois Rings Designs, Codes and Cryptography, 10, 157 165 (1997) c 1997 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Construction of a (64, 2 37, 12) Code via Galois Rings A. R. CALDERBANK AT&T

More information

APN Power Functions Over GF(2 n ) for Infinitely Many n

APN Power Functions Over GF(2 n ) for Infinitely Many n APN Power Functions Over GF( n ) for Infinitely Many n David Jedlicka University of Texas at Austin Department of Mathematics Austin, TX 7871 USA jedlicka@math.utexas.edu July 11, 005 Abstract I present

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences

Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences Some results on cross-correlation distribution between a p-ary m-sequence and its decimated sequences A joint work with Chunlei Li, Xiangyong Zeng, and Tor Helleseth Selmer Center, University of Bergen

More information

THE additive or stabilizer construction of quantum error

THE additive or stabilizer construction of quantum error 1700 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 4, APRIL 2008 Boolean Functions, Projection Operators, and Quantum Error Correcting Codes Vaneet Aggarwal, Student Member, IEEE, and A Robert Calderbank,

More information

Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation

Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation 14 JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL.1, NO.1, MARCH 1999 Existence of Cyclic Hadamard Difference Sets and its Relation to Binary Sequences with Ideal Autocorrelation Jeong-Heon Kim and Hong-Yeop

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565 USA Alex J. Grant Institute for Telecommunications

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

arxiv: v4 [cs.it] 14 May 2013

arxiv: v4 [cs.it] 14 May 2013 arxiv:1006.1694v4 [cs.it] 14 May 2013 PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION MARTIANUS FREDERIC EZERMAN Centre for Quantum Technologies, National University

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes

Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Some Open Problems on Quasi-Twisted and Related Code Constructions and Good Quaternary Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics Kenyon College Gambier, OH 43022 {aydinn,asamovt}@kenyon.edu

More information

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies

hold or a eistel cipher. We nevertheless prove that the bound given by Nyberg and Knudsen still holds or any round keys. This stronger result implies Dierential cryptanalysis o eistel ciphers and dierentially uniorm mappings Anne Canteaut INRIA Projet codes Domaine de Voluceau BP 105 78153 Le Chesnay Cedex rance Abstract In this paper we study the round

More information

Postdoctoral Researcher, Otto-von-Guericke University, Germany, September September 2013,

Postdoctoral Researcher, Otto-von-Guericke University, Germany, September September 2013, Contact Information Address: İstanbul Kemerburgaz University Faculty of Arts and Sciences Mahmutbey Dilmenler Caddesi, No:26 34217 Bağcılar-İstanbul Turkey E-mail: ayca.cesmelioglu@kemerburgaz.edu.tr Present

More information

7.1 Definitions and Generator Polynomials

7.1 Definitions and Generator Polynomials Chapter 7 Cyclic Codes Lecture 21, March 29, 2011 7.1 Definitions and Generator Polynomials Cyclic codes are an important class of linear codes for which the encoding and decoding can be efficiently implemented

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

Permutation decoding for the binary codes from triangular graphs

Permutation decoding for the binary codes from triangular graphs Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for

More information

CONSTRUCTING APN FUNCTIONS THROUGH ISOTOPIC SHIFTS

CONSTRUCTING APN FUNCTIONS THROUGH ISOTOPIC SHIFTS CONSTRUCTING APN FUNCTIONS THROUGH ISOTOPIC SHIFTS LILYA BUDAGHYAN, MARCO CALDERINI, CLAUDE CARLET, ROBERT S. COULTER, AND IRENE VILLA Abstract. Almost perfect nonlinear (APN) functions over fields of

More information

On the representability of the bi-uniform matroid

On the representability of the bi-uniform matroid On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 1, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large

More information

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q),

Elementary 2-Group Character Codes. Abstract. In this correspondence we describe a class of codes over GF (q), Elementary 2-Group Character Codes Cunsheng Ding 1, David Kohel 2, and San Ling Abstract In this correspondence we describe a class of codes over GF (q), where q is a power of an odd prime. These codes

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The

More information

New algebraic decoding method for the (41, 21,9) quadratic residue code

New algebraic decoding method for the (41, 21,9) quadratic residue code New algebraic decoding method for the (41, 21,9) quadratic residue code Mohammed M. Al-Ashker a, Ramez Al.Shorbassi b a Department of Mathematics Islamic University of Gaza, Palestine b Ministry of education,

More information

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups.

MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. MATH 433 Applied Algebra Lecture 21: Linear codes (continued). Classification of groups. Binary codes Let us assume that a message to be transmitted is in binary form. That is, it is a word in the alphabet

More information

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x]. The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive

More information

Support weight enumerators and coset weight distributions of isodual codes

Support weight enumerators and coset weight distributions of isodual codes Support weight enumerators and coset weight distributions of isodual codes Olgica Milenkovic Department of Electrical and Computer Engineering University of Colorado, Boulder March 31, 2003 Abstract In

More information

On cyclic codes of composite length and the minimal distance

On cyclic codes of composite length and the minimal distance 1 On cyclic codes of composite length and the minimal distance Maosheng Xiong arxiv:1703.10758v1 [cs.it] 31 Mar 2017 Abstract In an interesting paper Professor Cunsheng Ding provided three constructions

More information

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16

Solutions of Exam Coding Theory (2MMC30), 23 June (1.a) Consider the 4 4 matrices as words in F 16 Solutions of Exam Coding Theory (2MMC30), 23 June 2016 (1.a) Consider the 4 4 matrices as words in F 16 2, the binary vector space of dimension 16. C is the code of all binary 4 4 matrices such that the

More information

There are no Barker arrays having more than two dimensions

There are no Barker arrays having more than two dimensions There are no Barker arrays having more than two dimensions Jonathan Jedwab Matthew G. Parker 5 June 2006 (revised 7 December 2006) Abstract Davis, Jedwab and Smith recently proved that there are no 2-dimensional

More information

G-Perfect Nonlinear Functions

G-Perfect Nonlinear Functions University of Richmond UR Scholarship Repository Math and Computer Science Faculty Publications Math and Computer Science 1-2008 G-Perfect Nonlinear Functions James A. Davis University of Richmond, jdavis@richmond.edu

More information

Which Codes Have 4-Cycle-Free Tanner Graphs?

Which Codes Have 4-Cycle-Free Tanner Graphs? Which Codes Have 4-Cycle-Free Tanner Graphs? Thomas R. Halford and Keith M. Chugg Communication Sciences Institute University of Southern California Los Angeles, CA 90089-565, USA Email: {halford, chugg}@usc.edu

More information

Characterizations of the differential uniformity of vectorial functions by the Walsh transform

Characterizations of the differential uniformity of vectorial functions by the Walsh transform Characterizations of the differential uniformity of vectorial functions by the Walsh transform Claude Carlet LAGA, Department of Mathematics, University of Paris 8 (and Paris 13 and CNRS), Saint Denis

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40

A Projection Decoding of a Binary Extremal Self-Dual Code of Length 40 A Projection Decoding of a Binary Extremal Self-Dual Code of Length 4 arxiv:7.48v [cs.it] 6 Jan 27 Jon-Lark Kim Department of Mathematics Sogang University Seoul, 2-742, South Korea jlkim@sogang.ac.kr

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

A New Approach to Permutation Polynomials over Finite Fields

A New Approach to Permutation Polynomials over Finite Fields A New Approach to Permutation Polynomials over Finite Fields Xiang-dong Hou Department of Mathematics and Statistics University of South Florida Coding, Cryptology and Combinatorial Designs Singapore,

More information

On the Correlation Distribution of Delsarte Goethals Sequences

On the Correlation Distribution of Delsarte Goethals Sequences On the Correlation Distribution of Delsarte Goethals Seuences Kai-Uwe Schmidt 9 July 009 (revised 01 December 009) Abstract For odd integer m 3 and t = 0, 1,..., m 1, we define Family V (t) to be a set

More information

On the Construction and Decoding of Cyclic LDPC Codes

On the Construction and Decoding of Cyclic LDPC Codes On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and

More information

New binary self-dual codes of lengths 50 to 60

New binary self-dual codes of lengths 50 to 60 Designs, Codes and Cryptography manuscript No. (will be inserted by the editor) New binary self-dual codes of lengths 50 to 60 Nikolay Yankov Moon Ho Lee Received: date / Accepted: date Abstract Using

More information

On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields

On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 47, NO 7, NOVEMBER 2001 2751 On the Algebraic Structure of Quasi-Cyclic Codes I: Finite Fields San Ling Patrick Solé, Member, IEEE Abstract A new algebraic

More information

Vectorial Boolean Functions for Cryptography

Vectorial Boolean Functions for Cryptography Vectorial Boolean Functions for Cryptography Claude Carlet June 1, 008 To appear as a chapter of the volume Boolean Methods and Models, published by Cambridge University Press, Eds Yves Crama and Peter

More information

Cyclic Codes and Self-Dual Codes Over

Cyclic Codes and Self-Dual Codes Over 1250 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 4, MAY 1999 Cyclic Codes and Self-Dual Codes Over A. Bonnecaze and P. Udaya TABLE I MULTIPLICATION AND ADDITION TABLES FOR THE RING F 2 + uf 2

More information

has the two-level autocorrelation function for (2) otherwise, where the periodic unnormalized autocorrelation function of the sequence is defined as

has the two-level autocorrelation function for (2) otherwise, where the periodic unnormalized autocorrelation function of the sequence is defined as 1530 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 3, MARCH 2011 Trace Representation Linear Complexity of Binary eth Power Residue Sequences of Period p Zongduo Dai, Guang Gong, Hong-Yeop Song,

More information

Type I Codes over GF(4)

Type I Codes over GF(4) Type I Codes over GF(4) Hyun Kwang Kim San 31, Hyoja Dong Department of Mathematics Pohang University of Science and Technology Pohang, 790-784, Korea e-mail: hkkim@postech.ac.kr Dae Kyu Kim School of

More information

Construction X for quantum error-correcting codes

Construction X for quantum error-correcting codes Simon Fraser University Burnaby, BC, Canada joint work with Vijaykumar Singh International Workshop on Coding and Cryptography WCC 2013 Bergen, Norway 15 April 2013 Overview Construction X is known from

More information

Stream Ciphers and Number Theory

Stream Ciphers and Number Theory Stream Ciphers and Number Theory Revised Edition Thomas W. Cusick The State University of New York at Buffalo, NY, U.S.A. Cunsheng Ding The Hong Kong University of Science and Technology China Ari Renvall

More information

On the Existence and Constructions of Vectorial Boolean Bent Functions

On the Existence and Constructions of Vectorial Boolean Bent Functions On the Existence and Constructions of Vectorial Boolean Bent Functions Yuwei Xu 1, and ChuanKun Wu 1 1 State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy

More information