首页 > 最新文献

Advances in Mathematics of Communications最新文献

英文 中文
On the pseudorandom properties of $ k $-ary Sidel'nikov sequences 关于k元Sidel'nikov序列的伪随机性质
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2021038
Huaning Liu, Yixin Ren

In 2002 Mauduit and Sárközy started to study finite sequences of begin{document}$ k $end{document} symbols

where begin{document}$ mathcal{A} = left{a_{1},a_{2},cdots,a_{k}right}(kin mathbb{N},kgeq 2) $end{document} is a finite set of begin{document}$ k $end{document} symbols. Later many pseudorandom sequences of begin{document}$ k $end{document} symbols have been given and studied by using number theoretic methods. In this paper we study the pseudorandom properties of the begin{document}$ k $end{document}-ary Sidel'nikov sequences with length begin{document}$ q-1 $end{document} by using the estimates for certain character sums with exponential function, where begin{document}$ q $end{document} is a prime power. Our results show that Sidel'nikov sequences enjoy good well-distribution measure and correlation measure. Furthermore, we prove that the set of size begin{document}$ phi(q-1) $end{document} of begin{document}$ k $end{document}-ary Sidel'nikov sequences is collision free and possesses the strict avalanche effect property provided that begin{document}$ k = o(q^{frac{1}{4}}) $end{document}, where begin{document}$ phi $end{document} denotes Euler's totient function.

In 2002 Mauduit and Sárközy started to study finite sequences of begin{document}$ k $end{document} symbols begin{document}$ E_{N} = left(e_{1},e_{2},cdots,e_{N}right)in mathcal{A}^{N}, $end{document} where begin{document}$ mathcal{A} = left{a_{1},a_{2},cdots,a_{k}right}(kin mathbb{N},kgeq 2) $end{document} is a finite set of begin{document}$ k $end{document} symbols. Later many pseudorandom sequences of begin{document}$ k $end{document} symbols have been given and studied by using number theoretic methods. In this paper we study the pseudorandom properties of the begin{document}$ k $end{document}-ary Sidel'nikov sequences with length begin{document}$ q-1 $end{document} by using the estimates for certain character sums with exponential function, where begin{document}$ q $end{document} is a prime power. Our results show that Sidel'nikov sequences enjoy good well-distribution measure and correlation measure. Furthermore, we prove that the set of size begin{document}$ phi(q-1) $end{document} of begin{document}$ k $end{document}-ary Sidel'nikov sequences is collision free and possesses the strict avalanche effect property provided that begin{document}$ k = o(q^{frac{1}{4}}) $end{document}, where begin{document}$ phi $end{document} denotes Euler's totient function.
{"title":"On the pseudorandom properties of $ k $-ary Sidel'nikov sequences","authors":"Huaning Liu, Yixin Ren","doi":"10.3934/amc.2021038","DOIUrl":"https://doi.org/10.3934/amc.2021038","url":null,"abstract":"<p style='text-indent:20px;'>In 2002 Mauduit and Sárközy started to study finite sequences of <inline-formula><tex-math id=\"M2\">begin{document}$ k $end{document}</tex-math></inline-formula> symbols</p><p style='text-indent:20px;'><disp-formula> <label/> <tex-math id=\"FE1\"> begin{document}$ E_{N} = left(e_{1},e_{2},cdots,e_{N}right)in mathcal{A}^{N}, $end{document} </tex-math></disp-formula></p><p style='text-indent:20px;'>where <inline-formula><tex-math id=\"M3\">begin{document}$ mathcal{A} = left{a_{1},a_{2},cdots,a_{k}right}(kin mathbb{N},kgeq 2) $end{document}</tex-math></inline-formula> is a finite set of <inline-formula><tex-math id=\"M4\">begin{document}$ k $end{document}</tex-math></inline-formula> symbols. Later many pseudorandom sequences of <inline-formula><tex-math id=\"M5\">begin{document}$ k $end{document}</tex-math></inline-formula> symbols have been given and studied by using number theoretic methods. In this paper we study the pseudorandom properties of the <inline-formula><tex-math id=\"M6\">begin{document}$ k $end{document}</tex-math></inline-formula>-ary Sidel'nikov sequences with length <inline-formula><tex-math id=\"M7\">begin{document}$ q-1 $end{document}</tex-math></inline-formula> by using the estimates for certain character sums with exponential function, where <inline-formula><tex-math id=\"M8\">begin{document}$ q $end{document}</tex-math></inline-formula> is a prime power. Our results show that Sidel'nikov sequences enjoy good well-distribution measure and correlation measure. Furthermore, we prove that the set of size <inline-formula><tex-math id=\"M9\">begin{document}$ phi(q-1) $end{document}</tex-math></inline-formula> of <inline-formula><tex-math id=\"M10\">begin{document}$ k $end{document}</tex-math></inline-formula>-ary Sidel'nikov sequences is collision free and possesses the strict avalanche effect property provided that <inline-formula><tex-math id=\"M11\">begin{document}$ k = o(q^{frac{1}{4}}) $end{document}</tex-math></inline-formula>, where <inline-formula><tex-math id=\"M12\">begin{document}$ phi $end{document}</tex-math></inline-formula> denotes Euler's totient function.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82655278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Repeated-root constacyclic codes of length 6lmpn 长度为6lmpn的重根恒循环码
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2021044
Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li

Let begin{document}$ mathbb{F}_{q} $end{document} be a finite field with character begin{document}$ p $end{document}. In this paper, the multiplicative group begin{document}$ mathbb{F}_{q}^{*} = mathbb{F}_{q}setminus{0} $end{document} is decomposed into a mutually disjoint union of begin{document}$ gcd(6l^mp^n,q-1) $end{document} cosets over subgroup begin{document}$ $end{document}, where begin{document}$ xi $end{document} is a primitive element of begin{document}$ mathbb{F}_{q} $end{document}. Based on the decomposition, the structure of constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over finite field begin{document}$ mathbb{F}_{q} $end{document} and their duals is established in terms of their generator polynomials, where begin{document}$ pneq{3} $end{document} and begin{document}$ lneq{3} $end{document} are distinct odd primes, begin{document}$ m $end{document} and begin{document}$ n $end{document} are positive integers. In addition, we determine the characterization and enumeration of all linear complementary dual(LCD) negacyclic codes and self-dual constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over begin{document}$ mathbb{F}_{q} $end{document}.

Let begin{document}$ mathbb{F}_{q} $end{document} be a finite field with character begin{document}$ p $end{document}. In this paper, the multiplicative group begin{document}$ mathbb{F}_{q}^{*} = mathbb{F}_{q}setminus{0} $end{document} is decomposed into a mutually disjoint union of begin{document}$ gcd(6l^mp^n,q-1) $end{document} cosets over subgroup begin{document}$ $end{document}, where begin{document}$ xi $end{document} is a primitive element of begin{document}$ mathbb{F}_{q} $end{document}. Based on the decomposition, the structure of constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over finite field begin{document}$ mathbb{F}_{q} $end{document} and their duals is established in terms of their generator polynomials, where begin{document}$ pneq{3} $end{document} and begin{document}$ lneq{3} $end{document} are distinct odd primes, begin{document}$ m $end{document} and begin{document}$ n $end{document} are positive integers. In addition, we determine the characterization and enumeration of all linear complementary dual(LCD) negacyclic codes and self-dual constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over begin{document}$ mathbb{F}_{q} $end{document}.
{"title":"Repeated-root constacyclic codes of length 6lmpn","authors":"Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li","doi":"10.3934/amc.2021044","DOIUrl":"https://doi.org/10.3934/amc.2021044","url":null,"abstract":"<p style='text-indent:20px;'>Let <inline-formula><tex-math id=\"M1\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula> be a finite field with character <inline-formula><tex-math id=\"M2\">begin{document}$ p $end{document}</tex-math></inline-formula>. In this paper, the multiplicative group <inline-formula><tex-math id=\"M3\">begin{document}$ mathbb{F}_{q}^{*} = mathbb{F}_{q}setminus{0} $end{document}</tex-math></inline-formula> is decomposed into a mutually disjoint union of <inline-formula><tex-math id=\"M4\">begin{document}$ gcd(6l^mp^n,q-1) $end{document}</tex-math></inline-formula> cosets over subgroup <inline-formula><tex-math id=\"M5\">begin{document}$ <xi^{6l^mp^n}> $end{document}</tex-math></inline-formula>, where <inline-formula><tex-math id=\"M6\">begin{document}$ xi $end{document}</tex-math></inline-formula> is a primitive element of <inline-formula><tex-math id=\"M7\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula>. Based on the decomposition, the structure of constacyclic codes of length <inline-formula><tex-math id=\"M8\">begin{document}$ 6l^mp^n $end{document}</tex-math></inline-formula> over finite field <inline-formula><tex-math id=\"M9\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula> and their duals is established in terms of their generator polynomials, where <inline-formula><tex-math id=\"M10\">begin{document}$ pneq{3} $end{document}</tex-math></inline-formula> and <inline-formula><tex-math id=\"M11\">begin{document}$ lneq{3} $end{document}</tex-math></inline-formula> are distinct odd primes, <inline-formula><tex-math id=\"M12\">begin{document}$ m $end{document}</tex-math></inline-formula> and <inline-formula><tex-math id=\"M13\">begin{document}$ n $end{document}</tex-math></inline-formula> are positive integers. In addition, we determine the characterization and enumeration of all linear complementary dual(LCD) negacyclic codes and self-dual constacyclic codes of length <inline-formula><tex-math id=\"M14\">begin{document}$ 6l^mp^n $end{document}</tex-math></inline-formula> over <inline-formula><tex-math id=\"M15\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula>.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82766987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multivariate identity-based broadcast encryption with applications to the internet of things 一种基于多元身份的广播加密技术及其在物联网中的应用
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2021050
Vikas Srivastava, Sumit Kumar Debnath, P. Stănică, S. Pal
When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part of human lives in just two decades. In short, the Internet of Things (IoT), is a catch-all terminology used to describe devices connected to the internet. These devices can share and receive data as well as provide instructions over a network. By design itself, the IoT system requires multicasting data and information to a set of designated devices, securely. Taking everything into account, Broadcast Encryption (BE) seems to be the natural choice to address the problem. BE allows an originator to broadcast ciphertexts to a big group of receivers in a well-organized and competent way, while ensuring that only designated people can decrypt the data. In this work, we put forward the first Identity-Based Broadcast Encryption scheme based on multivariate polynomials that achieves post-quantum security. Multivariate public key cryptosystems (MPKC), touted as one of the most promising post-quantum cryptography candidates, forms the foundation on which our scheme relies upon, which allows it to be very cost-effective and faster when implemented. In addition, it also provides resistance to collusion attack, and as a consequence our scheme can be utilized to form an efficient and robust IoT system.
当凯文·阿什顿(Kevin Ashton)在1999年提出“物联网”(Internet of Things)这个口号时,他根本不知道,在短短20年的时间里,技术将成为人类生活中不可或缺的一部分。简而言之,物联网(IoT)是一个包罗万象的术语,用于描述连接到互联网的设备。这些设备可以通过网络共享和接收数据以及提供指令。根据设计本身,物联网系统需要将数据和信息安全地广播到一组指定设备。考虑到所有因素,广播加密(BE)似乎是解决这个问题的自然选择。BE允许发端者以一种组织良好、胜任的方式向一大群接收者广播密文,同时确保只有指定的人才能解密数据。在这项工作中,我们提出了第一个基于多元多项式的基于身份的广播加密方案,实现了后量子安全。多元公钥密码系统(MPKC)被吹捧为最有前途的后量子密码候选者之一,它构成了我们方案所依赖的基础,这使得它在实现时非常具有成本效益和速度。此外,它还提供了抵抗合谋攻击的能力,因此我们的方案可以用来形成一个高效和强大的物联网系统。
{"title":"A multivariate identity-based broadcast encryption with applications to the internet of things","authors":"Vikas Srivastava, Sumit Kumar Debnath, P. Stănică, S. Pal","doi":"10.3934/amc.2021050","DOIUrl":"https://doi.org/10.3934/amc.2021050","url":null,"abstract":"When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part of human lives in just two decades. In short, the Internet of Things (IoT), is a catch-all terminology used to describe devices connected to the internet. These devices can share and receive data as well as provide instructions over a network. By design itself, the IoT system requires multicasting data and information to a set of designated devices, securely. Taking everything into account, Broadcast Encryption (BE) seems to be the natural choice to address the problem. BE allows an originator to broadcast ciphertexts to a big group of receivers in a well-organized and competent way, while ensuring that only designated people can decrypt the data. In this work, we put forward the first Identity-Based Broadcast Encryption scheme based on multivariate polynomials that achieves post-quantum security. Multivariate public key cryptosystems (MPKC), touted as one of the most promising post-quantum cryptography candidates, forms the foundation on which our scheme relies upon, which allows it to be very cost-effective and faster when implemented. In addition, it also provides resistance to collusion attack, and as a consequence our scheme can be utilized to form an efficient and robust IoT system.","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82188953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Nonexistence of some ternary linear codes with minimum weight -2 modulo 9 若干最小权值为-2模9的三元线性码的不存在性
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2021052
Toshiharu Sawashima, T. Maruta

One of the fundamental problems in coding theory is to find begin{document}$ n_q(k,d) $end{document}, the minimum length begin{document}$ n $end{document} for which a linear code of length begin{document}$ n $end{document}, dimension begin{document}$ k $end{document}, and the minimum weight begin{document}$ d $end{document} over the field of order begin{document}$ q $end{document} exists. The problem of determining the values of begin{document}$ n_q(k,d) $end{document} is known as the optimal linear codes problem. Using the geometric methods through projective geometry and a new extension theorem given by Kanda (2020), we determine begin{document}$ n_3(6,d) $end{document} for some values of begin{document}$ d $end{document} by proving the nonexistence of linear codes with certain parameters.

One of the fundamental problems in coding theory is to find begin{document}$ n_q(k,d) $end{document}, the minimum length begin{document}$ n $end{document} for which a linear code of length begin{document}$ n $end{document}, dimension begin{document}$ k $end{document}, and the minimum weight begin{document}$ d $end{document} over the field of order begin{document}$ q $end{document} exists. The problem of determining the values of begin{document}$ n_q(k,d) $end{document} is known as the optimal linear codes problem. Using the geometric methods through projective geometry and a new extension theorem given by Kanda (2020), we determine begin{document}$ n_3(6,d) $end{document} for some values of begin{document}$ d $end{document} by proving the nonexistence of linear codes with certain parameters.
{"title":"Nonexistence of some ternary linear codes with minimum weight -2 modulo 9","authors":"Toshiharu Sawashima, T. Maruta","doi":"10.3934/amc.2021052","DOIUrl":"https://doi.org/10.3934/amc.2021052","url":null,"abstract":"<p style='text-indent:20px;'>One of the fundamental problems in coding theory is to find <inline-formula><tex-math id=\"M3\">begin{document}$ n_q(k,d) $end{document}</tex-math></inline-formula>, the minimum length <inline-formula><tex-math id=\"M4\">begin{document}$ n $end{document}</tex-math></inline-formula> for which a linear code of length <inline-formula><tex-math id=\"M5\">begin{document}$ n $end{document}</tex-math></inline-formula>, dimension <inline-formula><tex-math id=\"M6\">begin{document}$ k $end{document}</tex-math></inline-formula>, and the minimum weight <inline-formula><tex-math id=\"M7\">begin{document}$ d $end{document}</tex-math></inline-formula> over the field of order <inline-formula><tex-math id=\"M8\">begin{document}$ q $end{document}</tex-math></inline-formula> exists. The problem of determining the values of <inline-formula><tex-math id=\"M9\">begin{document}$ n_q(k,d) $end{document}</tex-math></inline-formula> is known as the optimal linear codes problem. Using the geometric methods through projective geometry and a new extension theorem given by Kanda (2020), we determine <inline-formula><tex-math id=\"M10\">begin{document}$ n_3(6,d) $end{document}</tex-math></inline-formula> for some values of <inline-formula><tex-math id=\"M11\">begin{document}$ d $end{document}</tex-math></inline-formula> by proving the nonexistence of linear codes with certain parameters.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90358202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PMNS for cryptography: A guided tour 密码学的PMNS:导览
4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2023033
Nicolas Méloni, François Palma, Pascal Véron
{"title":"PMNS for cryptography: A guided tour","authors":"Nicolas Méloni, François Palma, Pascal Véron","doi":"10.3934/amc.2023033","DOIUrl":"https://doi.org/10.3934/amc.2023033","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135400791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets 一类新的最优宽间隙单符合跳频序列集
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/AMC.2020131
Wenli Ren, Feng Wang
In this paper, we propose a new class of optimal one-coincidence FHS (OC-FHS) sets with respect to the Peng-Fan bounds, including prime sequence sets and HMC sequence sets as special cases. Thereafter, through investigating their properties, we determine all of the FHS distances in the OC-FHS set. Finally, for a given positive integer, we also propose a new class of wide-gap one-coincidence FHS (WG-OC-FHS) sets where the FHS gap is larger than the given positive integer. Moreover, such a WG-OC-FHS set is optimal with respect to the WG-Lempel-Greenberger bound and the WG-Peng-Fan bounds simultaneously.
本文提出了一类新的关于Peng-Fan界的最优单符合FHS (OC-FHS)集,包括素数序列集和HMC序列集作为特例。然后,通过研究它们的性质,我们确定了OC-FHS集合中的所有FHS距离。最后,对于给定的正整数,我们还提出了一类新的宽间隙单符合FHS集(WG-OC-FHS),其中FHS间隙大于给定的正整数。此外,这种WG-OC-FHS集同时相对于WG-Lempel-Greenberger界和WG-Peng-Fan界是最优的。
{"title":"A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets","authors":"Wenli Ren, Feng Wang","doi":"10.3934/AMC.2020131","DOIUrl":"https://doi.org/10.3934/AMC.2020131","url":null,"abstract":"In this paper, we propose a new class of optimal one-coincidence FHS (OC-FHS) sets with respect to the Peng-Fan bounds, including prime sequence sets and HMC sequence sets as special cases. Thereafter, through investigating their properties, we determine all of the FHS distances in the OC-FHS set. Finally, for a given positive integer, we also propose a new class of wide-gap one-coincidence FHS (WG-OC-FHS) sets where the FHS gap is larger than the given positive integer. Moreover, such a WG-OC-FHS set is optimal with respect to the WG-Lempel-Greenberger bound and the WG-Peng-Fan bounds simultaneously.","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73884356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructions of mismatched binary periodic complementary pairs 错配二进制周期互补对的构造
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2023006
Lina Shi, Ruibin Ren, Yang Yang
{"title":"Constructions of mismatched binary periodic complementary pairs","authors":"Lina Shi, Ruibin Ren, Yang Yang","doi":"10.3934/amc.2023006","DOIUrl":"https://doi.org/10.3934/amc.2023006","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73053738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On some codes from rank 3 primitive actions of the simple Chevalley group $ G_2(q) $ 关于简单Chevalley群$ G_2(q) $ 3阶基元作用的一些码
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2022016
Tung Le, B. Rodrigues

Let begin{document}$ G_2(q) $end{document} be a Chevalley group of type begin{document}$ G_2 $end{document} over a finite field begin{document}$ mathbb{F}_q $end{document}. Considering the begin{document}$ G_2(q) $end{document}-primitive action of rank begin{document}$ 3 $end{document} on the set of begin{document}$ frac{q^3(q^3-1)}{2} $end{document} hyperplanes of type begin{document}$ O_{6}^{-}(q) $end{document} in the begin{document}$ 7 $end{document}-dimensional orthogonal space begin{document}$ {{rm{PG}}}(7, q) $end{document}, we study the designs, codes, and some related geometric structures. We obtained the main parameters of the codes, the full automorphism groups of these structures, and geometric descriptions of the classes of minimum weight codewords.

Let begin{document}$ G_2(q) $end{document} be a Chevalley group of type begin{document}$ G_2 $end{document} over a finite field begin{document}$ mathbb{F}_q $end{document}. Considering the begin{document}$ G_2(q) $end{document}-primitive action of rank begin{document}$ 3 $end{document} on the set of begin{document}$ frac{q^3(q^3-1)}{2} $end{document} hyperplanes of type begin{document}$ O_{6}^{-}(q) $end{document} in the begin{document}$ 7 $end{document}-dimensional orthogonal space begin{document}$ {{rm{PG}}}(7, q) $end{document}, we study the designs, codes, and some related geometric structures. We obtained the main parameters of the codes, the full automorphism groups of these structures, and geometric descriptions of the classes of minimum weight codewords.
{"title":"On some codes from rank 3 primitive actions of the simple Chevalley group $ G_2(q) $","authors":"Tung Le, B. Rodrigues","doi":"10.3934/amc.2022016","DOIUrl":"https://doi.org/10.3934/amc.2022016","url":null,"abstract":"<p style='text-indent:20px;'>Let <inline-formula><tex-math id=\"M2\">begin{document}$ G_2(q) $end{document}</tex-math></inline-formula> be a Chevalley group of type <inline-formula><tex-math id=\"M3\">begin{document}$ G_2 $end{document}</tex-math></inline-formula> over a finite field <inline-formula><tex-math id=\"M4\">begin{document}$ mathbb{F}_q $end{document}</tex-math></inline-formula>. Considering the <inline-formula><tex-math id=\"M5\">begin{document}$ G_2(q) $end{document}</tex-math></inline-formula>-primitive action of rank <inline-formula><tex-math id=\"M6\">begin{document}$ 3 $end{document}</tex-math></inline-formula> on the set of <inline-formula><tex-math id=\"M7\">begin{document}$ frac{q^3(q^3-1)}{2} $end{document}</tex-math></inline-formula> hyperplanes of type <inline-formula><tex-math id=\"M8\">begin{document}$ O_{6}^{-}(q) $end{document}</tex-math></inline-formula> in the <inline-formula><tex-math id=\"M9\">begin{document}$ 7 $end{document}</tex-math></inline-formula>-dimensional orthogonal space <inline-formula><tex-math id=\"M10\">begin{document}$ {{rm{PG}}}(7, q) $end{document}</tex-math></inline-formula>, we study the designs, codes, and some related geometric structures. We obtained the main parameters of the codes, the full automorphism groups of these structures, and geometric descriptions of the classes of minimum weight codewords.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81289202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some results on BCH codes of length $ frac{{{q^m} + 1}}{2} $ 长度为$ frac{{{q^m} + 1}}{2} $的BCH码的一些结果
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2023010
Jiayuan Zhang, Ping Li, X. Kai, Zhonghua Sun
{"title":"Some results on BCH codes of length $ frac{{{q^m} + 1}}{2} $","authors":"Jiayuan Zhang, Ping Li, X. Kai, Zhonghua Sun","doi":"10.3934/amc.2023010","DOIUrl":"https://doi.org/10.3934/amc.2023010","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91119323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constacyclic and quasi-twisted codes over $ mathbb{Z}_{q}[u]/langle u^{2}-1rangle $ and new $ mathbb{Z}_4 $-linear codes $ mathbb{Z}_{q}[u]/langle u^{2}-1rangle $上的恒环和拟扭曲码及新的$ mathbb{Z}_4 $-线性码
IF 0.9 4区 计算机科学 Q1 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/amc.2023026
Amina Bellil, K. Guenda, N. Aydin, Peihan Liu, T. Aaron Gulliver
{"title":"Constacyclic and quasi-twisted codes over $ mathbb{Z}_{q}[u]/langle u^{2}-1rangle $ and new $ mathbb{Z}_4 $-linear codes","authors":"Amina Bellil, K. Guenda, N. Aydin, Peihan Liu, T. Aaron Gulliver","doi":"10.3934/amc.2023026","DOIUrl":"https://doi.org/10.3934/amc.2023026","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84534616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Advances in Mathematics of Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1