1985
DOI: 10.1109/tit.1985.1057109
|View full text |Cite
|
Sign up to set email alerts
|

The concatenated structure of cyclic and Abelian codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
31
0

Year Published

1989
1989
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 62 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…This yields a new procedure which is easy to understand. Moreover our method fits in with the description of cyclic codes over extensions of GF(2) and can be used for obtaining abelian codes as concatenations of cyclic codes [4,6].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This yields a new procedure which is easy to understand. Moreover our method fits in with the description of cyclic codes over extensions of GF(2) and can be used for obtaining abelian codes as concatenations of cyclic codes [4,6].…”
Section: Resultsmentioning
confidence: 99%
“…Our interest in this problem comes from [6] where it is shown that abelian codes over a finite field can be obtained by taking concatenations of cyclic codes over extensions of this field. Thus in order to construct binary abelian codes by this method, we must know how to factor x" 1 over GF(2 s) I-4].…”
Section: Introductionmentioning
confidence: 99%
“…It is important to note that an analogue of the representations in (12) and (13) can also be obtained vertically. For this, we look at the columns of v g in (10). The first column is ðx i g Þ xAA ; the second column is ða j g x i g Þ xAA ; etc.…”
Section: Trace Representation Of 2-d Cyclic Codesmentioning
confidence: 99%
“…There is another lower bound on the minimum distance of 2-D cyclic codes due to Jensen (see [10,11]). He utilizes the concatenated structure of 2-D cyclic codes to come up with this bound.…”
Section: Introductionmentioning
confidence: 99%
“…Representation theory has also been used to construct codes by Liebler [23], Camion [12], Rabizzoni [32], Ward [34], Zlotnik [36], Klemm [21], Charpin [13], [14], Bhattacharya [6], Jensen [20], Wolfmann [35], and Landrock and Manz [22].…”
mentioning
confidence: 99%