973 research outputs found
Some new results on the self-dual [120,60,24] code
The existence of an extremal self-dual binary linear code of length 120 is a
long-standing open problem. We continue the investigation of its automorphism
group, proving that automorphisms of order 30 and 57 cannot occur. Supposing
the involutions acting fixed point freely, we show that also automorphisms of
order 8 cannot occur and the automorphism group is of order at most 120, with
further restrictions. Finally, we present some necessary conditions for the
existence of the code, based on shadow and design theory.Comment: 23 pages, 6 tables, to appear in Finite Fields and Their Application
Self-Dual Codes
Self-dual codes are important because many of the best codes known are of
this type and they have a rich mathematical theory. Topics covered in this
survey include codes over F_2, F_3, F_4, F_q, Z_4, Z_m, shadow codes, weight
enumerators, Gleason-Pierce theorem, invariant theory, Gleason theorems,
bounds, mass formulae, enumeration, extremal codes, open problems. There is a
comprehensive bibliography.Comment: 136 page
Symmetries of weight enumerators and applications to Reed-Muller codes
Gleason's 1970 theorem on weight enumerators of self-dual codes has played a
crucial role for research in coding theory during the last four decades. Plenty
of generalizations have been proved but, to our knowledge, they are all based
on the symmetries given by MacWilliams' identities. This paper is intended to
be a first step towards a more general investigation of symmetries of weight
enumerators. We list the possible groups of symmetries, dealing both with the
finite and infinite case, we develop a new algorithm to compute the group of
symmetries of a given weight enumerator and apply these methods to the family
of Reed-Muller codes, giving, in the binary case, an analogue of Gleason's
theorem for all parameters.Comment: 14 pages. Improved and extended version of arXiv:1511.00803. To
appear in Advances in Mathematics of Communication
Additive Asymmetric Quantum Codes
We present a general construction of asymmetric quantum codes based on
additive codes under the trace Hermitian inner product. Various families of
additive codes over \F_{4} are used in the construction of many asymmetric
quantum codes over \F_{4}.Comment: Accepted for publication March 2, 2011, IEEE Transactions on
Information Theory, to appea
A new class of codes for Boolean masking of cryptographic computations
We introduce a new class of rate one-half binary codes: {\bf complementary
information set codes.} A binary linear code of length and dimension
is called a complementary information set code (CIS code for short) if it has
two disjoint information sets. This class of codes contains self-dual codes as
a subclass. It is connected to graph correlation immune Boolean functions of
use in the security of hardware implementations of cryptographic primitives.
Such codes permit to improve the cost of masking cryptographic algorithms
against side channel attacks. In this paper we investigate this new class of
codes: we give optimal or best known CIS codes of length We derive
general constructions based on cyclic codes and on double circulant codes. We
derive a Varshamov-Gilbert bound for long CIS codes, and show that they can all
be classified in small lengths by the building up construction. Some
nonlinear permutations are constructed by using -codes, based on the
notion of dual distance of an unrestricted code.Comment: 19 pages. IEEE Trans. on Information Theory, to appea
- …