16,393 research outputs found
A Novel Application of Boolean Functions with High Algebraic Immunity in Minimal Codes
Boolean functions with high algebraic immunity are important cryptographic
primitives in some stream ciphers. In this paper, two methodologies for
constructing binary minimal codes from sets, Boolean functions and vectorial
Boolean functions with high algebraic immunity are proposed. More precisely, a
general construction of new minimal codes using minimal codes contained in
Reed-Muller codes and sets without nonzero low degree annihilators is
presented. The other construction allows us to yield minimal codes from certain
subcodes of Reed-Muller codes and vectorial Boolean functions with high
algebraic immunity. Via these general constructions, infinite families of
minimal binary linear codes of dimension and length less than or equal to
are obtained. In addition, a lower bound on the minimum distance of
the proposed minimal linear codes is established. Conjectures and open problems
are also presented. The results of this paper show that Boolean functions with
high algebraic immunity have nice applications in several fields such as
symmetric cryptography, coding theory and secret sharing schemes
Codeword stabilized quantum codes: algorithm and structure
The codeword stabilized ("CWS") quantum codes formalism presents a unifying
approach to both additive and nonadditive quantum error-correcting codes
(arXiv:0708.1021). This formalism reduces the problem of constructing such
quantum codes to finding a binary classical code correcting an error pattern
induced by a graph state. Finding such a classical code can be very difficult.
Here, we consider an algorithm which maps the search for CWS codes to a problem
of identifying maximum cliques in a graph. While solving this problem is in
general very hard, we prove three structure theorems which reduce the search
space, specifying certain admissible and optimal ((n,K,d)) additive codes. In
particular, we find there does not exist any ((7,3,3)) CWS code though the
linear programming bound does not rule it out. The complexity of the CWS search
algorithm is compared with the contrasting method introduced by Aggarwal and
Calderbank (arXiv:cs/0610159).Comment: 11 pages, 1 figur
Linear Codes from Some 2-Designs
A classical method of constructing a linear code over \gf(q) with a
-design is to use the incidence matrix of the -design as a generator
matrix over \gf(q) of the code. This approach has been extensively
investigated in the literature. In this paper, a different method of
constructing linear codes using specific classes of -designs is studied, and
linear codes with a few weights are obtained from almost difference sets,
difference sets, and a type of -designs associated to semibent functions.
Two families of the codes obtained in this paper are optimal. The linear codes
presented in this paper have applications in secret sharing and authentication
schemes, in addition to their applications in consumer electronics,
communication and data storage systems. A coding-theory approach to the
characterisation of highly nonlinear Boolean functions is presented
Complementary Sets, Generalized Reed-Muller Codes, and Power Control for OFDM
The use of error-correcting codes for tight control of the peak-to-mean
envelope power ratio (PMEPR) in orthogonal frequency-division multiplexing
(OFDM) transmission is considered in this correspondence. By generalizing a
result by Paterson, it is shown that each q-phase (q is even) sequence of
length 2^m lies in a complementary set of size 2^{k+1}, where k is a
nonnegative integer that can be easily determined from the generalized Boolean
function associated with the sequence. For small k this result provides a
reasonably tight bound for the PMEPR of q-phase sequences of length 2^m. A new
2^h-ary generalization of the classical Reed-Muller code is then used together
with the result on complementary sets to derive flexible OFDM coding schemes
with low PMEPR. These codes include the codes developed by Davis and Jedwab as
a special case. In certain situations the codes in the present correspondence
are similar to Paterson's code constructions and often outperform them
- …