Designs, Codes and Cryptography最新文献

筛选
英文 中文
Curve-lifted codes for local recovery using lines 利用线路进行局部恢复的曲线提升代码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-17 DOI: 10.1007/s10623-024-01456-0
Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy
{"title":"Curve-lifted codes for local recovery using lines","authors":"Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy","doi":"10.1007/s10623-024-01456-0","DOIUrl":"https://doi.org/10.1007/s10623-024-01456-0","url":null,"abstract":"<p>In this paper, we introduce curve-lifted codes over fields of arbitrary characteristic, inspired by Hermitian-lifted codes over <span>(mathbb {F}_{2^r})</span>. These codes are designed for locality and availability, and their particular parameters depend on the choice of curve and its properties. Due to the construction, the numbers of rational points of intersection between curves and lines play a key role. To demonstrate that and generate new families of locally recoverable codes (LRCs) with high availabilty, we focus on norm-trace-lifted codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141631347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hulls of cyclic codes with respect to the regular permutation inner product 与正则置换内积有关的循环码的赫尔
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-15 DOI: 10.1007/s10623-024-01428-4
Xiaoshan Quan, Qin Yue, Fuqing Sun
{"title":"Hulls of cyclic codes with respect to the regular permutation inner product","authors":"Xiaoshan Quan, Qin Yue, Fuqing Sun","doi":"10.1007/s10623-024-01428-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01428-4","url":null,"abstract":"<p>In this paper, we introduce regular permutation inner products which contain the Euclidean inner product. And we generalize some properties of the Euclidean inner product to regular permutation inner products. As application, we construct a lot of cyclic codes with specific regular permutation hulls and also obtain the dimensions and distances of some BCH codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141625057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explicit constructions of NMDS self-dual codes NMDS 自偶码的显式构造
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-12 DOI: 10.1007/s10623-024-01450-6
Dongchun Han, Hanbin Zhang
{"title":"Explicit constructions of NMDS self-dual codes","authors":"Dongchun Han, Hanbin Zhang","doi":"10.1007/s10623-024-01450-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01450-6","url":null,"abstract":"<p>Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to combinatorics, lattice theory, and have important application in cryptography. In this paper, we construct a class of <i>q</i>-ary linear codes and prove that they are either MDS or NMDS which depends on certain zero-sum condition. In the NMDS case, we provide an effective approach to construct NMDS self-dual codes which largely extend known parameters of such codes. In particular, we proved that for square <i>q</i>, almost <i>q</i>/8 NMDS self-dual <i>q</i>-ary codes can be constructed.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141597506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New spence difference sets 新的斯彭斯差异套装
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-10 DOI: 10.1007/s10623-024-01446-2
James A. Davis, John Polhill, Ken Smith, Eric Swartz, Jordan Webster
{"title":"New spence difference sets","authors":"James A. Davis, John Polhill, Ken Smith, Eric Swartz, Jordan Webster","doi":"10.1007/s10623-024-01446-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01446-2","url":null,"abstract":"<p>Spence [9] constructed <span>(left( frac{3^{d+1}(3^{d+1}-1)}{2}, frac{3^d(3^{d+1}+1)}{2}, frac{3^d(3^d+1)}{2}right) )</span>-difference sets in groups <span>(K times C_3^{d+1})</span> for <i>d</i> any positive integer and <i>K</i> any group of order <span>(frac{3^{d+1}-1}{2})</span>. Smith and Webster [8] have exhaustively studied the <span>(d=1)</span> case without requiring that the group have the form listed above and found many constructions. Among these, one intriguing example constructs Spence difference sets in <span>(A_4 times C_3)</span> by using (3, 3, 3, 1)-relative difference sets in a non-normal subgroup isomorphic to <span>(C_3^2)</span>. Drisko [3] has a note implying that his techniques allow constructions of Spence difference sets in groups with a noncentral normal subgroup isomorphic to <span>(C_3^{d+1})</span> as long as <span>(frac{3^{d+1}-1}{2})</span> is a prime power. We generalize this result by constructing Spence difference sets in similar families of groups, but we drop the requirement that <span>(frac{3^{d+1}-1}{2})</span> is a prime power. We conjecture that any group of order <span>(frac{3^{d+1}(3^{d+1}-1)}{2})</span> with a normal subgroup isomorphic to <span>(C_3^{d+1})</span> will have a Spence difference set (this is analogous to Dillon’s conjecture in 2-groups, and that result was proved in Drisko’s work). Finally, we present the first known example of a Spence difference set in a group where the Sylow 3-subgroup is nonabelian and has exponent bigger than 3. This new construction, found by computing the full automorphism group <span>(textrm{Aut}(mathcal {D}))</span> of a symmetric design associated to a known Spence difference set and identifying a regular subgroup of <span>(textrm{Aut}(mathcal {D}))</span>, uses (3, 3, 3, 1)-relative difference sets to describe the difference set.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141577898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vectorial negabent concepts: similarities, differences, and generalizations 矢量否定概念:相似性、差异性和概括性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-05 DOI: 10.1007/s10623-024-01454-2
Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan
{"title":"Vectorial negabent concepts: similarities, differences, and generalizations","authors":"Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan","doi":"10.1007/s10623-024-01454-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01454-2","url":null,"abstract":"<p>In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial negabent and vectorial bent-negabent concepts are introduced, which leads to seemingly contradictory results. One of the main motivations for this article is to clarify the differences and similarities between these two concepts. Moreover, the negabent concept is extended to generalized Boolean functions from <span>({mathbb {F}}_2^n)</span> to the cyclic group <span>({mathbb {Z}}_{2^k})</span>. It is shown how to obtain nega-<span>({mathbb {Z}}_{2^k})</span>-bent functions from <span>({mathbb {Z}}_{2^k})</span>-bent functions, or equivalently, corresponding non-splitting relative difference sets from the splitting relative difference sets. This generalizes the shifting results for Boolean bent and negabent functions. We finally point to constructions of <span>({mathbb {Z}}_8)</span>-bent functions employing permutations with the <span>(({mathcal {A}}_m))</span> property, and more generally we show that the inverse permutation gives rise to <span>({mathbb {Z}}_{2^k})</span>-bent functions.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Additivity of symmetric and subspace 2-designs 对称和子空间 2 设计的可加性
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-05 DOI: 10.1007/s10623-024-01452-4
Marco Buratti, Anamari Nakić
{"title":"Additivity of symmetric and subspace 2-designs","authors":"Marco Buratti, Anamari Nakić","doi":"10.1007/s10623-024-01452-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01452-4","url":null,"abstract":"<p>A 2-<span>((v,k,lambda ))</span> design is additive (or strongly additive) if it is possible to embed it in a suitable abelian group <i>G</i> in such a way that its block set is contained in (or coincides with) the set of all zero-sum <i>k</i>-subsets of its point set. Explicit results on the additivity or strong additivity of symmetric designs and subspace 2-designs are presented. In particular, the strong additivity of PG<span>(_d(n,q))</span>, which was known to be additive only for <span>(q=2)</span> or <span>(d=n-1)</span>, is always established.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Around LCD group codes 围绕 LCD 组代码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-05 DOI: 10.1007/s10623-024-01451-5
Javier de la Cruz, Wolfgang Willems
{"title":"Around LCD group codes","authors":"Javier de la Cruz, Wolfgang Willems","doi":"10.1007/s10623-024-01451-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01451-5","url":null,"abstract":"<p>In this note we answer some questions on <span>(text{ LCD })</span> group codes posed in de la Cruz and Willems (Des Codes Cryptogr 86:2065–2073, 2018) and (Vietnam J Math 51:721–729, 2023). Furthermore, over prime fields we determine completely the <i>p</i>-part of the divisor of an <span>(text{ LCD })</span> group code. In addition we present a natural construction of nearly <span>(text{ LCD })</span> codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141545936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some self-dual codes and isodual codes constructed by matrix product codes 由矩阵乘积码构建的一些自偶码和等偶码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-04 DOI: 10.1007/s10623-024-01453-3
Xu Pan, Hao Chen, Hongwei Liu
{"title":"Some self-dual codes and isodual codes constructed by matrix product codes","authors":"Xu Pan, Hao Chen, Hongwei Liu","doi":"10.1007/s10623-024-01453-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01453-3","url":null,"abstract":"<p>In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic codes. In this paper, we study a family of matrix product codes with wonderful properties, which is a generalization of linear codes obtained from the <span>([u+v|u-v])</span>-construction and <span>([u+v|lambda ^{-1}u-lambda ^{-1}v])</span>-construction. Then we show that any <span>(lambda )</span>-constacyclic code (not necessary repeated-root <span>(lambda )</span>-constacyclic code) of length <i>N</i> over the finite field <span>(mathbb {F}_q)</span> with <span>(textrm{gcd}(frac{q-1}{textrm{ord}(lambda )},N)ge 2)</span>, where <span>(textrm{ord}(lambda ))</span> is the order of <span>(lambda )</span> in the cyclic group <span>(mathbb {F}^*_q=mathbb {F}_qbackslash {0})</span>, is a matrix product code of some constacyclic codes. It is a highly interesting question that the existence of sequences <span>({C_1,C_2,C_3,...})</span> of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances, i.e., <span>(C_i)</span> is an <span>([n(C_i),k(C_i),d(C_i)]_q)</span>-linear code such that </p><span>$$begin{aligned} lim _{irightarrow +infty }n(C_i)=+infty ,,,,,text {and},,,,,lim _{irightarrow +infty }frac{d(C_i)}{sqrt{n(C_i)}}&gt;0. end{aligned}$$</span><p>Based on the <span>([u+v|lambda ^{-1}u-lambda ^{-1}v])</span>-construction, we construct several families of Euclidean (or Hermitian) self-dual codes with square-root-like minimum Hamming distances by using Reed-Muller codes, projective Reed-Muller codes. And we construct some new Euclidean isodual <span>(lambda )</span>-constacyclic codes with square-root-like minimum Hamming distances from Euclidean self-dual cyclic codes and Euclidean self-dual negacyclic codes by monomial equivalences.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141521431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some constacyclic BCH codes with good parameters 一些参数良好的常环 BCH 编码
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-07-02 DOI: 10.1007/s10623-024-01433-7
Jin Li, Huilian Zhu, Shan Huang
{"title":"Some constacyclic BCH codes with good parameters","authors":"Jin Li, Huilian Zhu, Shan Huang","doi":"10.1007/s10623-024-01433-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01433-7","url":null,"abstract":"<p>BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are still very limited. In this paper, we investigate some <i>q</i>-ary BCH codes and <span>(lambda )</span>-constacyclic BCH codes of length <span>(q^{m}+1)</span>, where <i>q</i> is a prime power and <span>(textrm{ord}(lambda )mid q-1)</span>. We determine the dimensions of these codes with some large designed distances, and give good lower bounds on the minimum distance. The code examples presented in this paper indicate that these codes contain many distance-optimal codes and codes with best known parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141489579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of compositional inverses of permutation polynomials over finite fields 有限域上置换多项式的组成逆的考察
IF 1.6 2区 数学
Designs, Codes and Cryptography Pub Date : 2024-06-27 DOI: 10.1007/s10623-024-01436-4
Qiang Wang
{"title":"A survey of compositional inverses of permutation polynomials over finite fields","authors":"Qiang Wang","doi":"10.1007/s10623-024-01436-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01436-4","url":null,"abstract":"<p>In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In particular, we describe a framework in terms of a commutative diagram which unifies several recent methods in finding the inverses of permutation polynomials.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141462364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信