Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy
{"title":"Curve-lifted codes for local recovery using lines","authors":"Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy","doi":"10.1007/s10623-024-01456-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01456-0","url":null,"abstract":"<p>In this paper, we introduce curve-lifted codes over fields of arbitrary characteristic, inspired by Hermitian-lifted codes over <span>(mathbb {F}_{2^r})</span>. These codes are designed for locality and availability, and their particular parameters depend on the choice of curve and its properties. Due to the construction, the numbers of rational points of intersection between curves and lines play a key role. To demonstrate that and generate new families of locally recoverable codes (LRCs) with high availabilty, we focus on norm-trace-lifted codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141631347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hulls of cyclic codes with respect to the regular permutation inner product","authors":"Xiaoshan Quan, Qin Yue, Fuqing Sun","doi":"10.1007/s10623-024-01428-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01428-4","url":null,"abstract":"<p>In this paper, we introduce regular permutation inner products which contain the Euclidean inner product. And we generalize some properties of the Euclidean inner product to regular permutation inner products. As application, we construct a lot of cyclic codes with specific regular permutation hulls and also obtain the dimensions and distances of some BCH codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141625057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explicit constructions of NMDS self-dual codes","authors":"Dongchun Han, Hanbin Zhang","doi":"10.1007/s10623-024-01450-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01450-6","url":null,"abstract":"<p>Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to combinatorics, lattice theory, and have important application in cryptography. In this paper, we construct a class of <i>q</i>-ary linear codes and prove that they are either MDS or NMDS which depends on certain zero-sum condition. In the NMDS case, we provide an effective approach to construct NMDS self-dual codes which largely extend known parameters of such codes. In particular, we proved that for square <i>q</i>, almost <i>q</i>/8 NMDS self-dual <i>q</i>-ary codes can be constructed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141597506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
James A. Davis, John Polhill, Ken Smith, Eric Swartz, Jordan Webster
{"title":"New spence difference sets","authors":"James A. Davis, John Polhill, Ken Smith, Eric Swartz, Jordan Webster","doi":"10.1007/s10623-024-01446-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01446-2","url":null,"abstract":"<p>Spence [9] constructed <span>(left( frac{3^{d+1}(3^{d+1}-1)}{2}, frac{3^d(3^{d+1}+1)}{2}, frac{3^d(3^d+1)}{2}right) )</span>-difference sets in groups <span>(K times C_3^{d+1})</span> for <i>d</i> any positive integer and <i>K</i> any group of order <span>(frac{3^{d+1}-1}{2})</span>. Smith and Webster [8] have exhaustively studied the <span>(d=1)</span> case without requiring that the group have the form listed above and found many constructions. Among these, one intriguing example constructs Spence difference sets in <span>(A_4 times C_3)</span> by using (3, 3, 3, 1)-relative difference sets in a non-normal subgroup isomorphic to <span>(C_3^2)</span>. Drisko [3] has a note implying that his techniques allow constructions of Spence difference sets in groups with a noncentral normal subgroup isomorphic to <span>(C_3^{d+1})</span> as long as <span>(frac{3^{d+1}-1}{2})</span> is a prime power. We generalize this result by constructing Spence difference sets in similar families of groups, but we drop the requirement that <span>(frac{3^{d+1}-1}{2})</span> is a prime power. We conjecture that any group of order <span>(frac{3^{d+1}(3^{d+1}-1)}{2})</span> with a normal subgroup isomorphic to <span>(C_3^{d+1})</span> will have a Spence difference set (this is analogous to Dillon’s conjecture in 2-groups, and that result was proved in Drisko’s work). Finally, we present the first known example of a Spence difference set in a group where the Sylow 3-subgroup is nonabelian and has exponent bigger than 3. This new construction, found by computing the full automorphism group <span>(textrm{Aut}(mathcal {D}))</span> of a symmetric design associated to a known Spence difference set and identifying a regular subgroup of <span>(textrm{Aut}(mathcal {D}))</span>, uses (3, 3, 3, 1)-relative difference sets to describe the difference set.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141577898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan
{"title":"Vectorial negabent concepts: similarities, differences, and generalizations","authors":"Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan","doi":"10.1007/s10623-024-01454-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01454-2","url":null,"abstract":"<p>In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial negabent and vectorial bent-negabent concepts are introduced, which leads to seemingly contradictory results. One of the main motivations for this article is to clarify the differences and similarities between these two concepts. Moreover, the negabent concept is extended to generalized Boolean functions from <span>({mathbb {F}}_2^n)</span> to the cyclic group <span>({mathbb {Z}}_{2^k})</span>. It is shown how to obtain nega-<span>({mathbb {Z}}_{2^k})</span>-bent functions from <span>({mathbb {Z}}_{2^k})</span>-bent functions, or equivalently, corresponding non-splitting relative difference sets from the splitting relative difference sets. This generalizes the shifting results for Boolean bent and negabent functions. We finally point to constructions of <span>({mathbb {Z}}_8)</span>-bent functions employing permutations with the <span>(({mathcal {A}}_m))</span> property, and more generally we show that the inverse permutation gives rise to <span>({mathbb {Z}}_{2^k})</span>-bent functions.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Additivity of symmetric and subspace 2-designs","authors":"Marco Buratti, Anamari Nakić","doi":"10.1007/s10623-024-01452-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01452-4","url":null,"abstract":"<p>A 2-<span>((v,k,lambda ))</span> design is additive (or strongly additive) if it is possible to embed it in a suitable abelian group <i>G</i> in such a way that its block set is contained in (or coincides with) the set of all zero-sum <i>k</i>-subsets of its point set. Explicit results on the additivity or strong additivity of symmetric designs and subspace 2-designs are presented. In particular, the strong additivity of PG<span>(_d(n,q))</span>, which was known to be additive only for <span>(q=2)</span> or <span>(d=n-1)</span>, is always established.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Around LCD group codes","authors":"Javier de la Cruz, Wolfgang Willems","doi":"10.1007/s10623-024-01451-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01451-5","url":null,"abstract":"<p>In this note we answer some questions on <span>(text{ LCD })</span> group codes posed in de la Cruz and Willems (Des Codes Cryptogr 86:2065–2073, 2018) and (Vietnam J Math 51:721–729, 2023). Furthermore, over prime fields we determine completely the <i>p</i>-part of the divisor of an <span>(text{ LCD })</span> group code. In addition we present a natural construction of nearly <span>(text{ LCD })</span> codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some self-dual codes and isodual codes constructed by matrix product codes","authors":"Xu Pan, Hao Chen, Hongwei Liu","doi":"10.1007/s10623-024-01453-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01453-3","url":null,"abstract":"<p>In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic codes. In this paper, we study a family of matrix product codes with wonderful properties, which is a generalization of linear codes obtained from the <span>([u+v|u-v])</span>-construction and <span>([u+v|lambda ^{-1}u-lambda ^{-1}v])</span>-construction. Then we show that any <span>(lambda )</span>-constacyclic code (not necessary repeated-root <span>(lambda )</span>-constacyclic code) of length <i>N</i> over the finite field <span>(mathbb {F}_q)</span> with <span>(textrm{gcd}(frac{q-1}{textrm{ord}(lambda )},N)ge 2)</span>, where <span>(textrm{ord}(lambda ))</span> is the order of <span>(lambda )</span> in the cyclic group <span>(mathbb {F}^*_q=mathbb {F}_qbackslash {0})</span>, is a matrix product code of some constacyclic codes. It is a highly interesting question that the existence of sequences <span>({C_1,C_2,C_3,...})</span> of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances, i.e., <span>(C_i)</span> is an <span>([n(C_i),k(C_i),d(C_i)]_q)</span>-linear code such that </p><span>$$begin{aligned} lim _{irightarrow +infty }n(C_i)=+infty ,,,,,text {and},,,,,lim _{irightarrow +infty }frac{d(C_i)}{sqrt{n(C_i)}}>0. end{aligned}$$</span><p>Based on the <span>([u+v|lambda ^{-1}u-lambda ^{-1}v])</span>-construction, we construct several families of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances by using Reed-Muller codes, projective Reed-Muller codes. And we construct some new Euclidean isodual <span>(lambda )</span>-constacyclic codes with square-root-like minimum Hamming distances from Euclidean self-dual cyclic codes and Euclidean self-dual negacyclic codes by monomial equivalences.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141521431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some constacyclic BCH codes with good parameters","authors":"Jin Li, Huilian Zhu, Shan Huang","doi":"10.1007/s10623-024-01433-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01433-7","url":null,"abstract":"<p>BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are still very limited. In this paper, we investigate some <i>q</i>-ary BCH codes and <span>(lambda )</span>-constacyclic BCH codes of length <span>(q^{m}+1)</span>, where <i>q</i> is a prime power and <span>(textrm{ord}(lambda )mid q-1)</span>. We determine the dimensions of these codes with some large designed distances, and give good lower bounds on the minimum distance. The code examples presented in this paper indicate that these codes contain many distance-optimal codes and codes with best known parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141489579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of compositional inverses of permutation polynomials over finite fields","authors":"Qiang Wang","doi":"10.1007/s10623-024-01436-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01436-4","url":null,"abstract":"<p>In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In particular, we describe a framework in terms of a commutative diagram which unifies several recent methods in finding the inverses of permutation polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141462364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}