Convolutional goppa codes (CGC) were defined in Appl. Algebra Eng. Comm. Comput., vol. 15, pp. 51-61, 2004 and IEEE Trans. Inf. Theory, vol. 52, 340-344, 2006. In this paper, we prove that every convolutional code is ...
详细信息
Convolutional goppa codes (CGC) were defined in Appl. Algebra Eng. Comm. Comput., vol. 15, pp. 51-61, 2004 and IEEE Trans. Inf. Theory, vol. 52, 340-344, 2006. In this paper, we prove that every convolutional code is a CGC defined over a smooth curve over F-q(z) and we give an explicit construction of convolutional codes as CGC over the projective line P-Fq(z)(1). We characterize which convolutional codes are defined by a complete linear system over curves of genus 0, 1, and over hyperelliptic curves. We apply these results to provide detailed constructions of some linear block codes as goppa codes.
We construct goppa type sum-rank codes over Fq\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{up...
详细信息
We construct goppa type sum-rank codes over Fq\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathbb {F}_q$$\end{document} with the matrix size nxn\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n \times n$$\end{document}, directly from goppa codes or extended goppa codes over Fqn\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\mathbb {F}_{q<^>n}$$\end{document} in the Hamming metric. Lower bounds on dimensions and minimum sum-rank distances of goppa type sum-rank codes are proved. The goppa type sum-rank codes offer great flexibility in block length and dimension while maintaining strong error-correcting capability compared to the best known sum-rank codes. Furthermore, we construct numerous distance-optimal binary sum-rank codes with variable block length and minimum sum-rank distance four.
This paper characterizes goppa codes of certain maximal curves over finite fields defined by equations of the form yn = xm + x. We investigate algebraic geometric and quantum stabilizer codes associated with these max...
详细信息
This paper characterizes goppa codes of certain maximal curves over finite fields defined by equations of the form yn = xm + x. We investigate algebraic geometric and quantum stabilizer codes associated with these maximal curves and propose modifications to improve their parameters. The theoretical analysis is complemented by extensive simulation results, which validate the performance of these codes under various error rates. We provide concrete examples of the constructed codes, comparing them with known results to highlight their strengths and trade-offs. The simulation data, presented through detailed graphs and tables, offers insights into the practical behavior of these codes in noisy environments. Our findings demonstrate that while the constructed codes may not always achieve optimal minimum distances, they offer systematic construction methods and interesting parameter trade-offs that could be valuable in specific applications or for further theoretical study.
A class of goppa codes is constructed by using Artin-Schreier function fields, of which thenumber of prime divisors of degree olle is obtained for some cases, and their minimum distance,duallty and selfeduality are di...
详细信息
A class of goppa codes is constructed by using Artin-Schreier function fields, of which thenumber of prime divisors of degree olle is obtained for some cases, and their minimum distance,duallty and selfeduality are discussed. At laSt the sublield subcode of Artin-Schreier code isinvestigated, the true dimension under certain conditions is given and the covering radius andminimum distance are estimated.
We derive the Wu list-decoding algorithm for generalized Reed-Solomon (GRS) codes by using Grobner bases over modules and the Euclidean algorithm as the initial algorithm instead of the Berlekamp-Massey algorithm. We ...
详细信息
We derive the Wu list-decoding algorithm for generalized Reed-Solomon (GRS) codes by using Grobner bases over modules and the Euclidean algorithm as the initial algorithm instead of the Berlekamp-Massey algorithm. We present a novel method for constructing the interpolation polynomial fast. We give a new application of the Wu list decoder by decoding irreducible binary goppa codes up to the binary Johnson radius. Finally, we point out a connection between the governing equations of the Wu algorithm and the Guruswami-Sudan algorithm, immediately leading to equality in the decoding range and a duality in the choice of parameters needed for decoding, both in the case of GRS codes and in the case of goppa codes.
The McEliece cryptosystem is defined using a goppa code, and decoding the goppa code is a crucial step of its decryption. Patterson's decoding algorithm is the best known algorithm for decoding goppa codes. Curren...
详细信息
The McEliece cryptosystem is defined using a goppa code, and decoding the goppa code is a crucial step of its decryption. Patterson's decoding algorithm is the best known algorithm for decoding goppa codes. Currently, the most efficient implementation of Patterson's algorithm uses a precomputation. In this paper, we modify Patterson's decoding algorithm so that one can remove the precomputation part while sustaining the best efficiency. Precomputations yield additional storage requirement to store the precomputed value which increases as the security level increases in McEliece cryptosystem. In the original decoding algorithm of Patterson, computing square root in a quotient field of polynomial ring over a finite field is necessary. In our modification, the computations are involved only in the arithmetics of polynomial ring over a finite field, not in the quotient field. This achieves better efficiency because one can remove polynomial reductions in the computations of quotient field.
In this correspondence, we consider the minimum cyclotomic coset representatives and derive some of their properties. The results allow more precise estimates of the dimension of Bose-Chaudhuri-Hocquenghem (BCH) and c...
详细信息
In this correspondence, we consider the minimum cyclotomic coset representatives and derive some of their properties. The results allow more precise estimates of the dimension of Bose-Chaudhuri-Hocquenghem (BCH) and classical goppa codes of a given designed minimum distance, and more precise estimates of the true designed distance of BCH codes and the minimum distance of classical goppa codes.
We obtain here a necessary and sufficient condition for a certain class of binary goppa code to be quasi-cyclic. We also give another sufficient condition which is easier to check. We define a class of quasi-cyclic Go...
详细信息
We obtain here a necessary and sufficient condition for a certain class of binary goppa code to be quasi-cyclic. We also give another sufficient condition which is easier to check. We define a class of quasi-cyclic goppa codes. We find the true dimension for a part of those quasi-cyclic codes. and also a class of extended quasi-cyclic codes the minimum distance of which is equal to the designed distance.
In this paper, we consider the goppa codes, their decoding algorithms, their application in practice, and also the special properties of using the Patterson algorithm in the case of its use for decoding separable bina...
详细信息
ISBN:
(纸本)9781728122885
In this paper, we consider the goppa codes, their decoding algorithms, their application in practice, and also the special properties of using the Patterson algorithm in the case of its use for decoding separable binary goppa codes.
Most public-key cryptosystems frequently implemented have been proven secure on the basis of the presumed hardness of two mathematical problems: factoring the product of two large primes (FP) and computing discrete lo...
详细信息
ISBN:
(纸本)9783642254048
Most public-key cryptosystems frequently implemented have been proven secure on the basis of the presumed hardness of two mathematical problems: factoring the product of two large primes (FP) and computing discrete logarithms (DLP). At present, both problems are believed to be computationally infeasible with an ordinary computer. However, a quantum-computer having the ability to perform computations on a few thousand qbits could solve both problems using Shor's algorithm [23]. Although a quantum computer of this dimension has not been reported, development and cryptanalysis of alternative public-key cryptosystems seem suitable. To achieve acceptance and attention in practice, they have to be implemented efficiently. Furthermore, the implementations have to perform fast while keeping memory requirements low for security levels comparable to conventional schemes. The McEliece encryption and decryption do not require computationally expensive multiple precision arithmetic. Hence, it is predestined for an implementation on embedded devices. The major disadvantage of the McEliece public-key cryptosystem(PKC) is its very large public key of several hundred thousands bits. For this reason, the McEliece PKC has achieved little attention in the practice. Another disadvantage of the McEliece scheme, like many other schemes, is that it is not semantically secure. The quasi-dyadic McEliece variant proposed by Barreto and Misoczki addresses both problems. In this work we provide an implementation of this alternative public-key cryptosystem, which is semantically secure and uses a 40 times smaller public key and a five times smaller secret key compared to a previously published implementation [6].
暂无评论