2018
DOI: 10.3934/amc.2018042
|View full text |Cite
|
Sign up to set email alerts
|

Self-duality of generalized twisted Gabidulin codes

Abstract: Self-duality of Gabidulin codes was investigated in [10] and the authors provided an if and only if condition for a Gabidulin code to be equivalent to a self-dual maximum rank distance (MRD) code. In this paper, we investigate the analog problem for generalized twisted Gabidulin codes (a larger family of linear MRD codes including the family of Gabidulin codes). We observe that the condition presented in [10] still holds for generalized Gabidulin codes (an intermediate family between Gabidulin codes and genera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Rank metric codes were introduced by Delsarte (1978) as a q-analogue of coding theory [13]. Due to their applications in cryptography and in network error correction ( [30] [31]), there is a great interest in studying their general properties and their connections with other topics [1], [4], [9]- [11], [24], [26], [27], [29].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Rank metric codes were introduced by Delsarte (1978) as a q-analogue of coding theory [13]. Due to their applications in cryptography and in network error correction ( [30] [31]), there is a great interest in studying their general properties and their connections with other topics [1], [4], [9]- [11], [24], [26], [27], [29].…”
Section: Introductionmentioning
confidence: 99%
“…Additive codes and self-duality are also considered in the ambient space of matrices endowed with the rank metric (see, for example, [22], [25], [26]). They have potential applications not only in network coding, combinatorics and cryptography but also in code-based cryptography (and hence post-quantum cryptography).…”
Section: Introductionmentioning
confidence: 99%