-
arXiv:2501.04766 [pdf, ps, other]
Decoding rank metric Reed-Muller codes
Abstract: In this article, we investigate the decoding of the rank metric Reed--Muller codes introduced by Augot, Couvreur, Lavauzelle and Neri in 2021. We propose a polynomial time algorithm that rests on the structure of Dickson matrices, works on any such code and corrects up to half the minimum distance.
Submitted 8 January, 2025; originally announced January 2025.
-
arXiv:2408.00183 [pdf, ps, other]
Freiman's $3k-4$ Theorem for Function Fields
Abstract: Freiman's $3k-4$ Theorem states that if a subset $A$ of $k$ integers has a Minkowski sum $A+A$ of size at most $3k-4$, then it must be contained in a short arithmetic progression. We prove a function field analogue that is also a generalisation: it states that if $K$ is a perfect field and if $S\supset K$ is a vector space of dimension $k$ inside an extension $F/K$ in which~$K$ is algebraically cl… ▽ More
Submitted 30 September, 2024; v1 submitted 31 July, 2024; originally announced August 2024.
-
arXiv:2305.01287 [pdf, ps, other]
An extension of Overbeck's attack with an application to cryptanalysis of Twisted Gabidulin-based schemes
Abstract: In this article, we discuss the decoding of Gabidulin and related codes from a cryptographic point of view, and we observe that these codes can be decoded solely from the knowledge of a generator matrix. We then extend and revisit Gibson and Overbeck attacks on the generalized GPT encryption scheme (instantiated with the Gabidulin code) for different ranks of the distortion matrix. We apply our at… ▽ More
Submitted 26 June, 2023; v1 submitted 2 May, 2023; originally announced May 2023.
-
Codes and modular curves
Abstract: These lecture notes have been written for a course at the Algebraic Coding Theory (ACT) summer school 2022 that took place in the university of Zurich. The objective of the course propose an in-depth presentation of the proof of one of the most striking results of coding theory: Tsfasman Vlăduţ Zink Theorem, which asserts that for some prime power $q$, there exist sequences of codes over… ▽ More
Submitted 9 January, 2023; originally announced January 2023.
Comments: Lecture notes for a course given at the Algebraic Coding Theory (ACT) summer school 2022
-
A proof of the Brill-Noether method from scratch
Abstract: In 1874 Brill and Noether designed a seminal geometric method for computing bases of Riemann-Roch spaces. From then, their method has led to several algorithms, some of them being implemented in computer algebra systems. The usual proofs often rely on abstract concepts of algebraic geometry and commutative algebra. In this paper we present a short self-contained and elementary proof that mostly ne… ▽ More
Submitted 23 September, 2024; v1 submitted 26 August, 2022; originally announced August 2022.
Comments: Final version
Journal ref: ACM Communications in Computer Algebra, Volume 57, Issue 4 (December 2023), 200 - 229
-
arXiv:2202.13990 [pdf, ps, other]
On Codes and Learning With Errors over Function Fields
Abstract: It is a long standing open problem to find search to decision reductions for structured versions of the decoding problem of linear codes. Such results in the lattice-based setting have been carried out using number fields: Polynomial-LWE, Ring-LWE, Module-LWE and so on. We propose a function field version of the LWE problem. This new framework leads to another point of view on structured codes, e.… ▽ More
Submitted 28 February, 2022; originally announced February 2022.
-
arXiv:2110.11282 [pdf, ps, other]
How arithmetic and geometry make error correcting codes better
Abstract: This note completes a talk given at the conference Curves over Finite Fields: past, present and future celebrating the publication the book {\em Rational Points on Curves over Finite Fields by J.-P. Serre and organised at Centro de ciencias de Benasque in june 2021. It discusses a part of the history of algebraic geometry codes together with some of their recent applications. A particular focus is… ▽ More
Submitted 1 April, 2022; v1 submitted 21 October, 2021; originally announced October 2021.
-
arXiv:2011.04611 [pdf, ps, other]
On the hardness of code equivalence problems in rank metric
Abstract: In the recent years, the notion of rank metric in the context of coding theory has known many interesting developments in terms of applications such as space time coding, network coding or public key cryptography. These applications raised the interest of the community for theoretical properties of this type of codes, such as the hardness of decoding in rank metric. Among classical problems associ… ▽ More
Submitted 10 June, 2021; v1 submitted 9 November, 2020; originally announced November 2020.
-
Algebraic geometry codes and some applications
Abstract: This article surveys the development of the theory of algebraic geometry codes since their discovery in the late 70's. We summarize the major results on various problems such as: asymptotic parameters, improved estimates on the minimum distance, and decoding algorithms. In addition, we present various modern applications of these codes such as public-key cryptography, algebraic complexity theory,… ▽ More
Submitted 2 September, 2020; originally announced September 2020.
Comments: Survey chapter to appear in "A Concise Encyclopedia of Coding Theory", W.C. Huffman, J.-L. Kim, and P. Sole' Eds., CRC Press
-
arXiv:2006.14489 [pdf, ps, other]
Rank-metric codes over arbitrary Galois extensions and rank analogues of Reed-Muller codes
Abstract: This paper extends the study of rank-metric codes in extension fields $\mathbb{L}$ equipped with an arbitrary Galois group $G = \mathrm{Gal}(\mathbb{L}/\mathbb{K})$. We propose a framework for studying these codes as subspaces of the group algebra $\mathbb{L}[G]$, and we relate this point of view with usual notions of rank-metric codes in $\mathbb{L}^N$ or in $\mathbb{K}^{N\times N}$, where… ▽ More
Submitted 25 June, 2020; originally announced June 2020.
Comments: 26 pages, 1 figure
-
Toward good families of codes from towers of surfaces
Abstract: We introduce in this article a new method to estimate the minimum distance of codes from algebraic surfaces. This lower bound is generic, i.e. can be applied to any surface, and turns out to be ``liftable'' under finite morphisms, paving the way toward the construction of good codes from towers of surfaces. In the same direction, we establish a criterion for a surface with a fixed finite set of cl… ▽ More
Submitted 8 June, 2020; v1 submitted 6 February, 2020; originally announced February 2020.
Comments: In memory of Gilles Lachaud. This article has been submitted with an appendix by Alexander Schmidt previously posted on ArXiv with reference arXiv:1702.03701
-
arXiv:1907.11658 [pdf, ps, other]
Power Error Locating Pairs
Abstract: We present a new decoding algorithm based on error locating pairs and correcting an amount of errors exceeding half the minimum distance. When applied to Reed--Solomon or algebraic geometry codes, the algorithm is a reformulation of the so--called {\em power decoding} algorithm. Asymptotically, it corrects errors up to Sudan's radius. In addition, this new framework applies to any code benefiting… ▽ More
Submitted 9 July, 2020; v1 submitted 26 July, 2019; originally announced July 2019.
MSC Class: 94B35; 94B27; 11T71; 14G50
-
arXiv:1903.09397 [pdf, ps, other]
Anticanonical codes from del Pezzo surfaces with Picard rank one
Abstract: We construct algebraic geometric codes from del Pezzo surfaces and focus on the ones having Picard rank one and the codes associated to the anticanonical class. We give explicit constructions of del Pezzo surfaces of degree 4, 5 and 6, compute the parameters of the associated anticanonical codes and study their isomorphisms arising from the automorphisms of the surface. We obtain codes with excell… ▽ More
Submitted 22 March, 2019; originally announced March 2019.
-
arXiv:1709.00087 [pdf, ps, other]
Towards a function field version of Freiman's Theorem
Abstract: We discuss a multiplicative counterpart of Freiman's $3k-4$ theorem in the context of a function field $F$ over an algebraically closed field $K$. Such a theorem would give a precise description of subspaces $S$, such that the space $S^2$ spanned by products of elements of $S$ satisfies $\dim S^2 \leq 3 \dim S-4$. We make a step in this direction by giving a complete characterisation of spaces… ▽ More
Submitted 17 July, 2018; v1 submitted 31 August, 2017; originally announced September 2017.
-
On tensor products of CSS Codes
Abstract: CSS codes are in one-to-one correspondance with length 3 chain complexes. The latter are naturally endowed with a tensor product $\otimes$ which induces a similar operation on the former. We investigate this operation, and in particular its behavior with regard to minimum distances. Given a CSS code $\mathcal{C}$, we give a criterion which provides a lower bound on the minimum distance of… ▽ More
Submitted 25 September, 2018; v1 submitted 22 December, 2015; originally announced December 2015.
Comments: 26 pages, v2: improved introduction and remarks added, v3: many typos corrected, to appear in Ann. Inst. Henri Poincaré D, Comb. Phys. Interact
MSC Class: 81P70 (secondary: 55U15; 94B99)
-
arXiv:1409.8220 [pdf, ps, other]
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes
Abstract: We give a polynomial time attack on the McEliece public key cryptosystem based on subcodes of algebraic geometry (AG) codes. The proposed attack reposes on the distinguishability of such codes from random codes using the Schur product. Wieschebrink treated the genus zero case a few years ago but his approach cannot be extent straightforwardly to other genera. We address this problem by introducing… ▽ More
Submitted 29 September, 2014; originally announced September 2014.
Journal ref: CIM-MS Series by Springer-Verlag (2014)
-
arXiv:1409.7544 [pdf, ps, other]
An upper bound on the number of rational points of arbitrary projective varieties over finite fields
Abstract: We give an upper bound on the number of rational points of an arbitrary Zariski closed subset of a projective space over a finite field. This bound depends only on the dimensions and degrees of the irreducible components and holds for very general varieties, even reducible and non equidimensional. As a consequence, we prove a conjecture of Ghorpade and Lachaud on the maximal number of rational poi… ▽ More
Submitted 2 November, 2015; v1 submitted 26 September, 2014; originally announced September 2014.
MSC Class: 14J20; 11C25
-
arXiv:1402.3264 [pdf, ps, other]
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions
Abstract: We present a polynomial time structural attack against the McEliece system based on Wild Goppa codes from a quadratic finite field extension. This attack uses the fact that such codes can be distinguished from random codes to compute some filtration, that is to say a family of nested subcodes which will reveal their secret algebraic description.
Submitted 24 July, 2015; v1 submitted 13 February, 2014; originally announced February 2014.
Comments: The material of this article was presented at the conference EUROCRYPT 2014 (Copenhagen, Denmark) and published in its proceedings. Due to space constraints, most of the proofs were omitted in the proceedings version. The present article is a long revisited version including all the missing proofs
-
arXiv:1401.6025 [pdf, ps, other]
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and their subcodes
Abstract: We give polynomial time attacks on the McEliece public key cryptosystem based either on algebraic geometry (AG) codes or on small codimensional subcodes of AG codes. These attacks consist in the blind reconstruction either of an Error Correcting Pair (ECP), or an Error Correcting Array (ECA) from the single data of an arbitrary generator matrix of a code. An ECP provides a decoding algorithm that… ▽ More
Submitted 3 June, 2017; v1 submitted 23 January, 2014; originally announced January 2014.
Comments: A part of the material of this article has been published at the conferences ISIT 2014 with title "A polynomial time attack against AG code based PKC" and 4ICMCTA with title "Crypt. of PKC that use subcodes of AG codes". This long version includes detailed proofs and new results: the proceedings articles only considered the reconstruction of ECP while we discuss here the reconstruction of ECA
-
arXiv:1310.3202 [pdf, ps, other]
New Identities Relating Wild Goppa Codes
Abstract: For a given support $L \in \mathbb{F}_{q^m}^n$ and a polynomial $g\in \mathbb{F}_{q^m}[x]$ with no roots in $\mathbb{F}_{q^m}$, we prove equality between the $q$-ary Goppa codes $Γ_q(L,N(g)) = Γ_q(L,N(g)/g)$ where $N(g)$ denotes the norm of $g$, that is $g^{q^{m-1}+\cdots +q+1}.$ In particular, for $m=2$, that is, for a quadratic extension, we get $Γ_q(L,g^q) = Γ_q(L,g^{q+1})$. If $g$ has roots in… ▽ More
Submitted 7 November, 2013; v1 submitted 11 October, 2013; originally announced October 2013.
Comments: 14 pages
Journal ref: Finite Fields Appl, 29, 178-197, 2014
-
arXiv:1206.4728 [pdf, ps, other]
Codes and the Cartier Operator
Abstract: In this article, we present a new construction of codes from algebraic curves. Given a curve over a non-prime finite field, the obtained codes are defined over a subfield. We call them Cartier Codes since their construction involves the Cartier operator. This new class of codes can be regarded as a natural geometric generalisation of classical Goppa codes. In particular, we prove that a well-known… ▽ More
Submitted 10 September, 2012; v1 submitted 20 June, 2012; originally announced June 2012.
MSC Class: 11G20; 14G50; 94B27
Journal ref: Proc. Amer. Math. Soc. 142(6), 1983-1996, 2014
-
arXiv:1206.2656 [pdf, ps, other]
A Construction of Quantum LDPC Codes from Cayley Graphs
Abstract: We study a construction of Quantum LDPC codes proposed by MacKay, Mitchison and Shokrollahi. It is based on the Cayley graph of Fn together with a set of generators regarded as the columns of the parity-check matrix of a classical code. We give a general lower bound on the minimum distance of the Quantum code in $\mathcal{O}(dn^2)$ where d is the minimum distance of the classical code. When the cl… ▽ More
Submitted 17 December, 2013; v1 submitted 12 June, 2012; originally announced June 2012.
Comments: The material in this paper was presented in part at ISIT 2011. This article is published in IEEE Transactions on Information Theory. We point out that the second step of the proof of Proposition VI.2 in the published version (Proposition 25 in the present version and Proposition 18 in the ISIT extended abstract) is not strictly correct. This issue is addressed in the present version
MSC Class: 94C15; 05C99; 94B99
Journal ref: IEEE Trans. Inform. Theory. 59(9). 6087-6098. 2013
-
arXiv:1101.4603 [pdf, ps, other]
Evaluation Codes from smooth Quadric Surfaces and Twisted Segre Varieties
Abstract: We give the parameters of any evaluation code on a smooth quadric surface. For hyperbolic quadrics the approach uses elementary results on product codes and the parameters of codes on elliptic quadrics are obtained by detecting a BCH structure of these codes and using the BCH bound. The elliptic quadric is a twist of the surface P^1 x P^1 and we detect a similar BCH structure on twists of the Segr… ▽ More
Submitted 12 June, 2012; v1 submitted 24 January, 2011; originally announced January 2011.
Comments: 10 pages. Presented at the conference Workshop on Coding theory and Cryptography 2011
MSC Class: 94B27; 14J20; 94B15
Journal ref: Des. Codes Cryptogr. 66(1), 291-303. 2013
-
arXiv:1008.2368 [pdf, ps, other]
Construction of Rational Surfaces Yielding Good Codes
Abstract: In the present article, we consider Algebraic Geometry codes on some rational surfaces. The estimate of the minimum distance is translated into a point counting problem on plane curves. This problem is solved by applying the upper bound "à la Weil" of Aubry and Perret together with the bound of Homma and Kim for plane curves. The parameters of several codes from rational surfaces are computed. Amo… ▽ More
Submitted 16 December, 2010; v1 submitted 13 August, 2010; originally announced August 2010.
Comments: 20 pages, 7 figures
MSC Class: 94B27; 14J26; 11G25; 14C20
Journal ref: Finite Fields and their Applications, Volume 17(5), 2011, Pages 424-441
-
Incidence structures from the blown-up plane and LDPC codes
Abstract: In this article, new regular incidence structures are presented. They arise from sets of conics in the affine plane blown-up at its rational points. The LDPC codes given by these incidence matrices are studied. These sparse incidence matrices turn out to be redundant, which means that their number of rows exceeds their rank. Such a feature is absent from random LDPC codes and is in general interes… ▽ More
Submitted 24 January, 2011; v1 submitted 21 April, 2010; originally announced April 2010.
Comments: 31 pages, 10 figures
MSC Class: 51E99; 05B20; 94B27; 14H50
Journal ref: IEEE, Trans. Inform. Theory, volume 57(7), Pages 4401 - 4416, 2011
-
arXiv:0905.2345 [pdf, ps, other]
The dual minimum distance of arbitrary dimensional algebraic--geometric codes
Abstract: In this article, the minimum distance of the dual $C^{\bot}$ of a functional code $C$ on an arbitrary dimensional variety $X$ over a finite field $\F_q$ is studied. The approach consists in finding minimal configurations of points on $X$ which are not in "general position". If $X$ is a curve, the result improves in some situations the well-known Goppa designed distance.
Submitted 10 November, 2011; v1 submitted 14 May, 2009; originally announced May 2009.
Comments: 24 pages
MSC Class: 14J20; 94B27; 14C20
Journal ref: J. Algebra. 350(1), 84-107. 2012
-
arXiv:0905.2341 [pdf, ps, other]
Differential approach for the study of duals of algebraic-geometric codes on surfaces
Abstract: The purpose of the present article is the study of duals of functional codes on algebraic surfaces. We give a direct geometrical description of them, using differentials. Even if this geometrical description is less trivial, it can be regarded as a natural extension to surfaces of the result asserting that the dual of a functional code on a curve is a differential code. We study the parameters of… ▽ More
Submitted 1 December, 2010; v1 submitted 14 May, 2009; originally announced May 2009.
Comments: 21 pages
MSC Class: 14J20; 94B27; 11G25
Journal ref: Journal de Theorie des Nombres de Bordeaux, Volume 23(2), p95-120, 2011
-
arXiv:0905.2311 [pdf, ps, other]
Residus de 2-formes differentielles sur les surfaces algebriques et applications aux codes correcteurs d'erreurs
Abstract: The theory of algebraic-geometric codes has been developed in the beginning of the 80's after a paper of V.D. Goppa. Given a smooth projective algebraic curve X over a finite field, there are two different constructions of error-correcting codes. The first one, called "functional", uses some rational functions on X and the second one, called "differential", involves some rational 1-forms on this… ▽ More
Submitted 14 May, 2009; originally announced May 2009.
Comments: 168 pages
MSC Class: 14J20; 94B27
Journal ref: PhD Thesis - Université de Toulouse - 2008
-
arXiv:0810.4112 [pdf, ps, other]
Sums of residues on algebraic surfaces and application to coding theory
Abstract: In this paper, we study residues of differential 2-forms on a smooth algebraic surface over an arbitrary field and give several statements about sums of residues. Afterwards, using these results we construct algebraic-geometric codes which are an extension to surfaces of the well-known differential codes on curves. We also study some properties of these codes and extend to them some known proper… ▽ More
Submitted 22 October, 2008; originally announced October 2008.
Comments: 31 pages
MSC Class: 14J99; 14J20; 14G50; 94B27
Journal ref: Journal of Pure and Applied Algebra, vol 213 number 12, pages 2201-2223, 2009