共查询到20条相似文献,搜索用时 15 毫秒
1.
Sren Have Hansen 《Finite Fields and Their Applications》2001,7(4):530-552
In this paper we use intersection theory to develop methods for obtaining lower bounds on the parameters of algebraic geometric error-correcting codes constructed from varieties of arbitrary dimension. The methods are sufficiently general to encompass many of the codes previously constructed from higher-dimensional varieties, as well as those coming from curves. And still, the bounds obtained are usually as good as the ones previously known (at least of the same order of magnitude with respect to the size of the ground field). Several examples coming from Deligne–Lusztig varieties, complete intersections of Hermitian hyper-surfaces, and from ruled surfaces (or more generally, projective bundles over a curve) are given. 相似文献
2.
Almost MDS Codes 总被引:2,自引:0,他引:2
Mario A. de Boer 《Designs, Codes and Cryptography》1996,9(2):143-155
MDS codes are codes meeting the Singleton bound. Both for theory and practice, these codes are very important and have been studied extensively. Codes near this bound, but not attaining it, have had far less attention. In this paper we study codes that almost reach the Singleton bound. 相似文献
3.
In this paper we discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the redundancy of public keys. Another weakness is found in the Alabbadi-Wicker scheme, which results in a universal forgery attack against it. This attack shows that the Alabbadi-Wicker scheme fails to implement the necessary property of a digital signature scheme: it is infeasible to find a false signature algorithm D
from the public verification algorithm E such that E(D
(
)) =
for all messages
. Further analysis shows that this new weakness also applies to the Xinmei scheme. 相似文献
4.
One of the most important problems of coding theory is to construct codes with best possible minimum distances. Recently, quasi-cyclic (QC) codes have been proven to contain many such codes. In this paper, we consider quasi-twisted (QT) codes, which are generalizations of QC codes, and their structural properties and obtain new codes which improve minimum distances of best known linear codes over the finite fields GF(3) and GF(5). Moreover, we give a BCH-type bound on minimum distance for QT codes and give a sufficient condition for a QT code to be equivalent to a QC code. 相似文献
5.
Combinatorial designs have been used widely in the construction of self-dual codes. Recently a new method of constructing self-dual codes was established using orthogonal designs. This method has led to the construction of many new self-dual codes over small finite fields and rings. In this paper, we generalize this method by using generalized orthogonal designs, and we give another new method that creates and solves Diophantine equations over GF(p) in order to find suitable generator matrices for self-dual codes. We show that under the necessary conditions these methods can be applied as well to small and large fields. We apply these two methods to study self-dual codes over GF(31) and GF(37). Using these methods we obtain some new maximum distance separable self-dual codes of small orders. 相似文献
6.
A new bound for the dimension of binary Goppa codes belonging to a specific subclass is given. This bound improves the well-known lower bound for Goppa codes. 相似文献
7.
In this paper, a construction of optimal constant composition codes is developed, and used to derive some series of new optimal
constant composition codes meeting the upper bound given by [13]. 相似文献
8.
In this paper we show that the support of the codewords of each type in the Kerdock code of length 2m over Z4 form 3-designs for any odd integer
. In particular, twonew infinite families of 3-designs are obtained in this constructionfor any odd integer
. In particular, twonew infinite families of 3-designs are obtained in this constructionfor any odd integer
, whose parameters are
,and
. 相似文献
9.
T. L. Alderson 《Designs, Codes and Cryptography》2006,38(1):31-40
An (n,k)q-MDS code C over an alphabet
(of size q) is a collection of qk n–tuples over
such that no two words of C agree in as many as k coordinate positions. It follows that n ≤ q+k−1. By elementary combinatorial means we show that every (6,3)4-MDS code, linear or not, turns out to be a linear (6,3)4-MDS code or else a code equivalent to a linear code with these parameters. It follows that every (5,3)4-MDS code over
must also be equivalent to linear. 相似文献
10.
Neil J. Calkin Jennifer D. Key Marialuisa J. de Resmini 《Designs, Codes and Cryptography》1999,17(1-3):105-120
The geometric codes are the duals of the codes defined by the designs associated with finite geometries. The latter are generalized Reed–Muller codes, but the geometric codes are, in general, not. We obtain values for the minimum weight of these codes in the binary case, using geometric constructions in the associated geometries, and the BCH bound from coding theory. Using Hamada's formula, we also show that the dimension of the dual of the code of a projective geometry design is a polynomial function in the dimension of the geometry. 相似文献
11.
An upper bound for self-complementary balanced codes is presented in this paper. We give a characterization for self-complementary balanced codes meeting this upper bound. We show that the existence of certain quasi-symmetric designs implies the existence of such optimal self-complementary balanced codes. 相似文献
12.
循环码译码的Dixon结式方法 总被引:1,自引:0,他引:1
针对纠错码译码就是非线性方程组的求解问题,提出利用Dixon结式方法对译码方程进行消元以得到接收数据中的错位多项式.首先,根据纠错码的纠错能力和接收数据得到伴随式矩阵并通过该矩阵的秩确定接收码字中错误位的个数.然后,根据错位个数和伴随多项式构造译码方程.译码时,将其中一个错位变元作为隐藏变元,利用Dixon结式方法进行消元.最后,得到的Dixon结式就是关于隐藏变元的多项式.该多项式去掉多余因子后就是错位多项式,利用Chien搜索法即可求解出错误位置.当错位较多时,采用逐次计算结式的方法以筛除计算过程中的多余因子和重因子.另外,根据不同错位个数得到的错位多项式,提出了构造一类循环码错位多项式符号解的猜想,该猜想可以大大提高译码效率.实验验证了结式理论在纠错码译码方面的应用是有效的且有助于降低对芯片性能的要求. 相似文献
13.
By a T
*(2, k, v)-code we mean a perfect4-deletion-correcting code of length 6 over an alphabet of size v, which is capable of correcting anycombination of up to 4 deletions and/or insertions of letters that occur in transmission of codewords. Thethird author (DCC Vol. 23, No. 1) presented a combinatorial construction for such codes and prove thata T
*(2, 6, v)-code exists for all positive integers v 3 (mod 5), with 12 possible exceptions of v. In this paper, the notion of a directedgroup divisible quasidesign is introduced and used to show that a T
*(2, 6,v)-code exists for all positive integers v 3 (mod 5), except possiblyfor v {173, 178, 203, 208}. The 12 missing cases for T
*(2,6, v)-codes with v 3 (mod 5) are also provided, thereby the existenceproblem for T
*(2, 6, v)-codes is almost complete. 相似文献
14.
Mattias Svanström 《Designs, Codes and Cryptography》1999,18(1-3):223-229
We construct a class of perfect ternary constant-weight codes of length 2
r
, weight 2
r
-1 and minimum distance 3. The codes have
codewords. The construction is based on combining cosets of binary Hamming codes. As a special case, for r=2 the construction gives the subcode of the tetracode consisting of its nonzero codewords. By shortening the perfect codes, we get further optimal codes. 相似文献
15.
Tor Helleseth Torleiv Kløve Vladimir I. Levenshtein 《Designs, Codes and Cryptography》2003,28(3):265-282
An ordered orthogonal array OOA(, k, n) is a binary 2
k
× n matrix with the property that for each complete -set of columns, each possible -tuple occurs in exactly 2
k– rows of those columns (for definition of a complete -set, see below). Constructions of OOA(, k, n) for = 4 and = 5 are given. 相似文献
16.
The problem of providing bounds on the redundancy of an optimal code for a discrete memoryless source in terms of the probability distribution of the source, has been extensively studied in the literature. The attention has mainly focused on binary codes for the case when the most or the least likely source letter probabilities are known. In this paper we analyze the relationships among tight lower bounds on the redundancy r. Let r D,i(x) be the tight lower bound on r for D-ary codes in terms of the value x of the i-th most likely source letter probability. We prove that D,i-1(x) D,i(x) for all possible x and i. As a consequence, we can bound the redundancy when only the value of a probability (but not its rank) is known. Another consequence is a shorter and simpler proof of a known bound. We also provide some other properties of tight lower bounds. Finally, we determine an achievable lower bound on r in terms of the least likely source letter probability for D 3, generalizing the known bound for the case D = 2. 相似文献
17.
Finite geometry codes are defined as the null spaces of the incidence matrices of points and flats in finite geometries. In
this paper, we investigate the incidence matrix of points other than the origin and lines not passing through the origin in
the affine plane AG(2,2s), and we present two classes of quasi-cyclic codes derived from submatrices of the point-line incidence matrix. We also investigate
the 2-ranks of those submatrices.
AMS Classification: 94B25, 94B05 相似文献
19.
We recover the first linear programming bound of McEliece, Rodemich, Rumsey, and Welch for binary error-correcting codes and
designs via a covering argument. It is possible to show, interpreting the following notions appropriately, that if a code
has a large distance, then its dual has a small covering radius and, therefore, is large. This implies the original code to
be small.
We also point out that this bound is a natural isoperimetric constant of the Hamming cube, related to its Faber–Krahn minima.
While our approach belongs to the general framework of Delsarte’s linear programming method, its main technical ingredient
is Fourier duality for the Hamming cube. In particular, we do not deal directly with Delsarte’s linear program or orthogonal
polynomial theory.
This research was partially supported by ISF grant 039-7682. 相似文献