DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, Chengju | ko |
dc.contributor.author | Bae, Sunghan | ko |
dc.contributor.author | Ahn, Jaehyun | ko |
dc.contributor.author | Yang, Shudi | ko |
dc.contributor.author | Yao, Zheng-An | ko |
dc.date.accessioned | 2016-10-04T08:56:23Z | - |
dc.date.available | 2016-10-04T08:56:23Z | - |
dc.date.created | 2016-09-21 | - |
dc.date.created | 2016-09-21 | - |
dc.date.issued | 2016-10 | - |
dc.identifier.citation | DESIGNS CODES AND CRYPTOGRAPHY, v.81, no.1, pp.153 - 168 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | http://hdl.handle.net/10203/213149 | - |
dc.description.abstract | Recently, linear codes constructed from defining sets have been extensively studied. It was shown that the linear codes may have a few nonzero weights or be optimal if the defining sets are well chosen. The weight enumerators of these linear codes were also presented. In this paper, we investigate the complete weight enumerators of some linear codes constructed from the defining sets. As applications, we employ the explicit complete weight enumerators of the linear codes to construct constant composition codes and systematic authentication codes. A new class of optimal constant composition codes and three classes of asymptotically optimal systematic authentication codes are presented | - |
dc.language | English | - |
dc.publisher | SPRINGER | - |
dc.subject | CONSTANT-COMPOSITION CODES | - |
dc.subject | DIFFERENCE BALANCED FUNCTIONS | - |
dc.subject | REDUCIBLE CYCLIC CODES | - |
dc.subject | AUTHENTICATION CODES | - |
dc.subject | PERMUTATION ARRAYS | - |
dc.subject | CONSTRUCTIONS | - |
dc.subject | 3-WEIGHT | - |
dc.title | Complete weight enumerators of some linear codes and their applications | - |
dc.type | Article | - |
dc.identifier.wosid | 000381138500010 | - |
dc.identifier.scopusid | 2-s2.0-84944580651 | - |
dc.type.rims | ART | - |
dc.citation.volume | 81 | - |
dc.citation.issue | 1 | - |
dc.citation.beginningpage | 153 | - |
dc.citation.endingpage | 168 | - |
dc.citation.publicationname | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.identifier.doi | 10.1007/s10623-015-0136-9 | - |
dc.contributor.localauthor | Bae, Sunghan | - |
dc.contributor.nonIdAuthor | Li, Chengju | - |
dc.contributor.nonIdAuthor | Ahn, Jaehyun | - |
dc.contributor.nonIdAuthor | Yang, Shudi | - |
dc.contributor.nonIdAuthor | Yao, Zheng-An | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Complete weight enumerators | - |
dc.subject.keywordAuthor | Linear codes | - |
dc.subject.keywordAuthor | Exponential sums | - |
dc.subject.keywordAuthor | Constant composition codes | - |
dc.subject.keywordAuthor | Authentication codes | - |
dc.subject.keywordPlus | CONSTANT-COMPOSITION CODES | - |
dc.subject.keywordPlus | DIFFERENCE BALANCED FUNCTIONS | - |
dc.subject.keywordPlus | REDUCIBLE CYCLIC CODES | - |
dc.subject.keywordPlus | AUTHENTICATION CODES | - |
dc.subject.keywordPlus | PERMUTATION ARRAYS | - |
dc.subject.keywordPlus | CONSTRUCTIONS | - |
dc.subject.keywordPlus | 3-WEIGHT | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.