2016
DOI: 10.1016/j.ffa.2016.03.005
|View full text |Cite
|
Sign up to set email alerts
|

Deep holes in Reed–Solomon codes based on Dickson polynomials

Abstract: For an [n, k] Reed-Solomon code C, it can be shown that any received word r lies a distance at most n − k from C, denoted d(r, C) ≤ n − k. Any word r meeting the equality is called a deep hole. Guruswami and Vardy (2005) showed that for a specific class of codes, determining whether or not a word is a deep hole is NP-hard. They suggested passingly that it may be easier when the evaluation set of C is large or structured. Following this idea, we study the case where the evaluation set is the image of a Dickson… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2025
2025

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 16 publications
0
6
0
Order By: Relevance
“…Deciding deep holes of a given code is much harder than the covering radius problem, even for RS codes. The deep hole problem for RS codes was studied in [4], [5], [14], [15], [17], [18], [24], [25], [26]. As noted above, words u f with deg(f ) = k are deep hole of RS(D, k).…”
Section: A Notations and The Main Resultsmentioning
confidence: 99%
“…Deciding deep holes of a given code is much harder than the covering radius problem, even for RS codes. The deep hole problem for RS codes was studied in [4], [5], [14], [15], [17], [18], [24], [25], [26]. As noted above, words u f with deg(f ) = k are deep hole of RS(D, k).…”
Section: A Notations and The Main Resultsmentioning
confidence: 99%
“…Following established procedures, we use the Li-Wan sieve [17] to analyze large values of k. This method has been used several times [26,14,17,18,19,24] and is now standard. So, we will only give an outline and indicate the differences.…”
Section: K-mss(m) For Large Kmentioning
confidence: 99%
“…The following lemma is the key character sum estimate we need. The proof follows the method used in [14], where the case m = 1 is treated.…”
Section: Weil's Character Sum Boundmentioning
confidence: 99%
“…The covering radius and deep holes of a linear code embedded with Hamming metric were studied extensively [1,2,3,4,5,10,12,14,16,22,23,24,25,26,27], in which MDS codes such as generalized Reed-Solomon codes, standard Reed-Solomon codes and projective Reed-Solomon codes were explored deeply. Gabidulin codes were introduced by Gabidulin in [7] and independently by Delsarte in [6].…”
Section: Introductionmentioning
confidence: 99%