-
arXiv:2505.10068 [pdf, ps, other]
The Schur product of evaluation codes and its application to CSS-T quantum codes and private information retrieval
Abstract: In this work, we study the componentwise (Schur) product of monomial-Cartesian codes by exploiting its correspondence with the Minkowski sum of their defining exponent sets. We show that $ J$-affine variety codes are well suited for such products, generalizing earlier results for cyclic, Reed-Muller, hyperbolic, and toric codes. Using this correspondence, we construct CSS-T quantum codes from weig… ▽ More
Submitted 15 May, 2025; originally announced May 2025.
-
arXiv:2408.02916 [pdf, ps, other]
Binary Triorthogonal and CSS-T Codes for Quantum Error Correction
Abstract: In this paper, we study binary triorthogonal codes and their relation to CSS-T quantum codes. We characterize the binary triorthogonal codes that are minimal or maximal with respect to the CSS-T poset, and we also study how to derive new triorthogonal matrices from existing ones. Given a binary triorthogonal matrix, we characterize which of its equivalent matrices are also triorthogonal. As a cons… ▽ More
Submitted 5 August, 2024; originally announced August 2024.
-
arXiv:2312.17518 [pdf, ps, other]
An algebraic characterization of binary CSS-T codes and cyclic CSS-T codes for quantum fault tolerance
Abstract: CSS-T codes were recently introduced as quantum error-correcting codes that respect a transversal gate. A CSS-T code depends on a CSS-T pair, which is a pair of binary codes $(C_1, C_2)$ such that $C_1$ contains $C_2$, $C_2$ is even, and the shortening of the dual of $C_1$ with respect to the support of each codeword of $C_2$ is self-dual. In this paper, we give new conditions to guarantee that a… ▽ More
Submitted 6 June, 2024; v1 submitted 29 December, 2023; originally announced December 2023.
MSC Class: 94B05 (Primary); 81P70; 11T71; 14G50 (Secondary)
Journal ref: Quantum Inf Process 23, 230 (2024)
-
arXiv:2312.15308 [pdf, ps, other]
Quantum error-correcting codes from projective Reed-Muller codes and their hull variation problem
Abstract: Long quantum codes using projective Reed-Muller codes are constructed. Projective Reed-Muller codes are evaluation codes obtained by evaluating homogeneous polynomials at the projective space. We obtain asymmetric and symmetric quantum codes by using the CSS construction and the Hermitian construction, respectively. We provide entanglement-assisted quantum error-correcting codes from projective Re… ▽ More
Submitted 28 February, 2025; v1 submitted 23 December, 2023; originally announced December 2023.
MSC Class: 81P70 (Primary) 94B05; 13P25 (Secondary)
-
arXiv:2312.13921 [pdf, ps, other]
Hulls of projective Reed-Muller codes over the projective plane
Abstract: By solving a problem regarding polynomials in a quotient ring, we obtain the relative hull and the Hermitian hull of projective Reed-Muller codes over the projective plane. The dimension of the hull determines the minimum number of maximally entangled pairs required for the corresponding entanglement-assisted quantum error-correcting code. Hence, by computing the dimension of the hull we now have… ▽ More
Submitted 19 June, 2024; v1 submitted 21 December, 2023; originally announced December 2023.
MSC Class: 81P70 (Primary) 94B05; 13P25 (Secondary)
-
Single Server Private Information Retrieval Protocols With Codes Over Rings
Abstract: A Private Information Retrieval (PIR) protocol based on coding theory for a single server is proposed. It provides computational security against linear algebra attacks, addressing the main drawback of previous PIR proposals based on coding theory. The approach involves two types of codes each one over a different ring, an inner non-free linear code that will be used as a distinguisher of some ele… ▽ More
Submitted 29 December, 2023; v1 submitted 8 November, 2023; originally announced November 2023.
-
arXiv:2310.15703 [pdf, ps, other]
Locally recoverable codes from the matrix-product construction
Abstract: Matrix-product constructions giving rise to locally recoverable codes are considered, both the classical $r$ and $(r,δ)$ localities. We study the recovery advantages offered by the constituent codes and also by the defining matrices of the matrix product codes. Finally, we extend these methods to a particular variation of matrix-product codes and quasi-cyclic codes. Singleton-optimal locally recov… ▽ More
Submitted 24 October, 2023; originally announced October 2023.
-
arXiv:2307.09298 [pdf, ps, other]
Subfield subcodes of projective Reed-Muller codes
Abstract: Explicit bases for the subfield subcodes of projective Reed-Muller codes over the projective plane and their duals are obtained. In particular, we provide a formula for the dimension of these codes. For the general case over the projective space, we generalize the necessary tools to deal with this case as well: we obtain a universal Gröbner basis for the vanishing ideal of the set of standard repr… ▽ More
Submitted 20 December, 2023; v1 submitted 18 July, 2023; originally announced July 2023.
MSC Class: 11T71 (Primary) 94B05; 14G50; 13P25 (Secondary)
-
arXiv:2304.08121 [pdf, ps, other]
Entanglement-assisted quantum error-correcting codes from subfield subcodes of projective Reed-Solomon codes
Abstract: We study the subfield subcodes of projective Reed-Solomon codes and their duals: we provide bases for these codes and estimate their parameters. With this knowledge, we can construct symmetric and asymmetric entanglement-assisted quantum error-correcting codes, which in many cases have new or better parameters than the ones available in the literature.
Submitted 23 October, 2023; v1 submitted 17 April, 2023; originally announced April 2023.
MSC Class: 81P70 (Primary) 94B05; 13P25 (Secondary)
-
arXiv:2212.14521 [pdf, ps, other]
Relative hulls and quantum codes
Abstract: Given two $q$-ary codes $C_1$ and $C_2$, the relative hull of $C_1$ with respect to $C_2$ is the intersection $C_1\cap C_2^\perp$. We prove that when $q>2$, the relative hull dimension can be repeatedly reduced by one, down to a certain bound, by replacing either of the two codes with an equivalent one. The reduction of the relative hull dimension applies to hulls taken with respect to the $e$-Gal… ▽ More
Submitted 23 December, 2023; v1 submitted 29 December, 2022; originally announced December 2022.
MSC Class: 94B05; 81P70; 11T71; 14G50
-
arXiv:2208.06187 [pdf, ps, other]
Stabilizer quantum codes defined by trace-depending polynomials
Abstract: Quantum error-correcting codes with good parameters can be constructed by evaluating polynomials at the roots of the polynomial trace. In this paper, we propose to evaluate polynomials at the roots of trace-depending polynomials (given by a constant plus the trace of a polynomial) and show that this procedure gives rise to stabilizer quantum error-correcting codes with a wider range of lengths tha… ▽ More
Submitted 21 August, 2022; v1 submitted 12 August, 2022; originally announced August 2022.
Journal ref: Finite Fields Appl., 87:102138, 2023
-
arXiv:2202.04683 [pdf, ps, other]
Saturation and vanishing ideals
Abstract: We consider an homogeneous ideal $I$ in the polynomial ring $S=K[x_1,\dots,$ $x_m]$ over a finite field $K=\mathbb{F}_q$ and the finite set of projective rational points $\mathbb{X}$ that it defines in the projective space $\mathbb{P}^{m-1}$. We concern ourselves with the problem of computing the vanishing ideal $I(\mathbb{X})$. This is usually done by adding the equations of the projective space… ▽ More
Submitted 15 July, 2022; v1 submitted 9 February, 2022; originally announced February 2022.
-
arXiv:2111.09060 [pdf, ps, other]
Private Information Retrieval Schemes Using Cyclic Codes
Abstract: A Private Information Retrieval (PIR) scheme allows users to retrieve data from a database without disclosing to the server information about the identity of the data retrieved. A coded storage in a distributed storage system with colluding servers is considered in this work, namely the approach in [$t$-private information retrieval schemes using transitive codes, IEEE Trans. Inform. Theory, vol.… ▽ More
Submitted 18 July, 2022; v1 submitted 17 November, 2021; originally announced November 2021.
-
An Algorithmic Approach to Entanglement-Assisted Quantum Error-Correcting Codes from the Hermitian Curve
Abstract: We study entanglement-assisted quantum error-correcting codes (EAQECCs) arising from classical one-point algebraic geometry codes from the Hermitian curve with respect to the Hermitian inner product. Their only unknown parameter is $c$, the number of required maximally entangled quantum states since the Hermitian dual of an AG code is unknown. In this article, we present an efficient algorithmic a… ▽ More
Submitted 11 January, 2022; v1 submitted 5 May, 2021; originally announced May 2021.
Comments: 23 pages
MSC Class: 94B65; 81P70; 94B05
-
arXiv:2007.01113 [pdf, ps, other]
Entanglement-Assisted Quantum Error Correcting Codes From RS Codes and BCH Codes with Extension Degree 2
Abstract: Entanglement-assisted quantum error correcting codes (EAQECCs) constructed from Reed-Solomon codes and BCH codes are considered in this work. It is provided a complete and explicit formula for the parameters of EAQECCs coming from any Reed-Solomon code, for the Hermitian metric, and from any BCH code with extension degree $2$ and consecutive cyclotomic cosets, for both the Euclidean and the Hermit… ▽ More
Submitted 10 April, 2021; v1 submitted 2 July, 2020; originally announced July 2020.
MSC Class: 81P70 (Primary) 94B05 (Secondary)
Journal ref: Quantum Information Processing 20, 158 (2021)
-
arXiv:1911.10031 [pdf, ps, other]
Asymmetric entanglement-assisted quantum error-correcting codes and BCH codes
Abstract: The concept of asymmetric entanglement-assisted quantum error-correcting code (asymmetric EAQECC) is introduced in this article. Codes of this type take advantage of the asymmetry in quantum errors since phase-shift errors are more probable than qudit-flip errors. Moreover, they use pre-shared entanglement between encoder and decoder to simplify the theory of quantum error correction and increase… ▽ More
Submitted 14 January, 2020; v1 submitted 22 November, 2019; originally announced November 2019.
MSC Class: 81P70 (Primary); 94B65; 94B05 (Secondary)
Journal ref: IEEE Access, vol.8, pp.18571-18579, January 2020
-
High dimensional affine codes whose square has a designed minimum distance
Abstract: Given a linear code $\mathcal{C}$, its square code $\mathcal{C}^{(2)}$ is the span of all component-wise products of two elements of $\mathcal{C}$. Motivated by applications in multi-party computation, our purpose with this work is to answer the following question: which families of affine variety codes have simultaneously high dimension $k(\mathcal{C})$ and high minimum distance of… ▽ More
Submitted 30 July, 2019; originally announced July 2019.
-
arXiv:1903.05494 [pdf, ps, other]
Squares of Matrix-product Codes
Abstract: The component-wise or Schur product $C*C'$ of two linear error correcting codes $C$ and $C'$ over certain finite field is the linear code spanned by all component-wise products of a codeword in $C$ with a codeword in $C'$. When $C=C'$, we call the product the square of $C$ and denote it $C^{*2}$. Motivated by several applications of squares of linear codes in the area of cryptography, in this pape… ▽ More
Submitted 28 October, 2019; v1 submitted 13 March, 2019; originally announced March 2019.
Journal ref: Finite Fields and Their Applications 62 (2020) 101606
-
arXiv:1812.05312 [pdf, ps, other]
Entanglement-assisted quantum error-correcting codes over arbitrary finite fields
Abstract: We prove that the known formulae for computing the optimal number of maximally entangled pairs required for entanglement-assisted quantum error-correcting codes (EAQECCs) over the binary field hold for codes over arbitrary finite fields as well. We also give a Gilbert-Varshamov bound for EAQECCs and constructions of EAQECCs coming from punctured self-orthogonal linear codes which are valid for any… ▽ More
Submitted 27 January, 2021; v1 submitted 13 December, 2018; originally announced December 2018.
MSC Class: 81P70; 94B65; 94B05
Journal ref: Quantum Information Processing, vol.18, article ID 116, April 2019
-
arXiv:1710.02160 [pdf, ps, other]
Classical and Quantum Evaluation Codes at the Trace Roots
Abstract: We introduce a new class of evaluation linear codes by evaluating polynomials at the roots of a suitable trace function. We give conditions for self-orthogonality of these codes and their subfield-subcodes with respect to the Hermitian inner product. They allow us to construct stabilizer quantum codes over several finite fields which substantially improve the codes in the literature and that are r… ▽ More
Submitted 2 November, 2017; v1 submitted 5 October, 2017; originally announced October 2017.
Journal ref: IEEE Transactions on Information Theory. Volume 65, Issue 4, pages 2593-2602 (2019)
-
arXiv:1710.00196 [pdf, ps, other]
New binary and ternary LCD codes
Abstract: LCD codes are linear codes with important cryptographic applications. Recently, a method has been presented to transform any linear code into an LCD code with the same parameters when it is supported on a finite field with cardinality larger than 3. Hence, the study of LCD codes is mainly open for binary and ternary fields. Subfield-subcodes of $J$-affine variety codes are a generalization of BCH… ▽ More
Submitted 23 October, 2017; v1 submitted 30 September, 2017; originally announced October 2017.
Journal ref: IEEE Transactions on Information Theory. Volume 65, Issue 2, pages 1008-1016 (2019)
-
arXiv:1610.07891 [pdf, ps, other]
On the distance of stabilizer quantum codes from $J$-affine variety codes
Abstract: Self-orthogonal $J$-affine variety codes have been successfully used to obtain quantum stabilizer codes with excellent parameters. In a previous paper we gave formulae for the dimension of this family of quantum codes, but no bound for the minimum distance was given. In this work, we show how to derive quantum stabilizer codes with designed minimum distance from $J$-affine variety codes and their… ▽ More
Submitted 26 October, 2016; v1 submitted 25 October, 2016; originally announced October 2016.
Journal ref: Quantum Information Processing. Volume 16, Issue 4, 16:111 (2017)
-
arXiv:1610.06363 [pdf, ps, other]
Improved constructions of nested code pairs
Abstract: Two new constructions of linear code pairs $C_2 \subset C_1$ are given for which the codimension and the relative minimum distances $M_1(C_1,C_2)$, $M_1(C_2^\perp,C_1^\perp)$ are good. By this we mean that for any two out of the three parameters the third parameter of the constructed code pair is large. Such pairs of nested codes are indispensable for the determination of good linear ramp secret s… ▽ More
Submitted 18 July, 2017; v1 submitted 20 October, 2016; originally announced October 2016.
Comments: 36 pages
MSC Class: 11T71; 14G50; 94B27; 94B65;
Journal ref: IEEE Transactions on Information Theory. Volume 64, Issue 4, pages 2444-2459 (2018)
-
Refined analysis of RGHWs of code pairs coming from Garcia-Stichtenoth's second tower
Abstract: Asymptotically good sequences of ramp secret sharing schemes were given in [Asymptotically good ramp secret sharing schemes, arXiv:1502.05507] by using one-point algebraic geometric codes defined from asymptotically good towers of function fields. Their security is given by the relative generalized Hamming weights of the corresponding codes. In this paper we demonstrate how to obtain refined infor… ▽ More
Submitted 19 November, 2015; originally announced November 2015.
-
arXiv:1503.00879 [pdf, ps, other]
Stabilizer quantum codes from $J$-affine variety codes and a new Steane-like enlargement
Abstract: New stabilizer codes with parameters better than the ones available in the literature are provided in this work, in particular quantum codes with parameters $[[127,63, \geq 12]]_2$ and $[[63,45, \geq 6]]_4$ that are records. These codes are constructed with a new generalization of the Steane's enlargement procedure and by considering orthogonal subfield-subcodes --with respect to the Euclidean and… ▽ More
Submitted 24 June, 2015; v1 submitted 3 March, 2015; originally announced March 2015.
Journal ref: Quantum Information Processing. September 2015, Volume 14, Issue 9, pp 3211-3231
-
arXiv:1502.05507 [pdf, ps, other]
On asymptotically good ramp secret sharing schemes
Abstract: Asymptotically good sequences of linear ramp secret sharing schemes have been intensively studied by Cramer et al. in terms of sequences of pairs of nested algebraic geometric codes. In those works the focus is on full privacy and full reconstruction. In this paper we analyze additional parameters describing the asymptotic behavior of partial information leakage and possibly also partial reconstru… ▽ More
Submitted 2 February, 2017; v1 submitted 19 February, 2015; originally announced February 2015.
MSC Class: 94A62; 94B27; 94B65
Journal ref: IEICE Trans. Fundamentals. vol. E100-A, no. 12, pages 2699-2708 (2017)
-
arXiv:1406.0650 [pdf, ps, other]
New Quantum Codes from Evaluation and Matrix-Product Codes
Abstract: Stabilizer codes obtained via CSS code construction and Steane's enlargement of subfield-subcodes and matrix-product codes coming from generalized Reed-Muller, hyperbolic and affine variety codes are studied. Stabilizer codes with good quantum parameters are supplied, in particular, some binary codes of lengths 127 and 128 improve the parameters of the codes in http://www.codetables.de. Moreover,… ▽ More
Submitted 16 July, 2015; v1 submitted 3 June, 2014; originally announced June 2014.
Journal ref: Finite Fields and Their Applications. 2015, Volume 36, pp 98-120
-
Fulcrum Network Codes: A Code for Fluid Allocation of Complexity
Abstract: This paper proposes Fulcrum network codes, a network coding framework that achieves three seemingly conflicting objectives: (i) to reduce the coding coefficient overhead to almost n bits per packet in a generation of n packets; (ii) to operate the network using only GF(2) operations at intermediate nodes if necessary, dramatically reducing complexity in the network; (iii) to deliver an end-to-end… ▽ More
Submitted 18 November, 2015; v1 submitted 26 April, 2014; originally announced April 2014.
Comments: 30 pages, 12 figures, Submitted to the IEEE Transactions on Communications
-
arXiv:1403.7985 [pdf, ps, other]
Relative generalized Hamming weights of one-point algebraic geometric codes
Abstract: Security of linear ramp secret sharing schemes can be characterized by the relative generalized Hamming weights of the involved codes. In this paper we elaborate on the implication of these parameters and we devise a method to estimate their value for general one-point algebraic geometric codes. As it is demonstrated, for Hermitian codes our bound is often tight. Furthermore, for these codes the r… ▽ More
Submitted 24 July, 2014; v1 submitted 31 March, 2014; originally announced March 2014.
Journal ref: IEEE Transactions on Information Theory, vol. 60, no. 10, pp. 5938-5949, October 2014
-
arXiv:1210.6722 [pdf, ps, other]
Feng-Rao decoding of primary codes
Abstract: We show that the Feng-Rao bound for dual codes and a similar bound by Andersen and Geil [H.E. Andersen and O. Geil, Evaluation codes from order domain theory, Finite Fields Appl., 14 (2008), pp. 92-123] for primary codes are consequences of each other. This implies that the Feng-Rao decoding algorithm can be applied to decode primary codes up to half their designed minimum distance. The technique… ▽ More
Submitted 31 October, 2012; v1 submitted 24 October, 2012; originally announced October 2012.
Comments: elsarticle.cls, 23 pages, no figure. Version 3 added citations to the works by I.M. Duursma and R. Pellikaan
MSC Class: 94B65 (Primary) 94B35 (Secondary)
Journal ref: Finite Fields and Their Applications, vol. 23, pp. 35-52, September 2013
-
arXiv:1203.6129 [pdf, ps, other]
Generalization of the Lee-O'Sullivan List Decoding for One-Point AG Codes
Abstract: We generalize the list decoding algorithm for Hermitian codes proposed by Lee and O'Sullivan based on Gröbner bases to general one-point AG codes, under an assumption weaker than one used by Beelen and Brander. Our generalization enables us to apply the fast algorithm to compute a Gröbner basis of a module proposed by Lee and O'Sullivan, which was not possible in another generalization by Lax.
Submitted 7 March, 2013; v1 submitted 27 March, 2012; originally announced March 2012.
Comments: article.cls, 14 pages, no figure. The order of authors was changed. To appear in Journal of Symbolic Computation. This is an extended journal paper version of our earlier conference paper arXiv:1201.6248
MSC Class: 94B35 (Primary) 13P10; 94B27; 14G50 (Secondary) ACM Class: E.4; F.2.1; I.1.2; I.1.4
Journal ref: Journal of Symbolic Computation, vol. 55, pp. 1-9, August 2013
-
arXiv:1203.6127 [pdf, ps, other]
List Decoding Algorithm based on Voting in Groebner Bases for General One-Point AG Codes
Abstract: We generalize the unique decoding algorithm for one-point AG codes over the Miura-Kamiya Cab curves proposed by Lee, Bras-Amorós and O'Sullivan (2012) to general one-point AG codes, without any assumption. We also extend their unique decoding algorithm to list decoding, modify it so that it can be used with the Feng-Rao improved code construction, prove equality between its error correcting capabi… ▽ More
Submitted 18 February, 2016; v1 submitted 27 March, 2012; originally announced March 2012.
Comments: Accepted for publication in J. Symbolic Computation. LaTeX2e article.cls, 42 pages, 4 tables, no figures. Ver. 6 added an illustrative example of the algorithm execution
MSC Class: 94B35 (Primary); 13P10; 94B27; 14G50 (Secondary) ACM Class: E.4; F.2.1; I.1.2; I.1.4
Journal ref: J. Symbolic Computation, vol.79, pp.384-410, 2017
-
arXiv:1202.1238 [pdf, ps, other]
List decoding of repeated codes
Abstract: Assuming that we have a soft-decision list decoding algorithm of a linear code, a new hard-decision list decoding algorithm of its repeated code is proposed in this article. Although repeated codes are not used for encoding data, due to their parameters, we show that they have a good performance with this algorithm. We compare, by computer simulations, our algorithm for the repeated code of a Reed… ▽ More
Submitted 12 April, 2013; v1 submitted 6 February, 2012; originally announced February 2012.
Journal ref: Applicable Algebra in Engineering, Communication and Computing,August 2013, Volume 24, Issue 3-4, pp 237-253
-
arXiv:1202.0453 [pdf, ps, other]
Bounding the number of points on a curve using a generalization of Weierstrass semigroups
Abstract: In this article we use techniques from coding theory to derive upper bounds for the number of rational places of the function field of an algebraic curve defined over a finite field. The used techniques yield upper bounds if the (generalized) Weierstrass semigroup [P. Beelen, N. Tutaş: A generalization of the Weierstrass semigroup, J. Pure Appl. Algebra, 207(2), 2006] for an $n$-tuple of places is… ▽ More
Submitted 2 February, 2012; originally announced February 2012.
-
arXiv:1201.6397 [pdf, ps, other]
List Decoding of Matrix-Product Codes from nested codes: an application to Quasi-Cyclic codes
Abstract: A list decoding algorithm for matrix-product codes is provided when $C_1,..., C_s$ are nested linear codes and $A$ is a non-singular by columns matrix. We estimate the probability of getting more than one codeword as output when the constituent codes are Reed-Solomon codes. We extend this list decoding algorithm for matrix-product codes with polynomial units, which are quasi-cyclic codes. Furtherm… ▽ More
Submitted 30 January, 2012; originally announced January 2012.
MSC Class: 94B05 (Primary) 94B35 (Secondary)
Journal ref: Advances in Mathematics of Communications, Volume 6, Issue 3, pages 259-272 (2012)
-
arXiv:1201.6248 [pdf, ps, other]
List Decoding Algorithms based on Groebner Bases for General One-Point AG Codes
Abstract: We generalize the list decoding algorithm for Hermitian codes proposed by Lee and O'Sullivan based on Gröbner bases to general one-point AG codes, under an assumption weaker than one used by Beelen and Brander. By using the same principle, we also generalize the unique decoding algorithm for one-point AG codes over the Miura-Kamiya $C_{ab}$ curves proposed by Lee, Bras-Amorós and O'Sullivan to gen… ▽ More
Submitted 23 April, 2012; v1 submitted 30 January, 2012; originally announced January 2012.
Comments: IEEEtran.cls, 5 pages, no figure. To appear in Proc. 2012 IEEE International Symposium on Information Theory, July 1-6, 2012, Boston, MA, USA. Version 4 corrected wrong description of the work by Lee, Bras-Amorós and O'Sullivan, and added four references
MSC Class: 94B35 (Primary) 13P10; 94B27; 14G50 (Secondary) ACM Class: E.4; F.2.1; I.1.2; I.1.4
Journal ref: Proc. 2012 IEEE International Symposium on Information Theory, July 1-6, 2012, Boston, MA, USA, pages 86-90
-
arXiv:1107.1529 [pdf, ps, other]
Decoding of Matrix-Product Codes
Abstract: We propose a decoding algorithm for the $(u\mid u+v)$-construction that decodes up to half of the minimum distance of the linear code. We extend this algorithm for a class of matrix-product codes in two different ways. In some cases, one can decode beyond the error correction capability of the code.
Submitted 12 April, 2013; v1 submitted 7 July, 2011; originally announced July 2011.
MSC Class: 94B05; 94B35
Journal ref: Journal of Algebra and its Applications, Volume 12, Issue 4, Article ID 1250185, 15 pages (2013)
-
arXiv:1002.4759 [pdf, ps, other]
On the order bounds for one-point AG codes
Abstract: The order bound for the minimum distance of algebraic geometry codes was originally defined for the duals of one-point codes and later generalized for arbitrary algebraic geometry codes. Another bound of order type for the minimum distance of general linear codes, and for codes from order domains in particular, was given in [H. Andersen and O. Geil, Evaluation codes from order domain theory, Finit… ▽ More
Submitted 3 November, 2010; v1 submitted 25 February, 2010; originally announced February 2010.
MSC Class: 94B27 (Primary) 14G50; 14H55 (Secondary)
-
arXiv:0912.1790 [pdf, ps, other]
A Note on the Injection Distance
Abstract: Koetter and Kschischang showed in [R. Koetter and F.R. Kschischang, "Coding for Errors and Erasures in Random Network Coding," IEEE Trans. Inform. Theory, {54(8), 2008] that the network coding counterpart of Gabidulin codes performs asymptotically optimal with respect to the subspace distance. Recently, Silva and Kschischang introduced in [D. Silva and F.R. Kschischang, "On Metrics for Error Cor… ▽ More
Submitted 9 December, 2009; originally announced December 2009.
-
arXiv:0903.4826 [pdf, ps, other]
New Linear Codes from Matrix-Product Codes with Polynomial Units
Abstract: A new construction of codes from old ones is considered, it is an extension of the matrix-product construction. Several linear codes that improve the parameters of the known ones are presented.
Submitted 12 May, 2010; v1 submitted 27 March, 2009; originally announced March 2009.
MSC Class: 68P30
Journal ref: Adv. Math. Commun. 4 (2010), no. 3, 363-367
-
arXiv:0804.3507 [pdf, ps, other]
Sixteen New Linear Codes With Plotkin Sum
Abstract: Sixteen new linear codes are presented: three of them improve the lower bounds on the minimum distance for a linear code and the rest are an explicit construction of unknown codes attaining the lower bounds on the minimum distance. They are constructed using the Plotkin sum of two linear codes, also called $(u|u+v)$ construction. The computations have been achieved using an exhaustiv search.
Submitted 22 April, 2008; originally announced April 2008.
Comments: Submitted to IEEE Trans. Information Theory
-
arXiv:cs/0611010 [pdf, ps, other]
On the structure of generalized toric codes
Abstract: Toric codes are obtained by evaluating rational functions of a nonsingular toric variety at the algebraic torus. One can extend toric codes to the so called generalized toric codes. This extension consists on evaluating elements of an arbitrary polynomial algebra at the algebraic torus instead of a linear combination of monomials whose exponents are rational points of a convex polytope. We study… ▽ More
Submitted 2 November, 2006; originally announced November 2006.
Journal ref: The final version can be found in: Journal of Symbolic Computation. Volume 44, Issue 5, May 2009, Pages 499-506