首页 > 最新文献

Designs, Codes and Cryptography最新文献

英文 中文
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers 多变量相关攻击和基于 LFSR 的流密码的密码分析
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-18 DOI: 10.1007/s10623-024-01444-4
Isaac A. Canales-Martínez, Igor Semaev

Cryptanalysis of modern symmetric ciphers may be done by using linear equation systems with multiple right hand sides, which describe the encryption process. The tool was introduced by Raddum and Semaev (Des Codes Cryptogr 49(1):147–160, 2008) where several solving methods were developed. In this work, the probabilities are ascribed to the right hand sides and a statistical attack is then applied. The new approach is a multivariate generalisation of the correlation attack by Siegenthaler (IEEE Trans Comput C 49(1):81–85, 1985). A fast version of the attack is provided too. It may be viewed as an extension of the fast correlation attack in Meier and Staffelbach (J Cryptol 1(3):159–176, 1989), based on exploiting so called parity-checks for linear recurrences. Parity-checks are a particular case of the relations that we introduce in the present work. The notion of a relation is irrelevant to linear recurrences. We show how to apply the method to some LFSR-based stream ciphers including those from the Grain family. The new method generally requires a lower number of the keystream bits to recover the initial states than other techniques reported in the literature.

现代对称密码的加密分析可通过描述加密过程的多右边线性方程组来完成。Raddum 和 Semaev 在《Des Codes Cryptogr 49(1):147-160, 2008》中介绍了这一工具,并开发了几种求解方法。在这项工作中,将概率归因于右手边,然后应用统计攻击。新方法是 Siegenthaler(IEEE Trans Comput C 49(1):81-85, 1985)提出的相关性攻击的多变量概括。该方法还提供了一个快速攻击版本。它可以看作是 Meier 和 Staffelbach(《密码学杂志》1(3):159-176,1989 年)中的快速相关性攻击的扩展,其基础是利用所谓的线性递归奇偶校验。奇偶校验是我们在本研究中引入的关系的一种特殊情况。关系的概念与线性递归无关。我们展示了如何将该方法应用于一些基于 LFSR 的流密码,包括谷粒系列的流密码。与文献中报道的其他技术相比,新方法恢复初始状态所需的密钥流位数更少。
{"title":"Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers","authors":"Isaac A. Canales-Martínez, Igor Semaev","doi":"10.1007/s10623-024-01444-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01444-4","url":null,"abstract":"<p>Cryptanalysis of modern symmetric ciphers may be done by using linear equation systems with multiple right hand sides, which describe the encryption process. The tool was introduced by Raddum and Semaev (Des Codes Cryptogr 49(1):147–160, 2008) where several solving methods were developed. In this work, the probabilities are ascribed to the right hand sides and a statistical attack is then applied. The new approach is a multivariate generalisation of the correlation attack by Siegenthaler (IEEE Trans Comput C 49(1):81–85, 1985). A fast version of the attack is provided too. It may be viewed as an extension of the fast correlation attack in Meier and Staffelbach (J Cryptol 1(3):159–176, 1989), based on exploiting so called parity-checks for linear recurrences. Parity-checks are a particular case of the relations that we introduce in the present work. The notion of a relation is irrelevant to linear recurrences. We show how to apply the method to some LFSR-based stream ciphers including those from the Grain family. The new method generally requires a lower number of the keystream bits to recover the initial states than other techniques reported in the literature.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"13 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141334403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bases for Riemann–Roch spaces of linearized function fields with applications to generalized algebraic geometry codes 线性化函数场的黎曼-罗赫空间基础及其在广义代数几何编码中的应用
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-15 DOI: 10.1007/s10623-024-01426-6
Horacio Navarro

Several applications of function fields over finite fields, or equivalently, algebraic curves over finite fields, require computing bases for Riemann–Roch spaces. In this paper, we determine explicit bases for Riemann–Roch spaces of linearized function fields, and we give a lower bound for the minimum distance of generalized algebraic geometry codes. As a consequence, we construct generalized algebraic geometry codes with good parameters.

有限域上的函数域或等价有限域上的代数曲线的若干应用需要计算黎曼-罗赫空间的基。在本文中,我们确定了线性化函数域的黎曼-罗赫空间的显式基,并给出了广义代数几何代码的最小距离下限。因此,我们构建了具有良好参数的广义代数几何代码。
{"title":"Bases for Riemann–Roch spaces of linearized function fields with applications to generalized algebraic geometry codes","authors":"Horacio Navarro","doi":"10.1007/s10623-024-01426-6","DOIUrl":"https://doi.org/10.1007/s10623-024-01426-6","url":null,"abstract":"<p>Several applications of function fields over finite fields, or equivalently, algebraic curves over finite fields, require computing bases for Riemann–Roch spaces. In this paper, we determine explicit bases for Riemann–Roch spaces of linearized function fields, and we give a lower bound for the minimum distance of generalized algebraic geometry codes. As a consequence, we construct generalized algebraic geometry codes with good parameters.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"54 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal ternary locally repairable codes 最优三元局部可修复代码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-13 DOI: 10.1007/s10623-024-01409-7
Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang

Locally repairable codes (LRCs) are linear codes with locality properties for code symbols, which have important applications in distributed storage systems. In this paper, we completely classify all the possible code parameters of optimal ternary LRCs achieving the Singleton-like bound proposed by Gopalan et al. Explicit constructions of optimal ternary LRCs are given for each group of possible code parameters. Moreover, it is also proved that optimal ternary LRCs with maximal minimum distance 6 are unique up to the equivalence of linear codes.

局部可修复代码(LRC)是一种具有代码符号局部性的线性代码,在分布式存储系统中有着重要的应用。在本文中,我们对达到 Gopalan 等人提出的类似 Singleton- 界值的最优三元 LRC 的所有可能代码参数进行了完整分类,并给出了每组可能代码参数的最优三元 LRC 的明确构造。此外,还证明了具有最大最小距离 6 的最优三元 LRC 在线性编码的等价性上是唯一的。
{"title":"Optimal ternary locally repairable codes","authors":"Jie Hao, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang","doi":"10.1007/s10623-024-01409-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01409-7","url":null,"abstract":"<p>Locally repairable codes (LRCs) are linear codes with locality properties for code symbols, which have important applications in distributed storage systems. In this paper, we completely classify all the possible code parameters of optimal ternary LRCs achieving the Singleton-like bound proposed by Gopalan et al. Explicit constructions of optimal ternary LRCs are given for each group of possible code parameters. Moreover, it is also proved that optimal ternary LRCs with maximal minimum distance 6 are unique up to the equivalence of linear codes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"37 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141319967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An asymptotic property of quaternary additive codes 四元加法码的渐近特性
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-12 DOI: 10.1007/s10623-024-01438-2
Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco

Let (n_k(s)) be the maximal length n such that a quaternary additive ([n,k,n-s]_4)-code exists. We solve a natural asymptotic problem by determining the lim sup (lambda _k) of (n_k(s)/s) for s going to infinity, and the smallest value of s such that (n_k(s)/s=lambda _k.) Our new family of quaternary additive codes has parameters ([4^k-1,k,4^k-4^{k-1}]_4=[2^{2k}-1,k,3cdot 2^{2k-2}]_4) (where (k=l/2) and l is an odd integer). These are constant-weight codes. The binary codes obtained by concatenation with inner code ([3,2,2]_2) meet the Griesmer bound with equality. The proof is in terms of multisets of lines in (PG(l-1,2)).

让(n_k(s))是存在四元加法([n,k,n-s]_4)-编码的最大长度n。我们解决了一个自然渐近问题,即确定 s 变为无穷大时 (n_k(s)/s) 的 lim sup (lambda _k),以及 s 的最小值使得 (n_k(s)/s=lambda _k.)。我们新的四元加法码族的参数是([4^k-1,k,4^k-4^{k-1}]_4=[2^{2k}-1,k,3cdot 2^{2k-2}]_4) (其中(k=l/2)并且 l 是奇整数)。这些都是恒重码。与内码 ([3,2,2]_2)连接得到的二进制码等价地满足格里斯梅尔约束。证明是通过 (PG(l-1,2)) 中的多行集来实现的。
{"title":"An asymptotic property of quaternary additive codes","authors":"Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco","doi":"10.1007/s10623-024-01438-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01438-2","url":null,"abstract":"<p>Let <span>(n_k(s))</span> be the maximal length <i>n</i> such that a quaternary additive <span>([n,k,n-s]_4)</span>-code exists. We solve a natural asymptotic problem by determining the lim sup <span>(lambda _k)</span> of <span>(n_k(s)/s)</span> for <i>s</i> going to infinity, and the smallest value of <i>s</i> such that <span>(n_k(s)/s=lambda _k.)</span> Our new family of quaternary additive codes has parameters <span>([4^k-1,k,4^k-4^{k-1}]_4=[2^{2k}-1,k,3cdot 2^{2k-2}]_4)</span> (where <span>(k=l/2)</span> and <i>l</i> is an odd integer). These are constant-weight codes. The binary codes obtained by concatenation with inner code <span>([3,2,2]_2)</span> meet the Griesmer bound with equality. The proof is in terms of multisets of lines in <span>(PG(l-1,2))</span>.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"6 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141309080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circular external difference families: construction and non-existence 循环外部差异族:构建与不存在
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-12 DOI: 10.1007/s10623-024-01443-5
Huawei Wu, Jing Yang, Keqin Feng

The circular external difference family and its strong version are of great significance both in theory and in applications. In this paper, we apply the classical cyclotomic construction to the circular external differnece family and exhibit several concrete examples, in particular constructing an infinite family. Furthermore, we prove that all strong circular external differnece families are constructed by patching together several strong external difference families consisting of two subsets, thereby solving the open problem raised by Veitch and Stinson. We also present a new result on the non-existence of a certain type of strong external difference families.

圆周外差族及其强序列在理论和应用方面都具有重要意义。在本文中,我们将经典的循环构造应用于圆外差族,并展示了几个具体的例子,特别是构造了一个无穷族。此外,我们还证明了所有强循环外差族都是由两个子集组成的几个强外差族拼凑而成的,从而解决了维奇和斯坦森提出的未决问题。我们还提出了关于某类强外差族不存在的新结果。
{"title":"Circular external difference families: construction and non-existence","authors":"Huawei Wu, Jing Yang, Keqin Feng","doi":"10.1007/s10623-024-01443-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01443-5","url":null,"abstract":"<p>The circular external difference family and its strong version are of great significance both in theory and in applications. In this paper, we apply the classical cyclotomic construction to the circular external differnece family and exhibit several concrete examples, in particular constructing an infinite family. Furthermore, we prove that all strong circular external differnece families are constructed by patching together several strong external difference families consisting of two subsets, thereby solving the open problem raised by Veitch and Stinson. We also present a new result on the non-existence of a certain type of strong external difference families.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"28 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141315778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On prefer-one sequences 关于优选序列
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-10 DOI: 10.1007/s10623-024-01425-7
Yupeng Jiang, Ming Li, Ying Gao, Dongdai Lin

We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial vectors with Hamming weight one, we prove that the generated sequences are modified de Bruijn sequences. Moreover, for two of them, we give the truth tables of their feedback functions. We also investigate the feedback functions of prefer-one de Bruijn sequences. For order n prefer-one de Bruijn sequence, we give linear and quadratic terms in its feedback function and prove that the number of degree (n-2) terms has the same parity as n. The statistical result for small n shows that about half of all terms occur in the feedback functions.

我们研究了用 prefer-one 规则生成的具有不同初始向量的序列。首先,我们给出了它们的周期上限,对于汉明权重为 1 的初始向量,我们证明了生成的序列是修正的德布鲁因序列。此外,我们还给出了其中两个序列的反馈函数真值表。我们还研究了优选一德布鲁因序列的反馈函数。对于 n 阶 prefer-one de Bruijn 序列,我们给出了其反馈函数中的线性项和二次项,并证明了度(n-2)项的数量与 n 具有相同的奇偶性。
{"title":"On prefer-one sequences","authors":"Yupeng Jiang, Ming Li, Ying Gao, Dongdai Lin","doi":"10.1007/s10623-024-01425-7","DOIUrl":"https://doi.org/10.1007/s10623-024-01425-7","url":null,"abstract":"<p>We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial vectors with Hamming weight one, we prove that the generated sequences are modified de Bruijn sequences. Moreover, for two of them, we give the truth tables of their feedback functions. We also investigate the feedback functions of prefer-one de Bruijn sequences. For order <i>n</i> prefer-one de Bruijn sequence, we give linear and quadratic terms in its feedback function and prove that the number of degree <span>(n-2)</span> terms has the same parity as <i>n</i>. The statistical result for small <i>n</i> shows that about half of all terms occur in the feedback functions.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"40 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141299115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
External codes for multiple unicast networks via interference alignment 通过干扰对齐实现多个单播网络的外部编码
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-10 DOI: 10.1007/s10623-024-01439-1
F. R. Kschischang, F. Manganiello, A. Ravagnani, K. Savary

We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and fixed. We show that the problem corresponds to an interference alignment problem over a finite field. In this context, we establish an outer bound for the achievable rate region and provide examples of networks where the bound is sharp. We finally give evidence of the crucial role played by the field characteristic in the problem.

我们引入了一个正式框架来研究编码网络的多路单播问题,在该网络中,网络编码在有限域上是线性的且固定不变。我们证明,该问题对应于有限域上的干扰对齐问题。在这种情况下,我们建立了可实现速率区域的外部界限,并举例说明了界限尖锐的网络。最后,我们证明了场特性在问题中的关键作用。
{"title":"External codes for multiple unicast networks via interference alignment","authors":"F. R. Kschischang, F. Manganiello, A. Ravagnani, K. Savary","doi":"10.1007/s10623-024-01439-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01439-1","url":null,"abstract":"<p>We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and fixed. We show that the problem corresponds to an interference alignment problem over a finite field. In this context, we establish an outer bound for the achievable rate region and provide examples of networks where the bound is sharp. We finally give evidence of the crucial role played by the field characteristic in the problem.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141299090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the classification of skew Hadamard matrices of order $$varvec{36}$$ and related structures 关于阶为 $$varvec{36}$ 的倾斜哈达玛矩阵的分类及相关结构
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-07 DOI: 10.1007/s10623-024-01427-5
Makoto Araya, Masaaki Harada, Hadi Kharaghani, Ali Mohammadian, Behruz Tayfeh-Rezaie

Two skew Hadamard matrices are considered SH-equivalent if they are similar by a signed permutation matrix. This paper determines the number of SH-inequivalent skew Hadamard matrices of order 36 for some types. We also study ternary self-dual codes and association schemes constructed from the skew Hadamard matrices of order 36.

如果两个倾斜哈达玛矩阵通过一个带符号的置换矩阵而相似,那么这两个矩阵就被认为是 SH-等价的。本文确定了某些类型的 36 阶 SH-inequivalent skew Hadamard 矩阵的数量。我们还研究了由 36 阶偏斜哈达玛矩阵构造的三元自偶码和关联方案。
{"title":"On the classification of skew Hadamard matrices of order $$varvec{36}$$ and related structures","authors":"Makoto Araya, Masaaki Harada, Hadi Kharaghani, Ali Mohammadian, Behruz Tayfeh-Rezaie","doi":"10.1007/s10623-024-01427-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01427-5","url":null,"abstract":"<p>Two skew Hadamard matrices are considered <span>SH</span>-equivalent if they are similar by a signed permutation matrix. This paper determines the number of <span>SH</span>-inequivalent skew Hadamard matrices of order 36 for some types. We also study ternary self-dual codes and association schemes constructed from the skew Hadamard matrices of order 36.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141287241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes 投影里德-穆勒型编码理论中的指示函数、v数和戈伦斯坦环
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-05 DOI: 10.1007/s10623-024-01437-3
Manuel González-Sarabia, Humberto Muñoz-George, Jorge A. Ordaz, Eduardo Sáenz-de-Cabezón, Rafael H. Villarreal

For projective Reed–Muller-type codes we give a global duality criterion in terms of the v-number and the Hilbert function of a vanishing ideal. As an application, we provide a global duality theorem for projective Reed–Muller-type codes over Gorenstein vanishing ideals, generalizing the known case where the vanishing ideal is a complete intersection. We classify self dual Reed–Muller-type codes over Gorenstein ideals using the regularity and a parity check matrix. For projective evaluation codes, we give a duality theorem inspired by that of affine evaluation codes. We show how to compute the regularity index of the r-th generalized Hamming weight function in terms of the standard indicator functions of the set of evaluation points.

对于射影里德-穆勒型码,我们给出了一个以消失理想的 v 数和希尔伯特函数为基础的全局对偶准则。作为应用,我们提供了戈伦斯坦消失理想上的射影里德-穆勒型码的全局对偶定理,推广了消失理想是完全交集的已知情况。我们利用正则性和奇偶校验矩阵对 Gorenstein 理想上的自对偶 Reed-Muller 型编码进行了分类。对于射影评价码,我们给出了一个受仿射评价码启发的对偶性定理。我们展示了如何根据评价点集合的标准指示函数计算 r 次广义汉明权重函数的正则性指数。
{"title":"Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes","authors":"Manuel González-Sarabia, Humberto Muñoz-George, Jorge A. Ordaz, Eduardo Sáenz-de-Cabezón, Rafael H. Villarreal","doi":"10.1007/s10623-024-01437-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01437-3","url":null,"abstract":"<p>For projective Reed–Muller-type codes we give a global duality criterion in terms of the v-number and the Hilbert function of a vanishing ideal. As an application, we provide a global duality theorem for projective Reed–Muller-type codes over Gorenstein vanishing ideals, generalizing the known case where the vanishing ideal is a complete intersection. We classify self dual Reed–Muller-type codes over Gorenstein ideals using the regularity and a parity check matrix. For projective evaluation codes, we give a duality theorem inspired by that of affine evaluation codes. We show how to compute the regularity index of the <i>r</i>-th generalized Hamming weight function in terms of the standard indicator functions of the set of evaluation points.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"27 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the number of rational points of Artin–Schreier’s curves and hypersurfaces 论阿尔廷-施莱尔曲线和超曲面的有理点数
IF 1.6 2区 数学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-05 DOI: 10.1007/s10623-024-01431-9
F. E. Brochero Martínez, Daniela Oliveira

Let (mathbb {F}_{q^n}) represent the finite field with (q^n) elements. In this paper, our focus is on determining the number of (mathbb {F}_{q^n})-rational points for two specific objects: an affine Artin–Schreier curve given by the equation (y^q-y = x(x^{q^i}-x)-lambda ), and an Artin–Schreier hypersurface given by the equation (y^q-y=sum _{j=1}^r a_jx_j(x_j^{q^{i_j}}-x_j)-lambda ). Additionally, we establish that the Weil bound is only achieved in these cases when the trace of the element (lambda in mathbb {F}_{q^n}) over the subfield (mathbb {F}_q) is equal to zero.

让 (mathbb {F}_{q^n}) 表示具有 (q^n) 元素的有限域。本文的重点是确定两个特定对象的 (mathbb {F}_{q^n}) 有理点的数目:由方程 (y^q-y = x(x^{q^i}-x)-lambda) 给出的仿射阿尔丁-施莱尔曲线,以及由方程 (y^q-y=sum _{j=1}^r a_jx_j(x_j^{q^{i_j}}-x_j)-lambda) 给出的阿尔丁-施莱尔超曲面。此外,我们还确定,只有当子域 (mathbb {F}_{q^n}) 上的元素 (mathbb {F}_q) 的迹等于零时,Weil 约束才会在这些情况下实现。
{"title":"On the number of rational points of Artin–Schreier’s curves and hypersurfaces","authors":"F. E. Brochero Martínez, Daniela Oliveira","doi":"10.1007/s10623-024-01431-9","DOIUrl":"https://doi.org/10.1007/s10623-024-01431-9","url":null,"abstract":"<p>Let <span>(mathbb {F}_{q^n})</span> represent the finite field with <span>(q^n)</span> elements. In this paper, our focus is on determining the number of <span>(mathbb {F}_{q^n})</span>-rational points for two specific objects: an affine Artin–Schreier curve given by the equation <span>(y^q-y = x(x^{q^i}-x)-lambda )</span>, and an Artin–Schreier hypersurface given by the equation <span>(y^q-y=sum _{j=1}^r a_jx_j(x_j^{q^{i_j}}-x_j)-lambda )</span>. Additionally, we establish that the Weil bound is only achieved in these cases when the trace of the element <span>(lambda in mathbb {F}_{q^n})</span> over the subfield <span>(mathbb {F}_q)</span> is equal to zero.\u0000</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141264885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Designs, Codes and Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1