首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
In this paper, we mainly study the theory of linear codes over the ring \(R =\mathbb {Z}_4+u\mathbb {Z}_4+v\mathbb {Z}_4+uv\mathbb {Z}_4\). By using the Chinese Remainder Theorem, we prove that R is isomorphic to a direct sum of four rings. We define a Gray map \(\Phi \) from \(R^{n}\) to \(\mathbb {Z}_4^{4n}\), which is a distance preserving map. The Gray image of a cyclic code over R is a linear code over \(\mathbb {Z}_4\). We also discuss some properties of MDS codes over R. Furthermore, we study the MacWilliams identities of linear codes over R and give the generator polynomials of cyclic codes over R.  相似文献   

2.
We prove that the class of \(\mathbb {Z}_2\mathbb {Z}_2[u]\)-linear codes is exactly the class of \(\mathbb {Z}_2\)-linear codes with automorphism group of even order. Using this characterization, we give examples of known codes, e.g. perfect codes, which have a nontrivial \(\mathbb {Z}_2\mathbb {Z}_2[u]\) structure. Moreover, we exhibit some examples of \(\mathbb {Z}_2\)-linear codes which are not \(\mathbb {Z}_2\mathbb {Z}_2[u]\)-linear. Also, we state that the duality of \(\mathbb {Z}_2\mathbb {Z}_2[u]\)-linear codes is the same as the duality of \(\mathbb {Z}_2\)-linear codes. Finally, we prove that the class of \(\mathbb {Z}_2\mathbb {Z}_4\)-linear codes which are also \(\mathbb {Z}_2\)-linear is strictly contained in the class of \(\mathbb {Z}_2\mathbb {Z}_2[u]\)-linear codes.  相似文献   

3.
We determine the possible homogeneous weights of regular projective two-weight codes over \(\mathbb {Z}_{2^k}\) of length \(n>3\), with dual Krotov distance \(d^{\lozenge }\) at least four. The determination of the weights is based on parameter restrictions for strongly regular graphs applied to the coset graph of the dual code. When \(k=2\), we characterize the parameters of such codes as those of the inverse Gray images of \(\mathbb {Z}_4\)-linear Hadamard codes, which have been characterized by their types by several authors.  相似文献   

4.
In this paper we investigate linear codes with complementary dual (LCD) codes and formally self-dual codes over the ring \(R=\mathbb {F}_{q}+v\mathbb {F}_{q}+v^{2}\mathbb {F}_{q}\), where \(v^{3}=v\), for q odd. We give conditions on the existence of LCD codes and present construction of formally self-dual codes over R. Further, we give bounds on the minimum distance of LCD codes over \(\mathbb {F}_q\) and extend these to codes over R.  相似文献   

5.
In this paper, we define the simplex and MacDonald codes of types \(\alpha \) and \(\beta \) over \({\mathbb {Z}}_{2}{\mathbb {Z}}_{4}\). We also examine the covering radii of these codes. Further, we study the binary images of these codes and prove that the binary image of the simplex codes of type \(\alpha \) meets the Gilbert bound.  相似文献   

6.
Let \(\ell \) be a prime and let \(L/ \mathbb {Q}\) be a Galois number field with Galois group isomorphic to \( \mathbb {Z}/\ell \mathbb {Z}\). We show that the shape of L, see Definition 1.2, is either \(\frac{1}{2}\mathbb {A}_{\ell -1}\) or a fixed sub-lattice depending only on \(\ell \); such a dichotomy in the value of the shape only depends on the type of ramification of L. This work is motivated by a result of Bhargava and Shnidman, and a previous work of the first named author, on the shape of \( \mathbb {Z}/3 \mathbb {Z}\) number fields.  相似文献   

7.
Let \(\mathcal{C}\) be a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-additive code of length \(n > 3\). We prove that if the binary Gray image of \(\mathcal{C}\) is a 1-perfect nonlinear code, then \(\mathcal{C}\) cannot be a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-cyclic code except for one case of length \(n=15\). Moreover, we give a parity check matrix for this cyclic code. Adding an even parity check coordinate to a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-additive 1-perfect code gives a \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-additive extended 1-perfect code. We also prove that such a code cannot be \({\mathbb {Z}}_2{\mathbb {Z}}_4\)-cyclic.  相似文献   

8.
We study the structure of cyclic DNA codes of odd length over the finite commutative ring \(R=\mathbb {F}_2+u\mathbb {F}_2+v\mathbb {F}_2+uv\mathbb {F}_2 + v^2\mathbb {F}_2+uv^2\mathbb {F}_2,~u^2=0, v^3=v\), which plays an important role in genetics, bioengineering and DNA computing. A direct link between the elements of the ring R and 64 codons used in the amino acids of living organisms is established by introducing a Gray map from R to \(R_1=\mathbb {F}_2+u\mathbb {F}_2 ~(u^2=0)\). The reversible and the reversible-complement codes over R are investigated. We also discuss the binary image of the cyclic DNA codes over R. Among others, some examples of DNA codes obtained via Gray map are provided.  相似文献   

9.
A binary linear code C is a \({\mathbb {Z}}_2\)-double cyclic code if the set of coordinates can be partitioned into two subsets such that any cyclic shift of the coordinates of both subsets leaves invariant the code. These codes can be identified as submodules of the \({\mathbb {Z}}_2[x]\)-module \({\mathbb {Z}}_2[x]/(x^r-1)\times {\mathbb {Z}}_2[x]/(x^s-1).\) We determine the structure of \({\mathbb {Z}}_2\)-double cyclic codes giving the generator polynomials of these codes. We give the polynomial representation of \({\mathbb {Z}}_2\)-double cyclic codes and its duals, and the relations between the generator polynomials of these codes. Finally, we study the relations between \({{\mathbb {Z}}}_2\)-double cyclic and other families of cyclic codes, and show some examples of distance optimal \({\mathbb {Z}}_2\)-double cyclic codes.  相似文献   

10.
A classic result of Delsarte connects the strength (as orthogonal array) of a linear code with the minimum weight of its dual: the former is one less than the latter. Since the paper of Hammons et al., there is a lot of interest in codes over rings, especially in codes over \(\mathbb {Z}_{4}\) and their (usually non-linear) binary Gray map images. We show that Delsarte’s observation extends to codes over arbitrary finite commutative rings with identity. Also, we show that the strength of the Gray map image of a \(\mathbb {Z}_{4}\) code is one less than the minimum Lee weight of its Gray map image.  相似文献   

11.
We establish the linear independence of time-frequency translates for functions \(f\) on \(\mathbb {R}^d\) having one-sided decay \(\lim _{x \in H,\ |x|\rightarrow \infty } |f(x)| e^{c|x| \log |x|} = 0\) for all \(c>0\), which do not vanish on an affine half-space \(H \subset \mathbb {R}^d\).  相似文献   

12.
Let \(\mathbb {F}_{p^m}\) be a finite field of cardinality \(p^m\), where p is a prime, and kN be any positive integers. We denote \(R_k=F_{p^m}[u]/\langle u^k\rangle =F_{p^m}+uF_{p^m}+\cdots +u^{k-1}F_{p^m}\) (\(u^k=0\)) and \(\lambda =a_0+a_1u+\cdots +a_{k-1}u^{k-1}\) where \(a_0, a_1,\ldots , a_{k-1}\in F_{p^m}\) satisfying \(a_0\ne 0\) and \(a_1=1\). Let r be a positive integer satisfying \(p^{r-1}+1\le k\le p^r\). First we define a Gray map from \(R_k\) to \(F_{p^m}^{p^r}\), then prove that the Gray image of any linear \(\lambda \)-constacyclic code over \(R_k\) of length N is a distance preserving linear \(a_0^{p^r}\)-constacyclic code over \(F_{p^m}\) of length \(p^rN\). Furthermore, the generator polynomials for each linear \(\lambda \)-constacyclic code over \(R_k\) of length N and its Gray image are given respectively. Finally, some optimal constacyclic codes over \(F_{3}\) and \(F_{5}\) are constructed.  相似文献   

13.
We study odd and even \(\mathbb{Z }_2\mathbb{Z }_4\) formally self-dual codes. The images of these codes are binary codes whose weight enumerators are that of a formally self-dual code but may not be linear. Three constructions are given for formally self-dual codes and existence theorems are given for codes of each type defined in the paper.  相似文献   

14.
In this paper we study the difference between the 2-adic valuations of the cardinalities \( \# E( \mathbb {F}_{q^k} ) \) and \( \# E( \mathbb {F}_q ) \) of an elliptic curve E over \( \mathbb {F}_q \). We also deduce information about the structure of the 2-Sylow subgroup \( E[ 2^\infty ]( \mathbb {F}_{q^k} ) \) from the exponents of \( E[ 2^\infty ]( \mathbb {F}_q ) \).  相似文献   

15.
In this paper, several nonexistence results on generalized bent functions \(f:\mathbb {Z}_{2}^{n} \rightarrow \mathbb {Z}_{m}\) are presented by using the knowledge on cyclotomic number fields and their imaginary quadratic subfields.  相似文献   

16.
Permutation polynomials over finite fields have been studied extensively recently due to their wide applications in cryptography, coding theory, communication theory, among others. Recently, several authors have studied permutation trinomials of the form \(x^rh\left( x^{q-1}\right) \) over \({\mathbb F}_{q^2}\), where \(q=2^k\), \(h(x)=1+x^s+x^t\) and \(r, k>0, s, t\) are integers. Their methods are essentially usage of a multiplicative version of AGW Criterion because they all transformed the problem of proving permutation polynomials over \({\mathbb F}_{q^2}\) into that of showing the corresponding fractional polynomials permute a smaller set \(\mu _{q+1}\), where \(\mu _{q+1}:=\{x\in \mathbb {F}_{q^2} : x^{q+1}=1\}\). Motivated by these results, we characterize the permutation polynomials of the form \(x^rh\left( x^{q-1}\right) \) over \({\mathbb F}_{q^2}\) such that \(h(x)\in {\mathbb F}_q[x]\) is arbitrary and q is also an arbitrary prime power. Using AGW Criterion twice, one is multiplicative and the other is additive, we reduce the problem of proving permutation polynomials over \({\mathbb F}_{q^2}\) into that of showing permutations over a small subset S of a proper subfield \({\mathbb F}_{q}\), which is significantly different from previously known methods. In particular, we demonstrate our method by constructing many new explicit classes of permutation polynomials of the form \(x^rh\left( x^{q-1}\right) \) over \({\mathbb F}_{q^2}\). Moreover, we can explain most of the known permutation trinomials, which are in Ding et al. (SIAM J Discret Math 29:79–92, 2015), Gupta and Sharma (Finite Fields Appl 41:89–96, 2016), Li and Helleseth (Cryptogr Commun 9:693–705, 2017), Li et al. (New permutation trinomials constructed from fractional polynomials, arXiv: 1605.06216v1, 2016), Li et al. (Finite Fields Appl 43:69–85, 2017) and Zha et al. (Finite Fields Appl 45:43–52, 2017) over finite field with even characteristic.  相似文献   

17.
We prove that for each prime p, positive integer \(\alpha \), and non-negative integers \(\beta \) and \(\gamma \), the Diophantine equation \(X^{2N} + 2^{2\alpha }5^{2\beta }{p}^{2\gamma } = Z^5\) has no solution with N, X, \(Z\in \mathbb {Z}^+\), \(N > 1\), and \(\gcd (X,Z) = 1\).  相似文献   

18.
Let F be an \(L^2\)-normalized Hecke Maaß cusp form for \(\Gamma _0(N) \subseteq {\mathrm{SL}}_{n}({\mathbb {Z}})\) with Laplace eigenvalue \(\lambda _F\). If \(\Omega \) is a compact subset of \(\Gamma _0(N)\backslash {\mathrm{PGL}}_n/\mathrm{PO}_{n}\), we show the bound \(\Vert F|_{\Omega }\Vert _{\infty } \ll _{ \Omega } N^{\varepsilon } \lambda _F^{n(n-1)/8 - \delta }\) for some constant \(\delta = \delta _n> 0\) depending only on n.  相似文献   

19.
In this paper we investigate univariate algebraic attacks on filter generators over extension fields \(\mathbb {F}_q=\mathbb {F}_{2^n}\) with focus on the Welch–Gong (WG) family of stream ciphers. Our main contribution is to reduce the general algebraic attack complexity on such cipher by proving new and lower bounds for the spectral immunity of such ciphers. The spectral immunity is the univariate analog of algebraic immunity and instead of measuring degree of multiples of a multivariate polynomial, it measures the minimum number of nonzero coefficients of a multiple of a univariate polynomial. In particular, there is an algebraic degeneracy in these constructions, which, when combined with attacks based on low-weight multiples over \(\mathbb {F}_q\), provides much more efficient attacks than over \(\mathbb {F}_2\). With negligible computational complexity, our best attack breaks the primitive WG-5 if given access to 4 kilobytes of keystream, break WG-7 if given access to 16 kilobytes of keystream and break WG-8 if given access to half a megabyte of keystream. Our best attack on WG-16 targeted at 4G-LTE is less practical, and requires \(2^{103}\) computational complexity and \(2^{61}\) bits of keystream. In all instances, we significantly lower both keystream and computational complexity in comparison to previous estimates. On a side note, we resolve an open problem regarding the rank of a type of equation systems used in algebraic attacks.  相似文献   

20.
Let R be a commutative ring with \(1\in R\) and \(R^{*}\) be the multiplicative group of its units. In 1969, Nagell introduced the concept of an exceptional unit, namely a unit u such that \(1-u\) is also a unit. Let \({\mathbb {Z}}_n\) be the ring of residue classes modulo n. In this paper, given an integer \(k\ge 2\), we obtain an exact formula for the number of ways to represent each element of \( \mathbb {Z}_n\) as the sum of k exceptional units. This generalizes a recent result of J. W. Sander for the case \(k=2\).  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号