Results 11 to 20 of about 1,005,908 (254)

A Mathematical Perspective on Post-Quantum Cryptography

open access: yesMathematics, 2022
In 2016, the National Institute of Standards and Technology (NIST) announced an open competition with the goal of finding and standardizing suitable algorithms for quantum-resistant cryptography.
Maximilian Richter   +3 more
doaj   +1 more source

Linear Codes over Finite Rings

open access: yesTrends in Computational and Applied Mathematics, 2005
In this paper we present a construction technique of cyclic, BCH, alternat, Goppa and Srivastava codes over a local finite commutative rings with identity.
A.A. de Andrade, R. Palazzo Jr.
doaj   +1 more source

Multi-block Two Repeated Fixed Burst Error Correcting Linear Codes

open access: yesRatio Mathematica, 2022
During the digital transmission of information, errors are bound to occur. The errors may be random or burst errors. In this paper, we have obtained necessary and sufficient conditions for the existence of linear codes over  that are capable of ...
Ritu Arora   +3 more
doaj   +1 more source

Linear codes resulting from finite group actions [PDF]

open access: yesTransactions on Combinatorics, 2022
In this article, we use group action theory to define some important ternary linear codes. Some of these codes are self-orthogonal having a minimum distance achieving the lower bound in the previous records. Then, we define two new codes sharing the same
Driss Harzalla
doaj   +1 more source

Projective parameterized linear codes

open access: yesAnalele Stiintifice ale Universitatii Ovidius Constanta: Seria Matematica, 2015
In this paper we estimate the main parameters of some evaluation codes which are known as projective parameterized codes. We find the length of these codes and we give a formula for the dimension in terms of the Hilbert function associated to two ideals,
González Sarabia Manuel   +2 more
doaj   +1 more source

Partial IDS decoding based on the base graph of protograph LDPC codes

open access: yesIET Communications, 2023
The residual belief propagation (RBP) algorithm, which is the most classic informed dynamic scheduling strategy, achieves outstanding performance in error correction and can drastically accelerate convergence speed.
Shuo Liang, Xingcheng Liu, Suipeng Xie
doaj   +1 more source

On Block-Coded Modulation Using Unequal Error Protection Codes Over Rayleigh-Fading Channels [PDF]

open access: yes, 1998
This paper considers block-coded 8-phase-shift-keying (PSK) modulations for the unequal error protection (UEP) of information transmitted over Rayleigh-fading channels.
Imai, Hideki   +3 more
core   +2 more sources

On the Construction of Self-Complementary Codes and their Application in the Problem of Information Hiding

open access: yesМоделирование и анализ информационных систем, 2022
Line codes are widely used to protect against errors in data transmission and storage systems, to ensure the stability of various cryptographic algorithms and protocols, to protect hidden information from errors in a stegocontainer. One of the classes of
Yury V. Kosolapov   +2 more
doaj   +1 more source

Weight distributions for projective binary linear codes from Weil sums

open access: yesAIMS Mathematics, 2021
A class of projective binary linear codes are constructed and their weight distributions are investigated using Weil sums. They have at most three nonzero weights, containing some optimal codes.
Shudi Yang, Zheng-An Yao
doaj   +1 more source

Low-Complexity LP Decoding of Nonbinary Linear Codes [PDF]

open access: yes, 2013
Linear Programming (LP) decoding of Low-Density Parity-Check (LDPC) codes has attracted much attention in the research community in the past few years. LP decoding has been derived for binary and nonbinary linear codes.
Mark F. Flanagan   +5 more
core   +1 more source

Home - About - Disclaimer - Privacy