1,429 research outputs found

    On quadratic residue codes and hyperelliptic curves

    Get PDF
    A long standing problem has been to develop "good" binary linear codes to be used for error-correction. This paper investigates in some detail an attack on this problem using a connection between quadratic residue codes and hyperelliptic curves. One question which coding theory is used to attack is: Does there exist a c<2 such that, for all sufficiently large pp and all subsets S of GF(p), we have |X_S(GF(p))| < cp?Comment: 18 pages, no figure

    Families of sequences with good family complexity and cross-correlation measure

    Full text link
    In this paper we study pseudorandomness of a family of sequences in terms of two measures, the family complexity (ff-complexity) and the cross-correlation measure of order β„“\ell. We consider sequences not only on binary alphabet but also on kk-symbols (kk-ary) alphabet. We first generalize some known methods on construction of the family of binary pseudorandom sequences. We prove a bound on the ff-complexity of a large family of binary sequences of Legendre-symbols of certain irreducible polynomials. We show that this family as well as its dual family have both a large family complexity and a small cross-correlation measure up to a rather large order. Next, we present another family of binary sequences having high ff-complexity and low cross-correlation measure. Then we extend the results to the family of sequences on kk-symbols alphabet.Comment: 13 pages. Comments are welcome

    Artin's primitive root conjecture -a survey -

    Get PDF
    This is an expanded version of a write-up of a talk given in the fall of 2000 in Oberwolfach. A large part of it is intended to be understandable by non-number theorists with a mathematical background. The talk covered some of the history, results and ideas connected with Artin's celebrated primitive root conjecture dating from 1927. In the update several new results established after 2000 are also discussed.Comment: 87 pages, 512 references, to appear in Integer

    Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold

    Get PDF
    In Chen-Cramer Crypto 2006 paper \cite{cc} algebraic geometric secret sharing schemes were proposed such that the "Fundamental Theorem in Information-Theoretically Secure Multiparty Computation" by Ben-Or, Goldwasser and Wigderson \cite{BGW88} and Chaum, Cr\'{e}peau and Damg{\aa}rd \cite{CCD88} can be established over constant-size base finite fields. These algebraic geometric secret sharing schemes defined by a curve of genus gg over a constant size finite field Fq{\bf F}_q is quasi-threshold in the following sense, any subset of u≀Tβˆ’1u \leq T-1 players (non qualified) has no information of the secret and any subset of uβ‰₯T+2gu \geq T+2g players (qualified) can reconstruct the secret. It is natural to ask that how far from the threshold these quasi-threshold secret sharing schemes are? How many subsets of u∈[T,T+2gβˆ’1]u \in [T, T+2g-1] players can recover the secret or have no information of the secret? In this paper it is proved that almost all subsets of u∈[T,T+gβˆ’1]u \in [T,T+g-1] players have no information of the secret and almost all subsets of u∈[T+g,T+2gβˆ’1]u \in [T+g,T+2g-1] players can reconstruct the secret when the size qq goes to the infinity and the genus satisfies lim⁑gq=0\lim \frac{g}{\sqrt{q}}=0. Then algebraic geometric secret sharing schemes over large finite fields are asymptotically threshold in this case. We also analyze the case when the size qq of the base field is fixed and the genus goes to the infinity
    • …
    corecore