“…, 6. From this and by C 6 ⊇ C 5 ⊇ C 4 ⊇ C 3 ⊇ C 2 ⊇ C 1 ⊇ C 0 , we deduce that d ∈ {1, 2, 3,4,5,6,7,9,10,12,14,15,18,20,21,25,28,30,35,42, 49, 0}. Now, let l = 3.…”
Section: An Examplementioning
confidence: 82%
“…Theorem 2.1 (cf. [6], [3] Theorem 1) The matrix-product code [C 1 , ..., C α ]·A given by a sequence of [n, k i , d i ]-linear codes C i over F p m and a full-rank matrix A is a linear code whose length is nβ, it has dimension α i=1 k i and minimum distance larger than or equal to…”
For any prime number p, positive integers m, k, n satisfying gcd(p, n) = 1 and λ 0 ∈ F × p m , we prove that any λ p k 0 -constacyclic code of length p k n over the finite field F p m is monomially equivalent to a matrix-product code of a nested sequence of p k λ 0 -constacyclic codes with length n over F p m .
“…, 6. From this and by C 6 ⊇ C 5 ⊇ C 4 ⊇ C 3 ⊇ C 2 ⊇ C 1 ⊇ C 0 , we deduce that d ∈ {1, 2, 3,4,5,6,7,9,10,12,14,15,18,20,21,25,28,30,35,42, 49, 0}. Now, let l = 3.…”
Section: An Examplementioning
confidence: 82%
“…Theorem 2.1 (cf. [6], [3] Theorem 1) The matrix-product code [C 1 , ..., C α ]·A given by a sequence of [n, k i , d i ]-linear codes C i over F p m and a full-rank matrix A is a linear code whose length is nβ, it has dimension α i=1 k i and minimum distance larger than or equal to…”
For any prime number p, positive integers m, k, n satisfying gcd(p, n) = 1 and λ 0 ∈ F × p m , we prove that any λ p k 0 -constacyclic code of length p k n over the finite field F p m is monomially equivalent to a matrix-product code of a nested sequence of p k λ 0 -constacyclic codes with length n over F p m .
“…We now turn our attention to the minimum distance of C. Denote by A i the matrix consisting of the first i rows of A and let C A i be the linear code spanned by the rows in A i . From [21], we have the following result on the minimum distance.…”
Section: Preliminariesmentioning
confidence: 99%
“…Matrix-product codes, formalized in [2], is a generalization of some previously known code constructions, such as for example the (u, u + v)-construction, also known as Plotkin sum. Matrix-product codes have been studied in several works, including [2,16,17,21].…”
The component-wise or Schur product C * C ′ of two linear error-correcting codes C and C ′ over certain finite field is the linear code spanned by all component-wise products of a codeword in C with a codeword in C ′ . When C = C ′ , we call the product the square of C and denote it C * 2 . Motivated by several applications of squares of linear codes in the area of cryptography, in this paper we study squares of so-called matrixproduct codes, a general construction that allows to obtain new longer codes from several "constituent" codes. We show that in many cases we can relate the square of a matrix-product code to the squares and products of their constituent codes, which allow us to give bounds or even determine its minimum distance. We consider the well-known (u, u+v)-construction, or Plotkin sum (which is a special case of a matrix-product code) and determine which parameters we can obtain when the constituent codes are certain cyclic codes. In addition, we use the same techniques to study the squares of other matrix-product codes, for example when the defining matrix is Vandermonde (where the minimum distance is in a certain sense maximal with respect to matrix-product codes).
“…We consider the matrix-product construction [U, V ] · D which was already introduced in [5] and rediscovered in [4,15]. In [4, Theorem3.7] a lower bound for the minimum distance of such code is given when the matrix D has a certain property, namely non-singular by columns.…”
In this paper we present a modification of Reed-Solomon codes that beats the Guruwami-Sudan 1 − √ R decoding radius of Reed-Solomon codes at low rates R. The idea is to choose Reed-Solomon codes U and V with appropriate rates in a (U | U + V ) construction and to decode them with the Koetter-Vardy soft information decoder. We suggest to use a slightly more general version of these codes (but which has the same decoding performances as the (U | U + V )-construction) for code-based cryptography, namely to build a McEliece scheme. The point is here that these codes not only perform nearly as well (or even better in the low rate regime) as Reed-Solomon codes, their structure seems to avoid the Sidelnikov-Shestakov attack which broke a previous McEliece proposal based on generalized Reed-Solomon codes.2. Secondly, once we have recovered the right part v of the codeword, we can get a word (y 1 | y 2 − v) which should match two copies of a same word u of U . We can model this decoding problem by having some soft information.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.