where begin{document}$ mathcal{A} = left{a_{1},a_{2},cdots,a_{k}right}(kin mathbb{N},kgeq 2) $end{document} is a finite set of begin{document}$ k $end{document} symbols. Later many pseudorandom sequences of begin{document}$ k $end{document} symbols have been given and studied by using number theoretic methods. In this paper we study the pseudorandom properties of the begin{document}$ k $end{document}-ary Sidel'nikov sequences with length begin{document}$ q-1 $end{document} by using the estimates for certain character sums with exponential function, where begin{document}$ q $end{document} is a prime power. Our results show that Sidel'nikov sequences enjoy good well-distribution measure and correlation measure. Furthermore, we prove that the set of size begin{document}$ phi(q-1) $end{document} of begin{document}$ k $end{document}-ary Sidel'nikov sequences is collision free and possesses the strict avalanche effect property provided that begin{document}$ k = o(q^{frac{1}{4}}) $end{document}, where begin{document}$ phi $end{document} denotes Euler's totient function.
In 2002 Mauduit and Sárközy started to study finite sequences of begin{document}$ k $end{document} symbols begin{document}$ E_{N} = left(e_{1},e_{2},cdots,e_{N}right)in mathcal{A}^{N}, $end{document} where begin{document}$ mathcal{A} = left{a_{1},a_{2},cdots,a_{k}right}(kin mathbb{N},kgeq 2) $end{document} is a finite set of begin{document}$ k $end{document} symbols. Later many pseudorandom sequences of begin{document}$ k $end{document} symbols have been given and studied by using number theoretic methods. In this paper we study the pseudorandom properties of the begin{document}$ k $end{document}-ary Sidel'nikov sequences with length begin{document}$ q-1 $end{document} by using the estimates for certain character sums with exponential function, where begin{document}$ q $end{document} is a prime power. Our results show that Sidel'nikov sequences enjoy good well-distribution measure and correlation measure. Furthermore, we prove that the set of size begin{document}$ phi(q-1) $end{document} of begin{document}$ k $end{document}-ary Sidel'nikov sequences is collision free and possesses the strict avalanche effect property provided that begin{document}$ k = o(q^{frac{1}{4}}) $end{document}, where begin{document}$ phi $end{document} denotes Euler's totient function.
{"title":"On the pseudorandom properties of $ k $-ary Sidel'nikov sequences","authors":"Huaning Liu, Yixin Ren","doi":"10.3934/amc.2021038","DOIUrl":"https://doi.org/10.3934/amc.2021038","url":null,"abstract":"<p style='text-indent:20px;'>In 2002 Mauduit and Sárközy started to study finite sequences of <inline-formula><tex-math id=\"M2\">begin{document}$ k $end{document}</tex-math></inline-formula> symbols</p><p style='text-indent:20px;'><disp-formula> <label/> <tex-math id=\"FE1\"> begin{document}$ E_{N} = left(e_{1},e_{2},cdots,e_{N}right)in mathcal{A}^{N}, $end{document} </tex-math></disp-formula></p><p style='text-indent:20px;'>where <inline-formula><tex-math id=\"M3\">begin{document}$ mathcal{A} = left{a_{1},a_{2},cdots,a_{k}right}(kin mathbb{N},kgeq 2) $end{document}</tex-math></inline-formula> is a finite set of <inline-formula><tex-math id=\"M4\">begin{document}$ k $end{document}</tex-math></inline-formula> symbols. Later many pseudorandom sequences of <inline-formula><tex-math id=\"M5\">begin{document}$ k $end{document}</tex-math></inline-formula> symbols have been given and studied by using number theoretic methods. In this paper we study the pseudorandom properties of the <inline-formula><tex-math id=\"M6\">begin{document}$ k $end{document}</tex-math></inline-formula>-ary Sidel'nikov sequences with length <inline-formula><tex-math id=\"M7\">begin{document}$ q-1 $end{document}</tex-math></inline-formula> by using the estimates for certain character sums with exponential function, where <inline-formula><tex-math id=\"M8\">begin{document}$ q $end{document}</tex-math></inline-formula> is a prime power. Our results show that Sidel'nikov sequences enjoy good well-distribution measure and correlation measure. Furthermore, we prove that the set of size <inline-formula><tex-math id=\"M9\">begin{document}$ phi(q-1) $end{document}</tex-math></inline-formula> of <inline-formula><tex-math id=\"M10\">begin{document}$ k $end{document}</tex-math></inline-formula>-ary Sidel'nikov sequences is collision free and possesses the strict avalanche effect property provided that <inline-formula><tex-math id=\"M11\">begin{document}$ k = o(q^{frac{1}{4}}) $end{document}</tex-math></inline-formula>, where <inline-formula><tex-math id=\"M12\">begin{document}$ phi $end{document}</tex-math></inline-formula> denotes Euler's totient function.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82655278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let begin{document}$ mathbb{F}_{q} $end{document} be a finite field with character begin{document}$ p $end{document}. In this paper, the multiplicative group begin{document}$ mathbb{F}_{q}^{*} = mathbb{F}_{q}setminus{0} $end{document} is decomposed into a mutually disjoint union of begin{document}$ gcd(6l^mp^n,q-1) $end{document} cosets over subgroup begin{document}$ $end{document}, where begin{document}$ xi $end{document} is a primitive element of begin{document}$ mathbb{F}_{q} $end{document}. Based on the decomposition, the structure of constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over finite field begin{document}$ mathbb{F}_{q} $end{document} and their duals is established in terms of their generator polynomials, where begin{document}$ pneq{3} $end{document} and begin{document}$ lneq{3} $end{document} are distinct odd primes, begin{document}$ m $end{document} and begin{document}$ n $end{document} are positive integers. In addition, we determine the characterization and enumeration of all linear complementary dual(LCD) negacyclic codes and self-dual constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over begin{document}$ mathbb{F}_{q} $end{document}.
Let begin{document}$ mathbb{F}_{q} $end{document} be a finite field with character begin{document}$ p $end{document}. In this paper, the multiplicative group begin{document}$ mathbb{F}_{q}^{*} = mathbb{F}_{q}setminus{0} $end{document} is decomposed into a mutually disjoint union of begin{document}$ gcd(6l^mp^n,q-1) $end{document} cosets over subgroup begin{document}$ $end{document}, where begin{document}$ xi $end{document} is a primitive element of begin{document}$ mathbb{F}_{q} $end{document}. Based on the decomposition, the structure of constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over finite field begin{document}$ mathbb{F}_{q} $end{document} and their duals is established in terms of their generator polynomials, where begin{document}$ pneq{3} $end{document} and begin{document}$ lneq{3} $end{document} are distinct odd primes, begin{document}$ m $end{document} and begin{document}$ n $end{document} are positive integers. In addition, we determine the characterization and enumeration of all linear complementary dual(LCD) negacyclic codes and self-dual constacyclic codes of length begin{document}$ 6l^mp^n $end{document} over begin{document}$ mathbb{F}_{q} $end{document}.
{"title":"Repeated-root constacyclic codes of length 6lmpn","authors":"Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li","doi":"10.3934/amc.2021044","DOIUrl":"https://doi.org/10.3934/amc.2021044","url":null,"abstract":"<p style='text-indent:20px;'>Let <inline-formula><tex-math id=\"M1\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula> be a finite field with character <inline-formula><tex-math id=\"M2\">begin{document}$ p $end{document}</tex-math></inline-formula>. In this paper, the multiplicative group <inline-formula><tex-math id=\"M3\">begin{document}$ mathbb{F}_{q}^{*} = mathbb{F}_{q}setminus{0} $end{document}</tex-math></inline-formula> is decomposed into a mutually disjoint union of <inline-formula><tex-math id=\"M4\">begin{document}$ gcd(6l^mp^n,q-1) $end{document}</tex-math></inline-formula> cosets over subgroup <inline-formula><tex-math id=\"M5\">begin{document}$ <xi^{6l^mp^n}> $end{document}</tex-math></inline-formula>, where <inline-formula><tex-math id=\"M6\">begin{document}$ xi $end{document}</tex-math></inline-formula> is a primitive element of <inline-formula><tex-math id=\"M7\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula>. Based on the decomposition, the structure of constacyclic codes of length <inline-formula><tex-math id=\"M8\">begin{document}$ 6l^mp^n $end{document}</tex-math></inline-formula> over finite field <inline-formula><tex-math id=\"M9\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula> and their duals is established in terms of their generator polynomials, where <inline-formula><tex-math id=\"M10\">begin{document}$ pneq{3} $end{document}</tex-math></inline-formula> and <inline-formula><tex-math id=\"M11\">begin{document}$ lneq{3} $end{document}</tex-math></inline-formula> are distinct odd primes, <inline-formula><tex-math id=\"M12\">begin{document}$ m $end{document}</tex-math></inline-formula> and <inline-formula><tex-math id=\"M13\">begin{document}$ n $end{document}</tex-math></inline-formula> are positive integers. In addition, we determine the characterization and enumeration of all linear complementary dual(LCD) negacyclic codes and self-dual constacyclic codes of length <inline-formula><tex-math id=\"M14\">begin{document}$ 6l^mp^n $end{document}</tex-math></inline-formula> over <inline-formula><tex-math id=\"M15\">begin{document}$ mathbb{F}_{q} $end{document}</tex-math></inline-formula>.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82766987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vikas Srivastava, Sumit Kumar Debnath, P. Stănică, S. Pal
When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part of human lives in just two decades. In short, the Internet of Things (IoT), is a catch-all terminology used to describe devices connected to the internet. These devices can share and receive data as well as provide instructions over a network. By design itself, the IoT system requires multicasting data and information to a set of designated devices, securely. Taking everything into account, Broadcast Encryption (BE) seems to be the natural choice to address the problem. BE allows an originator to broadcast ciphertexts to a big group of receivers in a well-organized and competent way, while ensuring that only designated people can decrypt the data. In this work, we put forward the first Identity-Based Broadcast Encryption scheme based on multivariate polynomials that achieves post-quantum security. Multivariate public key cryptosystems (MPKC), touted as one of the most promising post-quantum cryptography candidates, forms the foundation on which our scheme relies upon, which allows it to be very cost-effective and faster when implemented. In addition, it also provides resistance to collusion attack, and as a consequence our scheme can be utilized to form an efficient and robust IoT system.
当凯文·阿什顿(Kevin Ashton)在1999年提出“物联网”(Internet of Things)这个口号时,他根本不知道,在短短20年的时间里,技术将成为人类生活中不可或缺的一部分。简而言之,物联网(IoT)是一个包罗万象的术语,用于描述连接到互联网的设备。这些设备可以通过网络共享和接收数据以及提供指令。根据设计本身,物联网系统需要将数据和信息安全地广播到一组指定设备。考虑到所有因素,广播加密(BE)似乎是解决这个问题的自然选择。BE允许发端者以一种组织良好、胜任的方式向一大群接收者广播密文,同时确保只有指定的人才能解密数据。在这项工作中,我们提出了第一个基于多元多项式的基于身份的广播加密方案,实现了后量子安全。多元公钥密码系统(MPKC)被吹捧为最有前途的后量子密码候选者之一,它构成了我们方案所依赖的基础,这使得它在实现时非常具有成本效益和速度。此外,它还提供了抵抗合谋攻击的能力,因此我们的方案可以用来形成一个高效和强大的物联网系统。
{"title":"A multivariate identity-based broadcast encryption with applications to the internet of things","authors":"Vikas Srivastava, Sumit Kumar Debnath, P. Stănică, S. Pal","doi":"10.3934/amc.2021050","DOIUrl":"https://doi.org/10.3934/amc.2021050","url":null,"abstract":"When Kevin Ashton proposed the catchword 'Internet of Things' in 1999, little did he know that technology will become an indispensable part of human lives in just two decades. In short, the Internet of Things (IoT), is a catch-all terminology used to describe devices connected to the internet. These devices can share and receive data as well as provide instructions over a network. By design itself, the IoT system requires multicasting data and information to a set of designated devices, securely. Taking everything into account, Broadcast Encryption (BE) seems to be the natural choice to address the problem. BE allows an originator to broadcast ciphertexts to a big group of receivers in a well-organized and competent way, while ensuring that only designated people can decrypt the data. In this work, we put forward the first Identity-Based Broadcast Encryption scheme based on multivariate polynomials that achieves post-quantum security. Multivariate public key cryptosystems (MPKC), touted as one of the most promising post-quantum cryptography candidates, forms the foundation on which our scheme relies upon, which allows it to be very cost-effective and faster when implemented. In addition, it also provides resistance to collusion attack, and as a consequence our scheme can be utilized to form an efficient and robust IoT system.","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82188953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the fundamental problems in coding theory is to find begin{document}$ n_q(k,d) $end{document}, the minimum length begin{document}$ n $end{document} for which a linear code of length begin{document}$ n $end{document}, dimension begin{document}$ k $end{document}, and the minimum weight begin{document}$ d $end{document} over the field of order begin{document}$ q $end{document} exists. The problem of determining the values of begin{document}$ n_q(k,d) $end{document} is known as the optimal linear codes problem. Using the geometric methods through projective geometry and a new extension theorem given by Kanda (2020), we determine begin{document}$ n_3(6,d) $end{document} for some values of begin{document}$ d $end{document} by proving the nonexistence of linear codes with certain parameters.
One of the fundamental problems in coding theory is to find begin{document}$ n_q(k,d) $end{document}, the minimum length begin{document}$ n $end{document} for which a linear code of length begin{document}$ n $end{document}, dimension begin{document}$ k $end{document}, and the minimum weight begin{document}$ d $end{document} over the field of order begin{document}$ q $end{document} exists. The problem of determining the values of begin{document}$ n_q(k,d) $end{document} is known as the optimal linear codes problem. Using the geometric methods through projective geometry and a new extension theorem given by Kanda (2020), we determine begin{document}$ n_3(6,d) $end{document} for some values of begin{document}$ d $end{document} by proving the nonexistence of linear codes with certain parameters.
{"title":"Nonexistence of some ternary linear codes with minimum weight -2 modulo 9","authors":"Toshiharu Sawashima, T. Maruta","doi":"10.3934/amc.2021052","DOIUrl":"https://doi.org/10.3934/amc.2021052","url":null,"abstract":"<p style='text-indent:20px;'>One of the fundamental problems in coding theory is to find <inline-formula><tex-math id=\"M3\">begin{document}$ n_q(k,d) $end{document}</tex-math></inline-formula>, the minimum length <inline-formula><tex-math id=\"M4\">begin{document}$ n $end{document}</tex-math></inline-formula> for which a linear code of length <inline-formula><tex-math id=\"M5\">begin{document}$ n $end{document}</tex-math></inline-formula>, dimension <inline-formula><tex-math id=\"M6\">begin{document}$ k $end{document}</tex-math></inline-formula>, and the minimum weight <inline-formula><tex-math id=\"M7\">begin{document}$ d $end{document}</tex-math></inline-formula> over the field of order <inline-formula><tex-math id=\"M8\">begin{document}$ q $end{document}</tex-math></inline-formula> exists. The problem of determining the values of <inline-formula><tex-math id=\"M9\">begin{document}$ n_q(k,d) $end{document}</tex-math></inline-formula> is known as the optimal linear codes problem. Using the geometric methods through projective geometry and a new extension theorem given by Kanda (2020), we determine <inline-formula><tex-math id=\"M10\">begin{document}$ n_3(6,d) $end{document}</tex-math></inline-formula> for some values of <inline-formula><tex-math id=\"M11\">begin{document}$ d $end{document}</tex-math></inline-formula> by proving the nonexistence of linear codes with certain parameters.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90358202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PMNS for cryptography: A guided tour","authors":"Nicolas Méloni, François Palma, Pascal Véron","doi":"10.3934/amc.2023033","DOIUrl":"https://doi.org/10.3934/amc.2023033","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135400791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a new class of optimal one-coincidence FHS (OC-FHS) sets with respect to the Peng-Fan bounds, including prime sequence sets and HMC sequence sets as special cases. Thereafter, through investigating their properties, we determine all of the FHS distances in the OC-FHS set. Finally, for a given positive integer, we also propose a new class of wide-gap one-coincidence FHS (WG-OC-FHS) sets where the FHS gap is larger than the given positive integer. Moreover, such a WG-OC-FHS set is optimal with respect to the WG-Lempel-Greenberger bound and the WG-Peng-Fan bounds simultaneously.
{"title":"A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets","authors":"Wenli Ren, Feng Wang","doi":"10.3934/AMC.2020131","DOIUrl":"https://doi.org/10.3934/AMC.2020131","url":null,"abstract":"In this paper, we propose a new class of optimal one-coincidence FHS (OC-FHS) sets with respect to the Peng-Fan bounds, including prime sequence sets and HMC sequence sets as special cases. Thereafter, through investigating their properties, we determine all of the FHS distances in the OC-FHS set. Finally, for a given positive integer, we also propose a new class of wide-gap one-coincidence FHS (WG-OC-FHS) sets where the FHS gap is larger than the given positive integer. Moreover, such a WG-OC-FHS set is optimal with respect to the WG-Lempel-Greenberger bound and the WG-Peng-Fan bounds simultaneously.","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73884356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructions of mismatched binary periodic complementary pairs","authors":"Lina Shi, Ruibin Ren, Yang Yang","doi":"10.3934/amc.2023006","DOIUrl":"https://doi.org/10.3934/amc.2023006","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73053738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let begin{document}$ G_2(q) $end{document} be a Chevalley group of type begin{document}$ G_2 $end{document} over a finite field begin{document}$ mathbb{F}_q $end{document}. Considering the begin{document}$ G_2(q) $end{document}-primitive action of rank begin{document}$ 3 $end{document} on the set of begin{document}$ frac{q^3(q^3-1)}{2} $end{document} hyperplanes of type begin{document}$ O_{6}^{-}(q) $end{document} in the begin{document}$ 7 $end{document}-dimensional orthogonal space begin{document}$ {{rm{PG}}}(7, q) $end{document}, we study the designs, codes, and some related geometric structures. We obtained the main parameters of the codes, the full automorphism groups of these structures, and geometric descriptions of the classes of minimum weight codewords.
Let begin{document}$ G_2(q) $end{document} be a Chevalley group of type begin{document}$ G_2 $end{document} over a finite field begin{document}$ mathbb{F}_q $end{document}. Considering the begin{document}$ G_2(q) $end{document}-primitive action of rank begin{document}$ 3 $end{document} on the set of begin{document}$ frac{q^3(q^3-1)}{2} $end{document} hyperplanes of type begin{document}$ O_{6}^{-}(q) $end{document} in the begin{document}$ 7 $end{document}-dimensional orthogonal space begin{document}$ {{rm{PG}}}(7, q) $end{document}, we study the designs, codes, and some related geometric structures. We obtained the main parameters of the codes, the full automorphism groups of these structures, and geometric descriptions of the classes of minimum weight codewords.
{"title":"On some codes from rank 3 primitive actions of the simple Chevalley group $ G_2(q) $","authors":"Tung Le, B. Rodrigues","doi":"10.3934/amc.2022016","DOIUrl":"https://doi.org/10.3934/amc.2022016","url":null,"abstract":"<p style='text-indent:20px;'>Let <inline-formula><tex-math id=\"M2\">begin{document}$ G_2(q) $end{document}</tex-math></inline-formula> be a Chevalley group of type <inline-formula><tex-math id=\"M3\">begin{document}$ G_2 $end{document}</tex-math></inline-formula> over a finite field <inline-formula><tex-math id=\"M4\">begin{document}$ mathbb{F}_q $end{document}</tex-math></inline-formula>. Considering the <inline-formula><tex-math id=\"M5\">begin{document}$ G_2(q) $end{document}</tex-math></inline-formula>-primitive action of rank <inline-formula><tex-math id=\"M6\">begin{document}$ 3 $end{document}</tex-math></inline-formula> on the set of <inline-formula><tex-math id=\"M7\">begin{document}$ frac{q^3(q^3-1)}{2} $end{document}</tex-math></inline-formula> hyperplanes of type <inline-formula><tex-math id=\"M8\">begin{document}$ O_{6}^{-}(q) $end{document}</tex-math></inline-formula> in the <inline-formula><tex-math id=\"M9\">begin{document}$ 7 $end{document}</tex-math></inline-formula>-dimensional orthogonal space <inline-formula><tex-math id=\"M10\">begin{document}$ {{rm{PG}}}(7, q) $end{document}</tex-math></inline-formula>, we study the designs, codes, and some related geometric structures. We obtained the main parameters of the codes, the full automorphism groups of these structures, and geometric descriptions of the classes of minimum weight codewords.</p>","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81289202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amina Bellil, K. Guenda, N. Aydin, Peihan Liu, T. Aaron Gulliver
{"title":"Constacyclic and quasi-twisted codes over $ mathbb{Z}_{q}[u]/langle u^{2}-1rangle $ and new $ mathbb{Z}_4 $-linear codes","authors":"Amina Bellil, K. Guenda, N. Aydin, Peihan Liu, T. Aaron Gulliver","doi":"10.3934/amc.2023026","DOIUrl":"https://doi.org/10.3934/amc.2023026","url":null,"abstract":"","PeriodicalId":50859,"journal":{"name":"Advances in Mathematics of Communications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84534616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}