8,650 research outputs found
Group Rings, G-Codes and Constructions of Self-Dual and Formally Self-Dual Codes
The final publication is available at Springer via http://dx.doi.org/10.1007/s10623-017-0440-7We describe G-codes, which are codes that are ideals in a group ring, where the ring is a finite commutative Frobenius ring and G is an arbitrary finite group. We prove that the dual of a G-code is also a G-code. We give constructions of self-dual and formally self-dual codes in this setting and we improve the existing construction given in [13] by showing that one of the conditions given in the theorem is unnecessary and, moreover, it restricts the number of self-dual codes obtained by the construction. We show that several of the standard constructions of self-dual codes are found within our general framework. We prove that our constructed codes must have an automorphism group that contains G as a subgroup. We also prove that a common construction technique for producing self-dual codes cannot produce the putative [72, 36, 16] Type II code. Additionally, we show precisely which groups can be used to construct the extremal Type II codes over length 24 and 48. We define quasi-G codes and give a construction of these codes
Self-Dual Codes
Self-dual codes are important because many of the best codes known are of
this type and they have a rich mathematical theory. Topics covered in this
survey include codes over F_2, F_3, F_4, F_q, Z_4, Z_m, shadow codes, weight
enumerators, Gleason-Pierce theorem, invariant theory, Gleason theorems,
bounds, mass formulae, enumeration, extremal codes, open problems. There is a
comprehensive bibliography.Comment: 136 page
Constructing formally self-dual codes from block Ć›-circulant matrices
In this work, construction methods for formally self-dual codes are generalized in the form of block lambda-circulant matrices. The constructions are applied over the rings F_2,R1 = F_2 + uF_2 and S = F_2[u]=(u^3-1). Using n-block lambda-circulant matrices for suitable integers n and units lambda, many binary FSD codes (as Gray images) with a higher minimum distance than best known self-dual codes of lengths 34, 40, 44, 54, 58, 70, 72 and 74 were obtained. In particular, ten new even FSD [72, 36, 14] codes were constructed together with eight new near-extremal FSD even codes of length 44 and twentyfive new near-extremal FSD even codes of length 36
Double Bordered Constructions of Self-Dual Codes from Group Rings over Frobenius Rings
This is a post-peer-review, pre-copyedit version of an article published in Cryptography and Communications. The final authenticated version is available online at: http://dx.doi.org/10.1007/s12095-019-00420-3In this work, we describe a double bordered construction of self-dual codes from
group rings. We show that this construction is effective for groups of order 2p where p
is odd, over the rings F2 + uF2 and F4 + uF4. We demonstrate the importance of this
new construction by finding many new binary self-dual codes of lengths 64, 68 and 80;
the new codes and their corresponding weight enumerators are listed in several table
A new class of codes for Boolean masking of cryptographic computations
We introduce a new class of rate one-half binary codes: {\bf complementary
information set codes.} A binary linear code of length and dimension
is called a complementary information set code (CIS code for short) if it has
two disjoint information sets. This class of codes contains self-dual codes as
a subclass. It is connected to graph correlation immune Boolean functions of
use in the security of hardware implementations of cryptographic primitives.
Such codes permit to improve the cost of masking cryptographic algorithms
against side channel attacks. In this paper we investigate this new class of
codes: we give optimal or best known CIS codes of length We derive
general constructions based on cyclic codes and on double circulant codes. We
derive a Varshamov-Gilbert bound for long CIS codes, and show that they can all
be classified in small lengths by the building up construction. Some
nonlinear permutations are constructed by using -codes, based on the
notion of dual distance of an unrestricted code.Comment: 19 pages. IEEE Trans. on Information Theory, to appea
- …