2018
DOI: 10.1016/j.disc.2017.10.032
|View full text |Cite
|
Sign up to set email alerts
|

New existence and nonexistence results for strong external difference families

Abstract: In this paper, we use character-theoretic techniques to give new nonexistence results for (n, m, k, λ)strong external difference families (SEDFs). We also use cyclotomic classes to give two new classes of SEDFs with m = 2. IntroductionMotivated by applications to algebraic manipulation detection codes (or AMD codes) [1, 2, 3], Paterson and Stinson introduced strong external difference families (or SEDFs) in [10]. SEDFs are closely related to but stronger than external difference families (or EDFs) [9]. In [10]… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
38
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 22 publications
(38 citation statements)
references
References 12 publications
0
38
0
Order By: Relevance
“…According to Lemma 2, B (1) is an optimal (10, 3, (1, 2, 2), 5, 3)-BSWEDF and B (2) is an optimal (10, 3, (1, 1, 3), 5, 4)-BSWEDF. By Corollary 1, ρ (10,3,5)…”
Section: Algebraic Manipulation Detection Codes and External Difmentioning
confidence: 97%
See 1 more Smart Citation
“…According to Lemma 2, B (1) is an optimal (10, 3, (1, 2, 2), 5, 3)-BSWEDF and B (2) is an optimal (10, 3, (1, 1, 3), 5, 4)-BSWEDF. By Corollary 1, ρ (10,3,5)…”
Section: Algebraic Manipulation Detection Codes and External Difmentioning
confidence: 97%
“…Firstly, we define a new type of weighted external difference families which are proved equivalent with weak AMD codes. By means of this combinatorial characterization of weak AMD codes: (1) We improve the known lower bound on the maximum probability of successful tampering for the adversary's all possible strategies; (2) We derive a necessary condition for the Paterson-Stinson bound to be achieved; (3) We determine the exact combinatorial structure for a weak AMD code to be optimal, when the Paterson-Stinson bound is not achievable. In this way, some weak AMD codes which have not been identified to be R-optimal previously now can be identified to be in fact R-optimal.…”
Section: Introductionmentioning
confidence: 99%
“…Wen, Yang, Fu and Feng [19] present some general constructions of GSEDF by using difference sets and partial difference sets. There are some (v, 2, k, λ)-SEDFs obtained from cyclotomic constructions, see [1,8,15]. Wen, Yang and Feng [18], and Jedwab and Li [9] respectively give an example of (243, 11,22,20)-SEDF in two different ways which is the first nontrivial example for m ≥ 5.…”
Section: Introductionmentioning
confidence: 99%
“…Further, Jedwab and Li [9] gave some upper bounds for a (v, m, k, λ)-SEDF, and used them to get some nonexistence results for the case m = 2. For more nonexistence results on (v, m, k, λ)-SEDFs, see [1,8,9,14].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation