Pub Date : 2024-12-20DOI: 10.1007/s10623-024-01527-2
Federico Canale, María Naya-Plasencia
GIFT-64 is a block cipher that has received a lot of attention from the community since its proposal in 2017. The attack on the highest number of rounds is a differential related-key attack on 26 rounds. We studied this attack, in particular with respect to some recent generic frameworks for improving key recovery, and we realised that this framework, combined with an efficient parallel key guessing of interesting subsets of the key and a consequent list merging applied to the partial solutions, can improve the complexity of the attack. We propose two different trade-offs, as a result of the improved key-recovery. We believe that the techniques are quite generic and that it is possible to apply them to improve other differential attacks.
{"title":"Guessing less and better: improved attacks on GIFT-64","authors":"Federico Canale, María Naya-Plasencia","doi":"10.1007/s10623-024-01527-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01527-2","url":null,"abstract":"<p>GIFT-64 is a block cipher that has received a lot of attention from the community since its proposal in 2017. The attack on the highest number of rounds is a differential related-key attack on 26 rounds. We studied this attack, in particular with respect to some recent generic frameworks for improving key recovery, and we realised that this framework, combined with an efficient parallel key guessing of interesting subsets of the key and a consequent list merging applied to the partial solutions, can improve the complexity of the attack. We propose two different trade-offs, as a result of the improved key-recovery. We believe that the techniques are quite generic and that it is possible to apply them to improve other differential attacks.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"31 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-20DOI: 10.1007/s10623-024-01539-y
Jicheng Ma, Guiying Yan
Cyclic codes, as a significant subclass of linear codes, can be constructed and analyzed using algebraic methods. Due to its cyclic nature, they have efficient encoding and decoding algorithms. To date, cyclic codes have found applications in various domains, including consumer electronics, data storage systems, and communication systems. In this paper, we investigate the full automorphism groups of binary cyclic codes. A matrix presentation technique of cyclic codewords is introduced, which subsequently serves well for presenting binary cyclic codes of long lengths. These constructions are significantly useful in facilitating the determination of the full automorphism groups of binary cyclic codes of specified lengths.
{"title":"On automorphism groups of binary cyclic codes","authors":"Jicheng Ma, Guiying Yan","doi":"10.1007/s10623-024-01539-y","DOIUrl":"https://doi.org/10.1007/s10623-024-01539-y","url":null,"abstract":"<p>Cyclic codes, as a significant subclass of linear codes, can be constructed and analyzed using algebraic methods. Due to its cyclic nature, they have efficient encoding and decoding algorithms. To date, cyclic codes have found applications in various domains, including consumer electronics, data storage systems, and communication systems. In this paper, we investigate the full automorphism groups of binary cyclic codes. A matrix presentation technique of cyclic codewords is introduced, which subsequently serves well for presenting binary cyclic codes of long lengths. These constructions are significantly useful in facilitating the determination of the full automorphism groups of binary cyclic codes of specified lengths.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-20DOI: 10.1007/s10623-024-01532-5
Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno
A locally recoverable code of locality r over (mathbb {F}_{q}) is a code where every coordinate of a codeword can be recovered using the values of at most r other coordinates of that codeword. Locally recoverable codes are efficient at restoring corrupted messages and data which make them highly applicable to distributed storage systems. Quasi-cyclic codes of length (n=mell ) and index (ell ) are linear codes that are invariant under cyclic shifts by (ell ) places. In this paper, we decompose quasi-cyclic locally recoverable codes into a sum of constituent codes where each constituent code is a linear code over a field extension of (mathbb {F}_q). Using these constituent codes with set parameters, we propose conditions which ensure the existence of almost optimal and optimal quasi-cyclic locally recoverable codes with increased dimension and code length.
{"title":"A construction of optimal quasi-cyclic locally recoverable codes using constituent codes","authors":"Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno","doi":"10.1007/s10623-024-01532-5","DOIUrl":"https://doi.org/10.1007/s10623-024-01532-5","url":null,"abstract":"<p>A locally recoverable code of locality <i>r</i> over <span>(mathbb {F}_{q})</span> is a code where every coordinate of a codeword can be recovered using the values of at most <i>r</i> other coordinates of that codeword. Locally recoverable codes are efficient at restoring corrupted messages and data which make them highly applicable to distributed storage systems. Quasi-cyclic codes of length <span>(n=mell )</span> and index <span>(ell )</span> are linear codes that are invariant under cyclic shifts by <span>(ell )</span> places. In this paper, we decompose quasi-cyclic locally recoverable codes into a sum of constituent codes where each constituent code is a linear code over a field extension of <span>(mathbb {F}_q)</span>. Using these constituent codes with set parameters, we propose conditions which ensure the existence of almost optimal and optimal quasi-cyclic locally recoverable codes with increased dimension and code length.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142867030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let (alpha ) be a generator of (mathbb F_{3^m}setminus {0}), where m is a positive integer. Denote by (mathcal {C}_{(i_1,i_2,cdots , i_t)}) the cyclic code with generator polynomial (m_{alpha ^{i_1}}(x)m_{alpha ^{i_2}}(x)cdots m_{alpha ^{i_t}}(x)), where ({{m}_{alpha ^{i}}}(x)) is the minimal polynomial of ({{alpha }^{i}}) over ({{mathbb {F}}_{3}}). In this paper, by analyzing the solutions of certain equations over finite fields, we present four classes of optimal ternary cyclic codes (mathcal {C}_{(0,1,e)}) and (mathcal {C}_{(1,e,s)}) with parameters ([3^m-1,3^m-frac{3m}{2}-2,4]), where (s=frac{3^m-1}{2}). In addition, by determining the solutions of certain equations and analyzing the irreducible factors of certain polynomials over (mathbb F_{3^m}), we present four classes of optimal ternary cyclic codes (mathcal {C}_{(2,e)}) and (mathcal {C}_{(1,e)}) with parameters ([3^m-1,3^m-2m-1,4]). We show that our new optimal cyclic codes are not covered by known ones.
{"title":"Several new classes of optimal ternary cyclic codes with two or three zeros","authors":"Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang","doi":"10.1007/s10623-024-01541-4","DOIUrl":"https://doi.org/10.1007/s10623-024-01541-4","url":null,"abstract":"<p>Cyclic codes are a subclass of linear codes and have wide applications in data storage systems, communication systems and consumer electronics due to their efficient encoding and decoding algorithms. Let <span>(alpha )</span> be a generator of <span>(mathbb F_{3^m}setminus {0})</span>, where <i>m</i> is a positive integer. Denote by <span>(mathcal {C}_{(i_1,i_2,cdots , i_t)})</span> the cyclic code with generator polynomial <span>(m_{alpha ^{i_1}}(x)m_{alpha ^{i_2}}(x)cdots m_{alpha ^{i_t}}(x))</span>, where <span>({{m}_{alpha ^{i}}}(x))</span> is the minimal polynomial of <span>({{alpha }^{i}})</span> over <span>({{mathbb {F}}_{3}})</span>. In this paper, by analyzing the solutions of certain equations over finite fields, we present four classes of optimal ternary cyclic codes <span>(mathcal {C}_{(0,1,e)})</span> and <span>(mathcal {C}_{(1,e,s)})</span> with parameters <span>([3^m-1,3^m-frac{3m}{2}-2,4])</span>, where <span>(s=frac{3^m-1}{2})</span>. In addition, by determining the solutions of certain equations and analyzing the irreducible factors of certain polynomials over <span>(mathbb F_{3^m})</span>, we present four classes of optimal ternary cyclic codes <span>(mathcal {C}_{(2,e)})</span> and <span>(mathcal {C}_{(1,e)})</span> with parameters <span>([3^m-1,3^m-2m-1,4])</span>. We show that our new optimal cyclic codes are not covered by known ones.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"24 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142858387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1007/s10623-024-01538-z
Ying Xu, Xiaoni Du, Jian Zou
In this paper, we promote Trojan message attacks against Merkle–Damgård hash functions and their concatenation combiner in quantum settings for the first time. Two main quantum scenarios are considered, involving the scenarios where a substantial amount of cheap quantum random access memory (qRAM) is available and where qRAM is limited and expensive to access. We first discuss the construction of diamond structures and analyze the corresponding time complexity in both of these quantum scenarios. Secondly, we propose quantum versions of the generic Trojan message attacks on Merkle–Damgård hash functions as well as their improved versions by combining with diamond structures and expandable messages, and then determine their cost. Finally, we propose Trojan message attack against Merkle–Damgård hash concatenation combiner in quantum setting. The results show that Trojan message attacks can be improved significantly with quantum computers under both scenarios, so the security of hash constructions in classical setting requires careful re-evaluation before being deployed to the post-quantum cryptography schemes.
{"title":"Quantum security of Trojan message attacks on Merkle–Damgård hash construction","authors":"Ying Xu, Xiaoni Du, Jian Zou","doi":"10.1007/s10623-024-01538-z","DOIUrl":"https://doi.org/10.1007/s10623-024-01538-z","url":null,"abstract":"<p>In this paper, we promote Trojan message attacks against Merkle–Damgård hash functions and their concatenation combiner in quantum settings for the first time. Two main quantum scenarios are considered, involving the scenarios where a substantial amount of cheap quantum random access memory (qRAM) is available and where qRAM is limited and expensive to access. We first discuss the construction of diamond structures and analyze the corresponding time complexity in both of these quantum scenarios. Secondly, we propose quantum versions of the generic Trojan message attacks on Merkle–Damgård hash functions as well as their improved versions by combining with diamond structures and expandable messages, and then determine their cost. Finally, we propose Trojan message attack against Merkle–Damgård hash concatenation combiner in quantum setting. The results show that Trojan message attacks can be improved significantly with quantum computers under both scenarios, so the security of hash constructions in classical setting requires careful re-evaluation before being deployed to the post-quantum cryptography schemes.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"260 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142849040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1007/s10623-024-01534-3
Xingyu Zheng, Shukai Wang, Cuiling Fan
Combinatorial neural (CN) codes are binary codes introduced firstly by Curto et al. for asymmetric channel, and then are further studied by Cotardo and Ravagnani under the metric (delta _r) (called asymmetric discrepancy) which measures the differentiation of codewords in CN codes. When (r>1), CN codes are different from the usual error-correcting codes in symmetric channel ((r=1)). In this paper, we focus on the optimality of some CN codes with (r>1). An upper bound for the size of CN codes with (delta _r=r+1) is deduced, by discussing the relationship between such CN codes and error-detecting codes for asymmetric channels, which is shown to be tight in this case. We also propose an improved Plotkin bound for CN codes. Notably, by applying symmetric designs related with Hadamard matrices, we not only generalize one former construction of optimal CN codes by bent functions obtained by Zhang et al. (IEEE Trans Inf Theory 69:5440–5448, 2023), but also obtain seven classes of new optimal CN codes meeting the improved Plotkin bound.
{"title":"Optimal combinatorial neural codes via symmetric designs","authors":"Xingyu Zheng, Shukai Wang, Cuiling Fan","doi":"10.1007/s10623-024-01534-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01534-3","url":null,"abstract":"<p>Combinatorial neural (CN) codes are binary codes introduced firstly by Curto et al. for asymmetric channel, and then are further studied by Cotardo and Ravagnani under the metric <span>(delta _r)</span> (called asymmetric discrepancy) which measures the differentiation of codewords in CN codes. When <span>(r>1)</span>, CN codes are different from the usual error-correcting codes in symmetric channel (<span>(r=1)</span>). In this paper, we focus on the optimality of some CN codes with <span>(r>1)</span>. An upper bound for the size of CN codes with <span>(delta _r=r+1)</span> is deduced, by discussing the relationship between such CN codes and error-detecting codes for asymmetric channels, which is shown to be tight in this case. We also propose an improved Plotkin bound for CN codes. Notably, by applying symmetric designs related with Hadamard matrices, we not only generalize one former construction of optimal CN codes by bent functions obtained by Zhang et al. (IEEE Trans Inf Theory 69:5440–5448, 2023), but also obtain seven classes of new optimal CN codes meeting the improved Plotkin bound.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"8 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142841501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-16DOI: 10.1007/s10623-024-01542-3
Huck Bennett, Kaung Myat Htay Win
We study the complexity of the Code Equivalence Problem on linear error-correcting codes by relating its variants to isomorphism problems on other discrete structures—graphs, lattices, and matroids. Our main results are a fine-grained reduction from the Graph Isomorphism Problem to the Linear Code Equivalence Problem over any field (mathbb {F}), and a reduction from the Linear Code Equivalence Problem over any field (mathbb {F}_p) of prime, polynomially bounded order p to the Lattice Isomorphism Problem. Both of these reductions are simple and natural. We also give reductions between variants of the Code Equivalence Problem, and study the relationship between isomorphism problems on codes and linear matroids.
{"title":"Relating code equivalence to other isomorphism problems","authors":"Huck Bennett, Kaung Myat Htay Win","doi":"10.1007/s10623-024-01542-3","DOIUrl":"https://doi.org/10.1007/s10623-024-01542-3","url":null,"abstract":"<p>We study the complexity of the <i>Code Equivalence Problem</i> on linear error-correcting codes by relating its variants to isomorphism problems on other discrete structures—graphs, lattices, and matroids. Our main results are a fine-grained reduction from the Graph Isomorphism Problem to the Linear Code Equivalence Problem over any field <span>(mathbb {F})</span>, and a reduction from the Linear Code Equivalence Problem over any field <span>(mathbb {F}_p)</span> of prime, polynomially bounded order <i>p</i> to the Lattice Isomorphism Problem. Both of these reductions are simple and natural. We also give reductions between variants of the Code Equivalence Problem, and study the relationship between isomorphism problems on codes and linear matroids.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"2021 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142832039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-14DOI: 10.1007/s10623-024-01543-2
Nathan Kaplan, Jon-Lark Kim
Projective Reed–Muller codes are constructed from the family of projective hypersurfaces of a fixed degree over a finite field (mathbb {F}_q). We consider the relationship between projective Reed–Muller codes and their duals. We determine when these codes are self-dual, when they are self-orthogonal, and when they are LCD. We then show that when q is sufficiently large, the dimension of the hull of a projective Reed–Muller code is 1 less than the dimension of the code. We determine the dimension of the hull for a wider range of parameters and describe how this leads to a new proof of a recent result of Ruano and San-José.
{"title":"Hulls of projective Reed–Muller codes","authors":"Nathan Kaplan, Jon-Lark Kim","doi":"10.1007/s10623-024-01543-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01543-2","url":null,"abstract":"<p>Projective Reed–Muller codes are constructed from the family of projective hypersurfaces of a fixed degree over a finite field <span>(mathbb {F}_q)</span>. We consider the relationship between projective Reed–Muller codes and their duals. We determine when these codes are self-dual, when they are self-orthogonal, and when they are LCD. We then show that when <i>q</i> is sufficiently large, the dimension of the hull of a projective Reed–Muller code is 1 less than the dimension of the code. We determine the dimension of the hull for a wider range of parameters and describe how this leads to a new proof of a recent result of Ruano and San-José.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"63 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142823245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-05DOI: 10.1007/s10623-024-01535-2
Xin Wei, Xiande Zhang, Gennian Ge
Set systems with strongly restricted intersections, called (alpha )-intersecting families for a vector (alpha ), were introduced recently as a generalization of several well-studied intersecting families including the classical oddtown and eventown. Given a binary vector (alpha =(a_1, ldots , a_k)), a collection ({mathcal {F}}) of subsets over an n element set is an (alpha )-intersecting family modulo 2 if for each (i=1,2,ldots ,k), all i-wise intersections of distinct members in ({mathcal {F}}) have sizes with the same parity as (a_i). Let (f_alpha (n)) denote the maximum size of such a family. In this paper, we study the asymptotic behavior of (f_alpha (n)) when n goes to infinity. We show that if t is the maximum integer such that (a_t=1) and (2tle k), then (f_alpha (n)sim (t! n)^{1/t}). More importantly, we show that for any constant (c>0), as the length k goes larger, (f_alpha (n)) is upper bounded by (O (n^c)) for almost all (alpha ). Equivalently, no matter what k is, there are only finitely many (alpha ) satisfying (f_alpha (n)=Omega (n^c)). This answers an open problem raised by Johnston and O’Neill in 2023. All of our results can be generalized to modulo p setting for any prime p smoothly.
{"title":"On set systems with strongly restricted intersections","authors":"Xin Wei, Xiande Zhang, Gennian Ge","doi":"10.1007/s10623-024-01535-2","DOIUrl":"https://doi.org/10.1007/s10623-024-01535-2","url":null,"abstract":"<p>Set systems with strongly restricted intersections, called <span>(alpha )</span>-intersecting families for a vector <span>(alpha )</span>, were introduced recently as a generalization of several well-studied intersecting families including the classical oddtown and eventown. Given a binary vector <span>(alpha =(a_1, ldots , a_k))</span>, a collection <span>({mathcal {F}})</span> of subsets over an <i>n</i> element set is an <span>(alpha )</span>-intersecting family modulo 2 if for each <span>(i=1,2,ldots ,k)</span>, all <i>i</i>-wise intersections of distinct members in <span>({mathcal {F}})</span> have sizes with the same parity as <span>(a_i)</span>. Let <span>(f_alpha (n))</span> denote the maximum size of such a family. In this paper, we study the asymptotic behavior of <span>(f_alpha (n))</span> when <i>n</i> goes to infinity. We show that if <i>t</i> is the maximum integer such that <span>(a_t=1)</span> and <span>(2tle k)</span>, then <span>(f_alpha (n)sim (t! n)^{1/t})</span>. More importantly, we show that for any constant <span>(c>0)</span>, as the length <i>k</i> goes larger, <span>(f_alpha (n))</span> is upper bounded by <span>(O (n^c))</span> for almost all <span>(alpha )</span>. Equivalently, no matter what <i>k</i> is, there are only finitely many <span>(alpha )</span> satisfying <span>(f_alpha (n)=Omega (n^c))</span>. This answers an open problem raised by Johnston and O’Neill in 2023. All of our results can be generalized to modulo <i>p</i> setting for any prime <i>p</i> smoothly.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"37 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-05DOI: 10.1007/s10623-024-01528-1
Daniele Bartoli, Francesco Ghiandoni
In this work we present results on the classification of (mathbb {F}_{q^n})-linear MRD codes of dimension three. In particular, using connections with certain algebraic varieties over finite fields, we provide non-existence results for MRD codes (mathcal {C}=langle X^{q^t}, F(X), G(X) rangle subseteq mathcal {L}_{n,q}) of exceptional type, i.e. such that (mathcal {C}) is MRD over infinitely many extensions of the base field. These results partially address a conjecture of Bartoli, Zini and Zullo in 2023.
{"title":"On 3-dimensional MRD codes of type $$langle X^{q^t},X+delta X^{q^{2t}},G(X) rangle $$","authors":"Daniele Bartoli, Francesco Ghiandoni","doi":"10.1007/s10623-024-01528-1","DOIUrl":"https://doi.org/10.1007/s10623-024-01528-1","url":null,"abstract":"<p>In this work we present results on the classification of <span>(mathbb {F}_{q^n})</span>-linear MRD codes of dimension three. In particular, using connections with certain algebraic varieties over finite fields, we provide non-existence results for MRD codes <span>(mathcal {C}=langle X^{q^t}, F(X), G(X) rangle subseteq mathcal {L}_{n,q})</span> of exceptional type, i.e. such that <span>(mathcal {C})</span> is MRD over infinitely many extensions of the base field. These results partially address a conjecture of Bartoli, Zini and Zullo in 2023.</p>","PeriodicalId":11130,"journal":{"name":"Designs, Codes and Cryptography","volume":"20 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142776813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}