0% found this document useful (0 votes)
22 views193 pages

Previewpdf

Uploaded by

shovanadutta94
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views193 pages

Previewpdf

Uploaded by

shovanadutta94
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 193

Concise Encyclopedia

of Coding Theory
Concise Encyclopedia
of Coding Theory

Edited by
W. Cary Huffman
Loyola University Chicago, USA

Jon-Lark Kim
Sogang University, Republic of Korea

Patrick Solé
University Aix-Marseille, Marseilles, France.
First edition published 2021
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press


2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

© 2021 Taylor & Francis Group, LLC

Two-Weight Codes: ©Andries E. Brouwer

CRC Press is an imprint of Taylor & Francis Group, LLC

Paintings, front, and back cover images used with permission from Gayle Imamura-Huffman.

Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright
holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowl-
edged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including pho-
tocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission
from the publishers.

For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are
not available on CCC please contact [email protected]

Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.

ISBN: 9781138551992 (hbk)


ISBN: 9781315147901 (ebk)
To a new generation, my grandchildren
Ezekiel James Huffman − 20 November 2019
Eliana Rei Beaton − 24 June 2020
− W. C. H.

To my daughter Sylvie Jinna Kim


To the memory of my advisor
Vera Pless − 1931–2020
− J.-L. K.

To the memory of my advisor


Gérard D. Cohen − 1951–2018
− P. S.
Contents

Preface xxiii

Contributors xxix

I Coding Fundamentals 1
1 Basics of Coding Theory 3
W. Cary Huffman, Jon-Lark Kim, and Patrick Solé
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Finite Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Generator and Parity Check Matrices . . . . . . . . . . . . . . . . . . . . 8
1.5 Orthogonality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6 Distance and Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.7 Puncturing, Extending, and Shortening Codes . . . . . . . . . . . . . . . 12
1.8 Equivalence and Automorphisms . . . . . . . . . . . . . . . . . . . . . . . 13
1.9 Bounds on Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.9.1 The Sphere Packing Bound . . . . . . . . . . . . . . . . . . . . . . 16
1.9.2 The Singleton Bound . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.3 The Plotkin Bound . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.4 The Griesmer Bound . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.5 The Linear Programming Bound . . . . . . . . . . . . . . . . . . 18
1.9.6 The Gilbert Bound . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.9.7 The Varshamov Bound . . . . . . . . . . . . . . . . . . . . . . . . 20
1.9.8 Asymptotic Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.10 Hamming Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.11 Reed–Muller Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.12 Cyclic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.13 Golay Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.14 BCH and Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . . . . 30
1.15 Weight Distributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.16 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.17 Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.18 Shannon’s Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

2 Cyclic Codes over Finite Fields 45


Cunsheng Ding
2.1 Notation and Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . 45
2.2 Subfield Subcodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
2.3 Fundamental Constructions of Cyclic Codes . . . . . . . . . . . . . . . . . 47
2.4 The Minimum Distances of Cyclic Codes . . . . . . . . . . . . . . . . . . 48
2.5 Irreducible Cyclic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

vii
viii Contents

2.6 BCH Codes and Their Properties . . . . . . . . . . . . . . . . . . . . . . 50


2.6.1 The Minimum Distances of BCH Codes . . . . . . . . . . . . . . . 51
2.6.2 The Dimensions of BCH Codes . . . . . . . . . . . . . . . . . . . 52
2.6.3 Other Aspects of BCH Codes . . . . . . . . . . . . . . . . . . . . 53
2.7 Duadic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
2.8 Punctured Generalized Reed–Muller Codes . . . . . . . . . . . . . . . . . 55
2.9 Another Generalization of the Punctured Binary Reed–Muller Codes . . 57
2.10 Reversible Cyclic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

3 Construction and Classification of Codes 61


Patric R. J. Östergård
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
3.2 Equivalence and Isomorphism . . . . . . . . . . . . . . . . . . . . . . . . 62
3.2.1 Prescribing Symmetries . . . . . . . . . . . . . . . . . . . . . . . . 63
3.2.2 Determining Symmetries . . . . . . . . . . . . . . . . . . . . . . . 66
3.3 Some Central Classes of Codes . . . . . . . . . . . . . . . . . . . . . . . . 67
3.3.1 Perfect Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
3.3.2 MDS Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
3.3.3 Binary Error-Correcting Codes . . . . . . . . . . . . . . . . . . . 73

4 Self-Dual Codes 79
Stefka Bouyuklieva
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.2 Weight Enumerators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.3 Bounds for the Minimum Distance . . . . . . . . . . . . . . . . . . . . . . 84
4.4 Construction Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.4.1 Gluing Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.4.2 Circulant Constructions . . . . . . . . . . . . . . . . . . . . . . . 89
4.4.3 Subtraction Procedure . . . . . . . . . . . . . . . . . . . . . . . . 90
4.4.4 Recursive Constructions . . . . . . . . . . . . . . . . . . . . . . . 90
4.4.5 Constructions of Codes with Prescribed Automorphisms . . . . . 92
4.5 Enumeration and Classification . . . . . . . . . . . . . . . . . . . . . . . . 93

5 Codes and Designs 97


Vladimir D. Tonchev
5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
5.2 Designs Supported by Codes . . . . . . . . . . . . . . . . . . . . . . . . . 98
5.3 Perfect Codes and Designs . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5.4 The Assmus–Mattson Theorem . . . . . . . . . . . . . . . . . . . . . . . . 101
5.5 Designs from Codes Meeting the Johnson Bound . . . . . . . . . . . . . . 102
5.6 Designs and Majority Logic Decoding . . . . . . . . . . . . . . . . . . . . 105
5.7 Concluding Remarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

6 Codes over Rings 111


Steven T. Dougherty
6.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
6.2 Quaternary Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
6.3 The Gray Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
6.3.1 Kernels of Quaternary Codes . . . . . . . . . . . . . . . . . . . . . 114
6.4 Rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
6.4.1 Codes over Frobenius Rings . . . . . . . . . . . . . . . . . . . . . 115
Contents ix

6.4.2 Families of Rings . . . . . . . . . . . . . . . . . . . . . . . . . . . 117


6.4.3 The Chinese Remainder Theorem . . . . . . . . . . . . . . . . . . 120
6.5 The MacWilliams Identities . . . . . . . . . . . . . . . . . . . . . . . . . . 121
6.6 Generating Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
6.7 The Singleton Bound and MDR Codes . . . . . . . . . . . . . . . . . . . 126
6.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

7 Quasi-Cyclic Codes 129


Cem Güneri, San Ling, and Buket Özkaya
7.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
7.2 Algebraic Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
7.3 Decomposition of Quasi-Cyclic Codes . . . . . . . . . . . . . . . . . . . . 132
7.3.1 The Chinese Remainder Theorem and Concatenated Decomposi-
tions of QC Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
7.3.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
7.3.2.1 Trace Representation . . . . . . . . . . . . . . . . . . . . 134
7.3.2.2 Self-Dual and Complementary Dual QC Codes . . . . . 135
7.4 Minimum Distance Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . 137
7.4.1 The Jensen Bound . . . . . . . . . . . . . . . . . . . . . . . . . . 137
7.4.2 The Lally Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
7.4.3 Spectral Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
7.4.3.1 Cyclic Codes and Distance Bounds From Their Zeros . . 138
7.4.3.2 Spectral Theory of QC Codes . . . . . . . . . . . . . . . 140
7.4.3.3 Spectral Bounds for QC Codes . . . . . . . . . . . . . . 141
7.5 Asymptotics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
7.5.1 Good Self-Dual QC Codes Exist . . . . . . . . . . . . . . . . . . . 143
7.5.2 Complementary Dual QC Codes Are Good . . . . . . . . . . . . . 147
7.6 Connection to Convolutional Codes . . . . . . . . . . . . . . . . . . . . . 148

8 Introduction to Skew-Polynomial Rings and Skew-Cyclic Codes 151


Heide Gluesing-Luerssen
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
8.2 Basic Properties of Skew-Polynomial Rings . . . . . . . . . . . . . . . . . 152
8.3 Skew Polynomials and Linearized Polynomials . . . . . . . . . . . . . . . 157
8.4 Evaluation of Skew Polynomials and Roots . . . . . . . . . . . . . . . . . 158
8.5 Algebraic Sets and Wedderburn Polynomials . . . . . . . . . . . . . . . . 162
8.6 A Circulant Approach Toward Cyclic Block Codes . . . . . . . . . . . . . 166
8.7 Algebraic Theory of Skew-Cyclic Codes with General Modulus . . . . . . 169
8.8 Skew-Constacyclic Codes and Their Duals . . . . . . . . . . . . . . . . . 174
8.9 The Minimum Distance of Skew-Cyclic Codes . . . . . . . . . . . . . . . 176

9 Additive Cyclic Codes 181


Jürgen Bierbrauer, Stefano Marcugini, and Fernanda Pambianco
9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181
9.2 Basic Notions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182
9.3 Code Equivalence and Cyclicity . . . . . . . . . . . . . . . . . . . . . . . 182
9.4 Additive Codes Which Are Cyclic in the Permutation Sense . . . . . . . . 184
9.4.1 The Linear Case m = 1 . . . . . . . . . . . . . . . . . . . . . . . . 185
9.4.2 The General Case m ≥ 1 . . . . . . . . . . . . . . . . . . . . . . . 187
9.4.3 Equivalence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
9.4.4 Duality and Quantum Codes . . . . . . . . . . . . . . . . . . . . . 191
x Contents

9.5 Additive Codes Which Are Cyclic in the Monomial Sense . . . . . . . . . 193
9.5.1 The Linear Case m = 1 . . . . . . . . . . . . . . . . . . . . . . . . 194
9.5.2 The General Case m ≥ 1 . . . . . . . . . . . . . . . . . . . . . . . 195

10 Convolutional Codes 197


Julia Lieb, Raquel Pinto, and Joachim Rosenthal
10.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
10.2 Foundational Aspects of Convolutional Codes . . . . . . . . . . . . . . . . 198
10.2.1 Definition of Convolutional Codes via Generator and Parity Check
Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
10.2.2 Distances of Convolutional Codes . . . . . . . . . . . . . . . . . . 203
10.3 Constructions of Codes with Optimal Distance . . . . . . . . . . . . . . . 207
10.3.1 Constructions of MDS Convolutional Codes . . . . . . . . . . . . 207
10.3.2 Constructions of MDP Convolutional Codes . . . . . . . . . . . . 208
10.4 Connections to Systems Theory . . . . . . . . . . . . . . . . . . . . . . . 211
10.5 Decoding of Convolutional Codes . . . . . . . . . . . . . . . . . . . . . . . 214
10.5.1 Decoding over the Erasure Channel . . . . . . . . . . . . . . . . . 214
10.5.1.1 The Case δ = 0 . . . . . . . . . . . . . . . . . . . . . . . 214
10.5.1.2 The General Case . . . . . . . . . . . . . . . . . . . . . . 215
10.5.2 The Viterbi Decoding Algorithm . . . . . . . . . . . . . . . . . . . 217
10.6 Two-Dimensional Convolutional Codes . . . . . . . . . . . . . . . . . . . 218
10.6.1 Definition of 2D Convolutional Codes via Generator and Parity
Check Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
10.6.2 ISO Representations . . . . . . . . . . . . . . . . . . . . . . . . . 221
10.7 Connections to Symbolic Dynamics . . . . . . . . . . . . . . . . . . . . . 223

11 Rank-Metric Codes 227


Elisa Gorla
11.1 Definitions, Isometries, and Equivalence of Codes . . . . . . . . . . . . . . 227
11.2 The Notion of Support in the Rank Metric . . . . . . . . . . . . . . . . . 230
11.3 MRD Codes and Optimal Anticodes . . . . . . . . . . . . . . . . . . . . . 232
11.4 Duality and the MacWilliams Identities . . . . . . . . . . . . . . . . . . . 236
11.5 Generalized Weights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
11.6 q-Polymatroids and Code Invariants . . . . . . . . . . . . . . . . . . . . . 245

12 Linear Programming Bounds 251


Peter Boyvalenkov and Danyo Danev
12.1 Preliminaries – Krawtchouk Polynomials, Codes, and Designs . . . . . . . 251
12.2 General Linear Programming Theorems . . . . . . . . . . . . . . . . . . . 253
12.3 Universal Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
12.4 Linear Programming on Sn−1 . . . . . . . . . . . . . . . . . . . . . . . . . 261
12.5 Linear Programming in Other Coding Theory Problems . . . . . . . . . . 265

13 Semidefinite Programming Bounds for Error-Correcting Codes 267


Frank Vallentin
13.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267
13.2 Conic Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
13.2.1 Conic Programming and its Duality Theory . . . . . . . . . . . . 268
13.2.2 Linear Programming . . . . . . . . . . . . . . . . . . . . . . . . . 270
13.2.3 Semidefinite Programming . . . . . . . . . . . . . . . . . . . . . . 270
13.3 Independent Sets in Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Contents xi

13.3.1 Independence Number and Codes . . . . . . . . . . . . . . . . . . 272


13.3.2 Semidefinite Programming Bounds for the Independence Number 273
13.4 Symmetry Reduction and Matrix ∗-Algebras . . . . . . . . . . . . . . . . 275
13.4.1 Symmetry Reduction of Semidefinite Programs . . . . . . . . . . 276
13.4.2 Matrix ∗-Algebras . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
13.4.3 Example: The Delsarte Linear Programming Bound . . . . . . . . 277
13.4.4 Example: The Schrijver Semidefinite Programming Bound . . . . 278
13.5 Extensions and Ramifications . . . . . . . . . . . . . . . . . . . . . . . . . 279

II Families of Codes 283


14 Coding Theory and Galois Geometries 285
Leo Storme
14.1 Galois Geometries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
14.1.1 Basic Properties of Galois Geometries . . . . . . . . . . . . . . . . 285
14.1.2 Spreads and Partial Spreads . . . . . . . . . . . . . . . . . . . . . 287
14.2 Two Links Between Coding Theory and Galois Geometries . . . . . . . . 288
14.2.1 Via the Generator Matrix . . . . . . . . . . . . . . . . . . . . . . 288
14.2.2 Via the Parity Check Matrix . . . . . . . . . . . . . . . . . . . . . 288
14.2.3 Linear MDS Codes and Arcs in Galois Geometries . . . . . . . . . 289
14.2.4 Griesmer Bound and Minihypers . . . . . . . . . . . . . . . . . . . 292
14.3 Projective Reed–Muller Codes . . . . . . . . . . . . . . . . . . . . . . . . 293
14.4 Linear Codes Defined by Incidence Matrices Arising from Galois Geometries 295
14.5 Subspace Codes and Galois Geometries . . . . . . . . . . . . . . . . . . . 297
14.5.1 Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
14.5.2 Designs over Fq . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
14.5.3 Rank-Metric Codes . . . . . . . . . . . . . . . . . . . . . . . . . . 299
14.5.4 Maximum Scattered Subspaces and MRD Codes . . . . . . . . . . 301
14.5.5 Semifields and MRD Codes . . . . . . . . . . . . . . . . . . . . . . 302
14.5.6 Nonlinear MRD Codes . . . . . . . . . . . . . . . . . . . . . . . . 303
14.6 A Geometric Result Arising from a Coding Theoretic Result . . . . . . . 303

15 Algebraic Geometry Codes and Some Applications 307


Alain Couvreur and Hugues Randriambololona
15.1 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
15.2 Curves and Function Fields . . . . . . . . . . . . . . . . . . . . . . . . . . 312
15.2.1 Curves, Points, Function Fields, and Places . . . . . . . . . . . . 312
15.2.2 Divisors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
15.2.3 Morphisms of Curves and Pullbacks . . . . . . . . . . . . . . . . . 314
15.2.4 Differential Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
15.2.4.1 Canonical Divisors . . . . . . . . . . . . . . . . . . . . . 315
15.2.4.2 Residues . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
15.2.5 Genus and the Riemann–Roch Theorem . . . . . . . . . . . . . . 315
15.3 Basics on Algebraic Geometry Codes . . . . . . . . . . . . . . . . . . . . 316
15.3.1 Algebraic Geometry Codes, Definitions, and Elementary Results . 316
15.3.2 Genus 0, Generalized Reed–Solomon and Classical Goppa Codes . 319
15.3.2.1 The CL Description . . . . . . . . . . . . . . . . . . . . . 320
15.3.2.2 The CΩ Description . . . . . . . . . . . . . . . . . . . . . 321
15.4 Asymptotic Parameters of Algebraic Geometry Codes . . . . . . . . . . . 323
15.4.1 Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
15.4.2 The Tsfasman–Vlăduţ–Zink Bound . . . . . . . . . . . . . . . . . 324
xii Contents

15.4.3 Subfield Subcodes and the Katsman–Tsfasman–Wirtz Bound . . . 326


15.4.4 Nonlinear Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
15.5 Improved Lower Bounds for the Minimum Distance . . . . . . . . . . . . 326
15.5.1 Floor Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
15.5.2 Order Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
15.5.3 Further Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
15.5.4 Geometric Bounds for Codes from Embedded Curves . . . . . . . 332
15.6 Decoding Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
15.6.1 Decoding Below Half the Designed Distance . . . . . . . . . . . . 333
15.6.1.1 The Basic Algorithm . . . . . . . . . . . . . . . . . . . . 333
15.6.1.2 Getting Rid of Algebraic Geometry: Error-Correcting
Pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
15.6.1.3 Reducing the Gap to Half the Designed Distance . . . . 337
15.6.1.4 Decoding Up to Half the Designed Distance: The Feng–
Rao Algorithm and Error-Correcting Arrays . . . . . . . 337
15.6.2 List Decoding and the Guruswami–Sudan Algorithm . . . . . . . 339
15.7 Application to Public-Key Cryptography: A McEliece-Type Cryptosystem 340
15.7.1 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
15.7.2 McEliece’s Original Proposal Using Binary Classical Goppa Codes 342
15.7.3 Advantages and Drawbacks of the McEliece Scheme . . . . . . . . 342
15.7.4 Janwa and Moreno’s Proposals Using AG Codes . . . . . . . . . . 342
15.7.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
15.7.5.1 Concatenated Codes Are Not Secure . . . . . . . . . . . 343
15.7.5.2 Algebraic Geometry Codes Are Not Secure . . . . . . . 343
15.7.5.3 Conclusion: Only Subfield Subcodes of AG Codes Remain
Unbroken . . . . . . . . . . . . . . . . . . . . . . . . . . 343
15.8 Applications Related to the ?-Product: Frameproof Codes, Multiplication
Algorithms, and Secret Sharing . . . . . . . . . . . . . . . . . . . . . . . . 344
15.8.1 The ?-Product from the Perspective of AG Codes . . . . . . . . . 344
15.8.1.1 Basic Properties . . . . . . . . . . . . . . . . . . . . . . 344
15.8.1.2 Dimension of ?-Products . . . . . . . . . . . . . . . . . . 345
15.8.1.3 Joint Bounds on Dimension and Distance . . . . . . . . 347
15.8.1.4 Automorphisms . . . . . . . . . . . . . . . . . . . . . . . 347
15.8.2 Frameproof Codes and Separating Systems . . . . . . . . . . . . . 348
15.8.3 Multiplication Algorithms . . . . . . . . . . . . . . . . . . . . . . 349
15.8.4 Arithmetic Secret Sharing . . . . . . . . . . . . . . . . . . . . . . 352
15.9 Application to Distributed Storage Systems: Locally Recoverable Codes . 354
15.9.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
15.9.2 A Bound on the Parameters Involving Locality . . . . . . . . . . 356
15.9.3 Tamo–Barg Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
15.9.4 Locally Recoverable Codes from Coverings of Algebraic Curves:
Barg–Tamo–Vlăduţ Codes . . . . . . . . . . . . . . . . . . . . . . 357
15.9.5 Improvement: Locally Recoverable Codes with Higher Local Dis-
tance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
15.9.6 Fibre Products of Curves and the Availability Problem . . . . . . 359

16 Codes in Group Algebras 363


Wolfgang Willems
16.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
16.2 Finite Dimensional Algebras . . . . . . . . . . . . . . . . . . . . . . . . . 364
16.3 Group Algebras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367
Contents xiii

16.4 Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369


16.5 Self-Dual Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
16.6 Idempotent Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
16.7 LCP and LCD Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . 375
16.8 Divisible Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377
16.9 Checkable Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
16.10 Decoding Group Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
16.11 Asymptotic Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
16.12 Group Codes over Rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

17 Constacyclic Codes over Finite Commutative Chain Rings 385


Hai Q. Dinh and Sergio R. López-Permouth
17.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
17.2 Chain Rings, Galois Rings, and Alternative Distances . . . . . . . . . . . 387
17.3 Constacyclic Codes over Arbitrary Commutative Finite Rings . . . . . . 391
17.4 Simple-Root Cyclic and Negacyclic Codes over Finite Chain Rings . . . . 392
17.5 Repeated-Root Constacyclic Codes over Galois Rings . . . . . . . . . . . 399
17.6 Repeated-Root Constacyclic Codes over R = Fpm + uFpm , u2 = 0 . . . . 407
17.6.1 All Constacyclic Codes of Length ps over R . . . . . . . . . . . . 407
17.6.2 All Constacyclic Codes of Length 2ps over R . . . . . . . . . . . . 412
17.6.3 All Constacyclic Codes of Length 4ps over R . . . . . . . . . . . . 414
17.6.4 λ-Constacyclic Codes of Length nps over R, λ ∈ F∗pm . . . . . . . 418
17.7 Extensions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423

18 Weight Distribution of Trace Codes over Finite Rings 429


Minjia Shi
18.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
18.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
18.3 A Class of Special Finite Rings Rk (Type I) . . . . . . . . . . . . . . . . 430
18.3.1 Case (i) k = 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
18.3.2 Case (ii) k = 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 432
18.3.3 Case (iii) k > 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
18.3.4 Case (iv) Rk (p), p an Odd Prime . . . . . . . . . . . . . . . . . . 435
18.4 A Class of Special Finite Rings R(k, p, uk = a) (Type II) . . . . . . . . . 441
18.5 Three Special Rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
18.5.1 R(2, p, u2 = u) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
18.5.2 R(3, 2, u3 = 1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
18.5.3 R(3, 3, u3 = 1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
18.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448

19 Two-Weight Codes 449


Andries E. Brouwer
19.1 Generalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
19.2 Codes as Projective Multisets . . . . . . . . . . . . . . . . . . . . . . . . . 450
19.2.1 Weights . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
19.3 Graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
19.3.1 Difference Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
19.3.2 Using a Projective Set as a Difference Set . . . . . . . . . . . . . 451
19.3.3 Strongly Regular Graphs . . . . . . . . . . . . . . . . . . . . . . . 451
19.3.4 Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
19.3.5 Complement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
xiv Contents

19.3.6 Duality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453


19.3.7 Field Change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
19.4 Irreducible Cyclic Two-Weight Codes . . . . . . . . . . . . . . . . . . . . 454
19.5 Cyclotomy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
19.5.1 The Van Lint–Schrijver Construction . . . . . . . . . . . . . . . . 455
19.5.2 The De Lange Graphs . . . . . . . . . . . . . . . . . . . . . . . . 456
19.5.3 Generalizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
19.6 Rank 3 Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456
19.6.1 One-Dimensional Affine Rank 3 Groups . . . . . . . . . . . . . . . 456
19.7 Two-Character Sets in Projective Space . . . . . . . . . . . . . . . . . . . 457
19.7.1 Subspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
19.7.2 Quadrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 458
19.7.3 Maximal Arcs and Hyperovals . . . . . . . . . . . . . . . . . . . . 459
19.7.4 Baer Subspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
19.7.5 Hermitian Quadrics . . . . . . . . . . . . . . . . . . . . . . . . . . 459
19.7.6 Sporadic Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 459
19.8 Nonprojective Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
19.9 Brouwer–Van Eupen Duality . . . . . . . . . . . . . . . . . . . . . . . . . 461
19.9.1 From Projective Code to Two-Weight Code . . . . . . . . . . . . 461
19.9.2 From Two-Weight Code to Projective Code . . . . . . . . . . . . 462

20 Linear Codes from Functions 463


Sihem Mesnager
20.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 465
20.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 466
20.2.1 The Trace Function . . . . . . . . . . . . . . . . . . . . . . . . . . 466
20.2.2 Vectorial Functions . . . . . . . . . . . . . . . . . . . . . . . . . . 466
20.2.2.1 Representations of p-Ary Functions . . . . . . . . . . . . 466
20.2.2.2 The Walsh Transform of a Vectorial Function . . . . . . 468
20.2.3 Nonlinearity of Vectorial Boolean Functions and Bent Boolean
Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 469
20.2.4 Plateaued Functions and More about Bent Functions . . . . . . . 471
20.2.5 Differential Uniformity of Vectorial Boolean Functions, PN, and
APN Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
20.2.6 APN and Planar Functions over Fqm . . . . . . . . . . . . . . . . 474
20.2.7 Dickson Polynomials . . . . . . . . . . . . . . . . . . . . . . . . . 475
20.3 Generic Constructions of Linear Codes . . . . . . . . . . . . . . . . . . . 476
20.3.1 The First Generic Construction . . . . . . . . . . . . . . . . . . . 476
20.3.2 The Second Generic Construction . . . . . . . . . . . . . . . . . . 478
20.3.2.1 The Defining Set Construction of Linear Codes . . . . . 478
20.3.2.2 Generalizations of the Defining Set Construction of Lin-
ear Codes . . . . . . . . . . . . . . . . . . . . . . . . . . 479
20.3.2.3 A Modified Defining Set Construction of Linear Codes . 479
20.4 Binary Codes with Few Weights from Boolean Functions and Vectorial
Boolean Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
20.4.1 A First Example of Codes from Boolean Functions: Reed–Muller
Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
20.4.2 A General Construction of Binary Linear Codes from Boolean
Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
20.4.3 Binary Codes from the Preimage f −1 (b) of Boolean Functions f . 480
20.4.4 Codes with Few Weights from Bent Boolean Functions . . . . . . 481
Contents xv

20.4.5 Codes with Few Weights from Semi-Bent Boolean Functions . . . 482
20.4.6 Linear Codes from Quadratic Boolean Functions . . . . . . . . . . 483
20.4.7 Binary Codes CDf with Three Weights . . . . . . . . . . . . . . . 484
20.4.8 Binary Codes CDf with Four Weights . . . . . . . . . . . . . . . . 484
20.4.9 Binary Codes CDf with at Most Five Weights . . . . . . . . . . . 485
20.4.10 A Class of Two-Weight Binary Codes from the Preimage of a Type
of Boolean Function . . . . . . . . . . . . . . . . . . . . . . . . . . 486
20.4.11 Binary Codes from Boolean Functions Whose Supports are Rela-
tive Difference Sets . . . . . . . . . . . . . . . . . . . . . . . . . . 487
20.4.12 Binary Codes with Few Weights from Plateaued Boolean Functions 487
20.4.13 Binary Codes with Few Weights from Almost Bent Functions . . 488
20.4.14 Binary Codes CD(G) from Functions on F2m of the Form G(x) =
F (x) + F (x + 1) + 1 . . . . . . . . . . . . . . . . . . . . . . . . . 489
20.4.15 Binary Codes from the Images of Certain Functions on F2m . . . 489
20.5 Constructions of Cyclic Codes from Functions: The Sequence Approach . 490
20.5.1 A Generic Construction of Cyclic Codes with Polynomials . . . . 490
20.5.2 Binary Cyclic Codes from APN Functions . . . . . . . . . . . . . 492
20.5.3 Non-Binary Cyclic Codes from Monomials and Trinomials . . . . 495
20.5.4 Cyclic Codes from Dickson Polynomials . . . . . . . . . . . . . . . 498
20.6 Codes with Few Weights from p-Ary Functions with p Odd . . . . . . . . 503
20.6.1 Codes with Few Weights from p-Ary Weakly Regular Bent Func-
tions Based on the First Generic Construction . . . . . . . . . . . 503
20.6.2 Linear Codes with Few Weights from Cyclotomic Classes and
Weakly Regular Bent Functions . . . . . . . . . . . . . . . . . . . 504
20.6.3 Codes with Few Weights from p-Ary Weakly Regular Bent Func-
tions Based on the Second Generic Construction . . . . . . . . . . 507
20.6.4 Codes with Few Weights from p-Ary Weakly Regular Plateaued
Functions Based on the First Generic Construction . . . . . . . . 508
20.6.5 Codes with Few Weights from p-Ary Weakly Regular Plateaued
Functions Based on the Second Generic Construction . . . . . . . 510
20.7 Optimal Linear Locally Recoverable Codes from p-Ary Functions . . . . . 521
20.7.1 Constructions of r-Good Polynomials for Optimal LRC Codes . . 523
20.7.1.1 Good Polynomials from Power Functions . . . . . . . . . 523
20.7.1.2 Good Polynomials from Linearized Functions . . . . . . 523
20.7.1.3 Good Polynomials from Function Composition . . . . . 523
20.7.1.4 Good Polynomials from Dickson Polynomials of the First
Kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
20.7.1.5 Good Polynomials from the Composition of Functions In-
volving Dickson Polynomials . . . . . . . . . . . . . . . . 525

21 Codes over Graphs 527


Christine A. Kelley
21.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 527
21.2 Low-Density Parity Check Codes . . . . . . . . . . . . . . . . . . . . . . . 528
21.3 Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532
21.3.1 Decoder Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . 537
21.4 Codes from Finite Geometries . . . . . . . . . . . . . . . . . . . . . . . . 540
21.5 Codes from Expander Graphs . . . . . . . . . . . . . . . . . . . . . . . . 542
21.6 Protograph Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
21.7 Density Evolution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548
21.8 Other Families of Codes over Graphs . . . . . . . . . . . . . . . . . . . . 550
xvi Contents

21.8.1 Turbo Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550


21.8.2 Repeat Accumulate Codes . . . . . . . . . . . . . . . . . . . . . . 551
21.8.3 Spatially-Coupled LDPC Codes . . . . . . . . . . . . . . . . . . . 551

III Applications 553


22 Alternative Metrics 555
Marcelo Firer
22.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
22.2 Metrics Generated by Subspaces . . . . . . . . . . . . . . . . . . . . . . . 558
22.2.1 Projective Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
22.2.2 Combinatorial Metrics . . . . . . . . . . . . . . . . . . . . . . . . 559
22.2.2.1 Block Metrics . . . . . . . . . . . . . . . . . . . . . . . . 561
22.2.2.2 b-Burst Metrics . . . . . . . . . . . . . . . . . . . . . . . 561
22.2.2.3 b1 × b2 -Burst Metrics . . . . . . . . . . . . . . . . . . . . 562
22.3 Poset Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562
22.3.1 Poset-Block Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . 565
22.3.2 Graph Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
22.4 Additive Generalizations of the Lee Metric . . . . . . . . . . . . . . . . . 566
22.4.1 Metrics over Rings of Integers . . . . . . . . . . . . . . . . . . . . 566
22.4.2 l-Dimensional Lee Weights . . . . . . . . . . . . . . . . . . . . . . 567
22.4.3 Kaushik–Sharma Metrics . . . . . . . . . . . . . . . . . . . . . . . 567
22.5 Non-Additive Metrics Digging into the Alphabet . . . . . . . . . . . . . . 568
22.5.1 Pomset Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
22.5.2 m-Spotty Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . 569
22.6 Metrics for Asymmetric Channels . . . . . . . . . . . . . . . . . . . . . . 570
22.6.1 The Asymmetric Metric . . . . . . . . . . . . . . . . . . . . . . . 570
22.6.2 The Generalized Asymmetric Metric . . . . . . . . . . . . . . . . 571
22.7 Editing Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
22.7.1 Bounds for Editing Codes . . . . . . . . . . . . . . . . . . . . . . 572
22.8 Permutation Metrics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573

23 Algorithmic Methods 575


Alfred Wassermann
23.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575
23.2 Linear Codes with Prescribed Minimum Distance . . . . . . . . . . . . . 576
23.3 Linear Codes as Sets of Points in Projective Geometry . . . . . . . . . . . 577
23.3.1 Automorphisms of Projective Point Sets . . . . . . . . . . . . . . 580
23.4 Projective Point Sets with Prescribed Automorphism Groups . . . . . . . 582
23.4.1 Strategies for Choosing Groups . . . . . . . . . . . . . . . . . . . 585
23.4.2 Observations for Permutation Groups . . . . . . . . . . . . . . . . 585
23.4.3 Observations for Cyclic Groups . . . . . . . . . . . . . . . . . . . 586
23.5 Solving Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
23.6 Construction of Codes with Additional Restrictions . . . . . . . . . . . . 587
23.6.1 Projective Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
23.6.2 Codes with Few Weights . . . . . . . . . . . . . . . . . . . . . . . 587
23.6.3 Divisible Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
23.6.4 Codes with Prescribed Gram Matrix . . . . . . . . . . . . . . . . 589
23.6.5 Self-Orthogonal Codes . . . . . . . . . . . . . . . . . . . . . . . . 591
23.6.6 LCD Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592
23.7 Extensions of Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
Contents xvii

23.8 Determining the Minimum Distance and Weight Distribution . . . . . . . 595

24 Interpolation Decoding 599


Swastik Kopparty
24.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599
24.2 The Berlekamp–Welch Algorithm . . . . . . . . . . . . . . . . . . . . . . 600
24.2.1 Correctness of the Algorithm RSDecode . . . . . . . . . . . . . . 602
24.3 List-decoding of Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . 603
24.3.1 The Sudan Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 603
24.3.2 Correctness of the Algorithm RSListDecodeV1 . . . . . . . . . . . 604
24.4 List-decoding of Reed–Solomon Codes Using Multiplicities . . . . . . . . 605
24.4.1 Preparations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 606
24.4.2 The Guruswami–Sudan Algorithm . . . . . . . . . . . . . . . . . . 607
24.4.3 Correctness of the Algorithm RSListDecodeV2 . . . . . . . . . . . 608
24.4.4 Why Do Multiplicities Help? . . . . . . . . . . . . . . . . . . . . . 608
24.5 Decoding of Interleaved Reed–Solomon Codes under Random Error . . . 609
24.6 Further Reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611

25 Pseudo-Noise Sequences 613


Tor Helleseth and Chunlei Li
25.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 613
25.2 Sequences with Low Correlation . . . . . . . . . . . . . . . . . . . . . . . 614
25.2.1 Correlation Measures of Sequences . . . . . . . . . . . . . . . . . 614
25.2.2 Sequences with Low Periodic Autocorrelation . . . . . . . . . . . 619
25.2.3 Sequence Families with Low Periodic Correlation . . . . . . . . . 624
25.3 Shift Register Sequences . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626
25.3.1 Feedback Shift Registers . . . . . . . . . . . . . . . . . . . . . . . 627
25.3.2 Cycle Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628
25.3.3 Cycle Joining and Splitting . . . . . . . . . . . . . . . . . . . . . . 630
25.3.4 Cycle Structure of LFSRs . . . . . . . . . . . . . . . . . . . . . . 631
25.4 Generation of De Bruijn Sequences . . . . . . . . . . . . . . . . . . . . . . 634
25.4.1 Graphical Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 634
25.4.2 Combinatorial Approach . . . . . . . . . . . . . . . . . . . . . . . 636
25.4.3 Algebraic Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 640

26 Lattice Coding 645


Frédérique Oggier
26.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 645
26.2 Lattice Coding for the Gaussian Channel . . . . . . . . . . . . . . . . . . 646
26.3 Modulation Schemes for Fading Channels . . . . . . . . . . . . . . . . . . 648
26.3.1 Channel Model and Design Criteria . . . . . . . . . . . . . . . . . 648
26.3.2 Lattices from Quadratic Fields . . . . . . . . . . . . . . . . . . . . 649
26.4 Lattices from Linear Codes . . . . . . . . . . . . . . . . . . . . . . . . . . 651
26.4.1 Construction A . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
26.4.2 Constructions D and D . . . . . . . . . . . . . . . . . . . . . . . . 653
26.5 Variations of Lattice Coding Problems . . . . . . . . . . . . . . . . . . . . 654
26.5.1 Index Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
26.5.2 Wiretap Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 655
xviii Contents

27 Quantum Error-Control Codes 657


Martianus Frederic Ezerman
27.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 657
27.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 658
27.3 The Stabilizer Formalism . . . . . . . . . . . . . . . . . . . . . . . . . . . 660
27.4 Constructions via Classical Codes . . . . . . . . . . . . . . . . . . . . . . 665
27.5 Going Asymmetric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669
27.6 Other Approaches and a Conclusion . . . . . . . . . . . . . . . . . . . . . 671

28 Space-Time Coding 673


Frédérique Oggier
28.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 673
28.2 Channel Models and Design Criteria . . . . . . . . . . . . . . . . . . . . . 674
28.2.1 Coherent Space-Time Coding . . . . . . . . . . . . . . . . . . . . 675
28.2.2 Differential Space-Time Coding . . . . . . . . . . . . . . . . . . . 676
28.3 Some Examples of Space-Time Codes . . . . . . . . . . . . . . . . . . . . 677
28.3.1 The Alamouti Code . . . . . . . . . . . . . . . . . . . . . . . . . . 677
28.3.2 Linear Dispersion Codes . . . . . . . . . . . . . . . . . . . . . . . 678
28.3.3 The Golden Code . . . . . . . . . . . . . . . . . . . . . . . . . . . 678
28.3.4 Cayley Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679
28.4 Variations of Space-Time Coding Problems . . . . . . . . . . . . . . . . . 680
28.4.1 Distributed Space-Time Coding . . . . . . . . . . . . . . . . . . . 680
28.4.2 Space-Time Coded Modulation . . . . . . . . . . . . . . . . . . . 681
28.4.3 Fast Decodable Space-Time Codes . . . . . . . . . . . . . . . . . . 681
28.4.4 Secure Space-Time Coding . . . . . . . . . . . . . . . . . . . . . . 683

29 Network Codes 685


Frank R. Kschischang
29.1 Packet Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685
29.2 Multicasting from a Single Source . . . . . . . . . . . . . . . . . . . . . . 687
29.2.1 Combinational Packet Networks . . . . . . . . . . . . . . . . . . . 687
29.2.2 Network Information Flow Problems . . . . . . . . . . . . . . . . 689
29.2.3 The Unicast Problem . . . . . . . . . . . . . . . . . . . . . . . . . 689
29.2.4 Linear Network Coding Achieves Multicast Capacity . . . . . . . 690
29.2.5 Multicasting from Multiple Sources . . . . . . . . . . . . . . . . . 691
29.3 Random Linear Network Coding . . . . . . . . . . . . . . . . . . . . . . . 692
29.4 Operator Channels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694
29.4.1 Vector Space, Matrix, and Combinatorial Preliminaries . . . . . . 694
29.4.2 The Operator Channel . . . . . . . . . . . . . . . . . . . . . . . . 697
29.5 Codes and Metrics in Pq (n) . . . . . . . . . . . . . . . . . . . . . . . . . . 698
29.5.1 Subspace Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698
29.5.2 Coding Metrics on Pq (n) . . . . . . . . . . . . . . . . . . . . . . . 699
29.6 Bounds on Constant-Dimension Codes . . . . . . . . . . . . . . . . . . . . 701
29.6.1 The Sphere Packing Bound . . . . . . . . . . . . . . . . . . . . . . 701
29.6.2 The Singleton Bound . . . . . . . . . . . . . . . . . . . . . . . . . 702
29.6.3 The Anticode Bound . . . . . . . . . . . . . . . . . . . . . . . . . 702
29.6.4 Johnson-Type Bounds . . . . . . . . . . . . . . . . . . . . . . . . 703
29.6.5 The Ahlswede and Aydinian Bound . . . . . . . . . . . . . . . . . 704
29.6.6 A Gilbert–Varshamov-Type Bound . . . . . . . . . . . . . . . . . 704
29.7 Constructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
29.7.1 Lifted Rank-Metric Codes . . . . . . . . . . . . . . . . . . . . . . 705
Contents xix

29.7.2 Padded Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 707


29.7.3 Lifted Ferrers Diagram Codes . . . . . . . . . . . . . . . . . . . . 708
29.7.4 Codes Obtained by Integer Linear Programming . . . . . . . . . . 710
29.7.5 Further Constructions . . . . . . . . . . . . . . . . . . . . . . . . 710
29.8 Encoding and Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
29.8.1 Encoding a Union of Lifted FD Codes . . . . . . . . . . . . . . . 711
29.8.2 Decoding Lifted Delsarte–Gabidulin Codes . . . . . . . . . . . . . 711
29.8.3 Decoding a Union of Lifted FD Codes . . . . . . . . . . . . . . . . 712
29.9 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 713

30 Coding for Erasures and Fountain Codes 715


Ian F. Blake
30.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715
30.2 Tornado Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717
30.3 LT Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722
30.4 Raptor Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 727

31 Codes for Distributed Storage 735


Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil Krishnan,
Birenjith Sasidharan, and P. Vijay Kumar
31.1 Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737
31.2 Regenerating Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 738
31.2.1 An Example of a Regenerating Code and Sub-Packetization . . . 739
31.2.2 General Definition of a Regenerating Code . . . . . . . . . . . . . 739
31.2.3 Bound on File Size . . . . . . . . . . . . . . . . . . . . . . . . . . 740
31.2.4 MSR and MBR Codes . . . . . . . . . . . . . . . . . . . . . . . . 741
31.2.5 Storage Bandwidth Tradeoff for Exact-Repair . . . . . . . . . . . 742
31.2.6 Polygon MBR Codes . . . . . . . . . . . . . . . . . . . . . . . . . 742
31.2.7 The Product-Matrix MSR and MBR Constructions . . . . . . . . 743
31.2.7.1 PM-MSR Codes . . . . . . . . . . . . . . . . . . . . . . . 743
31.2.7.2 PM-MBR Codes . . . . . . . . . . . . . . . . . . . . . . 744
31.2.8 The Clay Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
31.2.9 Variants of Regenerating Codes . . . . . . . . . . . . . . . . . . . 748
31.3 Locally Recoverable Codes . . . . . . . . . . . . . . . . . . . . . . . . . . 749
31.3.1 Information Symbol Locality . . . . . . . . . . . . . . . . . . . . . 750
31.3.1.1 Pyramid Codes . . . . . . . . . . . . . . . . . . . . . . . 750
31.3.1.2 Windows Azure LRC . . . . . . . . . . . . . . . . . . . . 751
31.3.2 All Symbol Locality . . . . . . . . . . . . . . . . . . . . . . . . . . 751
31.3.3 LRCs over Small Field Size . . . . . . . . . . . . . . . . . . . . . . 753
31.3.4 Recovery from Multiple Erasures . . . . . . . . . . . . . . . . . . 754
31.3.4.1 Codes with Sequential Recovery . . . . . . . . . . . . . . 754
31.3.4.2 Codes with Parallel Recovery . . . . . . . . . . . . . . . 755
31.3.4.3 Codes with Availability . . . . . . . . . . . . . . . . . . 755
31.3.4.4 Codes with Cooperative Recovery . . . . . . . . . . . . . 756
31.3.4.5 Codes with (r, δ) Locality . . . . . . . . . . . . . . . . . 756
31.3.4.6 Hierarchical Codes . . . . . . . . . . . . . . . . . . . . . 757
31.3.5 Maximally Recoverable Codes . . . . . . . . . . . . . . . . . . . . 757
31.4 Locally Regenerating Codes . . . . . . . . . . . . . . . . . . . . . . . . . . 758
31.5 Efficient Repair of Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . 759
31.6 Codes for Distributed Storage in Practice . . . . . . . . . . . . . . . . . . 760
xx Contents

32 Polar Codes 763


Noam Presman and Simon Litsyn
32.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763
32.2 Kernel Based ECCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764
32.2.1 Kernel Based ECCs are Recursive GCCs . . . . . . . . . . . . . . 766
32.3 Channel Splitting and Combining and the SC Algorithm . . . . . . . . . 769
32.4 Polarization Conditions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
32.4.1 Polarization Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . 774
32.5 Polar Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
32.5.1 Polar Code Design . . . . . . . . . . . . . . . . . . . . . . . . . . 775
32.6 Polar Codes Encoding Algorithms . . . . . . . . . . . . . . . . . . . . . . 776
32.7 Polar Codes Decoding Algorithms . . . . . . . . . . . . . . . . . . . . . . 777
32.7.1 The SC Decoding Algorithm . . . . . . . . . . . . . . . . . . . . . 778
32.7.1.1 SC for (u + v, v) . . . . . . . . . . . . . . . . . . . . . . 778
32.7.1.2 SC for General Kernels . . . . . . . . . . . . . . . . . . . 780
32.7.1.3 SC Complexity . . . . . . . . . . . . . . . . . . . . . . . 781
32.7.2 The SCL Decoding Algorithm . . . . . . . . . . . . . . . . . . . . 781
32.8 Summary and Concluding Remarks . . . . . . . . . . . . . . . . . . . . . 783

33 Secret Sharing with Linear Codes 785


Cunsheng Ding
33.1 Introduction to Secret Sharing Schemes . . . . . . . . . . . . . . . . . . . 785
33.2 The First Construction of Secret Sharing Schemes . . . . . . . . . . . . . 787
33.3 The Second Construction of Secret Sharing Schemes . . . . . . . . . . . . 790
33.3.1 Minimal Linear Codes and the Covering Problem . . . . . . . . . 790
33.3.2 The Second Construction of Secret Sharing Schemes . . . . . . . . 791
33.3.3 Secret Sharing Schemes from the Duals of Minimal Codes . . . . 792
33.3.4 Other Works on the Second Construction . . . . . . . . . . . . . . 793
33.4 Multisecret Sharing with Linear Codes . . . . . . . . . . . . . . . . . . . 794
33.4.1 The Relation Between Multisecret Sharing and Codes . . . . . . . 795
33.4.2 Linear Threshold Schemes and MDS Codes . . . . . . . . . . . . . 796

34 Code-Based Cryptography 799


Philippe Gaborit and Jean-Christophe Deneuville
34.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
34.1.1 Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 800
34.1.2 Background on Coding Theory . . . . . . . . . . . . . . . . . . . . 801
34.2 Difficult Problems for Code-Based Cryptography: The Syndrome Decoding
Problem and Its Variations . . . . . . . . . . . . . . . . . . . . . . . . . . 803
34.3 Best-Known Attacks for the Syndrome Decoding Problem . . . . . . . . . 804
34.4 Public-Key Encryption from Coding Theory with Hidden Structure . . . 807
34.4.1 The McEliece and Niederreiter Frameworks . . . . . . . . . . . . 807
34.4.2 Group-Structured McEliece Framework . . . . . . . . . . . . . . . 809
34.4.3 Moderate-Density Parity Check (MDPC) Codes . . . . . . . . . . 810
34.5 PKE Schemes with Reduction to Decoding Random Codes without Hidden
Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 812
34.5.1 Alekhnovich’s Approach . . . . . . . . . . . . . . . . . . . . . . . 812
34.5.2 HQC: Efficient Encryption from Random Quasi-Cyclic Codes . . 813
34.5.3 Ouroboros Key-Exchange Protocol . . . . . . . . . . . . . . . . . 814
34.6 Examples of Parameters for Code-Based Encryption and Key Exchange . 815
34.7 Authentication: The Stern Zero-Knowledge Protocol . . . . . . . . . . . . 816
Contents xxi

34.8 Digital Signatures from Coding Theory . . . . . . . . . . . . . . . . . . . 817


34.8.1 Signature from a Zero-Knowledge Authentication Scheme with the
Fiat–Shamir Heuristic . . . . . . . . . . . . . . . . . . . . . . . . 818
34.8.2 The CFS Signature Scheme . . . . . . . . . . . . . . . . . . . . . 818
34.8.3 The WAVE Signature . . . . . . . . . . . . . . . . . . . . . . . . . 819
34.8.4 Few-Times Signature Schemes and Variations . . . . . . . . . . . 820
34.9 Other Primitives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820
34.10 Rank-Based Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . 820

Bibliography 823

Index 941
Preface

The 1948 publication of the paper A mathematical theory of communication by Claude E.


Shannon is considered to be the genesis of the now vast area of coding theory. In the over 70
years since this monumental work first appeared, coding theory has grown into a discipline
intersecting mathematics, computer science, and engineering with applications to almost
every area of communication and data storage and even beyond. Given a communication
channel on which data is transmitted or a storage device on which data is kept, that data
may be corrupted by errors or erasures. In what form do you put that data so that the
original information can be recovered and how do you make that recovery? Shannon’s paper
showed that coding theory provides an answer to that question. The Concise Encyclopedia
of Coding Theory, somewhat in the spirit of the 1998 Handbook of Coding Theory [1521],
examines many of the major areas and themes of coding theory taking the reader from the
basic introductory level to the frontiers of research.
The authors chosen to contribute to this encyclopedia were selected because of their
expertise and understanding of the specific topic of their chapter. Authors have introduced
the topic of their chapter in relationship to how it fits into the historical development of
coding theory and why their topic is of theoretical and/or applied interest. Each chapter
progresses from basic to advanced ideas with few proofs but with many references to which
the reader may go for more in-depth study. An attempt has been made within each chapter
to point the reader to other chapters in the encyclopedia that deal with similar or related
material. An extensive index is provided to help guide the reader interested in pursuing a
particular concept.
The Concise Encyclopedia of Coding Theory is divided into of three parts: Part I explores
the fundamentals of coding theory, Part II examines specific families of codes, and Part III
focuses on the practical application of codes.
The first thirteen chapters make up Part I of this encyclopedia. This part explores the
fundamental concepts involved in the development of error-correcting codes. Included is an
introduction to several historically significant types of codes along with some of their natural
generalizations. The mathematical theory behind these codes and techniques for studying
them are also introduced. Readers of this encyclopedia who are new to coding theory are
encouraged to first read Chapter 1 and then consider other chapters that interest them.
More advanced readers may wish to skim Chapter 1 but then move to other chapters.
Chapter 1, written by the editors of this encyclopedia, is an introduction to the basic
concepts of coding theory and sets the stage with notation and terminology used throughout
the book. The chapter starts with a simple communication channel moving then to the
definition of linear and nonlinear codes over finite fields. Basic concepts needed to explore
codes are introduced along with families of classical codes: Hamming, Reed–Muller, cyclic,
Golay, BCH, and Reed–Solomon codes. The chapter concludes with an brief introduction
to encoding, decoding, and Shannon’s Theorem, the latter becoming the justification and
motivation for the entire discipline.
Chapter 2, written by Cunsheng Ding, describes two fundamental constructions of cyclic
codes and the BCH and Hartmann–Tzeng Bounds on cyclic codes. The main task of this
chapter is to introduce several important families of cyclic codes, including irreducible cyclic

xxiii
xxiv Preface

codes, reversible cyclic codes, BCH codes, duadic codes, punctured generalized Reed–Muller
codes, and a new generalization of the punctured binary Reed–Muller codes.
Shannon’s proof of the existence of good codes is non-constructive and therefore of little
use for applications, where one needs one or all codes with specific (small) parameters.
Techniques for constructing and classifying codes are considered in Chapter 3, written by
Patric R. J. Östergård, with an emphasis on computational methods. Some classes of codes
are discussed in more detail: perfect codes, MDS codes, and general binary codes.
Self-dual codes form one of the important classes of linear codes because of their rich
algebraic structure and their close connections with other combinatorial configurations like
block designs, lattices, graphs, etc. Topics covered in Chapter 4, by Stefka Bouyuklieva,
include construction methods, results on enumeration and classification, and bounds for
the minimum distance of self-dual codes over fields of size 2, 3, and 4.
Combinatorial designs often arise in codes that are optimal with respect to certain
bounds and are used in some decoding algorithms. Chapter 5, written by Vladimir D.
Tonchev, summarizes links between combinatorial designs and perfect codes, optimal codes
meeting the restricted Johnson Bound, and linear codes admitting majority logic decoding.
Chapters 1–5 explore codes over fields; Chapter 6, by Steven T. Dougherty, introduces
codes over rings. The chapter begins with a discussion of quaternary codes over the integers
modulo 4 and their Gray map, which popularized the study of codes over more general
rings. It then discusses codes over rings in a very broad sense describing families of rings,
the Chinese Remainder Theorem applied to codes, generating matrices, and bounds. It also
gives a description of the MacWilliams Identities for codes over rings.
Quasi-cyclic codes form an important class of algebraic codes that includes cyclic codes
as a special subclass. Chapter 7, coauthored by Cem Güneri, San Ling, and Buket Özkaya,
focuses on the algebraic structure of quasi-cyclic codes. Based on these structural properties,
some asymptotic results, minimum distance bounds, and further applications, such as the
trace representation and characterization of certain subfamilies of quasi-cyclic codes, are
elaborated upon.
Cyclic and quasi-cyclic codes are studied as ideals in ordinary polynomial rings. Chap-
ter 8, by Heide Gluesing-Luerssen, is a survey devoted to skew-polynomial rings and skew-
cyclic block codes. After discussing some relevant algebraic properties of skew polynomials,
the basic notions of skew-cyclic codes, such as generator polynomial, parity check polyno-
mial, and duality are investigated. The basic tool is a skew-circulant matrix. The chapter
concludes with results on constructions of skew-BCH codes.
The coauthors Jürgen Bierbrauer, Stefano Marcugini, and Fernanda Pambianco of Chap-
ter 9 develop the theory of cyclic additive codes, both in the permutation sense and in the
monomial sense when the code length is coprime to the characteristic of the underlying field.
This generalizes the classical theory of cyclic and constacyclic codes, respectively, from the
category of linear codes to the category of additive codes. The cyclic quantum codes corre-
spond to a special case when the codes are self-orthogonal with respect to the symplectic
bilinear form.
Up to this point the codes considered are block codes where codewords all have fixed
length. That is no longer the case in Chapter 10, coauthored by Julia Lieb, Raquel Pinto,
and Joachim Rosenthal. This chapter provides a survey of convolutional codes stressing the
connections to module theory and systems theory. Constructions of codes with maximal
possible distance and distance profile are provided.
Chapter 11, written by Elisa Gorla, provides a mathematical introduction to rank-
metric codes, beginning with the definition of the rank metric and the corresponding codes,
whose elements can be either vectors or matrices. This is followed by the definition of code
equivalence and the notion of support for a codeword and for a code. This chapter treats
some of the basic concepts in the mathematical theory of rank-metric codes: duality, weight
Preface xxv

enumerators and the MacWilliams Identities, higher rank weights, MRD codes, optimal
anticodes, and q-polymatroids associated to a rank-metric code.
The final two chapters of Part I deal with the important technique of linear programming
and a related generalization to produce bounds. As described in Chapter 12, coauthored by
Peter Boyvalenkov and Danyo Danev, general linear programming methods imply universal
bounds for codes and designs. The explanation is organized in the Levenshtein framework
extended with recent developments on universal bounds for the energy of codes, including
the concept of universal optimality. The exposition is done separately for codes in Hamming
spaces and for spherical codes.
Linear programming bounds, initially developed by Delsarte, belong to the most power-
ful and flexible methods to obtain bounds for extremal problems in coding theory. In recent
years, after the pioneering work of Schrijver, semidefinite programming bounds have been
developed with two aims: to strengthen linear programming bounds and to find bounds
for more general spaces. Chapter 13, by Frank Vallentin, introduces semidefinite program-
ming bounds with an emphasis on error-correcting codes and its relation to semidefinite
programming hierarchies for difficult combinatorial optimization problems.
The next eight chapters make up Part II of the Concise Encyclopedia of Coding Theory,
where the focus is on specific families of codes. The codes presented fall into two categories,
with some overlap. Some of them are generalizations of classical codes from Part I. The rest
have a direct connection to algebraic, geometric, or graph theoretic structures. They all are
interesting theoretically and often possess properties useful for application.
There are many problems in coding theory which are equivalent to geometrical prob-
lems in Galois geometries. Certain formulations of some of the classical codes have direct
connections to geometry. Chapter 14, written by Leo Storme, describes a number of the
many links between coding theory and Galois geometries, and shows how these two research
areas influence and stimulate each other.
Chapter 15, written by Alain Couvreur and Hugues Randriambololona, surveys the
development of the theory of algebraic geometry codes since their discovery in the late
1970s. The authors summarize the major results on various problems such as asymptotic
parameters, improved estimates on the minimum distance, and decoding algorithms. In
addition, the chapter describes various modern applications of these codes such as public-
key cryptography, algebraic complexity theory, multiparty computation, and distributed
storage.
Very often the parameters of good/optimal linear codes can be realized by group codes,
that is, ideals in a group algebra FG where G is a finite group and F is a finite field. Such
codes, the topic of Chapter 16 written by Wolfgang Willems, carry more algebraic structure
than only linear codes, which leads to an easier analysis of the codes. In particular, the full
machinery of representation theory of finite groups can be applied to prove interesting
coding theoretical properties.
Chapter 17, coauthored by Hai Q. Dinh and Sergio R. López-Permouth, discusses foun-
dational and theoretical aspects of the role of finite rings as alphabets in coding theory, with
a concentration on the class of constacyclic codes over finite commutative chain rings. The
chapter surveys both the simple-root and repeated-root cases. Several directions in which
the notion of constacyclicity has been extended are also presented.
The next three chapters focus on codes with few weights; such codes have applications
delineated throughout this encyclopedia. As described in Chapter 18, written by Minjia Shi,
one important construction technique for few-weight codes is to use trace codes. For example
the simplex code, a one-weight code, can be constructed as a trace code by using finite field
extensions. In recent years, this technique has been refined by using ring extensions of a
xxvi Preface

finite field coupled with a linear Gray map. Moreover, these image codes can be applied to
secret sharing schemes.
Codes with few weights often have an interesting geometric structure. Chapter 19, writ-
ten by Andries E. Brouwer, focuses specifically on codes with exactly two nonzero weights.
The chapter discusses the relationship between two-weight linear codes, strongly regular
graphs, and 2-character subsets of a projective space.
Functions in general and more specifically cryptographic functions, that is highly non-
linear functions (PN, APN, bent, AB, plateaued), have important applications in coding
theory since they are used to construct optimal linear codes and linear codes useful for
applications such as secret sharing, two-party computation, and storage. The ultimate goal
of Chapter 20, by Sihem Mesnager, is to provide an overview and insights into linear codes
with good parameters that are constructed from functions and polynomials over finite fields
using multiple approaches.
Chapter 21 by Christine A. Kelley, the concluding chapter of Part II, gives an overview of
graph-based codes and iterative message-passing decoding algorithms for these codes. Some
important classes of low-density parity check codes, such as finite geometry codes, expander
codes, protograph codes, and spatially coupled codes are discussed. Moreover, analysis tech-
niques of the decoding algorithm for both the finite length case and the asymptotic length
case are summarized. While the area of codes over graphs is vast, a few other families such
as repeat accumulate and turbo-like codes are briefly mentioned.
The final chapter of Part II provides a natural bridge to the applications in Part III
as codes from graphs were designed to facilitate communication. The thirteen chapters of
Part III examine several applications that fall into two categories, again with some overlap.
Some of the applications present codes developed for specific uses; other applications use
codes to produce other structures that themselves become the main application.
The first chapter in Part III is again a bridge between the previous and successive
chapters as it has a distinct theoretical slant but its content is useful as well in applications.
Chapter 22, written by Marcelo Firer, gives an account of many metrics used in the context
of coding theory, mainly for decoding purposes. The chapter tries to stress the role of some
metric related invariants and aspects that are eclipsed at the usual setting of the Hamming
metric.
Chapter 23, written by Alfred Wassermann, examines algorithms for computer construc-
tion of “good” linear codes and methods to determine the minimum distance and weight
enumerator of a linear code. For code construction the focus is on the geometric view: a
linear code can be seen as a suitable set of points in a projective geometry. The search then
reduces to an integer linear programming problem. The chapter explores how the search
space can be much reduced by prescribing a group of symmetries and how to construct
special code types such as self-orthogonal codes or LCD codes.
In Chapter 24 by Swastik Kopparty we will see some algorithmic ideas based on polyno-
mial interpolation for decoding algebraic codes, applied to generalized Reed–Solomon and
interleaved generalized Reed–Solomon codes. These ideas will power decoding algorithms
that can decode algebraic codes beyond half the minimum distance.
The theory of pseudo-noise sequences has close connections with coding theory, cryptog-
raphy, combinatorics, and discrete mathematics. Chapter 25, coauthored by Tor Helleseth
and Chunlei Li, gives a brief introduction of two kinds of pseudo-noise sequences, namely
sequences with low correlation and shift register sequences with maximum periods, which
are of particular interest in modern communication systems.
Lattice coding is presented in Chapter 26, written by Frédérique Oggier, in the context
of Gaussian and fading channels, where channel models are presented. Lattice constructions
Preface xxvii

from both quadratic fields and linear codes are described. Some variations of lattice coding
are also discussed.
A bridge between classical coding theory and quantum error control was firmly put in
place via the stabilizer formalism, allowing the capabilities of a quantum stabilizer code to
be inferred from the properties of the corresponding classical codes. Well-researched tools
and the wealth of results in classical coding theory often translate nicely to the design of
good quantum codes, the subject of Chapter 27 by Martianus Frederic Ezerman. Research
problems triggered by error-control issues in the quantum setup revive and expand studies
on specific aspects of classical codes, which were previously overlooked or deemed not so
interesting.
Chapter 28 on space-time coding, written by Frédérique Oggier, defines what space-time
coding actually is and what are variations of space-time coding problems. The chapter also
provides channel models and design criteria, together with several examples.
Chapter 29, by Frank R. Kschischang, describes error-correcting network codes for
packet networks employing random linear network coding. In such networks, packets sent
into the network by the transmitter are regarded as a basis for a vector space over a finite
field, and the network provides the receiver with random linear combinations of the trans-
mitted vectors, possibly also combined with noise vectors. Unlike classical coding theory—
where codes are collections of well-separated vectors, each of them a point of some ambient
vector space—here codes are collections of well-separated vector spaces, each of them a sub-
space of some ambient vector space. The chapter provides appropriate coding metrics for
such subspace codes, and describes various bounds and constructions, focusing particularly
on the case of constant-dimension codes whose codewords all have the same dimension.
Erasure codes have attained a position of importance for many streaming and file down-
load applications on the internet. Chapter 30, written by Ian F. Blake, outlines the devel-
opment of these codes from simple erasure correcting codes to the important Raptor codes.
Various decoding algorithms for these codes are developed and illustrated.
Chapter 31, with coauthors Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil
Krishnan, Birenjith Sasidharan, and P. Vijay Kumar, deals with the topic of designing
reliable and efficient codes for the storage and retrieval of large quantities of data over
storage devices that are prone to failure. Historically, the traditional objective has been one
of ensuring reliability against data loss while minimizing storage overhead. More recently,
a third concern has surfaced, namely, the need to efficiently recover from the failure of a
single storage unit corresponding to recovery from the erasure of a single code symbol. The
authors explain how coding theory has evolved to tackle this fresh challenge.
Polar codes are error-correcting codes that achieve the symmetric capacity of discrete
input memoryless channels with a polynomial encoding and decoding complexity. Chap-
ter 32, coauthored by Noam Presman and Simon Litsyn, provides a general presentation
of polar codes and their associated algorithms. At the same time, most of the examples in
the chapter use the basic Arıkan’s (u + v, v) original construction due to its simplicity and
wide applicability.
While one thinks of coding theory as the major tool to reveal correct information after
errors in that information have been introduced, the final two chapters of this encyclopedia
address the opposite problem: using coding theory as a tool to hide information. Chapter 33,
by Cunsheng Ding, first gives a brief introduction to secret sharing schemes, and then
introduces two constructions of secret sharing schemes with linear codes. It also documents
a construction of multisecret sharing schemes with linear codes. Basic results about these
secret sharing schemes are presented in this chapter.
Chapter 34, written by Philippe Gaborit and Jean-Christophe Deneuville, gives a gen-
eral overview of basic tools used for code-based cryptography. The security of the main diffi-
cult problem for code-based cryptography, the Syndrome Decoding problem, is considered,
xxviii Preface

together with its quasi-cyclic variations. The current state-of-the-art for the cryptographic
primitives of encryption, signature, and authentication is the main focus of the chapter.

The editors of the Concise Encyclopedia of Coding Theory thank the 48 other authors
for sharing their expertise to make this project come to pass. Their cooperation and patience
were invaluable to us. We also thank Gayle Imamura-Huffman for lending her transparent
watercolor Coded Information and opaque watercolor Linear Subspaces for use on the front
and back covers of this encyclopedia. Additionally we thank the editorial staff at CRC
Press/Taylor and Francis Group: Sarfraz Khan, who helped us begin this project; Callum
Fraser, who became the Mathematical Editor at CRC Press as the project progressed; and
Robin Lloyd-Starkes, who is Project Editor. Also with CRC Press, we thank Mansi Kabra
for handling permissions and copyrights and Kevin Craig who assisted with the cover design.
We thank Meeta Singh, Senior Project Manager at KnowledgeWorks Global Ltd., and her
team for production of this encyclopedia. And of course, we sincerely thank our families for
their support and encouragement throughout this journey.
– W. Cary Huffman
– Jon-Lark Kim
– Patrick Solé
Contributors

S. B. Balaji École Polytechnique


Qualcomm Palaiseau, France
Bangalore, India [email protected]
[email protected]
Danyo Danev
Jürgen Bierbrauer Department of Electrical Engineering and
Professor Emeritus Department of Mathematics
Department of Mathematical Sciences Linköping University
Michigan Technological University Linköping, Sweden
Houghton, Michigan, USA [email protected]
[email protected]
Jean-Christophe Deneuville
Ian F. Blake Ecole Nationale de l’Aviation Civile
Department of Electrical and Computer University of Toulouse, France
Engineering [email protected]
University of British Columbia
Vancouver, British Columbia, Canada Cunsheng Ding
[email protected] Department of Computer Science and
Engineering
Stefka Bouyuklieva The Hong Kong University of Science and
Faculty of Mathematics and Informatics Technology
St. Cyril and St. Methodius University Hong Kong, China
Veliko Tarnovo, Bulgaria [email protected]
[email protected]
Hai Q. Dinh
Peter Boyvalenkov Department of Mathematical Sciences
Institute of Mathematics and Informatics Kent State University
Bulgarian Academy of Sciences Warren, Ohio, USA
Sofia, Bulgaria [email protected]
and Technical Faculty
South-Western University Steven T. Dougherty
Blagoevgrad, Bulgaria Department of Mathematics
[email protected] University of Scranton
Scranton, Pennsylvania, USA
Andries E. Brouwer [email protected]
Department of Mathematics
Eindhoven University of Technology Martianus Frederic Ezerman
Eindhoven, Netherlands School of Physical and Mathematical
[email protected] Sciences
Nanyang Technological University
Alain Couvreur Singapore
Inria and LIX [email protected]

xxix
xxx Contributors

Marcelo Firer Swastik Kopparty


Department of Mathematics Department of Mathematics
State University of Campinas (Unicamp) Rutgers University
Campinas, Brasil Piscataway, New Jersey, USA
[email protected] [email protected]

Philippe Gaborit M. Nikhil Krishnan


XLIM-MATHIS Department of Electrical and Computer
University of Limoges, France Engineering
[email protected] University of Toronto
Toronto, Ontario, Canada
Heide Gluesing-Luerssen
[email protected]
Department of Mathematics
University of Kentucky
Frank R. Kschischang
Lexington, Kentucky, USA
[email protected] Department of Electrical and Computer
Engineering
Elisa Gorla University of Toronto
Institut de Mathématiques Toronto, Ontario, Canada
Université de Neuchâtel [email protected]
Neuchâtel, Switzerland
[email protected] P. Vijay Kumar
Department of Electrical Communication
Cem Güneri Engineering
Faculty of Engineering and Natural Sciences Indian Institute of Science
Sabancı University Bangalore, India
Istanbul, Turkey and
[email protected] Ming Hsieh Department of Electrical and
Computer Engineering
Tor Helleseth University of Southern California
Department of Informatics Los Angeles, California, USA
University of Bergen [email protected], [email protected]
Bergen, Norway
[email protected] Chunlei Li
Department of Informatics
W. Cary Huffman
University of Bergen
Department of Mathematics and Statistics
Bergen, Norway
Loyola University
[email protected]
Chicago, Illinois, USA
[email protected]
Julia Lieb
Christine A. Kelley Institut für Mathematik
Department of Mathematics Universität Zürich
University of Nebraska-Lincoln Zürich, Switzerland
Lincoln, Nebraska, USA [email protected]
[email protected]
San Ling
Jon-Lark Kim School of Physical and Mathematical
Department of Mathematics Sciences
Sogang University Nanyang Technological University
Seoul, South Korea Singapore
[email protected] [email protected]
Contributors xxxi

Simon Litsyn Fernanda Pambianco


Department of Electrical Dipartimento di Matematica e Informatica
Engineering-Systems Università degli Studi di Perugia
Tel Aviv University Perugia, Italy
Ramat Aviv, Israel [email protected]
[email protected]
Raquel Pinto
Sergio R. López-Permouth Departamento de Matemática
Department of Mathematics Universidade de Aveiro
Ohio University Aveiro, Portugal
Athens, Ohio, USA [email protected]
[email protected]
Noam Presman
Stefano Marcugini Department of Electrical
Dipartimento di Matematica e Informatica Engineering-Systems
Università degli Studi di Perugia Tel Aviv University
Perugia, Italy Ramat Aviv, Israel
[email protected] [email protected]

Sihem Mesnager Vinayak Ramkumar


Department of Mathematics Department of Electrical Communication
University of Paris VIII, 93526 Saint-Denis, Engineering
France Indian Institute of Science
and Bangalore, India
Laboratoire de Géométrie, Analyse et [email protected]
Applications, UMR 7539, CNRS
University Sorbonne Paris Cité, 93430 Hugues Randriambololona
Villetaneuse, France ANSSI – Laboratoire de Cryptographie
and Paris, France
Télécom Paris and
91120 Palaiseau, France Télécom Paris
[email protected] Palaiseau, France
[email protected]
Frédérique Oggier
Joachim Rosenthal
Division of Mathematical Sciences
Institut für Mathematik
Nanyang Technological University Universität Zürich
Singapore Zürich, Switzerland
[email protected] [email protected]
Patric R. J. Östergård Birenjith Sasidharan
Department of Communications and Department of Electronics and
Networking Communication Engineering
Aalto University Govt. Engineering College, Barton Hill
Espoo, Finland Trivandrum, India
[email protected]
Buket Özkaya
School of Physical and Mathematical Minjia Shi
Sciences School of Mathematical Sciences
Nanyang Technological University Anhui University
Singapore Hefei, 230601, China
[email protected] [email protected]
xxxii Contributors

Patrick Solé Bangalore, India


Lab I2M [email protected]
CNRS, Aix-Marseille Université, Centrale
Marseille Frank Vallentin
13 009 Marseilles, France Mathematisches Institut
[email protected] Universität zu Köln
Köln, Germany
Leo Storme [email protected]
Department of Mathematics: Analysis,
Alfred Wassermann
Logic and Discrete Mathematics
Mathematisches Institut
Ghent University
Universität Bayreuth
9000 Gent, Belgium
95440 Bayreuth, Germany
[email protected]
[email protected]
Vladimir D. Tonchev Wolfgang Willems
Department of Mathematical Sciences Fakultät für Mathematik
Michigan Technological University Otto-von-Guericke Universität
Houghton, Michigan, USA Magdeburg, Germany
[email protected] and
Departamento de Matemáticas y
Myna Vajha Estadı́stica
Department of Electrical Communication Universidad del Norte
Engineering Barranquilla, Colombia
Indian Institute of Science [email protected]
Part I

Coding Fundamentals

1
Chapter 1
Basics of Coding Theory

W. Cary Huffman
Loyola University, Chicago

Jon-Lark Kim
Sogang University

Patrick Solé
CNRS, Aix-Marseille Université

1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Finite Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Generator and Parity Check Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.5 Orthogonality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6 Distance and Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.7 Puncturing, Extending, and Shortening Codes . . . . . . . . . . . . . . . . . . 12
1.8 Equivalence and Automorphisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.9 Bounds on Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.9.1 The Sphere Packing Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.9.2 The Singleton Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.3 The Plotkin Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.4 The Griesmer Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.5 The Linear Programming Bound . . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.6 The Gilbert Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.9.7 The Varshamov Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.9.8 Asymptotic Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.10 Hamming Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.11 Reed–Muller Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.12 Cyclic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.13 Golay Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.14 BCH and Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.15 Weight Distributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.16 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.17 Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.18 Shannon’s Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

1.1 Introduction
Coding theory had it genesis in the late 1940s with the publication of works by Claude
Shannon, Marcel Golay, and Richard Hamming. In 1948 Shannon published a landmark

3
4 Concise Encyclopedia of Coding Theory

FIGURE 1.1: A simple communication channel

Message
Receiver
Source

6
e = e1 · · · en
x = x1 · · · xk noise e=x
x e1 · · · x
ek
message message
estimate

? ? y =c+e
c = c1 · · · cn received
Encoder codeword Channel vector Decoder
- -

paper A mathematical theory of communication [1661] which marked the beginning of both
information theory and coding theory. Given a communication channel, over which informa-
tion is transmitted and possibly corrupted, Shannon identified a number called the ‘channel
capacity’ and proved that arbitrarily reliable communication is possible at any rate below
the channel capacity. For example, when transmitting images of planets from deep space, it
is impractical to retransmit the images that have been altered by noise during transmission.
Shannon’s Theorem guarantees that the data can be encoded before transmission so that
the altered data can be decoded to the original, up to a specified degree of accuracy. Other
examples of communication channels include wireless communication devices and storage
systems such as DVDs or Blue-ray discs. In 1947 Hamming developed a code, now bearing
his name, in an attempt to correct errors that arose in the Bell Telephone Laboratories’
mechanical relay computer; his work was circulated through a series of memoranda at Bell
Labs and eventually published in [895]. Both Shannon [1661] and Golay [820] published
Hamming’s code, with Golay generalizing it. Additionally, Golay presented two of the four
codes that now bear his name. A monograph by T. M. Thompson [1801] traces the early
development of coding theory.
A simple communication channel is illustrated in Figure 1.1. At the source a mes-
sage, denoted x = x1 · · · xk in the figure, is to be sent. If no modification is made to x and
it is transmitted directly over the channel, any noise would distort x so that it could not
be recovered. The basic idea of coding theory is to embellish the message by adding some
redundancy so that hopefully the original message can be recovered after reception even if
noise corrupts the embellished message during transmission. The redundancy is added by
the encoder and the embellished message, called a codeword c = c1 · · · cn in the figure, is
sent over the channel where noise in the form of an error vector e = e1 · · · en distorts the
codeword producing a received vector y.1 The received vector is then sent to be decoded
where the errors are removed. The redundancy is then stripped off, and an estimate x e of
the original message is produced. Hopefully x e = x. (There is a one-to-one correspondence
1 Generally message and codeword symbols will come from a finite field F or a finite ring R. Messages

will be ‘vectors’ in Fk (or Rk ), and codewords will be ‘vectors’ in Fn (or Rn ). If c entered the channel and
y exited the channel, the difference y − c is what we have termed the error vector e in Figure 1.1. While
this is the normal scenario, other ambient spaces from which codes arise occur in this encyclopedia.
Basics of Coding Theory 5

between codewords and messages. In many cases, the real interest is not in the message x
but the codeword c. With this point of view, the job of the decoder is to obtain an estimate
e from y and hope that y
y e = c.) For example in deep space communication, the message
source is the satellite, the channel is outer space, the decoder is hardware at a ground sta-
tion on Earth, and the receiver is the people or computer processing the information; of
course, messages travel from Earth to the satellite as well. For a DVD or Blue-ray disc, the
message source is the voice, music, video, or data to be placed on the disc, the channel is
the disc itself, the decoder is the DVD or Blue-ray player, and the receiver is the listener or
viewer.
Shannon’s Theorem guarantees that the hope of successful recovery will be fulfilled a
certain percentage of the time. With the right encoding based on the characteristics of the
channel, this percentage can be made as high as desired, although not 100%. The proof of
Shannon’s Theorem is probabilistic and nonconstructive. No specific codes were produced
in the proof that give the desired accuracy for a given channel. Shannon’s Theorem only
guarantees their existence. In essence, the goal of coding theory is to produce codes that
fulfill the conditions of Shannon’s Theorem and make reliable communication possible.
There are numerous texts, ranging from introductory to research-level books, on coding
theory including (but certainly not limited to) [170, 209, 896, 1008, 1323, 1505, 1506, 1520,
1521, 1602, 1836]. There are two books, [169] edited by E. R. Berlekamp and [212] edited by
I. F. Blake, in which early papers in the development of coding theory have been reprinted.

1.2 Finite Fields


Finite fields play an essential role in coding theory. The theory and construction of finite
fields can be found, for example, in [1254] and [1408, Chapter 2]. Finite fields, as related
specifically to codes, are described in [1008, 1323, 1602]. In this section we give a brief
introduction.

Definition 1.2.1 A field F is a nonempty set with two binary operations, denoted + and
·, satisfying the following properties.
(a) For all α, β, γ ∈ F, α+β ∈ F, α·β ∈ F, α+β = β+α, α·β = β·α, α+(β+γ) = (α+β)+γ,
α · (β · γ) = (α · β) · γ, and α · (β + γ) = α · β + α · γ.
(b) F possesses an additive identity or zero, denoted 0, and a multiplicative identity
or unity, denoted 1, such that α + 0 = α and α · 1 = α for all α ∈ Fq .
(c) For all α ∈ F and all β ∈ F with β 6= 0, there exists α0 ∈ F, called the additive inverse
of α, and β ∗ ∈ F, called the multiplicative inverse of β, such that α + α0 = 0 and
β · β ∗ = 1.
The additive inverse of α will be denoted −α, and the multiplicative inverse of β will be
denoted β −1 . Usually the multiplication operation will be suppressed; that is, α · β will be
denoted αβ. If n is a positive integer and α ∈ F, nα = α+α+· · ·+α (n times), αn = αα · · · α
(n times), and α−n = α−1 α−1 · · · α−1 (n times when α 6= 0). Also α0 = 1 if α 6= 0. The
usual rules of exponentiation hold. If F is a finite set with q elements, F is called a finite
field of order q and denoted Fq .

Example 1.2.2 Fields include the rational numbers Q, the real numbers R, and the com-
plex numbers C. Finite fields include Zp , the set of integers modulo p, where p is a prime.
6 Concise Encyclopedia of Coding Theory

The following theorem gives some of the basic properties of finite fields.
Theorem 1.2.3 Let Fq be a finite field with q elements. The following hold.
(a) Fq is unique up to isomorphism.
(b) q = pm for some prime p and some positive integer m.
(c) Fq contains the subfield Fp = Zp .
(d) Fq is a vector space over Fp of dimension m.
(e) pα = 0 for all α ∈ Fq .
(f) If α, β ∈ Fq , (α + β)p = αp + β p .
(g) There exists an element γ ∈ Fq with the following properties.
(i) Fq = {0, 1 = γ 0 , γ, . . . , γ q−2 } and γ q−1 = 1,
(ii) {1 = γ 0 , γ, . . . , γ m−1 } is a basis of the vector space Fq over Fp , and
(iii) there exist a0 , a1 , . . . , am−1 ∈ Fp such that
γ m = a0 + a1 γ + · · · + am−1 γ m−1 . (1.1)
(h) For all α ∈ Fq , αq = α.
Definition 1.2.4 In Theorem 1.2.3, p is called the characteristic of Fq . The element γ is
called a primitive element of Fq .
Remark 1.2.5 Using Theorem 1.2.3(f), the map σp : Fq → Fq given by σp (α) = αp is
an automorphism of Fq , called the Frobenius automorphism of Fq . Once one primitive
element γ of Fq is found, the remaining primitive elements of Fq are precisely γ d where
gcd(d, q − 1) = 1.
The key to constructing a finite field is to find a primitive element γ in Fq and the
equation (1.1). We do not describe this process here, but refer the reader to the texts
mentioned at the beginning of the section. Assuming γ is found and the equation (1.1) is
known, we can construct addition and multiplication tables for Fq . This is done by writing
every element of Fq in two forms. The first form takes advantage of Theorem 1.2.3(g)(ii).
Every element α ∈ Fq is written uniquely in the form
α = a0 γ 0 + a1 γ + a2 γ 2 + · · · + am−1 γ m−1 with ai ∈ Fp = Zp for 0 ≤ i ≤ m − 1,
which we abbreviate α = a0 a1 a2 · · · am−1 , a vector in Zm p . Addition in Fq is accomplished
by ordinary vector addition in Zm
p . To each α ∈ F q , with α 6= 0, we associate a second form:
α = γ for some i with 0 ≤ i ≤ q − 2. Multiplication is accomplished by γ i γ j = γ i+j where
i

we use γ q−1 = 1 when appropriate. We illustrate this by constructing the field F9 .


Example 1.2.6 The field F9 has characteristic 3 and is a 2-dimensional vector space over
Z3 . One primitive element γ of F9 satisfies γ 2 = 1 + γ. Table 1.1 gives the two forms of all
elements. The zero element is 0γ 0 + 0γ = 00; the unity element is 1 = 1γ 0 + 0γ = 10. Now
γ = 0γ 0 +1γ = 01, γ 2 = 1+γ = 1γ 0 +1γ = 11, γ 3 = γγ 2 = γ(1+γ) = γ +γ 2 = γ +(1+γ) =
1γ 0 +2γ = 12, and γ 4 = γγ 3 = γ(1+2γ) = γ +2γ 2 = γ +2(1+γ) = 2γ 0 +0γ = 20. Note γ 4 =
−1. γ 5 , γ 6 , γ 7 are computed similarly. As an example, we compute (γ 5 −1+γ 6 )/(γ 5 +γ 3 +1)
as follows. First γ 5 −1+γ 6 = 02−10+22 = 11 = γ 2 , and γ 5 +γ 3 +1 = 02+12+10 = 21 = γ 7 .
So (γ 5 − 1 + γ 6 )/(γ 5 + γ 3 + 1) = γ 2 /γ 7 = γ −5 = γ 3 since γ 8 = 1.
Tables 1.2, 1.3, and 1.4 give addition and multiplication tables for F4 , F8 , and F16 ,
respectively. These fields have characteristic 2. Notice that F16 contains the subfield F4
where ω = ρ5 .
Basics of Coding Theory 7

TABLE 1.1: F9 with primitive element γ where γ 2 = 1 + γ and γ 8 = 1

vector power of γ vector power of γ vector power of γ


00 — 11 γ2 02 γ5
10 γ0 = 1 12 γ3 22 γ6
4
01 γ 20 γ = −1 21 γ7

TABLE 1.2: F4 with primitive element ω where ω 2 = 1 + ω and ω 3 = 1

vector power of ω vector power of ω vector power of ω vector power of ω


00 — 10 ω0 = 1 01 ω 11 ω2

1.3 Codes
In this section we introduce the concept of codes over finite fields. We begin with some
notation.
The set of n-tuples with entries in Fq forms an n-dimensional vector space, denoted
Fnq = {x1 x2 · · · xn | xi ∈ Fq , 1 ≤ i ≤ n}, under componentwise addition of n-tuples and
componentwise multiplication of n-tuples by scalars in Fq . The vectors in Fnq will often be
denoted using bold Roman characters x = x1 x2 · · · xn . The vector 0 = 00 · · · 0 is the zero
vector in Fnq .
For positive integers m and n, Fm×n q denotes the set of all m × n matrices with
entries in Fq . The matrix in Fm×n q with all entries 0 is the zero matrix denoted 0m×n .
The identity matrix of Fn×n q will be denoted In . If A ∈ Fm×n
q , AT ∈ Fn×m
q will denote
m T
the transpose of A. If x ∈ Fq , x will denote x as a column vector of length m, that is,
an m × 1 matrix. The column vector 0T and the m × 1 matrix 0m×1 are the same.
If S is any finite set, its order or size is denoted |S|.

Definition 1.3.1 A subset C ⊆ Fnq is called a code of length n over Fq ; Fq is called the
alphabet of C, and Fnq is the ambient space of C. Codes over Fq are also called q-ary
codes. If the alphabet is F2 , C is binary. If the alphabet is F3 , C is ternary. The vectors
in C are the codewords of C. If C has M codewords (that is, |C| = M ) C is denoted an
(n, M )q code, or, more simply, an (n, M ) code when the alphabet Fq is understood. If C is a
linear subspace of Fnq , that is C is closed under vector addition and scalar multiplication, C
is called a linear code of length n over Fq . If the dimension of the linear code C is k, C is
denoted an [n, k]q code, or, more simply, an [n, k] code. An (n, M )q code that is also linear
is an [n, k]q code where M = q k . An (n, M )q code may be referred to as an unrestricted
code; a specific unrestricted code may be either linear or nonlinear. When referring to a
code, expressions such as (n, M ), (n, M )q , [n, k], or [n, k]q are called the parameters of
the code.

Example 1.3.2 Let C = {1100, 1010, 1001, 0110, 0101, 0011} ⊆ F42 . Then C is a (4, 6)2
binary nonlinear code. Let C1 = C ∪ {0000, 1111}. Then C1 is a (4, 8)2 binary linear code.
As C1 is a subspace of F42 of dimension 3, C1 is also a [4, 3]2 code.

Remark 1.3.3 Basic development of linear codes is found in papers by D. Slepian [1722,
1723, 1724]. In some chapters of this book, codes will be considered where the alphabet is
8 Concise Encyclopedia of Coding Theory

TABLE 1.3: F8 with primitive element δ where δ 3 = 1 + δ and δ 7 = 1

vector power of δ vector power of δ vector power of δ vector power of δ


000 — 010 δ 110 δ3 111 δ5
100 δ0 = 1 001 δ2 011 δ4 101 δ6

TABLE 1.4: F16 with primitive element ρ where ρ4 = 1 + ρ and ρ15 = 1

vector power of ρ vector power of ρ vector power of ρ vector power of ρ


0000 — 0001 ρ3 1101 ρ7 0111 ρ11
1000 ρ0 = 1 1100 ρ4 1010 ρ8 1111 ρ12
0100 ρ 0110 ρ5 0101 ρ9 1011 ρ13
0010 ρ2 0011 ρ6 1110 ρ10 1001 ρ14

not necessarily a field but rather a ring R. In these situations, the vector space Fnq will be
replaced by an R-module such as Rn = {x1 x2 · · · xn | xi ∈ R, 1 ≤ i ≤ n}, and a code will
be considered linear if it is an R-submodule of that R-module. See for example Chapters 6,
17, and 18.

1.4 Generator and Parity Check Matrices


When choosing between linear and nonlinear codes, the added algebraic structure of
linear codes often makes them easier to describe and use. Generally, a linear code is defined
by giving either a generator or a parity check matrix.
Definition 1.4.1 Let C be an [n, k]q linear code. A generator matrix G for C is any
G ∈ Fk×n
q whose row span is C. Because any k-dimensional subspace of Fnq is the kernel of
(n−k)×n
some linear transformation from Fnq onto Fn−k
q , there exists H ∈ Fq , with independent
rows, such that C = {c ∈ Fnq | HcT = 0T }. Such a matrix, of which there are generally
many, is called a parity check matrix of C.
Example 1.4.2 Continuing with Example 1.3.2, there are several generator matrices for
C1 including
     
1 0 0 1 1 1 1 1 1 1 0 0
0 00
G1 =  0 1 0 1  , G1 =  1 1 0 0 , and G1 = 0 1 1
 0 .
0 0 1 1 0 1 1 0 0 0 1 1
 
In this case there is only one parity check matrix H1 = 1 1 1 1 .
Remark 1.4.3 Any matrix obtained by elementary row operations from a generator matrix
for a code remains a generator matrix of that code.
Remark 1.4.4 By Definition 1.4.1, the rows of G form a basis of C, and the rows of H
are independent. At times, the requirement may be relaxed so that the rows of G are only
required to span C. Similarly, the requirement that the rows of H be independent may be
dropped as long as C = {c ∈ Fnq | HcT = 0T } remains true.
Basics of Coding Theory 9
(n−k)×n
Theorem 1.4.5 ([1323, Chapter 1.1]) Let G ∈ Fk×n q and H ∈ Fq each have in-
dependent rows. Let C be an [n, k]q code. The following hold.
(a) If G, respectively H, is a generator, respectively parity check, matrix for C, then
HGT = 0(n−k)×k .

(b) If HGT = 0(n−k)×k , then G is a generator matrix for C if and only if H is a parity
check matrix for C.

Definition 1.4.6 Let C be an [n, k]q linear code with generator matrix G ∈ Fk×n q . For
any set of k independent columns of G, the corresponding set of coordinates forms an
information set for C; the remaining
 n − k coordinates form a redundancy set for C.
If G has the form G = Ik | A , G is in standard form in which case {1, 2, . . . , k} is an
information set with {k + 1, k + 2, . . . , n} the corresponding redundancy set.
 
Theorem 1.4.7 ([1602,
 Chapter
 2.3]) If G = Ik | A is a generator matrix of an [n, k]q
T
code C, then H = −A | In−k is a parity check matrix for C.

Example 1.4.8 Continuing with Examples 1.3.2 and 1.4.2, the matrix G1 is in standard
form. Applying Theorem 1.4.7 to G1 , we get the parity check matrix H1 of Example 1.4.2.
The matrices G01 and G001 both row reduce to G1 ; so all three are generator matrices of the
same code, consistent with Remark 1.4.3. Any subset of {1, 2, 3, 4} of size 3 is an information
0T 00T
set for C1 . The fact that HGT
1 = HG1 = HG1 = 01×3 is consistent with Theorem 1.4.5.
Finally, let C2 = {0000, 1100, 0011, 1111} be the [4, 2]2 linear subcode of C1 . C2 does not
have a generator matrix in standard form; the only information sets for C2 are {1, 3}, {1, 4},
{2, 3}, and {2, 4}.

Example 1.4.9 Generator and parity check matrices for the [7, 4]2 binary linear Hamming
code H3,2 are
 
1 0 0 0 0 1 1  
 0 1 0 0 1 0 1  0 1 1 1 1 0 0
G3,2 =   and H3,2 =  1 0 1 1 0 1 0 ,
 0 0 1 0 1 1 0 
1 1 0 1 0 0 1
0 0 0 1 1 1 1

respectively. G3,2 is in standard form. Two information sets for H3,2 are {1, 2, 3, 4} and
{1, 2, 3, 5} with corresponding redundancy sets {5, 6, 7} and {4, 6, 7}. The set {2, 3, 4, 5} is
not an information set. More general Hamming codes Hm,q are defined in Section 1.10.

1.5 Orthogonality
There is a natural inner product on Fnq that often proves useful in the study of codes.2

Definition 1.5.1 The ordinaryPinner product, also called the Euclidean inner prod-
n
uct, on Fnq is defined by x · y = i=1 xi yi where x = x1 x2 · · · xn and y = y1 y2 · · · yn . Two
n
vectors x, y ∈ Fq are orthogonal if x · y = 0. If C is an [n, k]q code,

C ⊥ = {x ∈ Fnq | x · c = 0 for all c ∈ C}


2 There are other inner products used in coding theory. See for example Chapters 4, 5, 7, 11, and 13.
10 Concise Encyclopedia of Coding Theory

is the orthogonal code or dual code of C. C is self-orthogonal if C ⊆ C ⊥ and self-dual


if C = C ⊥ .

Theorem 1.5.2 ([1323, Chapter 1.8]) Let C be an [n, k]q code with generator and parity
check matrices G and H, respectively. Then C ⊥ is an [n, n − k]q code with generator and
parity check matrices H and G, respectively. Additionally (C ⊥ )⊥ = C. Furthermore C is
n
self-dual if and only if C is self-orthogonal and k = .
2
Example 1.5.3 C2 from Example 1.4.8 is a [4, 2]2 self-dual code with generator and parity
check matrices both equal to  
1 1 0 0
.
0 0 1 1

The dual of the Hamming [7, 4]2 code in Example 1.4.9 is a [7, 3]2 code H3,2 . H3,2 is a

generator matrix of H3,2 . As every row of H3,2 is orthogonal to itself and every other row
⊥ ⊥ ⊥ ⊥
of H3,2 , H3,2 is self-orthogonal. As H3,2 has dimension 3 and (H3,2 ) = H3,2 has dimension

4, H3,2 is not self-dual.

1.6 Distance and Weight


The error-correcting capability of a code is keyed directly to the concepts of Hamming
distance and Hamming weight.3

Definition 1.6.1 The (Hamming) distance between two vectors x, y ∈ Fnq , denoted
dH (x, y), is the number of coordinates in which x and y differ. The (Hamming) weight
of x ∈ Fnq , denoted wtH (x), is the number of coordinates in which x is nonzero.

Theorem 1.6.2 ([1008, Chapter 1.4]) The following hold.


(a) (nonnegativity) dH (x, y) ≥ 0 for all x, y ∈ Fnq .
(b) dH (x, y) = 0 if and only if x = y.
(c) (symmetry) dH (x, y) = dH (y, x) for all x, y ∈ Fnq .
(d) (triangle inequality) dH (x, z) ≤ dH (x, y) + dH (y, z) for all x, y, z ∈ Fnq .
(e) dH (x, y) = wtH (x − y) for all x, y ∈ Fnq .
(f) If x, y ∈ Fn2 , then

wtH (x + y) = wtH (x) + wtH (y) − 2wtH (x ? y)

where x ? y is the vector in Fn2 which has 1s precisely in those coordinates where both
x and y have 1s.
(g) If x, y ∈ Fn2 , then wtH (x ? y) ≡ x · y (mod 2). In particular, wtH (x) ≡ x · x (mod 2).
3 There are other notions of distance and weight used in coding theory. See for example Chapters 6, 7,

10, 11, 17, 18, 22, and 29.


Basics of Coding Theory 11

(h) If x ∈ Fn3 , then wtH (x) ≡ x · x (mod 3).


Remark 1.6.3 A distance function on a vector space that satisfies parts (a) through (d) of
Theorem 1.6.2 is called a metric; thus dH is termed the Hamming metric. Other metrics
useful in coding theory are examined in Chapter 22.
Definition 1.6.4 Let C be an (n, M )q code with M > 1. The minimum (Hamming)
distance of C is the smallest distance between distinct codewords. If the minimum distance
d of C is known, C is denoted an (n, M, d)q code (or an [n, k, d]q code if C is linear of
dimension k). The (Hamming) distance distribution or inner distribution of C is the
list B0 (C), B1 (C), . . . , Bn (C) where, for 0 ≤ i ≤ n,
1 X
Bi (C) = {v ∈ C | dH (v, c) = i} .
M
c∈C

The minimum (Hamming) weight of a nonzero code C is the smallest weight of nonzero
codewords. The (Hamming) weight distribution of C is the list A0 (C), A1 (C), . . . , An (C)
where, for 0 ≤ i ≤ n, Ai (C) is the number of codewords of weight i. If C is understood,
the distance and weight distributions of C are denoted B0 , B1 , . . . , Bn and A0 , A1 , . . . , An ,
respectively.
Example 1.6.5 Let C be the (4, 6)2 code in Example 1.3.2. Its distance distribution is
B0 (C) = B4 (C) = 1, B2 (C) = 4, B1 (C) = B3 (C) = 0, and its minimum distance is 2. In par-
ticular C is a (4, 6, 2)2 code. The weight distribution of C is A2 (C) = 6 with Ai (C) = 0 other-
wise; its minimum weight is also 2. Let C 0 = 1000 + C = {0100, 0010, 0001, 1110, 1101, 1011}.
The distance distribution of C 0 agrees with the distance distribution of C making C 0 a
(4, 6, 2)2 code. However, the weight distribution of C 0 is A1 (C 0 ) = A3 (C 0 ) = 3 with Ai (C 0 ) = 0
otherwise; the minimum weight of C 0 is 1.
Theorem 1.6.6 ([1008, Chapter 1.4]) Let C be an [n, k, d]q linear code with k > 0. The
following hold.
(a) The minimum distance and minimum weight of C are the same.
(b) Ai (C) = Bi (C) for 0 ≤ i ≤ n.
n
X
(c) Ai (C) = q k .
i=0

(d) A0 (C) = 1 and Ai (C) = 0 for 1 ≤ i < d.


(e) If q = 2 and 1 = 11 · · · 1 ∈ C, then Ai (C) = An−i (C) for 0 ≤ i ≤ n.
(f) If q = 2 and C is self-orthogonal, every codeword of C has even weight and 1 ∈ C ⊥ .
(g) If q = 3 and C is self-orthogonal, every codeword of C has weight a multiple of 3.
Remark 1.6.7 Analogous to Theorem 1.6.6(c) and (d), if C is an (n, M, d)q code, then
Xn
Bi (C) = M with B0 (C) = 1 and Bi (C) = 0 for 1 ≤ i < d.
i=0

Binary vectors possess an important relationship between weights and inner products. If
x, y ∈ Fn2 and each have even weight, Theorem 1.6.2(f) implies x + y also has even weight.
If x, y ∈ Fn2 are orthogonal and each have weights a multiple of 4, Theorem 1.6.2(f) and (g)
show that x + y has weight a multiple of 4. This leads to the following definition for binary
codes.
12 Concise Encyclopedia of Coding Theory

Definition 1.6.8 Let C be a binary linear code. C is called even if all of its codewords
have even weight. C is called doubly-even if all of its codewords have weights a multiple
of 4. An even binary code that is not doubly-even is singly-even.

Remark 1.6.9 By Theorem 1.6.6(e), self-orthogonal binary linear codes are even. The
converse is not true; code C1 from Example 1.3.2 is even but not self-orthogonal. Doubly-
even binary linear codes must be self-orthogonal by Theorem 1.6.2(f) and (g). There are
self-orthogonal binary codes that are singly-even; code C2 from Examples 1.4.8 and 1.5.3 is
singly-even and self-dual.

Example 1.6.10 Let H3,2 be the [7, 4]2 binary Hamming code of Example 1.4.9. With
Ai = Ai (H3,2 ), A0 = A7 = 1, A3 = A4 = 7, and A1 = A2 = A5 = A6 = 0, illustrating

Theorem 1.6.6(d) and (e), and showing H3,2 is a [7, 4, 3]2 code. The [7, 3]2 dual code H3,2

is self-orthogonal by Example 1.5.3 and hence even. Also by self-orthogonality, H3,2 ⊆
⊥ ⊥
(H3,2 ) = H3,2 ; the weight distribution of H3,2 shows that the 8 codewords of weights 0
⊥ ⊥
and 4 must be precisely the codewords of H3,2 . In particular, H3,2 is a doubly-even [7, 3, 4]2

code. H3,2 is called a simplex code, described further in Section 1.10.

The minimum weight of a linear code is determined by a parity check matrix for the
code; see [1008, Corollary 1.4.14 and Theorem 1.4.15].

Theorem 1.6.11 A linear code has minimum weight d if and only if its parity check matrix
has a set of d linearly dependent columns but no set of d−1 linearly dependent columns. Also,
if C is an [n, k, d]q code, then every n − d + 1 coordinate positions contain an information
set; furthermore, d is the largest number with this property.

1.7 Puncturing, Extending, and Shortening Codes


There are several methods to obtain a longer or shorter code from a given code; while
this can be done for both linear and nonlinear codes, we focus on linear ones. Two codes
can be combined into a single code, for example as described in Section 1.11.

Definition 1.7.1 Let C be an [n, k, d]q linear code with generator matrix G and parity
check matrix H.
(a) For some i with 1 ≤ i ≤ n, let C ∗ be the codewords of C with the ith component
deleted. The resulting code, called a punctured code, is an [n − 1, k ∗ , d∗ ] code. If
d > 1, k ∗ = k, and d∗ = d unless C has a minimum weight codeword that is nonzero
on coordinate i, in which case d∗ = d − 1. If d = 1, k ∗ = k and d∗ = 1 unless C has
a weight 1 codeword that is nonzero on coordinate i, in which case k ∗ = k − 1 and
d∗ ≥ 1 as long as C ∗ is nonzero. A generator matrix for C ∗ is obtained from G by
deleting column i; G∗ will have dependent rows if d∗ = 1 and k ∗ = k − 1. Puncturing
is often done on multiple coordinates in an analogous manner, one coordinate at a
time.
 Pn+1
(b) Define Cb = c1 c2 · · · cn+1 ∈ Fn+1
q | c1 c2 · · · cn ∈ C where i=1 ci = 0 , called the
extended code. This is an [n + 1, k, d ]q code where d = d or d + 1. A generator
b b
Basics of Coding Theory 13

matrix Gb for Cb is obtained by adding a column on the right of G so that every row
sum in this k × (n + 1) matrix is 0. A parity check matrix H
b for Cb is

1 ··· 1 1
 
 0 
H
b = ..  .
 H . 
0

(c) Let S be any set of s coordinates. Let C(S) be all codewords in C that are zero on
S. Puncturing C(S) on S results in the [n − s, kS , dS ]q shortened code CS where
dS ≥ d. If C ⊥ has minimum weight d⊥ and s < d⊥ , then kS = k − s.

Example 1.7.2 Let H3,2 be the [7, 4, 3]2 binary Hamming code of Examples 1.4.9 and
1.6.10. Extending this code, we obtain H
b3,2 with generator and parity check matrices
   
1 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1
b 3,2 =  0 1 0 0 1 0 1 1  and H b 3,2 =  0 1 1 1 1 0 0 0  ,
   
G  0 0 1 0 1 1 0 1   1 0 1 1 0 1 0 0 
0 0 0 1 1 1 1 0 1 1 0 1 0 0 1 0

respectively. Given the weight distribution of H3,2 found in Example 1.6.10, the weight
distribution of H
b3,2 must be A0 (H b3,2 ) = A8 (H
b3,2 ) = 1, A4 (H
b3,2 ) = 14, and Ai (H
b3,2 ) = 0
otherwise, implying H b3,2 is doubly-even and self-dual; see Remark 1.6.9. Certainly if H b3,2
is punctured on its right-most coordinate, the resulting code is H3,2 .

There is a relationship between punctured and shortened codes via dual codes.

Remark 1.7.3 If C is a linear code over Fq and S a set of coordinates, then (C ⊥ )S = (C S )⊥


and (C ⊥ )S = (CS )⊥ where C S and (C ⊥ )S are C and C ⊥ punctured on S; see [1008, Theorem
1.5.7].

1.8 Equivalence and Automorphisms


Two vector spaces over Fq are considered the same (that is, isomorphic) if there is a
nonsingular linear transformation from one to the other. For linear codes to be considered
the same, we want these linear transformations to also preserve weights of codewords. In
Theorem 1.8.6, we will see that these weight preserving linear transformations are directly
related to monomial matrices. This leads to two different concepts of code equivalence for
linear codes.

Definition 1.8.1 If P ∈ Fn×n


q has exactly one 1 in each row and column and 0 elsewhere,
P is a permutation matrix. If M ∈ Fn×n q has exactly one nonzero entry in each row
and column, M is a monomial matrix. If C is a code over Fq of length n and A ∈
Fn×n
q , then CA = {cA | c ∈ C}. Let C1 and C2 be linear codes over Fq of length n.
C1 is permutation equivalent to C2 provided C2 = C1 P for some permutation matrix
P ∈ Fn×n
q . C1 is monomially equivalent to C2 provided C2 = C1 M for some monomial
matrix M ∈ Fn×n
q .
14 Concise Encyclopedia of Coding Theory

Remark 1.8.2 Applying a permutation matrix to a code simply permutes the coordinates;
applying a monomial matrix permutes and re-scales coordinates. Applying either a permu-
tation or monomial matrix to a vector does not change its weight. Also applying either
a permutation or monomial matrix to two vectors does not change the distance between
these two vectors. There is a third more general concept of equivalence, involving semi-linear
transformations, where two linear codes C1 and C2 over Fq are equivalent provided one
can be obtained from the other by permuting and re-scaling coordinates and then applying
an automorphism of the field Fq . Note that applying such maps to a vector or to a pair of
vectors preserves the weight of the vector and the distance between the two vectors, respec-
tively; see [1008, Section 1.7] for further discussion of this type of equivalence. There are
other concepts of equivalence that arise when the code may not be linear but has some spe-
cific algebraic structure (e.g., additive codes over Fq that are closed under vector addition
but not necessarily closed under scalar multiplication). The common theme when defining
equivalence of such codes is to use a set of maps which preserve distance between the two
vectors, which preserve the algebraic structure under consideration, and which form a group
under composition of these maps. We will follow this theme when we define equivalence of
unrestricted codes at the end of this section.
Remark 1.8.3 Let C1 and C2 be linear codes over Fq of length n. Define C1 ∼P C2 to mean
C1 is permutation equivalent to C2 ; similarly define C1 ∼M C2 to mean C1 is monomially
equivalent to C2 . Then both ∼P and ∼M are equivalence relations on the set of all linear
codes over Fq of length n; that is, both are reflexive, symmetric, and transitive. If q = 2,
the concepts of permutation and monomial equivalence are the same; if q > 2, they may
not be. Furthermore, two permutation or monomially equivalent codes have the same size,
weight and distance distributions, and minimum weight and distance. If two linear codes
are permutation equivalent and one code is self-orthogonal, so is the other; this may not be
true of two monomially equivalent codes.
Row reducing a generator matrix of a linear code to reduced echelon form and then
permuting columns yields the following result.
Theorem 1.8.4 Let C be a linear [n, k, d]q code with k ≥ 1. There is a code permutation
equivalent to C with a generator matrix in standard form.
Example 1.8.5 Let C be an [8, 4, 4]2 binary linear code.
 By Theorem 1.8.4, C is permuta-
tion equivalent to a code with generator matrix G = I4 | A . A straightforward argument
using minimum weight 4 shows that columns of A can be permuted so that the resulting
generator matrix is Gb 3 from Example 1.7.2. This verifies that C is permutation equivalent
to H3,2 .
b

The following is a generalization of a result of MacWilliams [1318]; see also [229, 1876].
This result motivated Definition 1.8.1.
Theorem 1.8.6 (MacWilliams Extension) There is a weight preserving linear trans-
formation between equal length linear codes C1 and C2 over Fq if and only if C1 and C2 are
monomially equivalent. Furthermore, the linear transformation agrees with the associated
monomial transformation on every codeword in C1 .
Definition 1.8.7 Let C be a linear code over Fq of length n. If CP = C for some permutation
matrix P ∈ Fn×nq , then P is a permutation automorphism of C; the set of all permutation
automorphisms of C is a group under matrix multiplication, denoted PAut(C). Similarly, if
CM = C for some monomial matrix M ∈ Fn×n q , then M is a monomial automorphism of
C; the set of all monomial automorphisms of C is a matrix group, denoted MAut(C). Clearly
PAut(C) ⊆ MAut(C).
Basics of Coding Theory 15

We now consider when two unrestricted codes are equivalent. It should be noted that, in
this definition, a linear code may end up being equivalent to a nonlinear code. See Chapter 3
for more on this general equivalence.

Definition 1.8.8 Let C1 and C2 be unrestricted codes of length n over Fq of the same size.
Then C1 is equivalent to C2 provided the codewords of C2 are the images under a map
of the codewords of C1 where the map is a permutation of coordinates together with n
permutations of the alphabet Fq , independently within each coordinate.4

1.9 Bounds on Codes


In this section we present seven bounds relating the length, dimension or number of
codewords, and minimum distance of an unrestricted code. The first five are considered
upper bounds on the code size given length, minimum distance, and field size. By this,
we mean that there does not exist a code of size bigger than the upper bound with the
specified length, minimum distance, and field size. The last two are lower bounds on the
size of a linear code. This means that a linear code can be constructed with the given length
and minimum distance over the specified field having size equalling or exceeding the lower
bound. We also give asymptotic versions of these bounds. Some of these bounds will be
described using Aq (n, d) and Bq (n, d), which we now define.

Definition 1.9.1 For positive integers n and d, Aq (n, d) is the largest number of code-
words in an (n, M, d)q code, linear or nonlinear. Bq (n, d) is the largest number of code-
words in a [n, k, d]q linear code. An (n, M, d)q code is optimal provided M = Aq (n, d);
an [n, k, d]q linear code is optimal if q k = Bq (n, d). The concept of ‘optimal’ can also be
used in other contexts. Given n and d, kq (n, d) denotes the largest dimension of a linear code
over Fq of length n and minimum weight d; an [n, kq (n, d), d]q code could be called ‘optimal
in dimension’. Notice that kq (n, d) = logq Bq (n, d). Similarly, dq (n, k) denotes the largest
minimum distance of a linear code over Fq of length n and dimension k; an [n, k, dq (n, k)]q
may be called ‘optimal in distance’. Analogously, nq (k, d) denotes the smallest length of a
linear code over Fq of dimension k and minimum weight d; an [nq (k, d), k, d]q code might
be called ‘optimal in length’.5

Clearly Bq (n, d) ≤ Aq (n, d). On-line tables relating parameters of various types of codes
are maintained by M. Grassl [845].
The following basic properties of Aq (n, d) and Bq (n, d) are easily derived; see [1008,
Chapter 2.1].

Theorem 1.9.2 The following hold for 1 ≤ d ≤ n.


(a) Bq (n, d) ≤ Aq (n, d).
(b) Bq (n, n) = Aq (n, n) = q and Bq (n, 1) = Aq (n, 1) = q n .
4 In a more general setting, unrestricted codes do not have to have F as an alphabet. If A is the alphabet,
q
the permutations within each coordinate are permutations of A.
5 Further restrictions might be placed on a family of codes when discussing optimality. For example, given

n, a self-dual [n, n2
, d]q code over Fq with largest minimum weight d is sometimes called an ‘optimal q-ary
self-dual code of length n’. Optimal codes are explored in chapters such as 2–5, 11, 12, 16, 18, 20, and 23.
16 Concise Encyclopedia of Coding Theory

(c) Bq (n, d) ≤ qBq (n − 1, d) and Aq (n, d) ≤ qAq (n − 1, d) when 1 ≤ d < n.

(d) Bq (n, d) ≤ Bq (n − 1, d − 1) and Aq (n, d) ≤ Aq (n − 1, d − 1).


(e) If d is even, B2 (n, d) = B2 (n − 1, d − 1) and A2 (n, d) = A2 (n − 1, d − 1).
(f) If d is even and M = A2 (n, d), then there is an (n, M, d)2 code such that all codewords
have even weight and the distance between all pairs of codewords is also even.

1.9.1 The Sphere Packing Bound


The Sphere Packing Bound, also called the Hamming Bound, is based on packing Fnq
with non-overlapping spheres.

Definition 1.9.3 The sphere of radius r centered at u ∈ Fnq is the set Sq,n,r (u) =
{v ∈ Fnq | dH (u, v) ≤ r} of all vectors in Fnq whose distance from u is at most r.

We need the size of a sphere, which requires use of binomial coefficients.


 
a
Definition 1.9.4 For a, b integers with 0 ≤ b ≤ a, is the number of b-element subsets
  b
a a!
in an a-element set. = and is called a binomial coefficient.
b b!(a − b)!

The next result is the basis of the Sphere Packing Bound; part (a) is a direct count and
part (b) follows from the triangle inequality of Theorem 1.6.2.

Theorem 1.9.5 The following hold.


r  
X n
(a) For u ∈ Fnq , |Sq,n,r (u)| = (q − 1)i .
i=0
i
 d−1 
(b) If C is an (n, M, d)q code and t = 2 , then spheres of radius t centered at distinct
codewords are disjoint.
 d−1 
Theorem 1.9.6 (Sphere Packing (or Hamming) Bound) Let d ≥ 1. If t = 2 ,
then
qn
Bq (n, d) ≤ Aq (n, d) ≤ Pt n
 .
i=0 i (q − 1)
i

Proof: Let C be an (n, M, d)q code. By Theorem 1.9.5, the spheres of radius t centered at
t  
X n
distinct codewords are disjoint, and each such sphere has α = (q − 1)i total vectors.
i=0
i
Thus M α cannot exceed the number q n of vectors in Fnq . The result is now clear. 

Remark 1.9.7 The Sphere Packing Bound is an upper bound on the size of a code given its
length and minimum distance. Additionally the Sphere Packing Bound produces an upper
bound on the minimum distance d of an (n, M )q code in the following sense. Given n, M ,
qn
and q, compute the smallest positive integer s with M > Ps n
 ; for an (n, M, d)q
i=0 i (q − 1)
i

code to exist, d < 2s − 1.


Basics of Coding Theory 17
qn
Definition 1.9.8 If C is an (n, M, d)q code with M = Pt n
 (that is, equality
i=0 i (q − 1)i
holds in the Sphere Packing Bound), C is called a perfect code. Perfect  codes are pre-
cisely those (n, M, d)q codes where the disjoint spheres of radius t = d−1

2 centered at all
codewords fill the entire space Fnq . Perfect codes are discussed in Sections 3.3.1 and 5.3.

Example 1.9.9 The code H3,2 of Examples 1.4.9 and 1.6.10 is a [7, 4, 3]2 code. So in this
n
27
case t = 3−1 = 1 and Pt qn (q−1)i = 1+7
 
= 24 yielding equality in the Sphere Packing
2 (
i=0 i )
Bound. So H3,2 is perfect.

1.9.2 The Singleton Bound


The Singleton Bound was formulated in [1717]. As with the Sphere Packing Bound, the
Singleton Bound is an upper bound on the size of a code.

Theorem 1.9.10 (Singleton Bound) For d ≤ n, Aq (n, d) ≤ q n−d+1 . Furthermore, if an


[n, k, d]q linear code exists, then k ≤ n − d + 1; i.e., kq (n, d) ≤ n − d + 1.

Remark 1.9.11 In addition to providing an upper bound on code size, the Singleton Bound
yields the upper bound d ≤ n − logq (M ) + 1 on the minimum distance of an (n, M, d)q code.

Definition 1.9.12 A code for which equality holds in the Singleton Bound is called max-
imum distance separable (MDS). No code of length n and minimum distance d has
more codewords than an MDS code with parameters n and d; equivalently, no code of length
n with M codewords has a larger minimum distance than an MDS code with parameters n
and M . MDS codes are discussed in Chapters 3, 6, 8, 14, and 33.

The following theorem is proved using Theorem 1.6.11.

Theorem 1.9.13 C is an [n, k, n−k +1]q MDS code if and only if C ⊥ is an [n, n−k, k +1]q
MDS code.

Example 1.9.14 Let H2,3 be the [4, 2]3 ternary linear code with generator matrix
 
1 0 1 1
G2,3 = .
0 1 1 −1

Examining inner products of the rows of G2,3 , we see that H2,3 is self-orthogonal of dimen-
sion half its length; so it is self-dual. Using Theorem 1.6.2(h), A0 (H2,3 ) = 1, A3 (H2,3 ) = 8,
and Ai (H2,3 ) = 0 otherwise. In particular H2,3 is a [4, 2, 3]3 code and hence is MDS.

1.9.3 The Plotkin Bound


The Binary Plotkin Bound [1527] is an upper bound on the size of an unrestricted binary
code of length n and minimum distance d provided d is close enough to n.

Theorem 1.9.15 (Binary Plotkin Bound) Let 2d > n. Then


 
d
A2 (n, d) ≤ 2 .
2d − n

This result is generalized in [230] to unrestricted codes over Fq .


18 Concise Encyclopedia of Coding Theory

Theorem 1.9.16 (Generalized Plotkin Bound) If an (n, M, d)q code exists, then
q−2 X
X q−1
M (M − 1)d ≤ 2n Mi Mj
i=0 j=i+1
 
M +i
where Mi = .
q

Example 1.9.17 The Sphere Packing Bound yields A2 (17, 9) ≤ 131 072
3 214 and A2 (18, 10) ≤
262 144
4 048 ; so A2 (17, 9) ≤ 40 and A2 (18, 10) ≤ 64. The Singleton Bound produces A2 (17, 9) ≤
512 and A2 (18, 10) ≤ 512. The Binary Plotkin Bound gives A2 (17, 9) ≤ 18 and A2 (18, 10) ≤
10. Using Theorem 1.9.2(e), the Plotkin Bound is best with A2 (18, 10) = A2 (17, 9) ≤ 10.
According to [845], there is a (18, 10, 10)2 code implying A2 (18, 10) = A2 (17, 9) = 10.

1.9.4 The Griesmer Bound


The Griesmer Bound [855] is a lower bound on the length of a linear code given its
dimension and minimum weight.

Theorem 1.9.18 (Griesmer Bound) Let C be an [n, k, d]q linear code with k ≥ 1. Then
k−1
X 
d
n≥ .
i=0
qi

Remark 1.9.19 One can interpret the Griesmer Bound as an upper bound on the code
size given its length and minimum weight. Specifically, Bq (n, d) ≤ q k where k is the largest
Pk−1  
positive integer such that n ≥ i=0 qdi . This bound can also be interpreted as a lower
bound on thePk−1 length
  of a linear code of given dimension and minimum weight; that is,
nq (k, d) ≥ i=0 qdi . Finally, the Griesmer Bound can be understood as an upper bound
on the minimum weight given the code length and dimension; given n and k, dq (n, k) is at
most the largest d for which the bound holds.

Example 1.9.20 Suppose we wish to find the smallest


  code  length
  n  such that an [n, 4, 3]2
code can exist. By the Griesmer Bound n ≥ 13 + 32 + 34 + 38 = 3 + 2 + 1 + 1 = 7.
Note that equality in this bound is attained by the [7, 4, 3]2 code H3,2 of Examples 1.4.9
and 1.6.10.

1.9.5 The Linear Programming Bound


The Linear Programming Bound is a result of the work of P. Delsarte in [517, 519, 521].
This is generally the most powerful of the bounds but does require setting up and solving
a linear program involving Krawtchouck polynomials.
(n,q)
Definition 1.9.21 For 0 ≤ k ≤ n, define the Krawtchouck polynomial Kk (x) of
degree k to be
k
x n−x
  
(n,q)
X
Kk (x) = (−1)j (q − 1)k−j .
j=0
j k−j
Basics of Coding Theory 19

An extensive presentation of properties of the Krawtchouck polynomials can be found


in [1229, 1365] and in Section 12.1. A simple proof of the following result, known as the
Delsarte–MacWilliams Inequalities, is found in [1885].

Theorem 1.9.22 (Delsarte–MacWilliams Inequalities) Let C be an (n, M, d)q code


with distance distribution Bi (C) for 0 ≤ i ≤ n. Then for 0 ≤ k ≤ n
n
(n,q)
X
Bi (C)Kk (i) ≥ 0.
i=0

Let C be an (n,PnM, d)q code with distance distribution Bi (C) for 0 ≤ i ≤ n. By Re-
mark 1.6.7, M = i=0 Bi (C), B0 (C) = 1, and Bi (C) = 0 for 1 ≤ i ≤ d − 1. Although Bi (C)
may not be an integer, Bi (C) ≥ 0. By the Delsarte–MacWilliams Inequalities, we also have
Pn (n,q) (n,q)
i=0 Bi (C)Kk ≥ 0 for 0 ≤ i ≤ n. As K0 (i) = 1, the 0th Delsarte–MacWilliams
(i) P
n
Inequality is merely i=0 Bi (C) ≥ 0, which is clearly already true. If q = 2, there are addi-
tional inequalities that hold. When q = 2, it is straightforward to show that Bn (C) ≤ 1. Fur-
thermore when q = 2 and d is even, we may also assume that Bi (C) = 0 when i is odd by The-
(n,2) (n,2)
orem 1.9.2(f). Properties of binomial coefficients show that Kk (i) = (−1)i Kn−k (i); thus
th th
the k Delsarte–MacWilliams Inequality is the same as the (n−k) Delsarte–MacWilliams
Inequality because Bi (C) = 0 when i is odd. This discussion leads to the linear program
that is set up to establish an upper bound on Aq (n, d).

Theorem 1.9.23 (Linear Programming Bound) The following hold.


Pn
(a) When q ≥ 2, Aq (n, d) ≤ max { i=0 Bi } where the maximum is taken over all Bi
subject to the following conditions:
(i) B0 = 1 and Bi = 0 for 1 ≤ i ≤ d − 1,
(ii) Bi ≥ 0 for d ≤ i ≤ n, and
Pn (n,q)
(iii) i=0 Bi Kk (i) ≥ 0 for 1 ≤ k ≤ n.
Pn
(b) When d is even and q = 2, A2 (n, d) ≤ max { i=0 Bi } where the maximum is taken
over all Bi subject to the following conditions:
(i) B0 = 1 and Bi = 0 for 1 ≤ i ≤ d − 1 and all odd i,
(ii) Bi ≥ 0 for d ≤ i ≤ n and Bn ≤ 1, and
Pn (n,2)
(i) ≥ 0 for 1 ≤ k ≤ n2 .
 
(iii) i=0 Bi Kk

SometimesPadditional constraints can be added to the linear program and reduce the
n
size of max { i=0 Bi }. Linear Programming Bounds will be considered in more detail in
Chapters 12 and 13.

1.9.6 The Gilbert Bound


The Gilbert Bound [806] is a lower bound on Bq (n, d) and hence a lower bound on
Aq (n, d).

Theorem 1.9.24 (Gilbert Bound)


qn
Bq (n, d) ≥ Pd−1 n
 .
i (q − 1)
i
i=0
20 Concise Encyclopedia of Coding Theory

1.9.7 The Varshamov Bound


The Varshamov Bound [1844] is similar to the Gilbert Bound; asymptotically they are
the same as stated in Section 1.9.8.

Theorem 1.9.25 (Varshamov Bound)

(n−1
i )(q−1) )e .
Pd−2 i
Bq (n, d) ≥ q n−dlogq (1+ i=0

1.9.8 Asymptotic Bounds


We now describe what happens to the bounds, excluding the Griesmer Bound, as the
code length approaches infinity; these bounds are termed asymptotic bounds. We first
need some terminology.

Definition 1.9.26 The information rate, or simply rate, of an (n, M, d)q code is defined
logq M k
to be . If the code is actually an [n, k, d]q linear code, its rate is , measuring the
n n
number of information coordinates relative to the total number of coordinates. In either the
linear or nonlinear case, the higher the rate, the higher the proportion of coordinates in a
d
codeword that actually contain information rather than redundancy. The ratio is called
n
the relative distance of the code; as we will see later, the relative distance is a measure
of the error-correcting capability of the code relative to its length.

Each asymptotic bound will be either an upper or lower bound on the largest possible
rate for a family of (possibly nonlinear) codes over Fq of lengths going to infinity with
relative distances approaching δ. The function, called the asymptotic normalized rate
function, that determines this rate is

logq Aq (n, δn)


αq (δ) = lim sup .
n→∞ n

As the exact value of αq (δ) is unknown, we desire upper and lower bounds on this function.
An upper bound would indicate that all families with relative distances approaching δ have
rates, in the limit, at most this upper bound. A lower bound indicates that there exists a
family of codes of lengths approaching infinity and relative distances approaching δ whose
rates are at least this bound. Three of the bounds in the next theorem involve the entropy
function.

Definition 1.9.27 The entropy function is defined for 0 ≤ x ≤ r = 1 − q −1 by



0 if x = 0,
Hq (x) =
x logq (q − 1) − x logq x − (1 − x) logq (1 − x) if 0 < x ≤ r.

Discussion and proofs of the asymptotic bounds can be found in [1008, 1323, 1505, 1836].
The MRRW Bound, named after the authors of [1365] who developed the bound, is the
Asymptotic Linear Programming Bound. The MRRW Bound has been improved by M.
Aaltonnen [2] in the case q > 2.

Theorem 1.9.28 (Asymptotic Bounds) Let q ≥ 2 and r = 1 − q −1 . The following hold.


(a) (Asymptotic Sphere Packing) αq (δ) ≤ 1 − Hq (δ/2) if 0 < δ ≤ r.
Basics of Coding Theory 21

(b) (Asymptotic Singleton) αq (δ) ≤ 1 − δ if 0 ≤ δ ≤ 1.


δ
(c) (Asymptotic Plotkin) αq (δ) = 0 if r ≤ δ ≤ 1 and αq (δ) ≤ 1 − r if 0 ≤ δ ≤ r.
(d) (MRRW)
(i) (First MRRW)
  p 
αq (δ) ≤ Hq 1q q − 1 − (q − 2)δ − 2 (q − 1)δ(1 − δ) if 0 < δ < r.

(ii) (Second MRRW) Let g(x) = H2 ((1 − 1 − x )/2).
α2 (δ) ≤ min0≤u≤1−2δ {1 + g(u2 ) − g(u2 + 2δu + 2δ)} if 0 < δ < 1/2.
(e) (Asymptotic Gilbert–Varshamov) 1 − Hq (δ) ≤ αq (δ) if 0 < δ ≤ r.

1.10 Hamming Codes


A binary code permutation equivalent to the code of Example 1.4.9 was discovered in
1947 by R. W. Hamming while working at Bell Telephone Laboratories. Because of patent
considerations, his work was not published until 1950; see [895]. This Hamming code actually
appeared earlier in C. E. Shannon’s seminal paper [1661]. It was also generalized to codes
over fields of prime order by M. J. E. Golay [820].
Given a positive integer m, if one takes an m × n binary matrix whose columns are
nonzero and distinct, the binary code with this parity check matrix must have minimum
weight at least 3 by Theorem 1.6.11. Binary Hamming codes Hm,2 arise by choosing an
m × n parity check matrix with the maximum number of columns possible that are distinct
and nonzero.
Definition 1.10.1 Let m ≥ 2 be an integer and n = 2m − 1. Let Hm,2 be an m × n matrix
whose columns are all 2m − 1 distinct nonzero binary m-tuples. A code with this parity
check matrix is called a binary Hamming code. Changing the column order of Hm,2
produces a set of pairwise permutation equivalent codes. Any code in this list is denoted
Hm,2 and is a [2m − 1, 2m − 1 − m, 3]2 code.
The code H3,2 of Example 1.4.9 is indeed a binary Hamming code. These codes are
generalized to Hamming codes Hm,q over Fq , all with minimum weight 3 again from Theo-
rem 1.6.11.
Definition 1.10.2 Let m ≥ 2 be an integer and n = (q m −1)/(q −1). There are a total of n
1-dimensional subspaces of Fm q . Let Hm,q be an m×n matrix whose columns are all nonzero
m-tuples with one column from each of the distinct 1-dimensional subspaces of Fm q . A code
with this parity check matrix is called a Hamming code over Fq . Re-scaling columns
and/or changing column order of Hm,q produces a set of pairwise monomially equivalent 
codes. Any code in this list is denoted Hm,q and is a (q m −1)/(q−1), (q m −1)/(q−1)−m, 3 q

code. The code Hm,q is called a simplex code.
Example 1.10.3 The parity check matrix of the code in Example 1.9.14 is
 
−1 −1 1 0
.
−1 1 0 1
This code satisfies the definition of a Hamming [4, 2, 3]3 code, and so H2,3 is the appropriate
labeling of this code.
22 Concise Encyclopedia of Coding Theory

The parameters of the Hamming codes in fact determine the code. That Hm,q is perfect
follows by direct computation from Definition 1.9.8.

Theorem 1.10.4 The following hold.

(a) If C is a [2m − 1, 2m − 1 − m, 3]2 binary linear code, then C is permutation equivalent


to Hm,2 .
 
(b) If C is a (q m − 1)/(q − 1), (q m − 1)/(q − 1) − m, 3 q linear code, then C is monomially
equivalent to Hm,q .
(c) Hm,q is perfect.

The weight distribution of H3,2 was given in Example 1.6.10. The following generalizes
this; for a proof see [1008, Theorem 2.7.5].
 
Theorem 1.10.5 The nonzero codewords of the (q m − 1)/(q − 1), m q simplex code over
Fq all have weight q m−1 .

1.11 Reed–Muller Codes


In 1954 the binary Reed–Muller codes were first constructed and examined by D. E.
Muller [1409], and a majority logic decoding algorithm for them was described by I. S.
Reed [1581]. The non-binary Reed–Muller codes, called generalized Reed–Muller codes,
were developed in [1089, 1887]; see also Example 16.4.11 and Section 2.8. We define bi-
nary Reed–Muller codes recursively based on the (u | u + v) construction; see [1323]. Other
constructions of Reed–Muller codes can be found in Chapters 2, 16, and 20.

Definition 1.11.1 For i ∈ {1, 2}, let Ci be linear codes both of length n over Fq . The
(u | u + v) construction produces the linear code C of length 2n given by C = {(u, u + v) |
u ∈ C1 , v ∈ C2 }.

Remark 1.11.2 Let Ci , for i ∈ {1, 2}, be [n, ki , di ]q codes with generator and parity check
matrices Gi and Hi , respectively. C obtained by the (u | u + v) construction is a [2n, k1 +
k2 , min {2d1 , d2 }]q code with generator and parity check matrices
   
G1 G1 H1 0(n−k1 )×n
G= and H = . (1.2)
0k2 ×n G2 −H2 H2

We now define the binary Reed–Muller codes.

Definition 1.11.3 Let r and m be integers with 0 ≤ r ≤ m and 1 ≤ m. The rth or-
der binary Reed–Muller (RM) code of length 2m , denoted RM(r, m), is defined
recursively. The code RM(0, m) = {0, 1}, the [2m , 1, 2m ]2 binary repetition code, and
m
RM(m, m) = F2q , a [2m , 2m , 1]2 code. For 1 ≤ r < m, define

RM(r, m) = {(u, u + v) | u ∈ RM(r, m − 1), v ∈ RM(r − 1, m − 1)}.


Basics of Coding Theory 23

Remark 1.11.4
 Let G(r, m) be a generator matrix of RM(r, m). By Definition 1.11.3,
G(0, m) = 1 1 · · · 1 and G(m, m) = I2m . By Definition 1.11.3 and (1.2), for 1 ≤ r < m,
 
G(r, m − 1) G(r, m − 1)
G(r, m) =
O G(r − 1, m − 1)

where O = 0k×2m−1 with k the dimension of RM(r − 1, m − 1).

Example 1.11.5 We give generator matrices for RM(r, m) with 1 ≤ r < m ≤ 3:


 
  1 0 1 0 1 0 1 0
1 0 1 0  0 1 0 1 0 1 0 1 
G(1, 2) =  0 1 0 1  , G(1, 3) =   0 0 1 1 0 0
,
1 1 
0 0 1 1
0 0 0 0 1 1 1 1
 
1 0 0 0 1 0 0 0
 0 1 0 0 0 1 0 0 
 
 0 0 1 0 0 0 1 0 
 
 0 0 0 1 0 0 0 1 .
G(2, 3) =  
 0 0 0 0 1 0 1 0 
 
 0 0 0 0 0 1 0 1 
0 0 0 0 0 0 1 1
From these generator matrices, we see that RM(1, 2) and RM(2, 3) consist of all even
weight binary vectors of lengths 4 and 8, respectively. Also RM(1, 3) is an [8, 4, 4]2 code,
which by Example 1.8.5 must be H b3,2 .

Using the definition of Reed–Muller codes and properties from the (u | u + v) construc-
tion, along with induction, the following hold; see [1008, Theorem 1.10.1].

Theorem 1.11.6 Let r and m be integers with 0 ≤ r ≤ m and 1 ≤ m. The following hold.
(a) RM(i, m) ⊆ RM(j, m) if 0 ≤ i ≤ j ≤ m.
(b) The dimension of RM(r, m) equals m m m
  
0 + 1 + ··· + r .
(c) The minimum weight of RM(r, m) equals 2m−r .
(d) RM(m, m)⊥ = {0}, and if 0 ≤ r < m, then RM(r, m)⊥ = RM(m − r − 1, m).

Remark 1.11.7 Theorem 1.11.6(a) is sometimes called the nesting property of Reed–
Muller codes. As observed in Example 1.11.5, RM(1, 3) = H b3,2 . Using Theorem 1.11.6(d),
it can be shown that RM(m−2, m) = Hm,2 ; see [1008, Exercise 61]. By Theorem 1.11.6(d),
b
RM(m − 1, m) = RM(0, m)⊥ . Since RM(0, m) = {0, 1}, RM(m − 1, m) must be all even
m
weight vectors in F22 , a fact observed for m = 2 and m = 3 in Example 1.11.5.

1.12 Cyclic Codes


The study of cyclic codes seems to have begun with a series of four Air Force Cambridge
Research Laboratory (AFCRL) technical notes [1536, 1537, 1538, 1539] by E. Prange from
24 Concise Encyclopedia of Coding Theory

1957 to 1959. The 1961 book by W. W. Peterson [1505] compiled extensive results about
cyclic codes and laid the framework for much of the present-day theory. In 1972 this book
was expanded and published jointly by Peterson and E. J. Weldon [1506].
Up to this point, the coordinates of Fnq have been denoted {1, 2, . . . , n}. For cyclic codes,
the coordinates of Fnq will be denoted {0, 1, . . . , n − 1}.

Definition 1.12.1 Let C be a code of length n over Fq . C is cyclic provided that for all
c = c0 c1 · · · cn−1 ∈ C, the cyclic shift c0 = cn−1 c0 · · · cn−2 ∈ C.

Remark 1.12.2 The cyclic shift described in Definition 1.12.1 is cyclic shift to the right
by one position with wrap-around. The code C is cyclic if and only if P ∈ PAut(C) where
the permutation matrix P = [pi,j ] is defined by pi,i+1 = 1 for 0 ≤ i ≤ n − 2, pn−1,0 = 1,
and pi,j = 0 otherwise. Cyclic codes are closed under cyclic shifts with wrap-around of any
amount and in either the left or right directions.

Example 1.12.3 Let C be the [7, 4]2 code with generator matrix
 
1 1 0 1 0 0 0
 0 1 1 0 1 0 0 
G=  0 0 1 1
.
0 1 0 
0 0 0 1 1 0 1

Labeling the rows of G as r1 , r2 , r3 , r4 top to bottom, we see that r5 = 1000110 = r1 +r2 +r3 ,
r6 = 0100011 = r2 + r3 + r4 , and r7 = 1010001 = r1 + r2 + r4 . Since C is spanned by
{r1 , r2 , . . . , r7 } and this list is closed under cyclic shifts, C must be a cyclic code. By row
reducing G, we obtain another generator matrix
 
1 0 0 0 1 1 0
 0 1 0 0 0 1 1 
G0 =  0 0 1 0 1 1 1 .

0 0 0 1 1 0 1

Label the columns of G0 left to right as 0, 1, . . . , 6. If P is the 7 × 7 permutation matrix


induced by the permutation that sends column 0 to column 2, column 2 to column 3, column
3 to column 1, column 1 to column 0, and fixes columns 4, 5, and 6, then G0 P has the same
rows as G3,2 , the generator matrix of H3,2 in Example 1.4.9. Therefore, by ordering the
coordinates of H3,2 appropriately, we see that H3,2 is a cyclic code.

While cyclic codes can be nonlinear, throughout this section we will examine only those
that are linear. To study linear cyclic codes it is useful to consider elements of Fnq as
polynomials inside a certain quotient ring of polynomials. In that framework, linear cyclic
codes are precisely the ideals of that quotient ring. We now establish the framework.

Definition 1.12.4 Let R be a commutative ring with identity. A subset I of R is an ideal


of R if for all a, b ∈ I and r ∈ R, then a − b ∈ I and ra ∈ I. The ideal I is a principal
ideal if there exists a ∈ I such that I = {ra | r ∈ R}; a is a generator of I and I
is denoted hai. 6 The ring R is an integral domain if whenever a, b ∈ R and ab = 0,
either a = 0 or b = 0. R is a principal ideal domain (PID) if it is an integral domain
and all its ideals are principal. The quotient ring of R by the ideal I, denoted R/I,
is the set of cosets {a + I | a ∈ R} with addition and multiplication of cosets given by
(r + I) + (s + I) = (r + s) + I and (r + I)(s + I) = rs + I; two cosets a + I and b + I are
equal if and only if a − b ∈ I.
6 In some chapters of this books, the principal ideal generated by a will be denoted (a).
Basics of Coding Theory 25

Definition 1.12.5 Let x be an indeterminate over Fq . The set

Fq [x] = {a0 + a1 x + · · · + am xm | ai ∈ Fq for 0 ≤ i ≤ m and some m}

is the ring of polynomials with coefficients in Fq . Let a(x) = a0 + a1 x + · · · + am xm ∈


Fq [x] be a nonzero polynomial where am 6= 0. The degree of a(x), denoted deg(a(x)), is
m. If am = 1, a(x) is monic. If deg(a(x)) ≥ 1 and there do not exist b(x), c(x) ∈ Fq [x] with
deg(b(x)) < deg(a(x)) and deg(c(x)) < deg(a(x)) such that a(x) = b(x)c(x), then a(x) is
irreducible over Fq .

The following result is standard; see for example [751].

Theorem 1.12.6 The following hold.

(a) Fq [x] is a commutative ring with identity 1.


(b) (Division Algorithm) For a(x), b(x) ∈ Fq [x] with b(x) nonzero, there exists unique
s(x), t(x) ∈ Fq [x] such that a(x) = b(x)s(x)+t(x) where either t(x) = 0 or deg(t(x)) <
deg(b(x)).
(c) Fq [x] is a PID.
(d) (Unique Factorization) Let p(x) ∈ Fq [x] with deg(p(x)) ≥ 1. There exists a unique set
{f1 (x), f2 (x), . . . , ft (x)} ⊆ Fq [x], a unique list n1 , n2 , . . . , nt of positive integers, and
a unique α ∈ Fq where each fi (x) is monic and irreducible over Fq such that

p(x) = αf1 (x)n1 f2 (x)n2 · · · ft (x)nt .

(e) (Unique Coset Representatives) Let p(x) ∈ Fq [x] be nonzero. The distinct cosets
of the quotient ring Fq [x]/hp(x)i are uniquely representable as a(x) + hp(x)i where
a(x) = 0 or deg(a(x)) < deg(p(x)); Fq [x]/hp(x)i has order q deg(p(x)) . The quotient
ring Fq [x]/hp(x)i is also a vector space over Fq of dimension deg(p(x)).
(f) If p(x) is irreducible over Fq , then Fq [x]/hp(x)i is a field.

The map a = a0 a1 · · · an−1 7→ a(x) + hxn − 1i where a(x) = a0 + a1 x + · · · + an−1 xn−1 is


a vector space isomorphism from Fnq onto Fq [x]/hxn − 1i. We denote this map by a 7→ a(x),
dropping the ‘+ hxn − 1i’. Thus a linear code C of length n can be viewed equivalently as
a subspace of Fnq or as an Fq -subspace of Fq [x]/hxn − 1i. Notice that if a 7→ a(x), then
a0 = an−1 a0 · · · an−2 7→ xa(x) as xn + hxn − 1i = 1 + hxn − 1i. So C is a cyclic code in Fnq if
and only if C 7→ I where I is an ideal of Fq [x]/hxn − 1i. Therefore we study cyclic codes as
ideals of Fq [x]/hxn − 1i.
To find the ideals of Fq [x]/hxn − 1i requires factorization of xn − 1. From the theory of
finite fields (see [170, 1254, 1362]), there is an extension field of Fq that contains all the roots
of xn − 1. The smallest such field, called a splitting field of xn − 1 over Fq , is Fqt where
t is the smallest integer such that n | (q t − 1). When gcd(n, q) = 1, there exists α ∈ Fqt ,
called a primitive nth root of unity, such that the n distinct roots of xn − 1 (called
the roots of unity) are α0 = 1, α, α2 , . . . , αn−1 ; alternately if γ is a primitive element of
t
Fqt , one choice for α is γ (q −1)/n . When gcd(n, q) 6= 1, xn − 1 has repeated roots. For the
remainder of this section, we assume gcd(n, q) = 1.7
7 The theory of cyclic codes when gcd(n, q) 6= 1 has some overlap with the theory when gcd(n, q) = 1, but

there are significant differences. When gcd(n, q) 6= 1, cyclic codes are called repeated-root cyclic codes.
Repeated-root cyclic codes were first examined in their most generality in [369, 1835].
26 Concise Encyclopedia of Coding Theory

Definition 1.12.7 Let s be an integer with 0 ≤ s < n. The q-cyclotomic coset of s


modulo n is the set
Cs = {s, sq, . . . , sq r−1 } mod n
where r is the smallest positive integer such that sq r ≡ s (mod n). The distinct q-cyclotomic
cosets modulo n partition the set of integers {0, 1, 2, . . . , n − 1}.

Remark 1.12.8 A splitting field of xn − 1 over Fq is Fqt where t is the size of the q-
cyclotomic coset of 1 modulo n.

Theorem 1.12.9 ([1323, Chapter 7.5]) Let α be a primitive nth Qroot of unity in the
splitting field Fqt of xn − 1 over Fq . For 0 ≤ s < n define Mαs (x) = i∈Cs (x − αi ). Then
n
Mαs (x) ∈ Fq [x] and is irreducible over Fq . Furthermore, the uniqueQ factorization of x − 1
n
into monic irreducible polynomials over Fq is given by x − 1 = s Mαs (x) where s runs
through a set of representatives of all distinct q-cyclotomic cosets modulo n.

Example 1.12.10 The 2-cyclotomic cosets modulo 7 are C0 = {0}, C1 = {1, 2, 4}, and
C3 = {3, 6, 5}. By Remark 1.12.8, F23 = F8 is the splitting field of x7 − 1 over F2 . In
the notation of Table 1.3, α = δ is a primitive 7th root of unity. In the notation of The-
orem 1.12.9, Mα0 (x) = −1 + x = 1 + x, Mα = (x − α)(x − α2 )(x − α4 ) = 1 + x + x3 ,
Mα3 = (x − α3 )(x − α6 )(x − α5 ) = 1 + x2 + x3 , and x7 − 1 = Mα0 (x)Mα (x)Mα3 (x).

Using Theorem 1.12.9, we have the following basic theorem [1008, Theorem 4.2.1] de-
scribing the structure of cyclic codes over Fq . We remark that all of this theorem except
part (g) is valid when gcd(n, q) 6= 1. We note that if a(x), b(x) ∈ Fq [x], then a(x) divides
b(x), denoted a(x) | b(x), means that there exists c(x) ∈ Fq [x] such that b(x) = a(x)c(x).

Theorem 1.12.11 Let C be a nonzero linear cyclic code over Fq of length n viewed as an
ideal of Fq [x]/hxn − 1i. There exists a polynomial g(x) ∈ C with the following properties.
(a) g(x) is the unique monic polynomial of minimum degree in C.
(b) C = hg(x)i in Fq [x]/hxn − 1i.
(c) g(x) | (xn − 1).
Pn−k
With k = n − deg(g(x)), let g(x) = i=0 gi xi where gn−k = 1. Then
(d) the dimension of C is k and {g(x), xg(x), . . . , xk−1 g(x)} is a basis for C,
(e) every element of C is uniquely expressible as a product g(x)f (x) where f (x) = 0 or
deg(f (x)) < k,
(f) a generator matrix G of C is

g0 g1 g2 · · · gn−k ··· ··· 0


 
 0 g0 g1 · · · gn−k−1 gn−k ··· 0 
G =   ... .. 
. 
0 0 0 g0 ··· ··· ··· gn−k
g(x)
 
 xg(x) 
↔  .. ,
 . 
k−1
x g(x)

and
Basics of Coding Theory 27

(g) if α is a primitive nth root of unity in the splitting field Fqt of xn − 1 over Fq , then
Y
g(x) = Mαs (x)
s

where the product is over a subset of representatives of distinct q-cyclotomic cosets


modulo n.

Definition 1.12.12 The polynomial g(x) in Theorem 1.12.11 is the generator polyno-
mial of C. By convention, the cyclic code C = {0} has generator polynomial g(x) = xn − 1.

The following are immediate consequences of Theorem 1.12.11.

Corollary 1.12.13 There are 2m linear cyclic codes of length n (including the zero code)
over Fq where m is the number of q-cyclotomic cosets modulo n.

Corollary 1.12.14 If g1 (x) and g2 (x) are generator polynomials of C1 and C2 , respectively,
and if g1 (x) | g2 (x), then C2 ⊆ C1 .

By Theorem 1.12.11, when gcd(n, q) = 1, a linear cyclic code of length n over Fq is


uniquely determined by its generator polynomial. This in turn is determined by its roots in
the splitting field of xn − 1 over Fq . This leads to the following definition.

Definition 1.12.15 Let C be a linear cyclic code of length n over Fq with generator poly-
nomial g(x) | (xn −1). Let α be a fixed primitive nthQroot n
Q of unity in ia splitting field of x −1
over Fq . By Theorems 1.12.9 and 1.12.11, g(x) = s i∈Cs (x − α ) where s runsSthrough
some subset of representatives of the q-cyclotomic cosets Cs modulo n. Let T = s Cs be
the union of these q-cyclotomic cosets. The roots of unity {αi | i ∈ T } are called the zeros
of C; {αi | 0 ≤ i < n, i 6∈ T } are the nonzeros of C. The set T is called the defining set
of C relative to α.

Remark 1.12.16 In Definition 1.12.15, if you change the primitive nth root of unity, you
change the defining set T ; so T is computed relative to a fixed primitive root of unity.

Remark 1.12.17 Corollary 1.12.14 can be translated into the language of defining sets: If
T1 and T2 are defining sets of C1 and C2 , respectively, relative to the same primitive root of
unity, and if T1 ⊆ T2 , then C2 ⊆ C1 .

Example 1.12.18 Continuing with Example 1.12.10, Table 1.5 describes the 23 = 8 bi-
nary cyclic codes of length 7. The code with g(x) = 1 + x + x3 is H3,2 as discussed in
Example 1.12.3. The code with g(x) = 1 + x2 + x3 is permutation equivalent to H3,2 . The
code of dimension k = 1 is the binary repetition code {0,1}.

The dual code of a cyclic code is also cyclic. We can determine its generator polynomial
and defining set; see [1323, Chapter 7.4].

Theorem 1.12.19 Let C be an [n, k]q cyclic code with generator polynomial g(x). Define
xn − 1 xk h(x−1 )
h(x) = . Then C ⊥ is cyclic with generator polynomial g ⊥ (x) = . Let α be
g(x) h(0)
a primitive nth root of unity in a splitting field of xn − 1 over Fq . If T is the defining set of
C relative to α, the defining set of C ⊥ is T ⊥ = {0, 1, . . . , n − 1} \ (−1)T mod n.
28 Concise Encyclopedia of Coding Theory

TABLE 1.5: The [7, k, d]2 cyclic codes with generator polynomial g(x) and defining set T
relative to α
k d g(x) T
0 — 1 + x7 = 0 {0, 1, 2, 3, 4, 5, 6}
1 7 1 + x + x2 + x3 + x4 + x5 + x6 {1, 2, 3, 4, 5, 6}
3 4 1 + x2 + x3 + x4 {0, 1, 2, 4}
3 4 1 + x + x2 + x4 {0, 3, 5, 6}
4 3 1 + x + x3 {1, 2, 4}
4 3 1 + x2 + x3 {3, 5, 6}
6 2 1+x {0}
7 1 1 ∅

Example 1.12.20 Continuing with Example 1.12.18, the dual of any code in Table 1.5
must be a code in the table. By comparing dimensions, the codes of dimension 0 and
7 in the table are duals of each other as are the codes of dimension 1 and 6; this is
confirmed by examining the defining sets and using Theorem 1.12.19. By this theorem,
{0, 1, 2, 3, 4, 5, 6} \ (−1){1, 2, 4} mod 7 = {0, 1, 2, 3, 4, 5, 6} \ {6, 5, 3} = {0, 1, 2, 4} showing
that the codes with defining sets {0, 1, 2, 4} and {1, 2, 4} are duals of each other. By Re-
mark 1.12.17, as {1, 2, 4} ⊆ {0, 1, 2, 4}, h1+x+x3 i⊥ = h1+x2 +x3 +x4 i ⊆ h1+x+x3 i, a fact
we already observed in Example 1.6.10. Similarly, the codes with defining sets {0, 3, 5, 6}
and {3, 5, 6} are duals of each other.

The following is a somewhat surprising fact about cyclic self-orthogonal binary codes;
see [1008, Theorem 4.4.18].

Theorem 1.12.21 A cyclic self-orthogonal binary code is doubly-even.



Example 1.12.22 As detailed in Examples 1.6.10 and 1.12.20, H3,2 is self-orthogonal and
doubly-even, illustrating Theorem 1.12.21.

Definition 1.12.23 Quasi-cyclic codes are a natural generalization of cyclic codes. Let C
be a code of length n and ` a positive integer dividing n. C is `-quasi-cyclic provided
whenever c0 c1 · · · cn−1 ∈ C then cn−` cn−`+1 · · · cn−1 c0 · · · cn−`−2 cn−`−1 ∈ C. Cyclic codes
are 1-quasi-cyclic codes. Quasi-cyclic codes will be studied in Chapter 7.

See Chapter 2 and Sections 8.6 and 20.5 for more on cyclic codes over fields.

1.13 Golay Codes


In the same remarkable one-half page 1949 paper [820] in which Golay generalized the
Hamming codes, he also introduced what later became known as the [23, 12, 7]2 binary
Golay code and the [11, 6, 5]3 ternary Golay code. There are many ways to present these
two codes; one way is to describe them as cyclic codes.

Example 1.13.1 There are three 2-cyclotomic cosets modulo 23 with sizes 1, 11, and 11:
C0 = {0}, C1 = {1, 2, 4, 8, 16, 9, 18, 13, 3, 6, 12}, C5 = {5, 10, 20, 17, 11, 22, 21, 19, 15, 7, 14}.
Theorem 1.12.9 implies that, over F2 , x23 − 1 = x23 + 1 factors into 3 monic irreducible
Basics of Coding Theory 29

polynomials of degrees 1, 11, and 11. These irreducible factors are b0 (x) = 1 + x, b1 (x) =
1 + x + x5 + x6 + x7 + x9 + x11 , and b2 (x) = 1 + x2 + x4 + x5 + x6 + x10 + x11 . There are
8 binary linear cyclic codes of length 23 by Corollary 1.12.13. By Theorem 1.12.11(d), the
codes C1 = hb1 (x)i and C2 = hb2 (x)i are [23, 12]2 codes. The map that fixes coordinate 0
and switches coordinates i and 23 − i for 1 ≤ i ≤ 11 leads to a permutation matrix P where
C1 P = C2 . Any code permutation equivalent to C1 is termed the [23, 12]2 binary Golay
code of length 23 and is denoted G23 . The splitting field of x23 − 1 over F2 is F211 . In F211
there is a primitive 23rd root of unity α where the defining sets of C1 and C2 are C1 and
C5 , respectively, relative to α. Another primitive 23rd root of unity is β = α5 ; relative to β,
the defining sets of C1 and C2 are C5 and C1 , respectively. By Theorem 1.12.19 the defining
set of C1⊥ relative to α is C0 ∪ C1 implying by Remark 1.12.17 that C1⊥ ⊆ C1 showing C1⊥ is
self-orthogonal. Using Theorem 1.12.21, C1⊥ is the doubly-even [23, 11]2 code consisting of
all codewords in C1 of even weight.

Example 1.13.2 The 3-cyclotomic cosets modulo 11 are C0 = {0}, C1 = {1, 3, 9, 5, 4},
and C2 = {2, 6, 7, 10, 8} of sizes 1, 5, and 5, respectively. Theorem 1.12.9 implies that,
over F3 , x11 − 1 factors into 3 monic irreducible polynomials of degrees 1, 5, and 5. These
irreducible factors are t0 (x) = −1 + x, t1 (x) = −1 + x2 − x3 + x4 + x5 , and t2 (x) =
−1−x+x2 −x3 +x5 . There are 8 ternary linear cyclic codes of length 11 by Corollary 1.12.13.
By Theorem 1.12.11(d), the codes C1 = ht1 (x)i and C2 = ht2 (x)i are [11, 6]3 codes. The map
that fixes coordinate 0 and switches coordinates i and 11 − i for 1 ≤ i ≤ 5 leads to a
permutation matrix P where C1 P = C2 . Any code monomially equivalent to C1 is termed
the [11, 6]3 ternary Golay code of length 11 and is denoted G11 . The splitting field of
x11 − 1 over F3 is F35 . In F35 there is a primitive 11th root of unity α where the defining
sets of C1 and C2 are C1 and C2 , respectively, relative to α. Another primitive 11th root of
unity is β = α2 ; relative to β, the defining sets of C1 and C2 are C2 and C1 , respectively.

Definition 1.13.3 G23 can be extended as in Section 1.7 to a [24, 12]2 code Gb23 , denoted
G24 , and called the binary Golay code of length 24. Similarly G11 can be extended to a
[12, 6]3 code Gb11 , denoted G12 , and called the ternary Golay code of length 12.

Remark 1.13.4 The automorphism groups of the four Golay codes involve the Mathieu
groups Mp for p ∈ {11, 12, 23, 24} discovered by Émile Mathieu [1352, 1353]. These four
permutation groups on p points are 4-fold transitive, when p ∈ {11, 23}, and 5-fold transitive,
when p ∈ {12, 24}, simple groups. Properties of these groups and their relationship to Golay
codes can be found in [442].

The following two theorems give basic properties of the four Golay codes. Parts (a), (b),
and (c) of each theorem can be found in most standard coding theory texts. The uniqueness
of these codes in part (d) of each theorem is a culmination of work in [525, 1514, 1518, 1732]
with a self-contained proof in [1008, Chapter 10]. Part (e) of each theorem follows by direct
computation from Definition 1.9.8. The automorphism groups in part (f) of each theorem
can be found in [434], which is also [442, Chapter 10].

Theorem 1.13.5 The following properties hold for the binary Golay codes.

(a) G23 has minimum distance 7 and weight distribution A0 = A23 = 1, A7 = A16 = 253,
A8 = A15 = 506, A11 = A12 = 1288, and Ai = 0 otherwise.
(b) G24 has minimum distance 8 and weight distribution A0 = A24 = 1, A8 = A16 = 759,
A12 = 2576, and Ai = 0 otherwise.
(c) G24 is doubly-even and self-dual.
30 Concise Encyclopedia of Coding Theory

(d) Both a (23, M )2 and a (24, M )2 , possibly nonlinear, binary code each containing 0
with M ≥ 212 codewords and minimum distance 7 and 8, respectively, are unique
up to permutation equivalence. They are the [23, 12, 7]2 and [24, 12, 8]2 binary Golay
codes.
(e) G23 is perfect.

(f) PAut(G23 ) = M23 and PAut(G24 ) = M24 .

Theorem 1.13.6 The following properties hold for the ternary Golay codes.

(a) G11 has minimum distance 5 and weight distribution A0 = 1, A5 = A6 = 132, A8 =


330, A9 = 110, A11 = 24, and Ai = 0 otherwise.
(b) G12 has minimum distance 6 and weight distribution A0 = 1, A6 = 264, A9 = 440,
A12 = 24, and Ai = 0 otherwise.

(c) G12 is self-dual.


(d) Both a (11, M )3 and a (12, M )3 , possibly nonlinear, ternary code each containing 0
with M ≥ 36 codewords and minimum distance 5 and 6, respectively, are unique up
to monomial equivalence. They are the [11, 6, 5]3 and [12, 6, 6]3 ternary Golay codes.
(e) G11 is perfect.

(f) MAut(G11 ) = Mf11 and MAut(G12 ) = M f12 where M f11 and Mf12 are isomorphic to the
double covers, or the non-splitting central extensions by a center of order 2, of M11
and M12 .

Remark 1.13.7 If there is equality for given parameters of a code in a bound from Sec-
tion 1.9, we say the code meets the bound. Perfect codes are those meeting the Sphere
Packing Bound; MDS codes are those meeting the Singleton Bound. Using Theorem 1.10.5,
direct computation shows that the [(q m − 1)/(q − 1), m, q m−1 ]q simplex code meets the
Griesmer Bound, as do G11 and G12 . Neither G23 nor G24 meet the Griesmer Bound.

1.14 BCH and Reed–Solomon Codes


There is a lower bound, presented in Theorem 1.14.3, on the minimum distance of a
cyclic code based on the defining set of the code. BCH codes take advantage of this bound.
The binary BCH codes were discovered by A. Hocquenghem [968] and independently by R.
C. Bose and D. K. Ray-Chaudhuri [248, 249], and were generalized to all finite fields by D.
C. Gorenstein and N. Zierler [840]. Some properties of BCH codes are given in Section 2.6.

Definition 1.14.1 Let N = {0, 1, . . . , n − 1} and T ⊆ N . We say T contains a set of s ≤ n


consecutive elements provided there exists b ∈ N such that

{b, b + 1, . . . , b + s − 1} mod n ⊆ T.

Remark 1.14.2 When considering the notion of consecutive, wrap-around is allowed. For
example if n = 10, {8, 9, 0, 1} is a consecutive set in T = {0, 1, 2, 5, 8, 9}.
Basics of Coding Theory 31

TABLE 1.6: The [7, k, d]2 BCH codes with defining set T relative to α, b, and Bose distance
δ
k d T b δ
0 — {0, 1, 2, 3, 4, 5, 6} = C1 ∪ C2 ∪ · · · ∪ C6 ∪ C0 1 —
1 7 {1, 2, 3, 4, 5, 6} = C1 ∪ C2 ∪ · · · ∪ C6 1 7
3 4 {0, 1, 2, 4} = C0 ∪ C1 ∪ C2 0 4
3 4 {0, 3, 5, 6} = C5 ∪ C6 ∪ C0 5 4
4 3 {1, 2, 4} = C1 ∪ C2 1 3
4 3 {3, 5, 6} = C5 ∪ C6 5 3
6 2 {0} = C0 0 2

Rather surprisingly, the existence of consecutive elements in the defining set of a cyclic
code determines a lower bound, called the BCH Bound, on the minimum distance of the
code. A proof of the following can be found in [1323, Chapter 7.6].

Theorem 1.14.3 (BCH Bound) Let C be a linear cyclic code of length n over Fq and
minimum distance d with defining set T relative to some primitive nth root of unity. Assume
T contains δ − 1 consecutive elements for some integer δ ≥ 2. Then d ≥ δ.

Definition 1.14.4 Let δ be an integer with 2 ≤ δ ≤ n. A BCH code over Fq of length


n and designed distance δ is a linear cyclic code with defining set

T = Cb ∪ Cb+1 ∪ · · · ∪ Cb+δ−2

relative to some primitive nth root of unity where Ci is the q-cyclotomic coset modulo n
containing i. As T contains the consecutive set {b, b+1, . . . , b+δ−2}, this code has minimum
distance at least δ by the BCH Bound. If b = 1, the code is narrow-sense; if n = q t − 1
for some t, the code is primitive.

Definition 1.14.5 Sometimes a BCH code can have more than one designed distance; the
largest designed distance is called the Bose distance.

Example 1.14.6 Consider the eight [7, k, d]2 binary cyclic codes from Example 1.12.18 and
presented in Table 1.5. All except the code with defining set T = ∅ are BCH codes as seen
in Table 1.6. As 7 = 23 − 1, all these BCH codes are primitive. Technically, the zero code
is primitive with designed distance 8; of course distance in the zero code is meaningless.
Of the six remaining codes, three are narrow-sense. Notice that the code with defining set
{1, 2, 4} is narrow-sense with two designed distances 2 and 3 as {1, 2, 4} = C1 = C1 ∪ C2 ;
the Bose distance is 3. The code with defining set {1, 2, 3, 4, 5, 6} is narrow-sense with
designed distances 4 through 7 as {1, 2, 3, 4, 5, 6} = C1 ∪ C2 ∪ C3 = C1 ∪ C2 ∪ C3 ∪ C4 =
C1 ∪ C2 ∪ C3 ∪ C4 ∪ C5 = C1 ∪ C2 ∪ C3 ∪ C4 ∪ C5 ∪ C6 ; the Bose distance is 7. The Bose
designed distance and the true minimum distance are the same for the seven nonzero BCH
codes.

Example 1.14.7 In the notation of Example 1.13.1, G23 has defining set T = C1 which
contains 4 consecutive elements {1, 2, 3, 4}. By the BCH Bound, G23 has minimum weight
at least 5; its true minimum weight is 7 from Theorem 1.13.5(a). As the defining set of G23
is T = C1 = C1 ∪ C2 ∪ C3 ∪ C4 , G23 is a narrow-sense8 BCH code of Bose designed distance
8G
23 is permutation equivalent to the BCH code with designed distance 5 and defining set C5 = C19 =
C19 ∪ C20 ∪ C21 ∪ C22 ; in this formulation G23 is not narrow-sense.
32 Concise Encyclopedia of Coding Theory

δ = 5 with b = 1. Similarly, G11 of Example 1.13.2 is a BCH code viewed in several ways.
G11 is a narrow-sense BCH code with b = 1, δ = 2 and defining set C1 = {1, 3, 4, 5, 9}. It is
also a BCH code with b = 3, δ = 2, 3, or 4 as {1, 3, 4, 5, 9} = C3 = C3 ∪ C4 = C3 ∪ C4 ∪ C5 .
The Bose distance of G11 is 4 while its true minimum distance is 5 from Theorem 1.13.6(a).

At about the same time as BCH codes appeared in the literature, I. S. Reed and G.
Solomon [1582] published their work on the codes that now bear their names. These codes,
which are now commonly presented as a special case of BCH codes, were actually first
constructed by K. A. Bush [319] in 1952 in the context of orthogonal arrays. Because
of their burst error-correction capabilities, Reed–Solomon codes are used to improve the
reliability of compact discs, digital audio tapes, and other data storage systems.

Definition 1.14.8 A Reed–Solomon (RS) code9 of length n over Fq is a primitive


BCH code of length n = q − 1.

When n = q − 1, the q-cyclotomic coset modulo n containing s is Cs = {s}. So if C is an


[n, k, d]q Reed–Solomon code, its defining set T has size n − k and must be {b, b + 1, . . . , b +
(n − k − 1)} mod n for some b. By the BCH Bound, d ≥ n − k + 1. By the Singleton Bound,
d ≤ n − k + 1. Therefore d = n − k + 1 and C is MDS; in particular the designed distance
δ = n − k + 1 equals the true minimum distance. In general the dual code of an MDS code
is also MDS by Theorem 1.9.13. The dual code of a BCH code may not be BCH; however
the dual of a Reed–Solomon code is Reed–Solomon as follows. By Theorem 1.12.19, C ⊥
has defining set T ⊥ = N \ (−1)T mod n where N = {0, 1, . . . , n − 1}. Since (−1)T mod n
consists of n−k consecutive elements of N , T ⊥ is the remaining k elements N , which clearly
must be consecutive (recalling that wrap-around is allowed in consecutive sets modulo n).
This discussion yields the following result.

Theorem 1.14.9 Let C be a Reed–Solomon code over Fq of length n = q − 1 and designed


distance δ. The following hold.
(a) C has defining set T = {b, b + 1, . . . , b + δ − 2} for some integer b.
(b) C has minimum distance d = δ and dimension k = n − d + 1.
(c) C is MDS.
(d) C ⊥ is a Reed–Solomon code of designed distance k + 1.

Example 1.14.10 Using Table 1.1, γ is both a primitive element of F9 and a primitive 8th
root of unity. Let C be the narrow-sense Reed–Solomon code over F9 of length 8 and designed
distance δ = 4. Then C has defining set {1, 2, 3} relative to γ and generator polynomial
g(x) = (x−γ)(x−γ 2 )(x−γ 3 ) = γ 2 +γx+γ 3 x2 +x3 . C is an [8, 5, 4]9 code. By Theorem 1.12.19,
C ⊥ has defining set T ⊥ = {0, 1, . . . , 7} \ (−1){1, 2, 3} mod 8 = {0, 1, . . . , 7} \ {7, 6, 5} =
{0, 1, 2, 3, 4} and hence generator polynomial g ⊥ (x) = (x−1)(x−γ)(x−γ 2 )(x−γ 3 )(x−γ 4 ) =
(x2 − 1)g(x) = γ 6 + γ 5 x + γ 5 x2 + γ 7 x3 + γ 3 x4 + x5 . So C ⊥ is an [8, 3, 6]9 non-narrow-sense
Reed–Solomon code with b = 0 and designed distance 6, consistent with Theorem 1.14.9(d).
As T ⊆ T ⊥ , C ⊥ ⊆ C by Remark 1.12.17.

The original formulation of Reed and Solomon for the narrow-sense Reed–Solomon codes
is different from that of Definition 1.14.8. This alternative formulation of narrow-sense
Reed–Solomon codes is of particular importance because it is the basis for the definitions
9 While this is a common definition of Reed–Solomon codes, there are other codes of lengths different

from q − 1 that are also called Reed–Solomon codes. See Remark 15.3.21.
Basics of Coding Theory 33

of generalized Reed–Solomon codes, Goppa codes, and algebraic geometry codes; see Chap-
ters 15 and 24.
For this formulation, let Pk,q = {p(x) ∈ Fq [x] | p(x) = 0 or deg(p(x)) < k} when k ≥ 0.
See [1008, Theorem 5.2.3] for a proof of the following.

Theorem 1.14.11 Let n = q − 1 and let α be a primitive nth root of unity in Fq . For
0 < k ≤ n = q − 1, let RS k (α) = p(α0 ), p(α), . . . , p(αq−2 ) ∈ Fnq | p(x) ∈ Pk,q . Then
RS k (α) is the narrow-sense [q − 1, k, q − k]q Reed–Solomon code.

In general, extending an MDS code may not produce an MDS code; however extending
a narrow-sense Reed–Solomon code does produce an MDS code. With Pq−2the notation of The-
orem 1.14.11, Fq = {0, 1 = α0 , α, α2 , . . . , αq−2 } and, when q ≥ 3, i=0 αi P
= 0. Using this,
it is straightforward to show that if q ≥ 3, k < q − 1, and p(x) ∈ Pk,q , then β∈Fq p(β) = 0.
This leads to the following result.

Theorem 1.14.12
 With the notation of Theorem  1.14.11 and 0 < k < n = q − 1,
RS
d k (α) = p(α0 ), p(α), . . . , p(αq−2 ), p(0) ∈ Fnq | p(x) ∈ Pk,q is a [q, k, q − k + 1]q
MDS code.

Remark 1.14.13 The code RS q−1 (α) omitted from consideration in Theorem 1.14.12
equals Fq−1
q . Its extension is not as given in Theorem 1.14.12; however RS
d q−1 (α) is still a
[q, q − 1, 2]q MDS code.

1.15 Weight Distributions


The weight distribution of a linear code determines the weight distribution of its dual
code via a series of equations, called the MacWilliams Identities or the MacWilliams Equa-
tions. They were first developed by F. J. MacWilliams in [1319]. There are in fact several
equivalent formulations of these equations. Among these are the Pless Power Moments dis-
covered by V. S. Pless [1513]. The most compact form of these identities is expressed in a
single polynomial equation relating the weight distribution of a code and its dual.

Definition 1.15.1 Let C be a linear code of length n over Fq with weight distribution
Ai (C) for 0 ≤ i ≤ n. Let x and y be independent indeterminates over Fq . The (Hamming)
weight enumerator of C is defined to be
n
X
HweC (x, y) = Ai (C)xi y n−i .
i=0

The formulation of the Pless Power Moments involves Stirling numbers.

Definition 1.15.2 The Stirling numbers S(r, ν) of the second kind are defined for
nonnegative integers r, ν by the equation
ν  
1 X ν−i ν
S(r, ν) = (−1) ir ;
ν! i=0 i

ν!S(r, ν) is the number of ways to distribute r distinct objects into ν distinct boxes with
no box left empty.
34 Concise Encyclopedia of Coding Theory

The next theorem gives six equivalent formulations of the MacWilliams Identities or
MacWilliams Equations. The fourth in the list involves the Krawtchouck polynomials;
see Definition 1.9.21. The last two are the Pless Power Moments. One proof of the
equivalence of these identities is found in [1008, Chapter 7.2].
Theorem 1.15.3 (MacWilliams Identities and Pless Power Moments) Let C be a
linear [n, k]q code and C ⊥ its [n, n − k]q dual code. Let Ai = Ai (C) and A⊥ ⊥
i = Ai (C ), for

0 ≤ i ≤ n, be the weight distributions of C and C , respectively. The following are equivalent.
n−ν
X n − j  ν 
n−j
X 
(a) Aj = q k−ν
A⊥
j for 0 ≤ ν ≤ n.
j=0
ν j=0
n − ν
n   ν
n−j
 
X j X
(b) Aj = q k−ν (−1)j (q − 1)ν−j A⊥
j for 0 ≤ ν ≤ n.
j=ν
ν j=0
n − ν

1
(c) HweC ⊥ (x, y) = HweC (y − x, y + (q − 1)x).
|C|
n
1 X (n,q)
(d) A⊥
j = Ai Kj (i) for 0 ≤ j ≤ n.
|C| i=0
 
n min{n,r} r

 
X X X n j
(e) j r Aj = (−1)j A⊥j
 ν!S(r, ν)q k−ν (q − 1)ν−j  for 0 ≤ r.
j=0 j=0 ν=j
n − ν
 
n min{n,r} r

 
X X X n j
(f) (n − j)r Aj = A⊥
j
 ν!S(r, ν)q k−ν  for 0 ≤ r.
j=0 j=0 ν=j
n − ν

Remark 1.15.4 In the case of a linear code, the Delsarte–MacWilliams Inequalities of


Theorem 1.9.22 follow from Theorem 1.15.3(d).
Example 1.15.5 In Theorem 1.13.6(b), we gave the weight distribution of G12 . Using the
Pless Power Moments of Theorem 1.15.3(e), we can verify this weight distribution using
only the fact that G12 is a [12, 6, 6]3 self-dual code. As G12 is self-dual, A⊥
i = Ai and Ai = 0
when 3 - i by Theorem 1.6.2(h). As A0 = 1 and the minimum weight of G12 is 6, the only
unknown Ai are A6 , A9 , and A12 . We can find these from the first three power moments in
Theorem 1.15.3(e). For a general [n, k]q code, as A⊥ 0 = 1, the first three power moments are
n
X
Aj = q k ,
j=0
n
X
jAj = q k−1 (qn − n − A⊥
1 ), and
j=0
n
X
j 2 Aj = q k−2 (q − 1)n(qn − n + 1) − (2qn − q − 2n + 2)A⊥ ⊥

1 + 2A2 .
j=0

Applied specifically to G12 , these become


1 + A6 + A9 + A12 = 729
6A6 + 9A9 + 12A12 = 5 832
36A6 + 81A9 + 144A12 = 48 600.
Basics of Coding Theory 35

The unique solution to this system is A6 = 264, A9 = 440, and A12 = 24. Thus the weight
enumerator of G12 is

HweG12 (x, y) = y 12 + 264x6 y 6 + 440x9 y 3 + 24x12 .


 
Example 1.15.6 Let C be the (q m −1)/(q−1), m, q m−1 q simplex code of Theorem 1.10.5;
by this theorem, with n = (q m − 1)/(q − 1),
m−1 m−1
HweC (x, y) = y n + (q m − 1)xq y n−q .

By Definition 1.10.1, C ⊥ = Hm,q . Using Theorem 1.15.3(d),


1 (n,q) (n,q) m−1 
Aj (Hm,q ) = K (0) + (q m − 1)Kj (q ) for 0 ≤ j ≤ n
qm j
noting that
 
(n,q) n
j
Kj (0) = (q − 1) and
j
j  m−1 
n − q m−1

(n,q) m−1 j−i q
X
i
Kj (q ) = (−1) (q − 1) .
i=1
i j−i

The MacWilliams Identities can be used to find the weight distribution of an MDS
code as found, for example, in [1323, Theorem 6 of Chapter 11]. A resulting corollary gives
bounding relations on the length, dimension, and field size.

Theorem 1.15.7 Let C be an [n, k, d]q MDS code over Fq . The weight distribution of C is
given by A0 (C) = 1, Ai (C) = 0 for 1 ≤ i < d = n − k + 1 and
i−d
 X  
n i
(−1)j q i+1−d−j − 1

Ai (C) =
i j=0 j

for d ≤ i ≤ n.

Corollary 1.15.8 Let C be an [n, k, d]q MDS code over Fq .


(a) If 2 ≤ k, then d = n − k + 1 ≤ q.
(b) If k ≤ n − 2, then k + 1 ≤ q.

This corollary becomes a foundation for the MDS Conjecture 3.3.21 in Chapter 3.

1.16 Encoding
Figure 1.1 shows a simple communication channel that includes a component called an
encoder, in which a message is encoded to produce a codeword. In this section we examine
two encoding processes.
As in Figure 1.1, a message is any of the q k possible k-tuples x ∈ Fkq . The encoder will
convert x to an n-tuple c from a code C over Fq with q k codewords; that codeword will then
be transmitted over the communication channel.
36 Concise Encyclopedia of Coding Theory

Suppose that C is an [n, k, d]q linear code with generator matrix G and parity check
matrix H. We first describe an encoder that uses the generator matrix G. The most common
way to encode the message x is as x 7→ c = xG. If G is replaced by another generator matrix,
the encoding of x will, of course, be different.  Anice relationship exists between message
and codeword if G is in standard form Ik | A . In that case the first k coordinates of
the codeword c are the information symbols x in order; the remaining n − k symbols are
the parity check symbols, that is, the redundancy added to x in order to help recover x
if errors occur during transmission. A similar relationship between message and codeword
can exist even if G is not in standard form. Specifically, suppose there exist column indices
i1 , i2 , . . . , ik such that the k×k matrix consisting of these k columns of G is the k×k identity
matrix. In that case the message is found in the k coordinates i1 , i2 , . . . , ik of the codeword
scrambled but otherwise unchanged; that is, the message symbol xj is in component ij of the
codeword. If this occurs where the message is embedded in the codeword, we say that the
encoder is a systematic encoder of C. We can always force an encoder to be systematic.
For example, if G is row reduced to a matrix G1 in reduced row echelon form, G1 remains
a generator matrix of C by Remark 1.4.3; the encoding x 7→ c = xG1 is systematic as G1
has k columns which together form Ik . Another way to force an encoder to be systematic
is as follows. By Theorem 1.8.4, C is permutation equivalent to an [n, k, d]q code C 0 with
generator matrix G0 in standard form. If the code C 0 is used in place of C, the encoder
x 7→ xG0 is a systematic encoder of C 0 .

Example 1.16.1 Let C be the [7, 4, 3]2 binary Hamming code H3,2 with generator matrix
G3,2 from Example 1.4.9. Encoding x = x1 x2 x3 x4 ∈ F42 as xG3,2 produces the codeword
c = x1 x2 x3 x4 (x2 + x3 + x4 )(x1 + x3 + x4 )(x1 + x2 + x4 ).

Example 1.16.2 Let C be an [n, k, d]q cyclic code with generator polynomial g(x) and
generator matrix G obtained from cyclic shifts of g(x) as in Theorem 1.12.11(f). Suppose
the message m = m0 m1 · · · mk−1 is to be encoded as c = mG. Using the polynomial m(x) =
m0 +m1 x+· · ·+mk−1 xk−1 to represent the message m and c(x) = c0 +c1 x+· · ·+cn−1 xn−1
to represent the codeword c, it is a simple calculation to show c(x) = m(x)g(x). Generally,
this encoding is not systematic. Recall from Examples 1.12.3 and 1.12.18 that the Hamming
[7, 4, 3]2 code H3,2 has a cyclic form with generator polynomial g(x) = 1 + x + x3 . The
nonsystematic encoder m(x) 7→ c(x) = m(x)g(x) yields c(x) = m0 + (m0 + m1 )x + (m1 +
m2 )x2 + (m0 + m2 + m3 )x3 + (m1 + m3 )x4 + m2 x5 + m3 x6 .

The second methodto encode  uses the parity check


 matrix H. This is easiest to do when
G is in standard form Ik | A ; in this case H = −AT | In−k by Theorem 1.4.7. Suppose
that x = x1 x2 · · · xk is to be encoded as the codeword c = c1 c2 · · · cn = xG. As G is in stan-
dard form, c1 c2 · · · ck = x1 x2 · · · xk . So we
 need to determine
 the n − k redundancy symbols
ck+1 ck+2 · · · cn . Because 0T = HcT = −AT | In−k cT , we have AT xT = ck+1 ck+2 · · · cT n,
or equivalently ck+1 ck+2 · · · cn = xA. This process can be generalized when x 7→ xG is a
systematic encoder.

Example 1.16.3 Continuing with Example 1.16.1, we can encode x = x1 x2 x3 x4 using


H3,2 from Example 1.4.9. Here c5 c6 c7 = xA where
 
0 1 1
 1 0 1 
A=  1 1 0 .

1 1 1
Thus c5 = x2 + x3 + x4 , c6 = x1 + x3 + x4 , and c7 = x1 + x2 + x4 , consistent with
Example 1.16.1.
Basics of Coding Theory 37

Example 1.16.4 Let C be an [n, k, d]q cyclic code with generator polynomial g(x). In
Example 1.16.2 a nonsystematic encoder was described that encodes a cyclic code using
g(x). There is a systematic encoder of C using the generator polynomial g ⊥ (x) of C ⊥ .
By Theorem 1.12.19, g ⊥ (x) = xk h(x−1 )/h(0) = h00 + h01 x + · · · + h0k−1 xk−1 + h0k xk where
h(x) = (xn −1)/g(x) and h0k = 1. Let H, which is a parity check matrix for C, be determined
from the shifts of g ⊥ (x) as follows:
 0
h0 h01 h02 · · · h0k ··· ··· 0

 0 h00 h01 · · · h0k−1 h0k · · · 0 
H =   ... .. 
. 
0 0 0 h00 ··· ··· ··· h0k
g ⊥ (x)
 
 xg ⊥ (x) 
↔  .. .
 . 
xn−k−1 g ⊥ (x)
Examining the generator matrix G for C in Theorem 1.12.11(f), {0, 1, . . . , k − 1} is an infor-
mation set for C. Let c = c0 c1 · · · cn−1 ∈ C; so c0 c1 · · · ck−1 can be considered the associated
message. The redundancy components ck ck+1 · · · cn−1 are determined from HcT = 0T and
can be computed in the order i = k, k + 1, . . . , n − 1 where
k−1
X
ci = − h0j ci−k+j . (1.3)
j=0

Example 1.16.5 We apply the systematic encoding of Example 1.16.4 to the cyclic version
of the Hamming [7, 4, 3]2 code H3,2 with generator polynomial g(x) = 1 + x + x3 ; see
Example 1.12.18. By Example 1.12.20, g ⊥ (x) = 1 + x2 + x3 + x4 and (1.3) yields c4 =
c0 + c2 + c3 , c5 = c1 + c3 + c4 , and c6 = c2 + c4 + c5 . In terms of the information bits
c0 c1 c2 c3 , we have c4 = c0 + c2 + c3 , c5 = c0 + c1 + c2 , and c6 = c1 + c2 + c3 .
As discussed in Section 1.1, sometimes the receiver is interested only in the sent code-
words rather than the sent messages. However, if there is interest in the actual message, a
question arises as to how to recover the message from a codeword. If the encoder x 7→ xG
is systematic, it is straightforward to recover the message. What can be done otherwise?
Because G has independent rows, there is an n × k matrix K such that GK = Ik ; K is
called a right inverse for G. A right inverse is not necessarily unique. As c = xG, the
message x = xGK = cK.
Example 1.16.6 In Example 1.16.2, we encoded the message m0 m1 m2 m3 using the
[7, 4, 3]2 cyclic version of H3,2 with generator polynomial g(x) = 1 + x + x3 . The resulting
codeword was c = m0 , m0 + m1 , m1 + m2 , m0 + m2 + m3 , m1 + m3 , m2 , m5 . The generator
matrix G obtained from g(x) as in Theorem 1.12.11(f) has right inverse
 
1 0 0 0
 0 1 0 0 
 
 0 1 0 0 
 
K=  0 1 0 0 .

 0 1 0 0 
 
 0 0 1 0 
0 0 0 1
Computing cK gives m0 m1 m2 m3 as expected.
38 Concise Encyclopedia of Coding Theory

FIGURE 1.2: Binary symmetric channel with crossover probability %

1−%
s
1 H - s 1
HH 
H H %  
HH *

H
  HH
jH

 % H
 HH
s
0  - Hs 0
1−%
send receive

1.17 Decoding
Decoding is the process of determining which codeword c was sent when a vector y is
received. Decoding is generally more complex than encoding. Decoding algorithms usually
vary with the type of code being used. In this section we discuss only the basics of hard-
decision decoding. Decoding is discussed more in depth in Chapters 15, 21, 24, 28–30, and
32.

Definition 1.17.1 A hard-decision decoder is a decoder that inputs ‘hard’ data from
the channel (e.g., elements from Fq ) and outputs hard data to the receiver. A soft-decision
decoder is one which inputs ‘soft’ data from the channel (e.g., estimates of the symbols
with attached probabilities) and generally outputs hard data.

Initially we focus our discussion to the decoding of binary codes. To set the stage for
decoding, we begin with one possible mathematical model of a channel that transmits binary
data. Before stating the model, we establish some notation. If E is an event, Prob(E) is
the probability that E occurs. If E1 and E2 are events, Prob(E1 | E2 ) is the conditional
probability that E1 occurs given that E2 occurs. The model for transmitting binary data
we explore is called the binary symmetric channel (BSC) with crossover probability
% as illustrated in Figure 1.2. In a BSC, we have the following conditional probabilities: For
y, c ∈ F2 , 
1 − % if y = c,
Prob(y is received | c is sent) = (1.4)
% if y 6= c.
In a BSC we also assume that the probability of error in one bit is independent of previous
bits. We will assume that it is more likely that a bit is received correctly than in error; so
% < 21 . 10
Let C be a binary code of length n. Assume that c ∈ C is sent and y ∈ Fn2 is received
and decoded as e c ∈ C. Of course the hope is that ec = c; otherwise the decoder has made a
decoding error. So Prob(c | y) is the probability that the codeword c is sent given that y
is received, and Prob(y | c) is the probability that y is received given that the codeword c
10 While % is usually very small, if % > 21 , the probability that a bit is received in error is higher than
the probability that it is received correctly. One strategy is to then immediately interchange 0 and 1 at
the receiving end. This converts the BSC with crossover probability % to a BSC with crossover probability
1 − % < 12 . This of course does not help if % = 21 ; in this case communication is not possible.
Basics of Coding Theory 39

is sent. These probabilities are related by Bayes’ Rule


Prob(y | c)Prob(c)
Prob(c | y) =
Prob(y)

where Prob(c) is the probability that c is sent and Prob(y) is the probability that y is
received. There are two natural means by which a decoder can make a choice based on
c ∈ C where Prob(e
these two probabilities. First the decoder could decode y as e c | y) is max-
imum; such a decoder is called a maximum a posteriori probability (MAP) decoder.
Symbolically a MAP decoder makes the decision

c = arg max Prob(c | y).


e
c∈C

Here arg maxc∈C Prob(c | y) is the argument c of the probability function Prob(c | y) that
maximizes this probability. Alternately the decoder could decode y as e c ∈ C where
Prob(y | e
c) is maximum; such a decoder is called a maximum likelihood (ML) decoder.
Symbolically an ML decoder makes the decision

c = arg max Prob(y | c).


e
c∈C

We further analyze ML decoding over a BSC. If y = y1 y2 · · · yn and c = c1 c2 · · · cn ,


n
Y
Prob(y | c) = Prob(yi | ci )
i=1

since bit errors are independent. By (1.4) Prob(yi | ci ) = % if yi 6= ci and Prob(yi | ci ) = 1 − %


if yi = ci . Therefore
 dH (y,c)
dH (y,c) n−dH (y,c) n %
Prob(y | c) = % (1 − %) = (1 − %) . (1.5)
1−%
%
Since 0 < % < 12 , 0 < 1−% < 1. Thus maximizing Prob(y | c) is equivalent to minimizing
dH (y, c); so a ML decoder finds the codeword c closest to the received vector y in Hamming
distance.

Definition 1.17.2 If a decoder decodes a received vector y as the codeword c with dH (y, c)
minimized, the decoder is called a nearest neighbor decoder.

From this discussion, on a BSC, maximum likelihood and nearest neighbor decoding are
the same. We can certainly perform nearest neighbor decoding on any code over any field.
Before presenting an example of a nearest neighbor decoder, we need to establish the
relationship between the minimum distance of a code and the error-correcting capability of
the code under nearest neighbor decoding. Notice this theorem is valid for any code, linear
or not, over any finite field.

Theorem 1.17.3 Let C be an (n, M, d)q code and t = d−1


 
2 . If a codeword c ∈ C is sent
and y is received where t or fewer errors have occurred, then c is the unique codeword
closest to y. In particular nearest neighbor decoding uniquely and correctly decodes any
received vector in which at most t errors have occurred in transmission.

Proof: By definition y ∈ Sq,n,t (c), the sphere of radius t in Fnq centered at c. By The-
orem 1.9.5(b), spheres of radius t centered at codewords are pairwise disjoint; hence if
y ∈ Sq,n,t (c1 ) with c1 ∈ C, then c = c1 . 
40 Concise Encyclopedia of Coding Theory

Definition 1.17.4 A code C is a t-error-correcting code provided that whenever any


c ∈ C is transmitted and y ∈ Fnq is received, where y differs from c in at most t coordinates,
then every other codeword in C differs from y in more than t coordinates.

Remark
 d−1  d−1
 q code C is t-error-correcting for any t ≤
1.17.5 By Theorem 1.17.3, an (n, M, d)
2 . Furthermore, when M > 1 and t = 2 , there exist two distinct codewords such
that the spheres of radius t + 1 about them are not disjoint; if this were not  the case, the
minimum distance of C is in fact larger than d. Thus when M > 1 and t = d−1 2 , C is not
(t + 1)-error-correcting.11

The nearest neighbor decoding problem foran (n,  M, d)q code becomes one of finding an
efficient algorithm that will correct up to t = d−12 errors. An obvious decoding algorithm
is to examine all codewords until one is found with distance t or less from the received
vector. This is a realistic decoding algorithm only for M small. Another obvious algorithm
is to make a table consisting of a nearest codeword for each of the q n vectors in Fnq and then
look up a received vector in the table to decode it. This is impractical if q n is very large.
For an [n, k, d]q linear code, we can devise an algorithm using a table with q n−k rather
than q n entries where one can find the nearest codeword by looking up one of these q n−k
entries. This general nearest neighbor decoding algorithm for linear codes is called syndrome
decoding, which is the subject of the remainder of the section.

Definition 1.17.6 Let C be an [n, k, d]q linear code. For y ∈ Fnq , the coset of C with coset
representative y is y + C = {y + c | c ∈ C}. The weight of the coset y + C is the smallest
weight of a vector in the coset, and any vector of this smallest weight in the coset is called
a coset leader.

The next result follows from the theory of finite groups as a linear code is a group under
addition.

Theorem 1.17.7 Let C be an [n, k, d]q linear code. The following hold for y, y0 , e ∈ Fnq .
(a) y + C = y0 + C if and only if y − y0 ∈ C.
(b) Cosets of C all have size q k .
(c) Cosets of C are either equal or disjoint. There are q n−k distinct cosets of C and they
partition Fnq .
(d) If e is a coset representative of y + C, then e + C = y + C. In particular, if e is a coset
leader of y + C, then e + C = y + C.
(e) Any coset of weight at most t = d−1
 
2 has a unique coset leader.

Let C be an [n, k, d]q code; fix a parity check matrix H of C. For y ∈ Fnq , syn(y) = HyT
is called the syndrome of y. Syndromes are column vectors in Fn−k q . The code C consists
of all vectors whose syndrome equals 0T . As H has rank n − k, every column vector in Fn−k q
is a syndrome. From Theorem 1.17.7, if y, y0 ∈ Fnq are in the same coset of C, then y − y0 =
T T
c ∈ C. Therefore syn(y) = HyT = H(y0 + c)T = Hy0 + HcT = Hy0 + 0T = syn(y0 ).
0 0 T T 0
Conversely, if syn(y) = syn(y ), then H(y − y ) = 0 and so y − y ∈ C. Thus we have
the following theorem.
11 In the trivial case where M = 1, C is n-error-correcting as every received vector decodes to the only

codeword in C. However, since the information rate (Definition 1.9.26 ) of such a code is 0, it is never used
in practice.
Basics of Coding Theory 41

Theorem 1.17.8 Two vectors belong to the same coset if and only if they have the same
syndrome.

Hence there is a one-to-one correspondence between cosets of C and syndromes. For


s ∈ Fn−k
q , denote by Cs the coset of C consisting of all vectors in Fnq with syndrome sT . Also
let es be a coset leader of Cs . Thus Cs = es + C.
Suppose a codeword sent over a communication channel is received as a vector y. In
nearest neighbor decoding we seek a vector e of smallest weight such that y − e ∈ C. So
nearest neighbor decoding is equivalent to finding a coset leader e of the coset y + C and
decoding the received vector y as y − e. The Syndrome Decoding Algorithm is the following
implementation of nearest neighbor decoding.

Algorithm 1.17.9 (Syndrome Decoding)

Use the above notation.


Step 1: For each syndrome s ∈ Fn−k
q , choose a coset leader es of the coset Cs . Create a table
pairing the syndrome with the coset leader.
Step 2: After receiving a vector y, compute s = syn(y).

Step 3: Decode y as the codeword y − es .

Step 1 of this algorithm can be somewhat involved, but it is a one-time preprocessing


task that is carried out before received vectors are analyzed.
 We briefly describe this table
creation. Begin with all vectors in Fnq of weight t = d−1

2 or less and place them in the
table paired with their syndromes; by Theorem 1.17.7(e), no syndrome is repeated. If all
syndromes have not been accounted for, place all vectors in Fnq of weight t + 1, one at a
time, paired with their syndromes into the table as long as the syndrome is not already
in the table. If all syndromes have still not been accounted for, repeat this procedure with
vectors in Fnq of weight t + 2, then weight t + 3, and continue inductively. End the process
when all syndromes are in the table.

Example 1.17.10 Let C be the [6, 3, 3]2 binary code with parity check matrix
 
0 1 1 1 0 0
H= 1 0 1 0 1 0 .
1 1 0 0 0 1

The table of Step 1 in the Syndrome Decoding Algorithm is the following.

leader syndrome leader syndrome leader syndrome leader syndrome


000000 000T 010000 101T 000100 100T 000001 001T
100000 011T 001000 110T 000010 010T 100100 111T

Notice that the coset with syndrome 111T has weight 2 and does not have a unique coset
leader. This coset has two other coset leaders: 010010 and 001001. All other cosets have
unique coset leaders by Theorem 1.17.7(e). We analyze three received vectors.

• Suppose y = 110110 is received. Then syn(y) = HyT = 000T and y is decoded as y.


y was the sent codeword provided 2 or more errors were not made.
42 Concise Encyclopedia of Coding Theory

• Now suppose that y = 101000 is received. Then syn(y) = 101T and y is decoded as
y − 010000 = 111000. This was the sent codeword provided only 1 error was made.
• Finally suppose that y = 111111 is received. Then syn(y) = 111T and y is decoded
as y − 100100 = 011011 and at least 2 errors were made in transmission. If exactly 2
errors were made, and we had chosen one of the other two possible coset leaders for
the table, y would have been decoded as y −010010 = 101101 or y −001001 = 110110.
For this code, any received vector where 0 or 1 errors were made would be decoded correctly.
If 2 errors were made, the decoder would decode the received vector to one of three possible
equally likely codewords; there is no way to determine which was actually sent. If more than
2 errors were made, the decoder would always decode the received vector incorrectly.

Example 1.17.11 Nearest neighbor decoding of the binary Hamming code Hm,2 is par-
ticularly easy. The parity check matrix for this code consists of the 2m − 1 nonzero binary
m-tuples of column length m; these can be viewed as the binary expansions of the integers
1, 2, . . . , 2m −1. Choose the parity check matrix H for Hm,2 where column i is the associated
binary m-tuple expansion of i. Step 1 of the Syndrome Decoding Algorithm 1.17.9 can be
skipped and the algorithm becomes the following: If y is received, compute s = syn(y). If
s = 0T , decode y as the codeword y. Otherwise s represents the binary expansion of some
integer i; the nearest codeword c to y is obtained from y by adding 1 to the ith bit.
As an illustration, the parity check matrix to use for H4,2 is
 
0 0 0 0 0 0 0 1 1 1 1 1 1 1 1
 0 0 0 1 1 1 1 0 0 0 0 1 1 1 1 
H=  0 1 1 0 0 1 1 0 0 1 1 0 0 1 1 .

1 0 1 0 1 0 1 0 1 0 1 0 1 0 1

Suppose y = 100110001111000 is received. Then syn(y) = 0100T , which is column 4 of H.


Hence 1 is added to coordinate 4 of y to yield the codeword c = 100010001111000.

1.18 Shannon’s Theorem


Shannon’s Channel Coding Theorem [1661] guarantees that good codes exist making
reliable communication possible. We will discuss this theorem in the context of binary
linear codes for which maximum likelihood decoding over a BSC is used. Note however that
the theorem can be stated in a more general setting.
Assume that the communication channel is a BSC with crossover probability % and that
syndrome decoding is used as the implementation of ML decoding to decode an [n, k, d]2
code C. The word error rate Perr for this channel and decoding scheme is the probability
that the decoder makes an error, averaged over all codewords of C; for simplicity assume
that each codeword of C is equally likely to be sent. A decoder error occurs when e c =
arg maxc∈C Prob(y | c) is not the originally transmitted codeword c when y is received. The
syndrome decoder makes a correct decision if y − c is a coset leader. The probability that
the decoder makes a correct decision is

%wtH (y−c) (1 − %)n−wtH (y−c)

by (1.5). Therefore the probability that the syndrome decoder makes a correct decision
Basics of Coding Theory 43
Pn
averaged over all equally likely transmitted codewords is i=0 αi %i (1 − %)n−i where αi is
the number of coset leaders of weight i. Thus
n
X
Perr = 1 − αi %i (1 − %)n−i . (1.6)
i=0

Example 1.18.1 Suppose binary messages of length k are sent unencoded over a BSC
with crossover probability %. This in effect is the same as transmitting codewords from the
[k, k, 1]2 code C = Fk2 . This code has a unique coset, the code itself, and its leader is the
zero codeword of weight 0. Hence α0 = 1 and αi = 0 for i > 0. Therefore (1.6) shows that
the probability of decoder error is

Perr = 1 − %0 (1 − %)k = 1 − (1 − %)k .

This is precisely what we expect as the probability of no decoding error is the probability
(1 − %)k that the k bits are received without error. For instance if % = 0.01 and k = 4, Perr
without coding the length 4 messages is 0.03940399.

Example 1.18.2 We compare sending 24 = 16 binary messages unencoded to encoding


using the [7, 4, 3]2 binary Hamming code H3,2 . By Theorem 1.17.7(c), there are 27−4 = 8
cosets of H3,2 in F72 . Since F72 has 1 vector of weight 0 and 7 vectors of weight 1, these
must be the coset leaders for all 8 cosets of H3,2 in F72 by Theorem 1.17.7(e). Thus α0 = 1,
α1 = 7, and αi = 0 for i > 1. Hence the probability of decoder error is

Perr = 1 − (1 − %)7 − 7%(1 − %)6

by (1.6). For example if % = 0.01, Perr = 0.00203104 · · · , significantly lower than the word er-
ror rate for unencoded transmissions of binary messages of length 4 found in Example 1.18.1.
For comparison, when transmitting 10 000 unencoded binary messages each of length 4, one
can expect about 394 to be received in error. On the other hand, when transmitting 10 000
binary messages each of length 4 encoded to length 7 codewords from H3,2 , one can expect
about 20 to be decoded in error.

In order to state Shannon’s Theorem, we need to define the channel capacity.

Definition 1.18.3 For a BSC with crossover probability %, the capacity of the channel
is
C(%) = 1 + % log2 % + (1 − %) log2 (1 − %).
The capacity C(%) = 1 − H2 (%) where H2 (%) is the binary entropy function defined in more
generality in Section 1.9.8.12 See Figure 1.3.

The next theorem is Shannon’s Theorem for binary symmetric channels. Shannon’s orig-
inal theorem was stated for nonlinear codes but was later shown to be valid for linear codes
as well. The theorem also holds for other channels provided channel capacity is appropri-
ately defined. For discussion and proofs of various versions of Shannon’s Theorem, see for
example [467, 1314]. For binary symmetric channels, Shannon’s Theorem is as follows.

Theorem 1.18.4 (Shannon) Let δ > 0 and R < C(%). Then for large enough n, there
exists an [n, k]2 binary linear code C with nk ≥ R such that Perr < δ when C is used for
communication over a BSC with crossover probability %. Furthermore no such code exists if
R > C(%).
12 When 1
q = 2, the domain of the entropy function H2 (x) can be extended from 0 ≤ x < 2
to 0 ≤ x < 1.
44 Concise Encyclopedia of Coding Theory

FIGURE 1.3: Channel capacity for a BCS with crossover probability ρ

R
6
1 pppp p
ppp ppp
ppp
ppp pp
ppp R = C(ρ) pp p
ppp
ppp pp
ppp pp
p
ppp pp
ppp
pppp
ppp pp
ppp pp
ppp p
ppp pp
ppp p
ppp p
ppp pp
ppp p p pp
ppp p pp
p p pp pp p
p p pp p p
p p p pp p ppp
p p p pp p
p pp p p p pp p p p p p p p p ppp pp
p pp p p pp p p p p p p p p p p p p p p - ρ
1 1
2

Remark 1.18.5 When the crossover probability is ρ = 12 , C 21 = 0. In this case Shannon’s




Theorem indicates that communication is not possible. This is not surprising; when ρ = 12 ,
whether a binary symbol is received correctly or incorrectly is essentially determined by a
coin flip. See Footnote 10.

Remark 1.18.6 Recall that nk is the information rate of the code as in Definition 1.9.26.
The proof of Shannon’s Theorem is nonconstructive, but the theorem does guarantee that
good codes exist with information rates just under channel capacity and decoding error rates
arbitrarily small; unfortunately these codes may have to be extremely long. The objective
becomes to find codes with a large number of codewords (to send many messages), large
minimum distance (to correct many errors), and short length (to minimize transmission
time or storage space). These goals conflict as seen in Section 1.9.
Bibliography

[1] M. Aaltonen. Linear programming bounds for tree codes. IEEE Trans. Inform.
Theory, 25:85–90, 1979.
[2] M. Aaltonen. A new upper bound on nonbinary block codes. Discrete Math., 83:139–
160, 1990.
[3] E. Abbe. Randomness and dependencies extraction via polarization. In Proc. Infor-
mation Theory and Applications Workshop, La Jolla, California, 7 pages, February
2011.

[4] E. Abbe. Randomness and dependencies extraction via polarization, with applica-
tions to Slepian-Wolf coding and secrecy. IEEE Trans. Inform. Theory, 61:2388–
2398, 2015.
[5] E. Abbe and E. Telatar. Polar codes for the m-user MAC. arXiv:1002.0777 [cs.IT],
February 2010.

[6] E. Abbe and E. Telatar. Polar codes for the m-user multiple access channel. IEEE
Trans. Inform. Theory, 58:5437–5448, 2012.
[7] N. Abdelghany and N. Megahed. Code-checkable group rings. J. Algebra Comb.
Discrete Struct. Appl., 4:115–122, 2017.

[8] M. Abramowitz and I. A. Stegun. Handbook of Mathematical Functions with Formu-


las, Graphs, and Mathematical Tables, volume 55 of National Bureau of Standards
Applied Mathematics Series. For sale by the Superintendent of Documents, U.S. Gov-
ernment Printing Office, Washington, D.C.; 9th Dover printing, 10th GPO printing,
1964.

[9] T. Abualrub, A. Ghrayeb, and R. H. Oehmke. A mass formula and rank of Z4 cyclic
codes of length 2e . IEEE Trans. Inform. Theory, 50:3306–3312, 2004.
[10] T. Abualrub and R. H. Oehmke. On the generators of Z4 cyclic codes of length 2e .
IEEE Trans. Inform. Theory, 49:2126–2133, 2003.
[11] T. Abualrub and R. H. Oehmke. Correction to: “On the generators of Z4 cyclic
codes of length 2e ” [IEEE Trans. Inform. Theory 49:2126–2133, 2003]. IEEE Trans.
Inform. Theory, 51:3009, 2005.
[12] T. Abualrub and I. Şiap. Cyclic codes over the rings Z2 + uZ2 and Z2 + uZ2 + u2 Z2 .
Des. Codes Cryptogr., 42:273–287, 2007.
[13] L. M. Adleman. Molecular computation of solutions to combinatorial problems.
Science, 266:1021–1024, 1994.
[14] A. Agarwal, A. Barg, S. Hu, A. Mazumdar, and I. Tamo. Combinatorial alphabet-
dependent bounds for locally recoverable codes. IEEE Trans. Inform. Theory,
64:3481–3492, 2018.
[15] C. Aguilar-Melchor, N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-
C. Deneuville, P. Gaborit, S. Gueron, T. Güneysu, R. Misoczki, E. Persichetti,
N. Sendrier, J.-P. Tillich, and G. Zémor. BIKE. First round submission to the
NIST post-quantum cryptography call: https://bikesuite.org, November 2017.
[16] C. Aguilar-Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville,
P. Gaborit, A. Hauteville, and G. Zémor. Ouroboros-R. First round submission to the
NIST post-quantum cryptography call: https://pqc-ouroborosr.org, November
2017.

[17] C. Aguilar-Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville,


P. Gaborit, E. Persichetti, and G. Zémor. HQC. First round submission to the NIST
post-quantum cryptography call: https://pqc-hqc.org, November 2017.
[18] C. Aguilar-Melchor, S. Bettaieb, P. Gaborit, and J. Schrek. A code-based undeniable
signature scheme. In M. Stam, editor, Cryptography and Coding, volume 8308 of
Lecture Notes in Comput. Sci., pages 99–119. Springer, Berlin, Heidelberg, 2013.
[19] C. Aguilar-Melchor, O. Blazy, J.-C. Deneuville, P. Gaborit, and G. Zémor. Efficient
encryption from random quasi-cyclic codes. IEEE Trans. Inform. Theory, 64:3927–
3943, 2018.
[20] C. Aguilar-Melchor, P.-L. Cayrel, P. Gaborit, and F. Laguillaumie. A new efficient
threshold ring signature scheme based on coding theory. IEEE Trans. Inform. The-
ory, 57:4833–4842, 2011.
[21] C. Aguilar-Melchor and P. Gaborit. On the classification of extremal [36, 18, 8] binary
self-dual codes. IEEE Trans. Inform. Theory, 54:4743–4750, 2008.
[22] C. Aguilar-Melchor, P. Gaborit, J.-L. Kim, L. Sok, and P. Solé. Classification of
extremal and s-extremal binary self-dual codes of length 38. IEEE Trans. Inform.
Theory, 58:2253–2262, 2012.
[23] C. Aguilar-Melchor, P. Gaborit, and J. Schrek. A new zero-knowledge code based
identification scheme with reduced communication. In Proc. IEEE Information The-
ory Workshop, pages 648–652, Paraty, Brazil, October 2011.
[24] D. Aharonov and M. Ben-Or. Fault-tolerant quantum computation with constant
error rate. SIAM J. Comput., 38:1207–1282, 2008.
[25] R. Ahlswede and H. Aydinian. On error control codes for random network coding.
In Workshop on Network Coding, Theory, and Applications, pages 68–73, Lausanne,
Switzerland, June 2009.
[26] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung. Network information flow. IEEE
Trans. Inform. Theory, 46:1204–1216, 2000.
[27] M. Ajtai and C. Dwork. A public-key cryptosystem with worst-case/average-case
equivalence. In Proc. 29th Annual ACM Symposium on the Theory of Computing,
pages 284–293, El Paso, Texas, May 1997.
[28] A. Alahmadi, R. E. L. Aldred, R. de la Cruz, S. Ok, P. Solé, and C. Thomassen.
The minimum number of minimal codewords in an [n, k]-code and in graphic codes.
Discrete Appl. Math., 184:32–39, 2015.
[29] A. Alahmadi, C. Güneri, B. Özkaya, H. Shohaib, and P. Solé. On self-dual double
negacirculant codes. Discrete Appl. Math., 222:205–212, 2017.
[30] Q. Alamélou, O. Blazy, S. Cauchie, and P. Gaborit. A code-based group signature
scheme. Des. Codes Cryptogr., 82:469–493, 2017.
[31] S. M. Alamouti. A simple transmit diversity technique for wireless communications.
IEEE J. Selected Areas Commun., 16:1451–1458, 1998.
[32] S. M. E. Y. Alaoui, Ö Dagdelen, P. Véron, D. Galindo, and P.-L. Cayrel. Extended
security arguments for signature schemes. In A. Mitrokotsa and S. Vaudenay, editors,
Progress in Cryptology – AFRICACRYPT 2012, volume 7374 of Lecture Notes in
Comput. Sci., pages 19–34. Springer, Berlin, Heidelberg, 2012.
[33] A. Albanese, J. Blömer, J. Edmonds, M. G. Luby, and M. Sudan. Priority encoding
transmission. IEEE Trans. Inform. Theory, 42:1737–1744, 1996.

[34] A. A. Albert. Symmetric and alternate matrices in an arbitrary field. I. Trans.


Amer. Math. Soc., 43:386–436, 1938.
[35] T. L. Alderson. (6,3)-MDS codes over an alphabet of size 4. Des. Codes Cryptogr.,
38:31–40, 2006.

[36] M. Alekhnovich. More on average case vs. approximation complexity. In Proc. 44th
IEEE Symposium on Foundations of Computer Science, pages 298–307, Cambridge,
Massachusetts, October 2003.
[37] A. M. Alhakim. A simple combinatorial algorithm for de Bruijn sequences. Amer.
Math. Monthly, 117:728–732, 2010.

[38] P. Aliferis and J. Preskill. Fault-tolerant quantum computation against biased noise.
Physical Review A, 78(5):052331, November 2008.
[39] P. Almeida, D. Napp, and R. Pinto. A new class of superregular matrices and MDP
convolutional codes. Linear Algebra Appl., 439:2145–2157, 2013.

[40] N. Alon and F. R. K. Chung. Explicit construction of linear sized tolerant networks.
Discrete Math., 72:15–19, 1988.
[41] N. Alon, O. Goldreich, J. Håstad, and R. Peralta. Simple constructions of almost
k-wise independent random variables. Random Structures Algorithms, 3:289–304,
1992.

[42] N. Alon and M. G. Luby. A linear time erasure-resilient code with nearly optimal
recovery. IEEE Trans. Inform. Theory, 42:1732–1736, 1996.
[43] J. L. Alperin and R. B. Bell. Groups and Representations, volume 162 of Graduate
Texts in Mathematics. Springer-Verlag, New York, 1995.

[44] O. Alrabiah and V. Guruswami. An exponential lower bound on the sub-


packetization of MSR codes. In Proc. 51st Annual ACM Symposium on the Theory
of Computing, pages 979–985, Phoenix, Arizona, June 2019.
[45] M. M. S. Alves, L. Panek, and M. Firer. Error-block codes and poset metrics. Adv.
Math. Commun., pages 95–111, 2008.
[46] S. A. Aly, A. Klappenecker, and P. K. Sarvepalli. Remarkable degenerate quantum
stabilizer codes derived from duadic codes. In Proc. IEEE International Symposium
on Information Theory, pages 1105–1108, Seattle, Washington, July 2006.
[47] S. A. Aly, A. Klappenecker, and P. K. Sarvepalli. On quantum and classical BCH
codes. IEEE Trans. Inform. Theory, 53:1183–1188, 2007.
[48] R. J. Anderson, C. Ding, T. Helleseth, and T. Kløve. How to build robust shared
control systems. Des. Codes Cryptogr., 15:111–124, 1998.
[49] M. Andersson, V. Rathi, R. Thobaben, J. Kliewer, and M. Skoglund. Nested polar
codes for wiretap and relay channels. IEEE Commun. Letters, 14:752–754, 2010.
[50] M. F. Anjos and J. B. Lasserre, editors. Handbook on Semidefinite, Conic and
Polynomial Optimization. Springer-Verlag, New York, 2012.
[51] J. Antrobus and H. Gluesing-Luerssen. Maximal Ferrers diagram codes: construc-
tions and genericity considerations. IEEE Trans. Inform. Theory, 65:6204–6223,
2019.
[52] M. Antweiler and L. Bömer. Complex sequences over GF(pM ) with a two-level auto-
correlation function and a large linear span. IEEE Trans. Inform. Theory, 38:120–
130, 1992.
[53] D. Apon, R. Perlner, A. Robinson, and P. Santini. Cryptanalysis of LEDAcrypt.
Cryptology ePrint Archive, Report 2020/455, https://eprint.iacr.org/2020/
455, 2020.
[54] B. Applebaum, Y. Ishai, and E. Kushilevitz. Cryptography with constant input
locality. In A. Menezes, editor, Advances in Cryptology – CRYPTO 2007, volume
4622 of Lecture Notes in Comput. Sci., pages 92–110. Springer, Berlin, Heidelberg,
2007.
[55] N. Aragon, O. Blazy, J.-C. Deneuville, P. Gaborit, A. Hauteville, O. Ruatta, J.-P.
Tillich, G. Zémor, C. Aguilar-Melchor, S. Bettaieb, L. Bidoux, Bardet M., and A. Ot-
mani. ROLLO (merger of Rank-Ouroboros, LAKE and LOCKER). Second round
submission to the NIST post-quantum cryptography call: https://pqc-rollo.org,
March 2019.
[56] N. Aragon, O. Blazy, P. Gaborit, A. Hauteville, and G. Zémor. Durandal: a rank
metric based signature scheme. In Y. Ishai and V. Rijmen, editors, Advances in Cryp-
tology – EUROCRYPT 2019, Part III, volume 11478 of Lecture Notes in Comput.
Sci., pages 728–758. Springer, Berlin, Heidelberg, 2019.
[57] N. Aragon, P. Gaborit, and G. Zémor. HQC-RMRS, an instantiation of the
HQC encryption framework with a more efficient auxiliary error-correcting code.
arXiv:2005.10741 [cs.CR], May 2020.
[58] N. Aragon, J. Lavauzelle, and M. Lequesne. Decoding challenge. http://
decodingchallenge.org, 2019.
[59] K. T. Arasu. Sequences and arrays with desirable correlation properties. In
D. Crnković and V. Tonchev, editors, Information Security, Coding Theory and Re-
lated Combinatorics, volume 29 of NATO Sci. Peace Secur. Ser. D Inf. Commun.
Secur., pages 136–171. IOS, Amsterdam, 2011.
[60] K. T. Arasu, C. Ding, T. Helleseth, P. V. Kumar, and H. M. Martinsen. Almost dif-
ference sets and their sequences with optimal autocorrelation. IEEE Trans. Inform.
Theory, 47:2934–2943, 2001.
[61] E. Arbarello, M. Cornalba, P. A. Griffiths, and J. Harris. Geometry of Algebraic
Curves. Volume I, volume 267 of Grundlehren der Mathematischen Wissenschaften
[Fundamental Principles of Mathematical Sciences]. Springer-Verlag, New York,
1985.
[62] E. Arıkan. A performance comparison of polar codes and Reed-Muller codes. IEEE
Commun. Letters, 12:447–449, 2008.
[63] E. Arıkan. Channel polarization: a method for constructing capacity-achieving codes
for symmetric binary-input memoryless channels. IEEE Trans. Inform. Theory,
55:3051–3073, 2009.
[64] E. Arıkan. Source polarization. In Proc. IEEE International Symposium on Infor-
mation Theory, pages 899–903, Austin, Texas, June 2010.
[65] E. Arıkan. Systematic polar coding. IEEE Commun. Letters, 15:860–862, 2011.
[66] E. Artin. Geometric Algebra. Wiley Classics Library. John Wiley & Sons, Inc., New
York, 1988. Reprint of the 1957 original, a Wiley-Interscience Publication.
[67] A. Ashikhmin and A. Barg. Minimal vectors in linear codes. IEEE Trans. Inform.
Theory, 44:2010–2017, 1998.
[68] A. Ashikhmin and A. Barg. Binomial moments of the distance distribution: bounds
and applications. IEEE Trans. Inform. Theory, 45:438–452, 1999.
[69] A. Ashikhmin, A. Barg, G. D. Cohen, and L. Huguet. Variations on minimal code-
words in linear codes. In G. D. Cohen, M. Giusti, and T. Mora, editors, Applied
Algebra, Algebraic Algorithms and Error-Correcting Codes, volume 948 of Lecture
Notes in Comput. Sci., pages 96–105. Springer, Berlin, Heidelberg, 1995.
[70] A. Ashikhmin and S. Litsyn. Upper bounds on the size of quantum codes. IEEE
Trans. Inform. Theory, 45:1206–1215, 1999.
[71] E. F. Assmus, Jr. and J. D. Key. Designs and Their Codes, volume 103 of Cambridge
Tracts in Mathematics. Cambridge University Press, Cambridge, UK, 1992.
[72] E. F. Assmus, Jr. and H. F. Mattson, Jr. New 5-designs. J. Combin. Theory, 6:122–
151, 1969.
[73] E. F. Assmus, Jr. and H. F. Mattson, Jr. Coding and combinatorics. SIAM Rev.,
16:349–388, 1974.
[74] E. F. Assmus, Jr., H. F. Mattson, Jr., and R. Turyn. Cyclic Codes. AFCRL-66-348,
Air Force Cambridge Research Labs, Bedford, Massachusetts, 1966.
[75] J. Astola. The Lee-scheme and bounds for Lee-code. Cybernetics and Systems,
13:331–343, 1982.
[76] D. Augot, M. Finiasz, P. Gaborit, S. Manuel, and N. Sendrier. SHA-3 proposal:
FSB. Submission to the SHA3 NIST competition; see https://www.rocq.inria.
fr/secret/CBCrypto/fsbdoc.pdf, 2008.
[77] D. Augot, M. Finiasz, and N. Sendrier. A family of fast syndrome based crypto-
graphic hash functions. In E. Dawson and S. Vaudenay, editors, Progress in Cryp-
tology – Mycrypt 2005, volume 3715 of Lecture Notes in Comput. Sci., pages 64–83.
Springer, Berlin, Heidelberg, 2005.
[78] J. Ax. Zeroes of polynomials over finite fields. Amer. J. Math., 86:255–261, 1964.
[79] N. Aydin and D. K. Ray-Chaudhuri. Quasi-cyclic codes over Z4 and some new binary
codes. IEEE Trans. Inform. Theory, 48:2065–2069, 2002.

[80] K. Azarian, H. El Gamal, and P. Schniter. On the achievable diversity-multiplexing


tradeoff in half-duplex cooperative channels. IEEE Trans. Inform. Theory, 51:4152–
4172, 2005.
[81] A. H. Baartmans, I. Bluskov, and V. D. Tonchev. The Preparata codes and a class
of 4-designs. J. Combin. Des., 2:167–170, 1994.
[82] C. Bachoc. On harmonic weight enumerators of binary codes. Des. Codes Cryptogr.,
18:11––28, 1999.
[83] C. Bachoc. Linear programming bounds for codes in Grassmannian spaces. IEEE
Trans. Inform. Theory, 52:2111–2125, 2006.
[84] C. Bachoc. Semidefinite programming, harmonic analysis and coding theory.
arXiv:0909.4767 [cs.IT], September 2010.
[85] C. Bachoc, V. Chandar, G. D. Cohen, P. Solé, and A. Tchamkerten. On bounded
weight codes. IEEE Trans. Inform. Theory, 57:6780–6787, 2011.
[86] C. Bachoc and P. Gaborit. Designs and self-dual codes with long shadows. J. Combin.
Theory Ser. A, 105:15–34, 2004.
[87] C. Bachoc, D. C. Gijswijt, A. Schrijver, and F. Vallentin. Invariant semidefinite pro-
grams. In M. F. Anjos and J. B. Lasserre, editors, Handbook on Semidefinite, Conic
and Polynomial Optimization, pages 219–269. Springer-Verlag, New York, 2012.

[88] C. Bachoc, A. Passuello, and F. Vallentin. Bounds for projective codes from semidef-
inite programming. Adv. Math. Comm., 7:127–145, 2013.
[89] C. Bachoc and F. Vallentin. New upper bounds for kissing numbers from semidefinite
programming. J. Amer. Math. Soc., 21:909–924, 2008.
[90] C. Bachoc and G. Zémor. Bounds for binary codes relative to pseudo-distances of k
points. Adv. Math. Commun., 4:547–565, 2010.
[91] B. Bagchi. On characterizing designs by their codes. In N. S. N. Sastry, editor,
Buildings, Finite Geometries and Groups, volume 10 of Springer Proc. Math., pages
1–14. Springer, New York, 2012.

[92] B. Bagchi and S. P. Inamdar. Projective geometric codes. J. Combin. Theory Ser.
A, 99:128–142, 2002.
[93] A. Baker. Transcendental Number Theory. Cambridge Mathematical Library. Cam-
bridge University Press, Cambridge, UK, 2nd edition, 1990.
[94] R. D. Baker, J. H. van Lint, and R. M. Wilson. On the Preparata and Goethals
codes. IEEE Trans. Inform. Theory, 29:342–345, 1983.
[95] S. B. Balaji, G. R. Kini, and P. V. Kumar. A tight rate bound and matching
construction for locally recoverable codes with sequential recovery from any number
of multiple erasures. IEEE Trans. Inform. Theory, 66:1023–1052, 2020.
[96] S. B. Balaji, M. N. Krishnan, M. Vajha, V. Ramkumar, B. Sasidharan, and P. V.
Kumar. Erasure coding for distributed storage: an overview. SCIENCE CHINA
Information Sciences, 61(10):100301:1–100301:45, 2018.

[97] S. B. Balaji and P. V. Kumar. Bounds on the rate and minimum distance of codes
with availability. In Proc. IEEE International Symposium on Information Theory,
pages 3155–3159, Aachen, Germany, June 2017.
[98] S. B. Balaji and P. V. Kumar. A tight lower bound on the sub-packetization level
of optimal-access MSR and MDS codes. In Proc. IEEE International Symposium on
Information Theory, pages 2381–2385, Vail, Colorado, June 2018.
[99] A. Balatsoukas-Stimming, M. B. Parizi, and A. Burg. LLR-based successive can-
cellation list decoding of polar codes. In Proc. IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), pages 3903–3907, Florence, Italy,
May 2014.
[100] M. Baldi, A. Barenghi, F. Chiaraluce, G. Pelosi, and P. Santini. LEDAkem.
First round submission to the NIST post-quantum cryptography call:
https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/
documents/round-1/submissions/LEDAkem.zip, November 2017.
[101] M. Baldi, M. Bianchi, F. Chiaraluce, J. Rosenthal, and D. Schipani. Enhanced public
key security for the McEliece cryptosystem. J. Cryptology, 29:1–27, 2016.
[102] M. Baldi, M. Bodrato, and F. Chiaraluce. A new analysis of the McEliece cryp-
tosystem based on QC-LDPC codes. In R. Ostrovsky, R. De Prisco, and I. Visconti,
editors, Security and Cryptography for Networks, volume 5229 of Lecture Notes in
Comput. Sci., pages 246–262. Springer, Berlin, Heidelberg, 2008.

[103] M. Baldi and F. Chiaraluce. Cryptanalysis of a new instance of McEliece cryp-


tosystem based on QC-LDPC codes. In Proc. IEEE International Symposium on
Information Theory, pages 2591–2595, Nice, France, June 2007.
[104] S. Ball. On sets of vectors of a finite vector space in which every subset of basis size
is a basis. J. Eur. Math. Soc. (JEMS), 14:733–748, 2012.
[105] S. Ball, A. Blokhuis, and F. Mazzocca. Maximal arcs in Desarguesian planes of odd
order do not exist. Combinatorica, 17:31–41, 1997.
[106] S. Ball and J. De Beule. On sets of vectors of a finite vector space in which every
subset of basis size is a basis II. Des. Codes Cryptogr., 65:5–14, 2012.

[107] S. Ballentine, A. Barg, and S. G. Vlăduţ. Codes with hierarchical locality from
covering maps of curves. IEEE Trans. Inform. Theory, 65:6056–6071, 2019.
[108] S. Ballet, J. Chaumine, J. Pieltant, M. Rambaud, H. Randriambololona, and R. Rol-
land. On the tensor rank of multiplication in finite extensions of finite fields and
related issues in algebraic geometry. arXiv:1906.07456 [math.AG], June 2019, to
appear Russian Math. Surveys.
[109] B. Ballinger, G. Blekherman, H. Cohn, N. Giansiracusa, E. Kelly, and A. Schürmann.
Experimental study of energy-minimizing point configurations on spheres. Experi-
ment. Math., 18:257–283, 2009.
[110] G. Banegas, P. S. L. M. Barreto, B. O. Boidje, P.-L. Cayrel, G. N. Dione,
K. Gaj, C. T. Gueye, R. Haeussler, J. B. Klamti, O. N’diaye, D. T. Nguyen,
E. Persichetti, and J. E. Ricardini. DAGS: key encapsulation for dyadic GS
codes. First round submission to the NIST post-quantum cryptography call:
https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/
documents/round-1/submissions/DAGS.zip, November 2017.
[111] Ei. Bannai and Et. Bannai. A survey on spherical designs and algebraic combinatorics
on spheres. European J. Combin., 30:1392–1425, 2009.
[112] Ei. Bannai, Et. Bannai, H. Tanaka, and Y. Zhu. Design theory from the viewpoint
of algebraic combinatorics. Graphs Combin., 33:1–41, 2017.
[113] Ei. Bannai and R. M. Damerell. Tight spherical designs, I. J. Math. Soc. Japan,
31:199–207, 1979.
[114] Ei. Bannai and R. M. Damerell. Tight spherical disigns, II. J. London Math. Soc.
(2), 21:13–30, 1980.
[115] Ei. Bannai, S. T. Dougherty, M. Harada, and M. Oura. Type II codes, even uni-
modular lattices, and invariant rings. IEEE Trans. Inform. Theory, 45:1194–1205,
1999.
[116] M. Barbier, C. Chabot, and G. Quintin. On quasi-cyclic codes as a generalization of
cyclic codes. Finite Fields Appl., 18:904–919, 2012.
[117] M. Bardet, É. Barelli, O. Blazy, R. Canto Torres, A. Couvreur, P. Gaborit, A. Ot-
mani, N. Sendrier, and J.-P. Tillich. BIG QUAKE. First round submission to
the NIST post-quantum cryptography call: https://bigquake.inria.fr, Novem-
ber 2017.
[118] M. Bardet, M. Bros, D. Cabarcas, P. Gaborit, R. Perlner, D. Smith-Tone, J.-P.
Tillich, and J. Verbel. Improvements of algebraic attacks for solving the rank decod-
ing and MinRank problems. arXiv:2002.08322 [cs.CR], February 2020.
[119] M. Bardet, J. Chaulet, V. Dragoi, A. Otmani, and J.-P. Tillich. Cryptanalysis of
the McEliece public key cryptosystem based on polar codes. In T. Takagi, editor,
Post-Quantum Cryptography, volume 9606 of Lecture Notes in Comput. Sci., pages
118–143. Springer, Berlin, Heidelberg, 2016.
[120] É. Barelli. Étude de la Sécurité de Certaines Clés Compactes pour le Schéma de
McEliece Utilisant des Codes Géométriques. PhD thesis, Université Paris-Saclay,
2018.
[121] É Barelli and A. Couvreur. An efficient structural attack on NIST submission DAGS.
In T. Peyrin and S. D. Galbraith, editors, Advances in Cryptology – ASIACRYPT
2018, Part 1, volume 11272 of Lecture Notes in Comput. Sci., pages 93–118. Springer,
Berlin, Heidelberg, 2018.
[122] A. Barg, K. Haymaker, E. W. Howe, G. L. Matthews, and A. Várilly-Alvarado. Lo-
cally recoverable codes from algebraic curves and surfaces. In E. W. Howe, K. E.
Lauter, and J. L. Walker, editors, Algebraic Geometry for Coding Theory and Cryp-
tography, volume 9 of Assoc. Women Math. Ser., pages 95–127. Springer, Cham,
2017.
[123] A. Barg and D. B. Jaffe. Numerical results on the asymptotic rate of binary codes.
In A. Barg and S. Litsyn, editors, Codes and Association Schemes: DIMACS Work-
shop Codes and Association Schemes, November 9-12, 1999, DIMACS Center, vol-
ume 56 of Discrete Mathematics and Theoretical Computer Science, pages 25–32.
Amer. Math. Soc., Providence, Rhode Island, 2001.
[124] A. Barg and A. Mazumdar. Codes in permutations and error correction for rank
modulation. IEEE Trans. Inform. Theory, 56:3158–3165, 2010.
[125] A. Barg and D. Y. Nogin. Bounds on packings of spheres in the Grassmann manifold.
IEEE Trans. Inform. Theory, 48:2450–2454, 2002.
[126] A. Barg and D. Y. Nogin. Spectral approach to linear programming bounds on codes
(in Russian). Problemy Peredači Informacii, 42(2):12–25, 2006. (English translation
in Probl. Inform. Transm., 42(2):77–89, 2006).
[127] A. Barg and W. Park. On linear ordered codes. Mosc. Math. J., 15:679–702, 2015.
[128] A. Barg, I. Tamo, and S. G. Vlădaţ. Locally recoverable codes on algebraic curves.
IEEE Trans. Inform. Theory, 63:4928–4939, 2017.
[129] A. Barg and W.-H. Yu. New bounds for spherical two-distance sets. Experiment.
Math., 22:187–194, 2013.
[130] E. Barker. Recommendation for key management, 2019. Draft NIST special publi-
cation 800–57 Part 1. https://doi.org/10.6028/NIST.SP.800-57pt1r5-draft.
[131] A. Barra and H. Gluesing-Luerssen. MacWilliams extension theorems and the local-
global property for codes over Frobenius rings. J. Pure Appl. Algebra, 219:703–728,
2015.
[132] P. S. L. M. Barreto, S. Gueron, T. Güneysu, R. Misoczki, E. Persichetti, N. Sendrier,
and J.-P. Tillich. CAKE: Code-based Algorithm for Key Encapsulation. In
M. O’Neill, editor, Cryptography and Coding, volume 10655 of Lecture Notes in Com-
put. Sci., pages 207–226. Springer, Berlin, Heidelberg, 2017.
[133] D. Bartoli, A. Sboui, and L. Storme. Bounds on the number of rational points of
algebraic hypersurfaces over finite fields, with applications to projective Reed-Muller
codes. Adv. Math. Commun., 10:355–365, 2016.
[134] A. Barvinok. A Course in Convexity. Amer. Math. Soc., Providence, Rhode Island,
2002.
[135] A. Bassa, P. Beelen, A. Garcia, and H. Stichtenoth. Towers of function fields over
non-prime finite fields. Mosc. Math. J., 15:1–29, 181, 2015.
[136] L. A. Bassalygo, V. A. Zinov’ev, V. K. Leont’ev, and N. I. Fel’dman. Nonexistence of
perfect codes for certain composite alphabets (in Russian). Problemy Peredači Infor-
macii, 11(3):3–13, 1975 (English translation in Probl. Inform. Transm., 11(3):181–
189, 1975).
[137] V. Batagelj. Norms and distances over finite groups. Department of Mathematics,
University of Ljubljana, Yugoslavia, 1990.
[138] L. M. Batten and J. M. Dover. Some sets of type (m, n) in cubic order planes. Des.
Codes Cryptogr., 16:211–213, 1999.
[139] H. Bauer, B. Ganter, and E. Hergert. Algebraic techniques for nonlinear codes.
Combinatorica, 3:21–33, 1983.

[140] L. D. Baumert and R. J. McEliece. Weights of irreducible cyclic codes. Inform. and
Control, 20:158–175, 1972.
[141] L. D. Baumert, W. H. Mills, and R. L. Ward. Uniform cyclotomy. J. Number Theory,
14:67–82, 1982.

[142] Leonard D. Baumert. Cyclic Difference Sets, volume 182 of Lecture Notes in Math.
Springer-Verlag, Berlin-New York, 1971.
[143] E. Bayer-Fluckiger, F. Oggier, and E. Viterbo. New algebraic constructions of ro-
tated Zn -lattice constellations for the Rayleigh fading channel. IEEE Trans. Inform.
Theory, 50:702–714, 2004.

[144] L. M. J. Bazzi, M. Mahdian, and D. Spielman. The minimum distance of turbo-like


codes. IEEE Trans. Inform. Theory, 55:6–15, 2009.
[145] L. M. J. Bazzi and S. K. Mitter. Some randomized code constructions from group
actions. IEEE Trans. Inform. Theory, 52:3210–3219, 2006.

[146] A. Becker, A. Joux, A. May, and A. Meurer. Decoding random binary linear codes
in 2n/20 : how 1 + 1 = 0 improves information set decoding. In D. Pointcheval and
T. Johansson, editors, Advances in Cryptology – EUROCRYPT 2012, volume 7237
of Lecture Notes in Comput. Sci., pages 520–536. Springer, Berlin, Heidelberg, 2012.
[147] P. Beelen. The order bound for general algebraic geometric codes. Finite Fields
Appl., 13:665–680, 2007.
[148] P. Beelen and T. Høholdt. The decoding of algebraic geometry codes. In Advances
in Algebraic Geometry Codes, volume 5 of Ser. Coding Theory Cryptol., pages 49–98.
World Sci. Publ., Hackensack, New Jersey, 2008.

[149] A. Beemer, S. Habib, C. A. Kelley, and J. Kliewer. A general approach to optimizing


SC-LDPC codes. In Proc. 55th Allerton Conference on Communication, Control, and
Computing, pages 672–679, Monticello, Illinois, October 2017.
[150] A. Beemer, K. Haymaker, and C. A. Kelley. Absorbing sets of codes from finite
geometries. Cryptogr. Commun., 11:1115–1131, 2019.

[151] A. Beemer and C. A. Kelley. Avoiding trapping sets in SC-LDPC codes under
windowed decoding. In Proc. IEEE International Symposium on Information Theory
and its Applications, pages 206–210, Monterey, California, October-November 2016.
[152] J.-C. Belfiore and A. M. Cipriano. Space-Time Coding for Non-Coherent Channels.
In H. Boelcskei, D. Gesbert, C. Papadias, and A. J. van der Veen, editors, Space-Time
Wireless Systems: From Array Processing to MIMO Communications, chapter 10.
Cambridge University Press, Cambridge, UK, 2006.
[153] J.-C. Belfiore and F. Oggier. An error probability approach to MIMO wiretap chan-
nels. IEEE Trans. Commun., 61:3396–3403, 2013.
[154] J.-C. Belfiore, F. Oggier, and E. Viterbo. Cyclic division algebras: a tool for space-
time coding. Found. Trends Commun. and Inform. Theory, 4:1–95, 2007.
[155] J.-C. Belfiore and G. Rekaya. Quaternionic lattices for space-time coding. In Proc.
IEEE Information Theory Workshop, pages 267–270, Paris, France, April 2003.

[156] J.-C. Belfiore, G. Rekaya, and E. Viterbo. The golden code: a 2×2 full-rate space-time
code with non-vanishing determinants. IEEE Trans. Inform. Theory, 51:1432–1436,
2005.
[157] B. I. Belov, V. N. Logačev, and V. P. Sandimirov. Construction of a class of lin-
ear binary codes that attain the Varšamov-Griesmer bound (in Russian). Prob-
lemy Peredači Informacii, 10(3):36–44, 1974. (English translation in Probl. Inform.
Transm., 10(3):211–217, 1974).
[158] E. Ben-Sasson, T. Etzion, A. Gabizon, and N. Raviv. Subspace polynomials and
cyclic subspace codes. IEEE Trans. Inform. Theory, 62:1157–1165, 2016.

[159] E. Ben-Sasson, S. Kopparty, and J. Radhakrishnan. Subspace polynomials and limits


to list decoding of Reed-Solomon codes. IEEE Trans. Inform. Theory, 56:113–120,
2010.
[160] A. Ben-Tal and A. Nemirovski. Lectures on Modern Convex Optimization. Society for
Industrial and Applied Mathematics (SIAM); Mathematical Programming Society
(MPS), Philadelphia, Pennsylvania, 2001.
[161] T. P. Berger. The automorphism group of double-error-correcting BCH codes. IEEE
Trans. Inform. Theory, 40:538–542, 1994.
[162] T. P. Berger. Isometries for rank distance and permutation group of Gabidulin codes.
IEEE Trans. Inform. Theory, 49:3016–3019, 2002.
[163] T. P. Berger, P.-L. Cayrel, P. Gaborit, and A. Otmani. Reducing key length
of the McEliece cryptosystem. In B. Preneel, editor, Progress in Cryptology –
AFRICACRYPT 2009, volume 5580 of Lecture Notes in Comput. Sci., pages 77–
97. Springer, Berlin, Heidelberg, 2009.

[164] T. P. Berger and P. Loidreau. Designing an efficient and secure public-key cryptosys-
tem based on reducible rank codes. In A. Canteaut and K. Viswanathan, editors,
Progress in Cryptology – INDOCRYPT 2004, volume 3348 of Lecture Notes in Com-
put. Sci., pages 218–229. Springer, Berlin, Heidelberg, 2005.
[165] T. P. Berger and P. Loidreau. How to mask the structure of codes for a cryptographic
use. Des. Codes Cryptogr., 35:63–79, 2005.
[166] G. Berhuy and F. Oggier. On the existence of perfect space–time codes. IEEE Trans.
Inform. Theory, 55:2078–2082, 2009.
[167] E. R. Berlekamp. Negacyclic codes for the Lee metric. In R. C. Bose and T. A. Dowl-
ing, editors, Combinatorial Mathematics and its Applications (Proc. Conf., Univ.
North Carolina, Chapel Hill, NC, 1967), pages 298–316. Univ. North Carolina Press,
Chapel Hill, NC, 1969.
[168] E. R. Berlekamp. Goppa codes. IEEE Trans. Inform. Theory, 19:590–592, 1973.

[169] E. R. Berlekamp, editor. Key Papers in the Development of Coding Theory. IEEE
Press, New York, 1974.
[170] E. R. Berlekamp. Algebraic Coding Theory. World Scientific Publishing Co. Pte.
Ltd., Hackensack, New Jersey, revised edition, 2015.

[171] E. R. Berlekamp, R. J. McEliece, and H. C. A. van Tilborg. On the inherent in-


tractability of certain coding problems. IEEE Trans. Inform. Theory, 24:384–386,
1978.
[172] E. R. Berlekamp and L. Welch. Error correction of algebraic block codes. US Patent
Number 4,633,470.

[173] S. D. Berman. Semisimple cyclic and abelian codes. II (in Russian). Kibernetika
(Kiev), 3:21–30, 1967. (English translation in Cybernetics, 3:17–23, 1967).
[174] S. D. Berman. On the theory of group codes. Cybernetics, 3:25–31, 1969.
[175] J. J. Bernal, Á. del Rı́o, and J. J. Simón. An intrinsical description of group codes.
Des. Codes Cryptogr., 51:289–300, 2009.
[176] F. Bernhardt, P. Landrock, and O. Manz. The extended Golay codes considered as
ideals. J. Combin. Theory Ser. A, 55:235–246, 1990.
[177] D. J. Bernstein, T. Chou, T. Lange, I. von Maurich, R. Mizoczki, R. Niederhagen,
E. Persichetti, C. Peters, P. Schwabe, N. Sendrier, J. Szefer, and W. Wen. Classic
McEliece: conservative code-based cryptography. Second round submission to the
NIST post-quantum cryptography call. https://classic.mceliece.org, March
2019.
[178] D. J. Bernstein, T. Lange, and C. Peters. Attacking and defending the McEliece
cryptosystem. In J. Buchmann and J. Ding, editors, Post-Quantum Cryptography,
volume 5299 of Lecture Notes in Comput. Sci., pages 31–46. Springer, Berlin, Hei-
delberg, 2008.
[179] D. J. Bernstein, T. Lange, and C. Peters. Smaller decoding exponents: ball-collision
decoding. In P. Rogaway, editor, Advances in Cryptology – CRYPTO 2011, volume
6841 of Lecture Notes in Comput. Sci., pages 743–760. Springer, Berlin, Heidelberg,
2011.
[180] D. J. Bernstein, T. Lange, and C. Peters. Wild McEliece. In A. Biryukov, G. Gong,
and D. R. Stinson, editors, Selected Areas in Cryptography – SAC 2010, volume 6544
of Lecture Notes in Comput. Sci., pages 143–158. Springer, Berlin, Heidelberg, 2011.
[181] D. J. Bernstein, T. Lange, C. Peters, and P. Schwabe. Really fast syndrome-
based hashing. In A. Nitaj and D. Pointcheval, editors, Progress in Cryptology –
AFRICACRYPT 2011, volume 6737 of Lecture Notes in Comput. Sci., pages 134–
152. Springer, Berlin, Heidelberg, 2011.
[182] D. J. Bernstein, T. Lange, C. Peters, and H.C.A. van Tilborg. Explicit bounds for
generic decoding algorithms for code-based cryptography. In Pre-Proc. International
Workshop on Coding and Cryptography, pages 168–180, Ullensvang, Norway, May
2009.
[183] C. Berrou, A. Glavieux, and P. Thitimajshima. Near Shannon limit error correcting
coding and decoding. In Proc. International Communications Conference, pages
1064–1070, Geneva, Switzerland, May 1983.
[184] M. Bertilsson and I. Ingemarsson. A construction of practical secret sharing schemes
using linear block codes. In J. Seberry and Y. Zheng, editors, Advances in Cryptol-
ogy – AUSCRYPT ’92, volume 718 of Lecture Notes in Comput. Sci., pages 67–79.
Springer, Berlin, Heidelberg, 1993.
[185] M. R. Best. Perfect codes hardly exist. IEEE Trans. Inform. Theory, 29:349–351,
1983.
[186] T. Beth and C. Ding. On almost perfect nonlinear permutations. In T. Helleseth,
editor, Advances in Cryptology – EUROCRYPT ’93, volume 765 of Lecture Notes in
Comput. Sci., pages 65–76. Springer, Berlin, Heidelberg, 1994.
[187] T. Beth, D. Jungnickel, and H. Lenz. Design Theory. Cambridge University Press,
Cambridge, UK, 2nd edition, 1999.
[188] K. Betsumiya, T. A. Gulliver, and M. Harada. On binary extremal formally self-dual
even codes. Kyushu J. Math., 53:421—-430, 1999.
[189] K. Betsumiya, M. Harada, and A. Munemasa. A complete classification of doubly
even self-dual codes of length 40. Electronic J. Combin., 19:#P18 (12 pages), 2012.
[190] A. Betten, M. Braun, H. Fripertinger, A. Kerber, A. Kohnert, and A. Wassermann.
Error-Correcting Linear Codes, volume 18 of Algorithms and Computation in Math-
ematics. Springer-Verlag, Berlin, 2006. Classification by isometry and applications,
with 1 CD-ROM (Windows and Linux).
[191] A. Betten, H. Fripertinger, A. Kerber, A. Wassermann, and K-H. Zimmermann.
Codierungstheorie – Konstruktion und Anwendung linearer Codes. Springer-Verlag,
Heidelberg, 1998.

[192] A. Betten, R. Laue, and A. Wassermann. Simple 7-designs with small parameters.
J. Combin. Des., 7:79–94, 1999.
[193] A. Beutelspacher. Partial spreads in finite projective spaces and partial designs.
Math. Z., 145:211–229, 1975.

[194] A. Beutelspacher. Correction to: “Partial spreads in finite projective spaces and
partial designs” [Math. Z., 145:211–229, 1975]. Math. Z., 147:303, 1976.
[195] A. Beutelspacher. On t-covers in finite projective spaces. J. Geom., 12:10–16, 1979.
[196] J. Bierbrauer. The theory of cyclic codes and a generalization to additive codes.
Des. Codes Cryptogr., 25:189–206, 2002.
[197] J. Bierbrauer. Cyclic additive and quantum stabilizer codes. In C. Carlet and
B. Sunar, editors, Arithmetic of Finite Fields, volume 4547 of Lecture Notes in Com-
put. Sci., pages 276–283. Springer, Berlin, Heidelberg, 2007.
[198] J. Bierbrauer. Cyclic additive codes. J. Algebra, 372:661–672, 2012.

[199] J. Bierbrauer. Introduction to Coding Theory. Discrete Mathematics and its Appli-
cations. Chapman & Hall/CRC, Boca Raton, Florida, 2nd edition, 2017.
[200] J. Bierbrauer, D. Bartoli, S. Marcugini, and F. Pambianco. Geometric constructions
of quantum codes. In A. A. Bruen and D. L. Wehlau, editors, Error-Correcting
Codes, Finite Geometries and Cryptography, volume 523 of Contemp. Math., pages
149–154. Amer. Math. Soc., Providence, Rhode Island, 2010.
[201] J. Bierbrauer and Y. Edel. Quantum twisted codes. J. Combin. Des., 8:174–188,
2000.

[202] J. Bierbrauer, Y. Edel, G. Faina, S. Marcugini, and F. Pambianco. Short additive


quaternary codes. IEEE Trans. Inform. Theory, 55:952–954, 2009.
[203] E. Biglieri, Y. Hong, and E. Viterbo. On fast-decodable space-time block codes.
IEEE Trans. Inform. Theory, 55:524–530, 2009.

[204] E. Biglieri, J. Proakis, and S. Shamai. Fading channels: information-theoretic and


communications aspects. IEEE Trans. Inform. Theory, 44:2619–2692, 1998.
[205] R. T. Bilous. Enumeration of the binary self-dual codes of length 34. J. Combin.
Math. Combin. Comput., 59:173–211, 2006.
[206] S. R. Blackburn. Frameproof codes. SIAM J. Discrete Math., 16:499–510, 2003.

[207] T. Blackford. Cyclic codes over Z4 of oddly even length. Discrete Appl. Math.,
128:27–46, 2003.
[208] T. Blackford. Negacyclic codes over Z4 of even length. IEEE Trans. Inform. Theory,
49:1417–1424, 2003.

[209] R. E. Blahut. Theory and Practice of Error Control Codes. Addison-Wesley, Reading,
Massachusetts, 1983.
[210] R. E. Blahut. The Gleason–Prange theorem. IEEE Trans. Inform. Theory, 37:1269–
1273, 1991.

[211] I. F. Blake. Codes over certain rings. Inform. and Control, 20:396–404, 1972.
[212] I. F. Blake, editor. Algebraic Coding Theory History and Development. Dowden,
Hutchinson, & Ross, Inc. Stroudsburg, Pennsylvania, 1973.
[213] I. F. Blake. Codes over integer residue rings. Inform. and Control, 29:295–300, 1975.

[214] G. R. Blakley. Safeguarding cryptographic keys. In Proc. National Computer Con-


ference, pages 313–317, New York, June 1979. AFIPS Press.
[215] F. L. Blasco. Fountain codes under maximum likelihood decoding. PhD thesis, Tech-
nischen Universität Hamburg-Harburg, 2017.

[216] F. L. Blasco, G. Liva, and G. Bauch. LT code design for inactivation decoding.
In Proc. IEEE Information Theory Workshop, pages 441–445, Hobart, Tasmania,
November 2014.
[217] M. Blaum, P. G. Farrell, and H. C. A. van Tilborg. Array Codes. In V. S. Pless and
W. C. Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 22, pages
1855–1909. North-Holland, Amsterdam, 1998.

[218] M. Blaum, J. L. Hafner, and S. Hetzler. Partial-MDS codes and their application to
RAID type of architectures. IEEE Trans. Inform. Theory, 59:4510–4519, 2013.
[219] O. Blazy, P. Gaborit, J. Schrek, and N. Sendrier. A code-based blind signature.
In Proc. IEEE International Symposium on Information Theory, pages 2718–2722,
Aachen, Germany, June 2017.
[220] D. Bleichenbacher, A. Kiayias, and M. Yung. Decoding interleaved Reed-Solomon
codes over noisy channels. Theoret. Comput. Sci., 379:348–360, 2007.
[221] G. Blekherman, P. A. Parrilo, and R. R. Thomas, editors. Semidefinite Optimiza-
tion and Convex Algebraic Geometry. Society for Industrial and Applied Mathemat-
ics (SIAM); Mathematical Optimization Society (MPS), Philadelphia, Pennsylvania,
2013.
[222] È. L. Blokh and V. V. Zyablov. Coding of generalized concatenated codes (in Rus-
sian). Problemy Peredači Informacii, 10(3):45–50, 1974 (English translation in Probl.
Inform. Transm., 10(3):218–222, 1974).
[223] A. Blokhuis and M. Lavrauw. Scattered spaces with respect to a spread in PG(n, q).
Geom. Dedicata, 81:231–243, 2000.
[224] A. Blokhuis and M. Lavrauw. On two-intersection sets with respect to hyperplanes
in projective spaces. J. Combin. Theory Ser. A, 99:377–382, 2002.
[225] A. Blokhuis and G. E. Moorhouse. Some p-ranks related to orthogonal spaces. J.
Algebraic Combin., 4:295–316, 1995.
[226] C. Blundo, A. De Santis, G. Di Cresceno, A. Gaggia, and U. Vaccaro. Multi-secret
sharing schemes. In D. R. Stinson, editor, Advances in Cryptology – CRYPTO
’93, volume 773 of Lecture Notes in Comput. Sci., pages 126–135. Springer, Berlin,
Heidelberg, 1994.
[227] I. Bocharova, F. Hug, R. Johannesson, B. Kudryashov, and R. Satyukov. Some
voltage graph-based LDPC tailbiting codes with large girth. In A. Kuleshov, V. M.
Blinovsky, and A. Ephremides, editors, Proc. IEEE International Symposium on
Information Theory, pages 732–736, St. Petersburg, Russia, July-August 2011.
[228] M. Bogaerts and P. Dukes. Semidefinite programming for permutation codes. Dis-
crete Math., 326:34–43, 2014.
[229] K. Bogart, D. Goldberg, and J. Gordon. An elementary proof of the MacWilliams
theorem on equivalence of codes. Inform. and Control, 37:19–22, 1978.

[230] G. T. Bogdanova, A. E. Brouwer, S. N. Kapralov, and P. R. J. Östergård. Error-


correcting codes over an alphabet of four elements. Des. Codes Cryptogr., 23:333–342,
2001.
[231] H. Bombı́n. Gauge color codes: optimal transversal gates and gauge fixing in topo-
logical stabilizer codes. New J. Phys., 17:083002, August 2015.
[232] A. Bondarenko, D. Radchenko, and M. Viazovska. Optimal asymptotic bounds for
spherical designs. Ann. of Math. (2), 178:443–452, 2013.
[233] D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Trans.
Inform. Theory, 44:1897–1905, 1998.

[234] G. Bonik, S. Goreinov, and N. Zamarashkin. A variant of list plus CRC concatenated
polar code. arXiv:1207.4661 [cs.IT], July 2012.
[235] A. Bonnecaze, P. Solé, C. Bachoc, and B. Mourrain. Type II codes over Z4 . IEEE
Trans. Inform. Theory, 43:969–976, 1997.
[236] A. Bonnecaze, P. Solé, and A. R. Calderbank. Quaternary quadratic residue codes
and unimodular lattices. IEEE Trans. Inform. Theory, 41:366–377, 1995.
[237] A. Borel. Linear Algebraic Groups, volume 126 of Graduate Texts in Mathematics.
Springer-Verlag, New York, 2nd edition, 1991.

[238] M. Borello. The automorphism group of a self-dual [72, 36, 16] binary code does not
contain elements of order 6. IEEE Trans. Inform. Theory, 58:7240–7245, 2012.
[239] M. Borello. The automorphism group of a self-dual [72, 36, 16] code is not an ele-
mentary abelian group of order 8. Finite Fields Appl., 25:1–7, 2014.

[240] M. Borello. On automorphism groups of binary linear codes. In G. Kyureghyan,


G. L. Mullen, and A. Pott, editors, Topics in Finite Fields, volume 632 of Contemp.
Math., pages 29–41. Amer. Math. Soc., Providence, Rhode Island, 2015.
[241] M. Borello, F. Dalla Volta, and G. Nebe. The automorphism group of a self-dual
[72, 36, 16] code does not contain S3 , A4 or D8 . Adv. Math. Commun., 7:503–510,
2013.
[242] M. Borello, J. de la Cruz, and W. Willems. A note on linear complementary pairs
of group codes. arXiv:1907.07506 [cs.IT], July 2019.
[243] M. Borello, J. de la Cruz, and W. Willems. On checkable codes in group algebras.
arXiv:1901.10979 [cs.IT], January 2019.
[244] M. Borello and W. Willems. Group codes over fields are asymptotically good.
arXiv:1904.10885 [cs.IT], April 2019.
[245] S. V. Borodachov, D. P. Hardin, and E. B. Saff. Discrete Energy on Rectifiable Sets.
Springer-Verlag, Berlin, Heidelberg, 2019.

[246] B. Bose and T. R. N. Rao. Theory of unidirectional error correcting/detecting codes.


IEEE Trans. Comput., 31:521–530, 1982.
[247] R. C. Bose. Mathematical theory of the symmetrical factorial design. Sankhya,
8:107–166, 1947.

[248] R. C. Bose and D. K. Ray-Chaudhuri. On a class of error correcting binary group


codes. Inform. and Control, 3:68–79, 1960. (Also reprinted in [169] pages 75–78 and
[212] pages 165–176).
[249] R. C. Bose and D. K. Ray-Chaudhuri. Further results on error correcting binary
group codes. Inform. and Control, 3:279–290, 1960. (Also reprinted in [169] pages
78–81 and [212] pages 177–188).
[250] W. Bosma, J. Cannon, and C. Playoust. The Magma algebra system. I. The user
language. Computational algebra and number theory (London, 1993). J. Symbolic
Comput., 24:235–265, 1997.

[251] M. Bossert. On decoding using codewords of the dual code. arXiv:2001.02956 [cs.IT],
January 2020.
[252] M. Bossert and V. Sidorenko. Singleton-type bounds for blot-correcting codes. IEEE
Trans. Inform. Theory, 42:1021–1023, 1996.
[253] L. Both and A. May. Optimizing BJMM with nearest neighbors: full decoding in
22/21n and McEliece security. In Proc. 10th International Workshop on Coding and
Cryptography, Saint Petersburg, Russia, September 2017. Available at http://cits.
rub.de/imperia/md/content/may/paper/bjmm+.pdf.

[254] L. Both and A. May. Decoding linear codes with high error rate and its impact for
LPN security. In T. Lange and R. Steinwandt, editors, Post-Quantum Cryptogra-
phy, volume 10786 of Lecture Notes in Comput. Sci., pages 25–46. Springer, Berlin,
Heidelberg, 2018.
[255] D. Boucher. Construction and number of self-dual skew codes over Fp2 . Adv. Math.
Commun., 10:765–795, 2016.
[256] D. Boucher, W. Geiselmann, and F. Ulmer. Skew-cyclic codes. Appl. Algebra Engrg.
Comm. Comput., 18:379–389, 2007.
[257] D. Boucher, P. Solé, and F. Ulmer. Skew constacyclic codes over Galois rings. Adv.
Math. Commun., 2:273–292, 2008.
[258] D. Boucher and F. Ulmer. Codes as modules over skew polynomial rings. In M. G.
Parker, editor, Cryptography and Coding, volume 5921 of Lecture Notes in Comput.
Sci., pages 38–55. Springer, Berlin, Heidelberg, 2009.
[259] D. Boucher and F. Ulmer. Coding with skew polynomial rings. J. Symbolic Comput.,
44:1644–1656, 2009.
[260] D. Boucher and F. Ulmer. Linear codes using skew polynomials with automorphisms
and derivations. Des. Codes Cryptogr., 70:405–431, 2014.
[261] D. Boucher and F. Ulmer. Self-dual skew codes and factorization of skew polynomials.
J. Symbolic Comput., 60:47–61, 2014.
[262] M. Boulagouaz and A. Leroy. (σ, δ)-codes. Adv. Math. Commun., 7:463–474, 2013.
[263] S. Boumova, P. G. Boyvalenkov, and D. P. Danev. Necessary conditions for existence
of some designs in polynomial metric spaces. European J. Combin., 20:213–225, 1999.
[264] J. Boutros, E. Viterbo, C. Rastello, and J.-C. Belfiore. Good lattice constellations for
both Rayleigh fading and Gaussian channels. IEEE Trans. Inform. Theory, 42:502–
518, 1996.
[265] I. Bouyukliev. About the code equivalence. In T. Shaska, W. C. Huffman, D. Joyner,
and V. Ustimenko, editors, Advances in Coding Theory and Cryptography, volume 3
of Ser. Coding Theory Cryptol., pages 126–151. World Sci. Publ., Hackensack, New
Jersey, 2007.
[266] I. Bouyukliev. What is Q-extension? Serdica J. Comput., 1:115–130, 2007.
[267] I. Bouyukliev. Classification of Griesmer codes and dual transform. Discrete Math.,
309:4049–4068, 2009.

[268] I. Bouyukliev, S. Bouyuklieva, and S. Kurz. Computer classification of linear codes.


arXiv:2002.07826 [cs.IT], February 2020.
[269] I. Bouyukliev, M. Dzhumalieva-Stoeva, and V. Monev. Classification of binary self-
dual codes of length 40. IEEE Trans. Inform. Theory, 61:4253–4258, 2015.
[270] I. Bouyukliev, V. Fack, W. Willems, and J. Winne. Projective two-weight codes with
small parameters and their corresponding graphs. Des. Codes Cryptogr., 41:59–78,
2006.
[271] I. Bouyukliev and P. R. J. Östergård. Classification of self-orthogonal codes over F3
and F4 . SIAM J. Discrete Math., 19:363–370, 2005.
[272] S. Bouyuklieva. A method for constructing self-dual codes with an automorphism of
order 2. IEEE Trans. Inform. Theory, 46:496–504, 2000.
[273] S. Bouyuklieva. On the automorphisms of order 2 with fixed points for the extremal
self-dual codes of length 24m. Des. Codes Cryptogr., 25:5–13, 2002.
[274] S. Bouyuklieva. On the automorphism group of a doubly-even (72, 36, 16) code.
IEEE Trans. Inform. Theory, 50:544–547, 2004.
[275] S. Bouyuklieva and I. Bouyukliev. Classification of the extremal formally self-dual
even codes of length 30. Adv. Math. Commun., 4:433–439, 2010.
[276] S. Bouyuklieva and I. Bouyukliev. An algorithm for classification of binary self-dual
codes. IEEE Trans. Inform. Theory, 58:3933–3940, 2012.
[277] S. Bouyuklieva, I. Bouyukliev, and M. Harada. Some extremal self-dual codes and
unimodular lattices in dimension 40. Finite Fields Appl., 21:67–83, 2013.
[278] S. Bouyuklieva and M. Harada. Extremal [50, 25, 10] codes with automorphisms of
order 3 and quasi-symmetric 2-(49, 9, 6) designs. Des. Codes Cryptogr., 28:163–169,
2003.
[279] S. Bouyuklieva, M. Harada, and A. Munemasa. Determination of weight enumerators
of binary extremal self-dual [42, 21, 8] codes. Finite Fields Appl., 14:177–187, 2008.
[280] S. Bouyuklieva, E. A. O’Brien, and W. Willems. The automorphism group of a binary
self-dual doubly even [72, 36, 16] code is solvable. IEEE Trans. Inform. Theory,
52:4244–4248, 2006.
[281] S. Bouyuklieva, R. Russeva, and N. Yankov. On the structure of binary self-dual
codes having an automorphism a square of an odd prime. IEEE Trans. Inform.
Theory, 51:3678–3686, 2005.
[282] S. Bouyuklieva and Z. Varbanov. Some connections between self-dual codes, com-
binatorial designs and secret sharing schemes. Adv. Math. Commun., 5:191–198,
2011.
[283] S. Bouyuklieva and W. Willems. Singly-even self-dual codes with minimal shadow.
IEEE Trans. Inform. Theory, 58:3856–3860, 2012.
[284] S. Bouyuklieva, N. Yankov, and R. Russeva. Classification of the binary self-dual
[42, 21, 8] codes having an automorphism of order 3. Finite Fields Appl., 13:605–615,
2007.
[285] S. Bouyuklieva, N. Yankov, and R. Russeva. On the classification of binary self-dual
[44, 22, 8] codes with an automorphism of order 3 or 7. Internat. J. Inform. Coding
Theory, 2, 2011.
[286] P. G. Boyvalenkov and D. P. Danev. On maximal codes in polynomial metric spaces.
In T. Mora and H. F. Mattson, Jr., editors, Applied Algebra, Algebraic Algorithms
and Error-Correcting Codes, volume 1255 of Lecture Notes in Comput. Sci., pages
29–38. Springer, Berlin, Heidelberg, 1997.
[287] P. G. Boyvalenkov and D. P. Danev. On linear programming bounds for codes in
polynomial metric spaces (in Russian). Problemy Peredači Informacii, 34(2):16–31,
1998. (English translation in Probl. Inform. Transm., 34(2):108–120, 1998).
[288] P. G. Boyvalenkov, D. P. Danev, and S. P. Bumova. Upper bounds on the minimum
distance of spherical codes. IEEE Trans. Inform. Theory, 42:1576–1581, 1996.
[289] P. G. Boyvalenkov, D. P. Danev, and M. Stoyanova. Refinements of Levenshtein
bounds in q-ary Hamming spaces (in Russian). Problemy Peredači Informacii,
54(4):35–50, 2018. (English translation in Probl. Inform. Transm., 54(4):329–342,
2018).
[290] P. G. Boyvalenkov, P. D. Dragnev, D. P. Hardin, E. B. Saff, and M. M. Stoyanova.
Universal lower bounds for potential energy of spherical codes. Constr. Approx.,
44:385–415, 2016.

[291] P. G. Boyvalenkov, P. D. Dragnev, D. P. Hardin, E. B. Saff, and M. M. Stoyanova.


Energy bounds for codes and designs in Hamming spaces. Des. Codes Cryptogr.,
82:411–433, 2017.
[292] T. Brack, M. Alles, F. Kienle, and N. Wehn. A synthesizable IP core for WIMAX
802.16E LDPC Code Decoding. In Proc. IEEE 17th International Symposium on
Personal, Indoor and Mobile Radio Communications, Helsinki, Finland, 5 pages,
September 2006.
[293] M. Braun. Construction of linear codes with large minimum distance. IEEE Trans.
Inform. Theory, 50:1687–1691, 2004.

[294] M. Braun. Designs over the binary field from the complete monomial group. Aus-
tralas. J. Combin., 67:470–475, 2017.
[295] M. Braun, T. Etzion, P. R. J. Östergård, A. Vardy, and A. Wassermann. Existence
of q-analogs of Steiner systems. Forum Math. Pi, 4:e7, 14, 2016.

[296] M. Braun, M. Kiermaier, and A. Wassermann. Computational methods in subspace


designs. In Network Coding and Subspace Designs, Signals Commun. Technol., pages
213–244. Springer, Cham, 2018.
[297] M. Braun, M. Kiermaier, and A. Wassermann. q-analogs of designs: subspace designs.
In Network Coding and Subspace Designs, Signals Commun. Technol., pages 171–211.
Springer, Cham, 2018.
[298] M. Braun, A. Kohnert, and A. Wassermann. Construction of (n, r)-arcs in PG(2, q).
Innov. Incidence Geom., 1:133–141, 2005.
[299] M. Braun, A. Kohnert, and A. Wassermann. Optimal linear codes from matrix
groups. IEEE Trans. Inform. Theory, 51:4247–4251, 2005.

[300] M. Braun, P. R. J. Östergård, and A. Wassermann. New lower bounds for binary
constant-dimension subspace codes. Experiment. Math., 27:179–183, 2018.
[301] S. Bravyi, M. Suchara, and A. Vargo. Efficient algorithms for maximum likelihood
decoding in the surface code. Physical Review A, 90(3):032326, September 2014.
[302] E. F. Brickell. Some ideal secret sharing schemes. In J.-J. Quisquater and J. Van-
dewalle, editors, Proc. Advances in Cryptology – EUROCRYPT ’89, volume 434 of
Lecture Notes in Comput. Sci., pages 468–475. Springer, Berlin, Heidelberg, 1990.
[303] J. D. Bridwell and J. K. Wolf. Burst distance and multiple-burst correction. Bell
System Tech. J., 49:889–909, 1970.
[304] J. Bringer, C. Carlet, H. Cabanne, S. Guilley, and H. Maghrebi. Orthogonal direct
sum masking: a smartcard friendly computation paradigm in a code, with builtin
protection against side-channel and fault attacks. In D. Naccache and D. Sauveron,
editors, Information Security Theory and Practice. Securing the Internet of Things,
volume 8501 of Lecture Notes in Comput. Sci., pages 40–56. Springer, Berlin, Hei-
delberg, 2014.
[305] A. E. Brouwer. Personal homepage. http://www.win.tue.nl//~aeb/. Accessed:
2018-08-31.
[306] A. E. Brouwer. Some unitals on 28 points and their embeddings in projective planes
of order 9. In M. Aigner and D. Jungnickel, editors, Geometries and Groups, volume
893 of Lecture Notes in Math., pages 183–188. Springer-Verlag, Berlin, Heidelberg,
1981.
[307] A. E. Brouwer. Some new two-weight codes and strongly regular graphs. Discrete
Appl. Math., 10:111–114, 1985.
[308] A. E. Brouwer. Strongly regular graphs. In C. J. Colbourn and J. H. Dinitz, edi-
tors, The CRC Handbook of Combinatorial Designs, chapter VII.11, pages 852–868.
Chapman & Hall/CRC Press, 2nd edition, 2007.
[309] A. E. Brouwer, A. M. Cohen, and A. Neumaier. Distance-Regular Graphs, volume 18
of Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics
and Related Areas (3)]. Springer-Verlag, Berlin, 1989.
[310] A. E. Brouwer, A. V. Ivanov, and M. H. Klin. Some new strongly regular graphs.
Combinatorica, 9:339–344, 1989.
[311] A. E. Brouwer and S. C. Polak. Uniqueness of codes using semidefinite programming.
Des. Codes Cryptogr., 87:1881–1895, 2019.
[312] A. E. Brouwer and L. M. G. M. Tolhuizen. A sharpening of the Johnson bound for
binary linear codes and the nonexistence of linear codes with Preparata parameters.
Des. Codes Cryptogr., 3:95–98, 1993.
[313] A. E. Brouwer and M. van Eupen. The correspondence between projective codes
and 2-weight codes. Des. Codes Cryptogr., 11:261–266, 1997.
[314] A. E. Brouwer, R. M. Wilson, and Q. Xiang. Cyclotomy and strongly regular graphs.
J. Algebraic Combin., 10:25–28, 1999.
[315] R. A. Brualdi, J. S. Graves, and K. M. Lawrence. Codes with a poset metric. Discrete
Math., 147:57–72, 1995.
[316] A. A. Bruen and J. A. Thas. Hyperplane coverings and blocking sets. Math. Z.,
181:407–409, 1982.
[317] T. A. Brun, I. Devetak, and M.-H. Hsieh. Correcting quantum errors with entangle-
ment. Science, 314(5798):436–439, 2006.
[318] F. Buekenhout. Existence of unitals in finite translation planes of order q 2 with a
kernel of order q. Geom. Dedicata, 5:189–194, 1976.
[319] K. A. Bush. Orthogonal arrays of index unity. Ann. Math. Stat., 23:279–290, 1952.

[320] S. Buzaglo and T. Etzion. Bounds on the size of permutation codes with the Kendall
τ -metric. IEEE Trans. Inform. Theory, 61:3241–3250, 2015.
[321] J. W. Byers, M. G. Luby, M. Mitzenmacher, and A. Rege. A digital fountain ap-
proach to reliable distribution of bulk data. In Proc. ACM SIGCOMM Conference
on Applications, Technologies, Architectures, and Protocols for Computer Communi-
cation, pages 56–67, Vancouver, Canada, August-September 1998. ACM Press, New
York.
[322] E. Byrne. Lifting decoding schemes over a Galois ring. In S. Boztaş and I. E. Shpar-
linski, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
volume 2227 of Lecture Notes in Comput. Sci., pages 323–332. Springer, Berlin, Hei-
delberg, 2001.
[323] E. Byrne. Decoding a class of Lee metric codes over a Galois ring. IEEE Trans.
Inform. Theory, 48:966–975, 2002.
[324] E. Byrne and P. Fitzpatrick. Gröbner bases over Galois rings with an application to
decoding alternant codes. J. Symbolic Comput., 31:565–584, 2001.

[325] E. Byrne and P. Fitzpatrick. Hamming metric decoding of alternant codes over
Galois rings. IEEE Trans. Inform. Theory, 48:683–694, 2002.
[326] V. R. Cadambe, S. A. Jafar, H. Maleki, K. Ramchandran, and C. Suh. Asymptotic
interference alignment for optimal repair of MDS codes in distributed storage. IEEE
Trans. Inform. Theory, 59:2974–2987, 2013.
[327] V. R. Cadambe and A. Mazumdar. Bounds on the size of locally recoverable codes.
IEEE Trans. Inform. Theory, 61:5787–5794, 2015.
[328] Y. Cai and C. Ding. Binary sequences with optimal autocorrelation. Theoret. Com-
put. Sci., 410:2316–2322, 2009.

[329] A. R. Calderbank, A. R. Hammons, Jr., P. V. Kumar, N. J. A. Sloane, and P. Solé.


A linear construction for certain Kerdock and Preparata codes. Bull. Amer. Math.
Soc. (N.S.), 29(2):218–222, 1993.
[330] A. R. Calderbank and W. M. Kantor. The geometry of two-weight codes. Bull.
London Math. Soc., 18:97–122, 1986.
[331] A. R. Calderbank, E. M. Rains, P. W. Shor, and N. J. A. Sloane. Quantum error
correction via codes over GF(4). IEEE Trans. Inform. Theory, 44:1369–1387, 1998.
[332] A. R. Calderbank and N. J. A. Sloane. Modular and p-adic cyclic codes. Des. Codes
Cryptogr., 6:21–35, 1995.

[333] S. Calkavur and P. Solé. Multisecret-sharing schemes and bounded distance decoding
of linear codes. Internat. J. Compt. Math., 94:107–114, 2017.
[334] E. T. Campbell, B. M. Terhal, and C. Vuillot. Roads towards fault-tolerant universal
quantum computation. Nature, 549:172–179, 2017.
[335] A. Canteaut and H. Chabanne. A further improvement of the work factor in an
attempt at breaking McEliece’s cryptosystem. In P. Charpin, editor, EUROCODE
94 – Livre des résumés, pages 169–173. INRIA, 1994.
[336] A. Canteaut and F. Chabaud. A new algorithm for finding minimum-weight words
in a linear code: application to McEliece’s cryptosystem and to narrow-sense BCH
codes of length 511. IEEE Trans. Inform. Theory, 44:367–378, 1998.
[337] A. Canteaut, P. Charpin, and G. M. Kyureghyan. A new class of monomial bent
functions. Finite Fields Appl., 14:221–241, 2008.
[338] A. Canteaut and N. Sendrier. Cryptanalysis of the original McEliece cryptosystem.
In K. Ohta and D. Pei, editors, Advances in Cryptology – ASIACRYPT ’98, volume
1514 of Lecture Notes in Comput. Sci., pages 187–199. Springer, Berlin, Heidelberg,
1998.
[339] R. Canto-Torres and N. Sendrier. Analysis of information set decoding for a sub-
linear error weight. In T. Takagi, editor, Post-Quantum Cryptography, volume 9606
of Lecture Notes in Comput. Sci., pages 144–161. Springer, Berlin, Heidelberg, 2016.
[340] X. Cao and L. Hu. Two Boolean functions with five-valued Walsh spectra and high
nonlinearity. Internat. J. Found. Comput. Sci., 26:537–556, 2015.
[341] Y. Cao, Y. Cao, H. Q. Dinh, F.-W. Fu, J. Gao, and S. Sriboonchitta. Constacyclic
codes of length nps over Fpm + uFpm . Adv. Math. Commun., 12:231–262, 2018.
[342] C. Carlet. A simple description of Kerdock codes. In G. D. Cohen and J. Wolfmann,
editors, Coding Theory and Applications, volume 388 of Lecture Notes in Comput.
Sci., pages 202–208. Springer, Berlin, Heidelberg, 1989.
[343] C. Carlet. Partially-bent functions. In E. F. Brickell, editor, Advances in Cryptology –
CRYPTO ’92, volume 740 of Lecture Notes in Comput. Sci., pages 280–291. Springer,
Berlin, Heidelberg, 1993.
[344] C. Carlet. Partially-bent functions. Des. Codes Cryptogr., 3:135–145, 1993.
[345] C. Carlet. On Kerdock codes. In Finite Fields: Theory, Applications, and Algorithms
(Waterloo, ON, 1997), volume 225 of Contemp. Math., pages 155–163. Amer. Math.
Soc., Providence, Rhode Island, 1999.
[346] C. Carlet. Boolean Functions for Cryptography and Error-Correcting Codes. In
Y. Crama and P. L. Hammer, editors, Boolean Models and Methods in Mathematics,
Computer Science, and Engineering, volume 134 of Encyclopedia of Mathematics and
its Applications, chapter 8, pages 257–397. Cambridge University Press, Cambridge,
UK, 2010.
[347] C. Carlet. Vectorial Boolean Functions for Cryptography. In Y. Crama and P. L.
Hammer, editors, Boolean Models and Methods in Mathematics, Computer Science,
and Engineering, volume 134 of Encyclopedia of Mathematics and its Applications,
chapter 9, pages 398–469. Cambridge University Press, Cambridge, UK, 2010.
[348] C. Carlet. Boolean and vectorial plateaued functions and APN functions. IEEE
Trans. Inform. Theory, 61:6272–6289, 2015.
[349] C. Carlet. Boolean Functions for Cryptography and Coding Theory. Cambridge
University Press, Cambridge, UK, 2020.
[350] C. Carlet, P. Charpin, and V. A. Zinoviev. Codes, bent functions and permutations
suitable for DES-like cryptosystems. Des. Codes Cryptogr., 15:125–156, 1998.
[351] C. Carlet and C. Ding. Highly nonlinear mappings. J. Complexity, 20:205–244, 2004.

[352] C. Carlet, C. Ding, and J. Yuan. Linear codes from perfect nonlinear mappings and
their secret sharing schemes. IEEE Trans. Inform. Theory, 51:2089–2102, 2005.
[353] C. Carlet and S. Guilley. Complementary dual codes for counter-measures to side-
channel attacks. In R. Pinto, P. R. Malonek, and P. Vettori, editors, Coding Theory
and Applications, volume 3 of CIM Ser. Math. Sci., pages 97–105. Springer, Cham,
2015.
[354] C. Carlet, C. Güneri, F. Özbudak, B. Özkaya, and P. Solé. On linear complementary
pairs of codes. IEEE Trans. Inform. Theory, 64:6583–6589, 2018.
[355] C. Carlet and S. Mesnager. Four decades of research on bent functions. Des. Codes
Cryptogr., 78:5–50, 2016.
[356] X. Caruso and J. Le Borgne. A new faster algorithm for factoring skew polynomials
over finite fields. J. Symbolic Comput., 79:411–443, 2017.
[357] I. Cascudo. On squares of cyclic codes. IEEE Trans. Inform. Theory, 65:1034–1047,
2019.

[358] I. Cascudo, H. Chen, R. Cramer, and C. Xing. Asymptotically good ideal linear
secret sharing with strong multiplication over any fixed finite field. In S. Halevi,
editor, Advances in Cryptology—CRYPTO 2009, volume 5677 of Lecture Notes in
Comput. Sci., pages 466–486. Springer, Berlin, Heidelberg, 2009.

[359] I. Cascudo, R. Cramer, D. Mirandola, and G. Zémor. Squares of random linear


codes. IEEE Trans. Inform. Theory, 61:1159–1173, 2015.
[360] I. Cascudo, R. Cramer, and C. Xing. The torsion-limit for algebraic function fields
and its application to arithmetic secret sharing. In P. Rogaway, editor, Advances in
Cryptology—CRYPTO 2011, volume 6841 of Lecture Notes in Comput. Sci., pages
685–705. Springer, Heidelberg, Heidelberg, 2011.

[361] I. Cascudo, R. Cramer, and C. Xing. Torsion limits and Riemann-Roch systems for
function fields and applications. IEEE Trans. Inform. Theory, 60:3871–3888, 2014.
[362] I. Cascudo, J. S. Gundersen, and D. Ruano. Squares of matrix-product codes. Finite
Fields Appl., 62:101606, 21, 2020.

[363] L. R. A. Casse and D. G. Glynn. The solution to Beniamino Segre’s problem Ir,q ,
r = 3, q = 2h . Geom. Dedicata, 13:157–163, 1982.
[364] L. R. A. Casse and D. G. Glynn. On the uniqueness of (q + 1)4 -arcs of PG(4, q),
q = 2h , h ≥ 3. Discrete Math., 48:173–186, 1984.

[365] Y. Cassuto and M. Blaum. Codes for symbol-pair read channels. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 988–992, Austin, Texas, June
2010.
[366] Y. Cassuto and M. Blaum. Codes for symbol-pair read channels. IEEE Trans.
Inform. Theory, 57:8011–8020, 2011.
[367] Y. Cassuto and S. Litsyn. Symbol-pair codes: algebraic constructions and asymptotic
bounds. In A. Kuleshov, V. M. Blinovsky, and A. Ephremides, editors, Proc. IEEE
International Symposium on Information Theory, pages 2348–2352, St. Petersburg,
Russia, July-August 2011.

[368] Y. Cassuto and M. A. Shokrollahi. Online fountain codes with low overhead. IEEE
Trans. Inform. Theory, 61:3137–3149, June 2015.
[369] G. Castagnoli, J. L. Massey, P. A. Schoeller, and N. von Seeman. On repeated-root
cyclic codes. IEEE Trans. Inform. Theory, 37:337–342, 1991.

[370] A. G. Castoldi and E. L. M. Carmelo. The covering problem in Rosenbloom-


Tsfasman spaces. Electron. J. Combin., 22(3):Paper 3.30, 18 pages, 2015.
[371] P.-L. Cayrel, P. Gaborit, and M. Girault. Identity-based identification and signature
schemes using correcting codes. In D. Augot, N. Sendrier, and J.-P. Tillich, edi-
tors, Proc. 5th International Workshop on Coding and Cryptography, pages 69–78,
Versailles, France, April 2007.
[372] P.-L. Cayrel, P. Véron, and S. M. E. Y. Alaoui. A zero-knowledge identification
scheme based on the q-ary syndrome decoding problem. In A. Biryukov, G. Gong,
and D. R. Stinson, editors, Selected Areas in Cryptography – SAC 2010, volume 6544
of Lecture Notes in Comput. Sci., pages 171–186. Springer, Berlin, Heidelberg, 2011.

[373] Y. Cengellenmis, A. Dertli, and S. T. Dougherty. Codes over an infinite family of


rings with a Gray map. Des. Codes Cryptogr., 72:559–580, 2014.
[374] H. Chabanne, G. D. Cohen, and A. Patey. Towards secure two-party computation
from the wire-tap channel. In H.-S. Lee and D.-G. Han, editors, Information Security
and Cryptology – ICISC 2013, volume 8565 of Lecture Notes in Comput. Sci., pages
34–46. Springer, Berlin, Heidelberg, 2014.
[375] H. Chabanne and B. Courteau. Application de la méthode de décodage itérative
d’omura a la cryptanalyse du système de McEliece. Technical Report 122, University
of Sherbrooke 1993, 1993.
[376] F. Chabaud. Bounds for self-complementary codes and their applications. In
P. Camion, P. Charpin, and S. Harari, editors, Proc. International Symposium on
Information Theory – EUROCODE 1992, volume 339 of CISM Courses and Lect.,
pages 175–183. Springer, Vienna, 1993.
[377] F. Chabaud and S. Vaudenay. Links between differential and linear cryptanalysis.
In A. De Santis, editor, Advances in Cryptology – EUROCRYPT ’94, volume 950 of
Lecture Notes in Comput. Sci., pages 356–365. Springer, Berlin, Heidelberg, 1995.
[378] G. Chalom, R. A. Ferraz, and C. P. Milies. Essential idempotents and simplex codes.
J. Algebra Comb. Discrete Struct. Appl., 4:181–188, 2017.
[379] D. Champion, J.-C. Belfiore, G. Rekaya, and E. Viterbo. Partitionning the golden
code: a framework to the design of space-time coded modulation. In Proc. 9th Cana-
dian Workshop on Information Theory, Montreal, Canada, 2 pages, June 2005.
[380] S. Chang and J. Y. Hyun. Linear codes from simplicial complexes. Des. Codes
Cryptogr., 86:2167–2181, 2018.
[381] Z. Chang, J. Chrisnata, M. F. Ezerman, and H. M. Kiah. Rates of DNA sequence
profiles for practical values of read lengths. IEEE Trans. Inform. Theory, 63:7166–
7177, 2017.
[382] Z. Chang, M. F. Ezerman, S. Ling, and H. Wang. Construction of de Bruijn sequences
from product of two irreducible polynomials. Cryptogr. Commun., 10:251–275, 2018.
[383] Z. Chang, M. F. Ezerman, S. Ling, and H. Wang. The cycle structure of LFSR with
arbitrary characteristic polynomial over finite fields. Cryptogr. Commun., 10:1183–
1202, 2018.

[384] Z. Chang, M. F. Ezerman, S. Ling, and H. Wang. On binary de Bruijn sequences from
LFSRs with arbitrary characteristic polynomials. Des. Codes Cryptogr., 87:1137–
1160, 2019.
[385] P. Charpin. Codes Idéaux de Certaines Algèbres Modulaires, Thèse de 3ième cycle.
Université de Paris VII, 1982.

[386] P. Charpin. Weight distributions of cosets of two-error-correcting binary BCH codes,


extended or not. IEEE Trans. Inform. Theory, 40:1425–1442, 1994.
[387] P. Charpin, T. Helleseth, and V. A. Zinov’ev. The coset distribution of triple-error-
correcting binary primitive BCH codes. IEEE Trans. Inform. Theory, 52:1727–1732,
2006.

[388] P. Charpin and V. A. Zinov’ev. On coset weight distributions of the 3-error-correcting


BCH-codes. SIAM J. Discrete Math., 10:128–145, 1997.
[389] L. Chaussade, P. Loidreau, and F. Ulmer. Skew codes of prescribed distance or rank.
Des. Codes Cryptogr., 50:267–284, 2009.

[390] B. Chen, H. Q. Dinh, H. Liu, and L. Wang. Constacyclic codes of length 2ps over
Fpm + uFpm . Finite Fields Appl., 37:108–130, 2016.
[391] B. Chen, S. Ling, and G. Zhang. Application of constacyclic codes to quantum MDS
codes. IEEE Trans. Inform. Theory, 61:1474–1484, 2015.

[392] B. Chen, S.-T. Xia, J. Hao, and F.-W. Fu. Constructions of optimal cyclic (r, δ)
locally repairable codes. IEEE Trans. Inform. Theory, 64:2499–2511, 2018.
[393] C. L. Chen, W. W. Peterson, and E. J. Weldon, Jr. Some results on quasi-cyclic
codes. Inform. and Control, 15:407–423, 1969.
[394] H. Chen and R. Cramer. Algebraic geometric secret sharing schemes and se-
cure multi-party computations over small fields. In C. Dwork, editor, Advances in
Cryptology—CRYPTO 2006, volume 4117 of Lecture Notes in Comput. Sci., pages
521–536. Springer, Berlin, Heidelberg, 2006.
[395] H. Chen, S. Ling, and C. Xing. Quantum codes from concatenated algebraic-
geometric codes. IEEE Trans. Inform. Theory, 51:2915–2920, 2005.

[396] J. Chen, A. Dholakia, E. Eleftheriou, M. P. C. Fossorier, and X. Hu. Reduced-


complexity decoding of LDPC codes. IEEE Trans. Commun., 53:1288–1299, 2005.
[397] J. Chen, R. M. Tanner, J. Zhang, and M. P. C. Fossorier. Construction of irregular
LDPC codes by quasi-cyclic extension. IEEE Trans. Inform. Theory, 53:1479–1483,
2007.
[398] Z. Chen. Six new binary quasi-cyclic codes. IEEE Trans. Inform. Theory, 40:1666–
1667, 1994.
[399] Z. Chen, M. Ye, and A. Barg. Enabling optimal access and error correction for the
repair of Reed-Solomon codes. arXiv:2001.07189 [cs.IT], January 2020.
[400] E. J. Cheon, Y. Kageyama, S. J. Kim, N. Lee, and T. Maruta. A construction of
two-weight codes and its applications. Bull. Korean Math. Soc., 54:731–736, 2017.
[401] W. E. Cherowitzo. α-flocks and hyperovals. Geom. Dedicata, 72:221–246, 1998.
[402] W. E. Cherowitzo, C. M. O’Keefe, and T. Penttila. A unified construction of finite
geometries associated with q-clans in characteristic 2. Adv. Geom., 3:1–21, 2003.
[403] W. E. Cherowitzo, T. Penttila, I. Pinneri, and G. F. Royle. Flocks and ovals. Geom.
Dedicata, 60:17–37, 1996.
[404] J. C. Y. Chiang and J. K. Wolf. On channels and codes for the Lee metric. Inform.
and Control, 19:159–173, 1971.
[405] S. Choi, J. Y. Hyun, H. K. Kim, and D. Y. Oh. MacWilliams-type equivalence
relations. arXiv:1205.1090 [math.CO], May 2012.
[406] B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Y. G. Desmedt, editor, Advances
in Cryptology – CRYPTO ’94, volume 839 of Lecture Notes in Comput. Sci., pages
257–270. Springer, Berlin, Heidelberg, 1994.
[407] P. A. Chou, Y. Wu, and K. Jain. Practical network coding. In Proc. 41st Allerton
Conference on Communication, Control, and Computing, pages 40–49, Monticello,
Illinois, October 2003.
[408] D. V. Chudnovsky and G. V. Chudnovsky. Algebraic complexities and algebraic
curves over finite fields. J. Complexity, 4:285–316, 1988.
[409] S.-Y. Chung, G. D. Forney, Jr., T. J. Richardson, and R. L. Urbanke. On the design
of low-density parity-check codes within 0.0045 dB of the Shannon limit. IEEE
Commun. Letters, 5:58–60, 2001.
[410] D. Clark, D. Jungnickel, and V. D. Tonchev. Affine geometry designs, polarities, and
Hamada’s conjecture. J. Combin. Theory Ser. A, 118:231–239, 2011.
[411] D. Clark, D. Jungnickel, and V. D. Tonchev. Exponential bounds on the number of
designs with affine parameters. J. Combin. Des., 19:131–140, 2011.
[412] D. Clark and V. D. Tonchev. A new class of majority-logic decodable codes derived
from finite geometry. Adv. Math. Commun., 7:175–186, 2013.
[413] G. C. Clark, Jr. and J. B. Cain. Error-Correction Coding for Digital Communica-
tions. Applications of Communications Theory. Plenum Press, New York-London,
1981.
[414] J.-J. Climent, D. Napp, C. Perea, and R. Pinto. A construction of MDS 2D con-
volutional codes of rate 1/n based on superregular matrices. Linear Algebra Appl.,
437:766–780, 2012.
[415] J.-J. Climent, D. Napp, C. Perea, and R. Pinto. Maximum distance separable 2D
convolutional codes. IEEE Trans. Inform. Theory, 62:669–680, 2016.
[416] J.-J. Climent, D. Napp, R. Pinto, and R. Simões. Series concatenation of 2D con-
volutional codes. In Proc. IEEE 9th International Workshop on Multidimensional
(nD) Systems (nDS), Vila Real, Portugal, 6 pages, September 2015.
[417] J. T. Coffey and R. M. Goodman. The complexity of information set decoding. IEEE
Trans. Inform. Theory, 36:1031–1037, 1990.
[418] J. T. Coffey, R. M. Goodman, and P. G. Farrell. New approaches to reduced-
complexity decoding. Discrete Appl. Math., 33:43–60, 1991.
[419] G. D. Cohen and S. Encheva. Efficient constructions of frameproof codes. Electron.
Lett., 36:1840–1842, 2000.
[420] G. D. Cohen, S. Mesnager, and A. Patey. On minimal and quasi-minimal linear
codes. In M. Stam, editor, Cryptography and Coding, volume 8308 of Lecture Notes
in Comput. Sci., pages 85–98. Springer, Berlin, Heidelberg, 2013.
[421] H. Cohn, J. H. Conway, N. D. Elkies, and A. Kumar. The D4 root system is not
universally optimal. Experiment. Math., 16:313–320, 2007.
[422] H. Cohn and M. de Courcy-Ireland. The Gaussian core model in high dimensions.
Duke Math. J., 167:2417–2455, 2018.
[423] H. Cohn and N. D. Elkies. New upper bounds on sphere packings I. Ann. of Math.,
157:689–714, 2003.
[424] H. Cohn and A. Kumar. Universally optimal distribution of points on spheres. J.
Amer. Math. Soc., 20:99–148, 2007.
[425] H. Cohn and J. Woo. Three-point bounds for energy minimization. J. Amer. Math.
Soc., 25:929–958, 2012.

[426] H. Cohn and Y. Zhao. Energy-minimizing error-correcting codes. IEEE Trans.


Inform. Theory, 60:7442–7450, 2014.
[427] P. M. Cohn. Free Rings and Their Relations, volume 19 of London Math. Soc.
Monographs. Academic Press, Inc. [Harcourt Brace Jovanovich, Publishers], London,
2nd edition, 1985.
[428] C. J. Colbourn and J. F. Dinitz, editors. The CRC Handbook of Combinatorial
Designs. Chapman & Hall/CRC Press, 2nd edition, 2007.
[429] P. Compeau, P. Pevzner, and G. Tesler. How to apply de Bruijn graphs to genome
assembly. Nature Biotechnology, 29:987–991, 2011.

[430] I. Constaninescu. Lineare Codes über Restklassenringen ganzer Zahlen und ihre
Automorphismen bezüglich einer verallgemeinerten Hamming-Metrik. PhD thesis,
Technische Universität, München, Germany, 1995.
[431] I. Constaninescu and W. Heise. A metric for codes over residue class rings of integers
(in Russian). Problemy Peredači Informacii, 33(3):22–28, 1997. (English translation
in Probl. Inform. Transm., 33(3):208–213, 1997).
[432] I. Constaninescu, W. Heise, and T. Honold. Monomial extensions of isometries
between codes over Zm . In Proc. 5th International Workshop on Algebraic and
Combinatorial Coding Theory, pages 98–104, Sozopol, Bulgaria, June 1996.
[433] S. D. Constantin and T. R. N. Rao. On the theory of binary asymmetric error
correcting codes. Inform. and Control, 40:20–36, 1979.

[434] J. H. Conway. Three lectures on exceptional groups. In M. B. Powell and G. Higman,


editors, Finite Simple Groups, pages 215–247. Academic Press, New York, 1971.
[435] J. H. Conway, S. J. Lomonaco, Jr., and N. J. A. Sloane. A [45, 13] code with minimal
distance 16. Discrete Math., 83:213–217, 1990.
[436] J. H. Conway and V. S. Pless. On the enumeration of self-dual codes. J. Combin.
Theory Ser. A, 28:26–53, 1980.
[437] J. H. Conway and V. S. Pless. On primes dividing the group order of a doubly-
even (72, 36, 16) code and the group order of a quaternary (24, 12, 10) code. Discrete
Math., 38:143–156, 1982.

[438] J. H. Conway, V. S. Pless, and N. J. A. Sloane. Self-dual codes over GF(3) and
GF(4) of length not exceeding 16. IEEE Trans. Inform. Theory, 25:312–322, 1979.
[439] J. H. Conway, V. S. Pless, and N. J. A. Sloane. The binary self-dual codes of length
up to 32: a revised enumeration. J. Combin. Theory Ser. A, 60:183–195, 1992.
[440] J. H. Conway and N. J. A. Sloane. A new upper bound on the minimal distance of
self-dual codes. IEEE Trans. Inform. Theory, 36:1319–1333, 1990.
[441] J. H. Conway and N. J. A. Sloane. Self-dual codes over the integers modulo 4. J.
Combin. Theory Ser. A, 62:30–45, 1993.
[442] J. H. Conway and N. J. A. Sloane. Sphere Packings, Lattices and Groups, volume
290 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles
of Mathematical Sciences]. Springer-Verlag, New York, 3rd edition, 1999. With
additional contributions by Ei. Bannai, R. E. Borcherds, J. Leech, S. P. Norton, A.
M. Odlyzko, R. A. Parker, L. Queen and B. B. Venkov.
[443] D. Coppersmith and M. Sudan. Reconstructing curves in three (and higher) dimen-
sional spaces from noisy data. In Proc. 35th Annual ACM Symposium on the Theory
of Computing, pages 136–142, San Diego, California, June 2003. ACM Press, New
York.
[444] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms.
MIT Press, Cambridge, Massachusetts; McGraw-Hill Book Co., Boston, 2nd edition,
2001.

[445] A. Cossidente, N. Durante, G. Marino, T. Penttila, and A. Siciliano. The geometry


of some two-character sets. Des. Codes Cryptogr., 46:231–241, 2008.
[446] A. Cossidente and O. H. King. Some two-character sets. Des. Codes Cryptogr.,
56:105–113, 2010.

[447] A. Cossidente and G. Marino. Veronese embedding and two-character sets. Des.
Codes Cryptogr., 42:103–107, 2007.
[448] A. Cossidente, G. Marino, and F. Pavese. Non-linear maximum rank distance codes.
Des. Codes Cryptogr., 79:597–609, 2016.
[449] A. Cossidente and F. Pavese. On subspace codes. Des. Codes Cryptogr., 78:527–531,
2016.
[450] A. Cossidente and F. Pavese. Veronese subspace codes. Des. Codes Cryptogr., 81:445–
457, 2016.

[451] A. Cossidente and F. Pavese. Subspace codes in PG(2N − 1, Q). Combinatorica,


37:1073–1095, 2017.
[452] A. Cossidente, F. Pavese, and L. Storme. Geometrical aspects of subspace codes. In
M. Greferath, M. Pavčević, N. Silberstein, and M. Á. Vázquez-Castro, editors, Net-
work Coding and Subspace Designs. Signals and Communication Technology, Signals
Commun. Technol., pages 107–129. Springer, Cham, 2018.
[453] A. Cossidente and H. Van Maldeghem. The simple exceptional group G2 (q), q even,
and two-character sets. J. Combin. Theory Ser. A, 114:964–969, 2007.
[454] S. I. R. Costa, M. M. S. Alves, E. Agustini, and R. Palazzo. Graphs, tessellations,
and perfect codes on flat tori. IEEE Trans. Inform. Theory, 50:2363–2377, 2004.
[455] S. I. R. Costa, F. Oggier, A. Campello, J.-C. Belfiore, and E. Viterbo. Lattices Applied
to Coding for Reliable and Secure Communications. SpringerBriefs in Mathematics.
Springer, Cham, 2017.

[456] N. T. Courtois, M. Finiasz, and N. Sendrier. How to achieve a McEliece-based digital


signature scheme. In C. Boyd, editor, Advances in Cryptology – ASIACRYPT 2001,
volume 2248 of Lecture Notes in Comput. Sci., pages 157–174. Springer, Berlin,
Heidelberg, 2001.
[457] A. Couvreur. The dual minimum distance of arbitrary-dimensional algebraic-
geometric codes. J. Algebra, 350:84–107, 2012.
[458] A. Couvreur. Codes and the Cartier operator. Proc. Amer. Math. Soc., 142(6):1983–
1996, 2014.
[459] A. Couvreur, P. Gaborit, V. Gauthier-Umaña, A. Otmani, and J.-P. Tillich.
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes.
Des. Codes Cryptogr., 73:641–666, 2014.
[460] A. Couvreur, P. Lebacque, and M. Perret. Toward good families of codes from towers
of surfaces. arXiv:2002.02220 [math.AG], February 2020, to appear AMS Contemp.
Math.

[461] A. Couvreur, M. Lequesne, and J.-P. Tillich. Recovering short secret keys of RLCE
in polynomial time. In J. Ding and R. Steinwandt, editors, Post-Quantum Cryp-
tography, volume 11505 of Lecture Notes in Comput. Sci., pages 133–152. Springer,
Berlin, Heidelberg, 2019.
[462] A. Couvreur, I. Márquez-Corbella, and R. Pellikaan. Cryptanalysis of McEliece
cryptosystem based on algebraic geometry codes and their subcodes. IEEE Trans.
Inform. Theory, 63:5404–5418, 2017.
[463] A. Couvreur, A. Otmani, and J.-P. Tillich. Polynomial time attack on wild McEliece
over quadratic extensions. In P. Q. Nguyen and E. Oswald, editors, Advances in
Cryptology – EUROCRYPT 2014, volume 8441 of Lecture Notes in Comput. Sci.,
pages 17–39. Springer, Berlin, Heidelberg, 2014.
[464] A. Couvreur, A. Otmani, and J.-P. Tillich. Polynomial time attack on wild McEliece
over quadratic extensions. IEEE Trans. Inform. Theory, 63:404–427, 2017.

[465] A. Couvreur, A. Otmani, J.-P. Tillich, and V. Gauthier-Umaña. A polynomial-time


attack on the BBCRS scheme. In J. Katz, editor, Public-Key Cryptography – PKC
2015, volume 9020 of Lecture Notes in Comput. Sci., pages 175–193. Springer, Berlin,
Heidelberg, 2015.
[466] A. Couvreur and C. Ritzenthaler. Oral presentation, Day 2 of ANR Manta First
Retreat (Lacapelle-Biron, France), April 12, 2016.
[467] T. M. Cover and J. A. Thomas. Elements of Information Theory. J. Wiley & Sons,
New York, 1991.
[468] R. Cramer, I. B. Damgård, and U. Maurer. General secure multi-party compu-
tation from any linear secret-sharing scheme. In B. Preneel, editor, Advances in
Cryptology—EUROCRYPT 2000 (Bruges), volume 1807 of Lecture Notes in Com-
put. Sci., pages 316–334. Springer, Berlin, Heidelberg, 2000.
[469] R. Cramer, I. B. Damgård, and J. Nielsen. Secure Multiparty Computation and
Secret Sharing. Cambridge University Press, Cambridge, UK, 2015.

[470] L. Creedon and K. Hughes. Derivations on group algebras with coding theory ap-
plications. Finite Fields Appl., 56:247–265, 2019.
[471] H. S. Cronie and S. B. Korada. Lossless source coding with polar codes. In
Proc. IEEE International Symposium on Information Theory, pages 904–908, Austin,
Texas, June 2010.

[472] E. Croot, V. F. Lev, and P. P. Pach. Progression-free sets in Zn4 are exponentially
small. Ann. of Math. (2), 185:331–337, 2017.
[473] A. Cross, G. Smith, J. A. Smolin, and B. Zeng. Codeword stabilized quantum codes.
IEEE Trans. Inform. Theory, 55:433–438, 2009.

[474] B. Csajbók, G. Marino, O. Polverino, and F. Zullo. Maximum scattered linear sets
and MRD-codes. J. Algebraic Combin., 46:517–531, 2017.
[475] B. Csajbók and A. Siciliano. Puncturing maximum rank distance codes. J. Algebraic
Combin., 49:507–534, 2019.

[476] D. Cullina and N. Kiyavash. An improvement to Levenshtein’s upper bound on the


cardinality of deletion correcting codes. IEEE Trans. Inform. Theory, 60:3862–3870,
2014.
[477] T. W. Cusick and H. S. Dobbertin. Some new three-valued crosscorrelation functions
for binary m-sequences. IEEE Trans. Inform. Theory, 42:1238–1240, 1996.

[478] M. O. Damen, K. Abed-Meraim, and J.-C. Belfiore. Diagonal algebraic space-time


block codes. IEEE Trans. Inform. Theory, 48:628–636, 2002.
[479] M. O. Damen, A. Chkeif, and J.-C. Belfiore. Lattice code decoder for space-time
codes. IEEE Commun. Letters, 4:161–163, 2000.
[480] M. O. Damen, A. Tewfik, and J.-C. Belfiore. A construction of a space-time code
based on number theory. IEEE Trans. Inform. Theory, 48:753–760, 2002.
[481] F. J. Damerau. A technique for computer detection and correction of spelling errors.
Commun. ACM, 7:171–176, 1964.

[482] I. B. Damgård and P. Landrock. Ideals and Codes in Group Algebras. Aarhus
Preprint Series, 1986.
[483] L. E. Danielsen and M. G. Parker. Edge local complementation and equivalence of
binary linear codes. Des. Codes Cryptogr., 49:161–170, 2008.

[484] L. E. Danielsen and M. G. Parker. Directed graph representation of half-rate additive


codes over GF(4). Des. Codes Cryptogr., 59:119–130, 2011.
[485] R. N. Daskalov and T. A. Gulliver. New good quasi-cyclic ternary and quaternary
linear codes. IEEE Trans. Inform. Theory, 43:1647–1650, 1997.

[486] R. N. Daskalov, T. A. Gulliver, and E. Metodieva. New ternary linear codes. IEEE
Trans. Inform. Theory, 45:1687–1688, 1999.
[487] B. K. Dass, N. Sharma, and R. Verma. Perfect codes in poset spaces and poset block
spaces. Finite Fields Appl., 46:90–106, 2017.
[488] A. Datta and F. Oggier. An overview of codes tailor-made for better repairability in
networked distributed storage systems. ACM SIGACT News, 44:89–105, 2013.
[489] H. Dau, I. M. Duursma, H. M. Kiah, and O. Milenkovic. Repairing Reed-Solomon
codes with multiple erasures. IEEE Trans. Inform. Theory, 64:6567–6582, 2018.
[490] M. C. Davey and D. J. C. MacKay. Low density parity check codes over GF(q).
IEEE Commun. Letters, 2:165–167, 1998.
[491] G. Davidoff, P. Sarnak, and A. Valette. Elementary Number Theory, Group Theory,
and Ramanujan Graphs, volume 55 of London Math. Soc. Student Texts. Cambridge
University Press, Cambridge, UK, 2003.
[492] P. J. Davis. Circulant Matrices. John Wiley & Sons, New York-Chichester-Brisbane,
1979.
[493] P. Dayal and M. K. Varanasi. An optimal two transmit antenna space-time code
and its stacked extensions. In Proc. 37th Asilomar Conference on Signals, Systems
and Computers, volume 1, pages 987–991, Pacific Grove, California, November 2003.
IEEE, Piscataway, New Jersey.

[494] P. Dayal and M. K. Varanasi. Distributed QAM-based space-time block codes for
efficient cooperative multiple-access communication. IEEE Trans. Inform. Theory,
54:4342–4354, 2008.
[495] J. De Beule, K. Metsch, and L. Storme. Characterization results on weighted mini-
hypers and on linear codes meeting the Griesmer bound. Adv. Math. Commun.,
2:261–272, 2008.
[496] N. G. de Bruijn. A combinatorial problem. Nederl. Akad. Wetensch., Proc., 49:758–
764, 1946 (See also Indagationes Math., 8:461–467, 1946).
[497] F. De Clerck and M. Delanote. Two-weight codes, partial geometries and Steiner
systems. Des. Codes Cryptogr., 21:87–98, 2000.
[498] E. de Klerk. Aspects of Semidefinite Programming. Kluwer Acad. Publ., Dordrecht,
Netherlands, 2002.
[499] E. de Klerk and F. Vallentin. On the Turing model complexity of interior point
methods for semidefinite programming. SIAM J. Optim., 26:1944–1961, 2016.
[500] J. de la Cruz, E. Gorla, H. Lopez, and A. Ravagnani. Weight distribution of rank-
metric codes. Des. Codes Cryptogr., 86:1–16, 2018.
[501] J. de la Cruz, M. Kiermaier, A. Wassermann, and W. Willems. Algebraic structures
of MRD codes. Adv. Math. Commun., 10:499–510, 2016.
[502] J. de la Cruz and W. Willems. On group codes with complementary duals. Des.
Codes Cryptogr., 86:2065–2073, 2018.
[503] D. de Laat. Moment methods in energy minimization: new bounds for Riesz minimal
energy problems. arXiv:1610.04905 [math.OC], October 2016.
[504] D. de Laat, F. M. de Oliveira Filho, and F. Vallentin. Upper bounds for packings of
spheres of several radii. Forum Math. Sigma, 2, 42 pages, 2014.
[505] D. de Laat, F. C. Machado, F. M. de Oliveira Filho, and F. Vallentin. k-point semidef-
inite programming bounds for equiangular lines. arXiv:1812.06045 [math.OC], De-
cember 2018.
[506] D. de Laat and F. Vallentin. A semidefinite programming hierarchy for packing
problems in discrete geometry. Math. Program. Ser. B, 151:529–553, 2015.
[507] C. L. M. de Lange. Some new cyclotomic strongly regular graphs. J. Algebraic
Combin., 4:329–330, 1995.
[508] F. M. de Oliveira Filho and F. Vallentin. Computing upper bounds for packing
densities of congruent copies of a convex body. In G. Ambrus, I. Bárány, K. J.
Böröczky, G. F. Tóth, and J. Pach, editors, New Trends in Intuitive Geometry,
volume 27 of Bolyai Society Mathematical Studies, pages 155–188. Springer-Verlag,
Berlin, 2018.
[509] M. J. De Resmini. A 35-set of type (2, 5) in PG(2, 9). J. Combin. Theory Ser. A,
45:303–305, 1987.
[510] M. J. De Resmini and G. Migliori. A 78-set of type (2, 6) in PG(2, 16). Ars Combin.,
22:73–75, 1986.
[511] C. de Seguins Pazzis. The classification of large spaces of matrices with bounded
rank. Israel J. Math., 208:219–259, 2015.
[512] A. De Wispelaere and H. Van Maldeghem. Codes from generalized hexagons. Des.
Codes Cryptogr., 37:435–448, 2005.
[513] A. De Wispelaere and H. Van Maldeghem. Some new two-character sets in PG(5, q 2 )
and a distance-2 ovoid in the generalized hexagon H(4). Discrete Math., 308:2976–
2983, 2008.
[514] T. Debris-Alazard, N. Sendrier, and J.-P. Tillich. WAVE: a new family of trapdoor
one-way preimage sampleable functions based on codes. In S. D. Galbraith and
S. Moriai, editors, Advances in Cryptology – ASIACRYPT 2019, Part 1, volume
11921 of Lecture Notes in Comput. Sci., pages 21–51. Springer, Berlin, Heidelberg,
2019.
[515] T. Debris-Alazard and J.-P. Tillich. Two attacks on rank metric code-based schemes:
RankSign and an IBE scheme. In T. Peyrin and S. D. Galbraith, editors, Advances in
Cryptology – ASIACRYPT 2018, Part 1, volume 11272 of Lecture Notes in Comput.
Sci., pages 62–92. Springer, Berlin, Heidelberg, 2018.
[516] L. Decreusefond and G. Zëmor. On the error-correcting capabilities of cycle codes of
graphs. In Proc. IEEE International Symposium on Information Theory, page 307,
Trondheim, Norway, June-July 1994.
[517] P. Delsarte. Bounds for unrestricted codes, by linear programming. Philips Res.
Rep., 27:272–289, 1972.
[518] P. Delsarte. Weights of linear codes and strongly regular normed spaces. Discrete
Math., 3:47–64, 1972.
[519] P. Delsarte. An algebraic approach to the association schemes of coding theory.
Philips Res. Rep. Suppl., 10:vi+97, 1973.
[520] P. Delsarte. An Algebraic Approach to the Association Schemes of Coding Theory.
PhD thesis, Université Catholique de Louvain, 1973.
[521] P. Delsarte. Four fundamental parameters of a code and their combinatorial signifi-
cance. Inform. and Control, 23:407–438, 1973.
[522] P. Delsarte. On subfield subcodes of modified Reed-Solomon codes. IEEE Trans.
Inform. Theory, 21:575–576, 1975.
[523] P. Delsarte. Bilinear forms over a finite field, with applications to coding theory. J.
Combin. Theory Ser. A, 25:226–241, 1978.
[524] P. Delsarte and J.-M. Goethals. Alternating bilinear forms over GF (q). J. Combin.
Theory Ser. A, 19:26–50, 1975.
[525] P. Delsarte and J.-M. Goethals. Unrestricted codes with the Golay parameters are
unique. Discrete Math., 12:211–224, 1975.
[526] P. Delsarte, J.-M. Goethals, and F. J. MacWilliams. On generalized Reed-Muller
codes and their relatives. Inform. and Control, 16:403–442, 1970.
[527] P. Delsarte, J.-M. Goethals, and J. J. Seidel. Spherical codes and designs. Geom.
Dedicata, 6:363–388, 1977.
[528] P. Delsarte and V. I. Levenshtein. Association schemes and coding theory. IEEE
Trans. Inform. Theory, 44:2477–2504, 1998.
[529] J.-C. Deneuville and P. Gaborit. Cryptanalysis of a code-based one-time signature.
Des. Codes Cryptogr., 88:to appear, 2020.
[530] J.-C. Deneuville, P. Gaborit, and G. Zémor. Ouroboros: a simple, secure and efficient
key exchange protocol based on coding theory. In T. Lange and T. Takagi, editors,
Post-Quantum Cryptography, volume 10346 of Lecture Notes in Comput. Sci., pages
18–34. Springer, Berlin, Heidelberg, 2017.
[531] R. H. F. Denniston. Some maximal arcs in finite projective planes. J. Combin.
Theory, 6:317–319, 1969.
[532] M. M. Deza and E. Deza. Encyclopedia of Distances. Springer-Verlag, Berlin, 2009.
[533] A. Dholakia. Introduction to Convolutional Codes with Applications. International
Series in Engineering and Computer Science. Springer Science & Business Media,
New York, 1994.

[534] C. Di, D. Proietti, T. J. Richardson, and R. L. Urbanke. Finite length analysis of


low-density parity-check codes. IEEE Trans. Inform. Theory, 48:1570–1579, 2002.
[535] C. Di, T. J. Richardson, and R. L. Urbanke. Weight distribution of low-density
parity-check codes. IEEE Trans. Inform. Theory, 52:4839–4855, 2006.

[536] Q. Diao, Y. Y. Tai, S. Lin, and K. Abdel-Ghaffar. Trapping set structure of finite
geometry LDPC codes. In Proc. IEEE International Symposium on Information
Theory, pages 3088–3092, Cambridge, Massachusetts, July 2012.
[537] L. E. Dickson. The analytic representation of substitutions on a power of a prime
number of letters with a discussion of the linear group. Ann. of Math., 11:65–120,
161–183, 1896/97.
[538] J. F. Dillon. Elementary Hadamard Difference Sets. PhD thesis, University of Mary-
land, 1974.
[539] J. F. Dillon. Multiplicative difference sets via additive characters. Des. Codes Cryp-
togr., 17:225–235, 1999.
[540] J. F. Dillon and H. S. Dobbertin. New cyclic difference sets with Singer parameters.
Finite Fields Appl., 10:342–389, 2004.
[541] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran. Net-
work coding for distributed storage systems. IEEE Trans. Inform. Theory, 56:4539–
4551, 2010.
[542] A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh. A survey on network codes
for distributed storage. Proc. IEEE, 99:476–489, 2011.
[543] B. K. Ding, T. Zhang, and G. N. Ge. Maximum distance separable codes for b-symbol
read channels. Finite Fields Appl., 49:180–197, 2018.
[544] C. Ding. Cyclic codes from APN and planar functions. arXiv:1206.4687 [cs.IT], June
2012.
[545] C. Ding. Cyclic codes from the two-prime sequences. IEEE Trans. Inform. Theory,
58:3881–3891, 2012.

[546] C. Ding. Cyclotomic constructions of cyclic codes with length being the product of
two primes. IEEE Trans. Inform. Theory, 58:2231–2236, 2012.
[547] C. Ding. Cyclic codes from cyclotomic sequences of order four. Finite Fields Appl.,
23:8–34, 2013.

[548] C. Ding. Cyclic codes from some monomials and trinomials. SIAM J. Discrete Math.,
27:1977–1994, 2013.
[549] C. Ding. Codes from Difference Sets. World Scientific Publishing Co. Pte. Ltd.,
Hackensack, New Jersey, 2015.
[550] C. Ding. Linear codes from some 2-designs. IEEE Trans. Inform. Theory, 61:3265–
3275, 2015.
[551] C. Ding. Parameters of several classes of BCH codes. IEEE Trans. Inform. Theory,
61:5322–5330, 2015.

[552] C. Ding. A construction of binary linear codes from Boolean functions. Discrete
Math., 339:2288–2303, 2016.
[553] C. Ding. Cyclic codes from Dickson polynomials. arXiv:1206.4370 [cs.IT], November
2016.

[554] C. Ding. A sequence construction of cyclic codes over finite fields. Cryptogr. Com-
mun., 10:319–341, 2018.
[555] C. Ding, C. Fan, and Z. Zhou. The dimension and minimum distance of two classes
of primitive BCH codes. Finite Fields Appl., 45:237–263, 2017.

[556] C. Ding, Z. Heng, and Z. Zhou. Minimal binary linear codes. IEEE Trans. Inform.
Theory, 64:6536–6545, 2018.
[557] C. Ding, D. Kohel, and S. Ling. Secret sharing with a class of ternary codes. Theoret.
Comput. Sci., 246:285–298, 2000.
[558] C. Ding, T. Laihonen, and A. Renvall. Linear multisecret-sharing schemes and error-
correcting codes. J. Universal Comput. Sci., 3:1023–1036, 1997.
[559] C. Ding, K. Y. Lam, and C. Xing. Construction and enumeration of all binary duadic
codes of length pm . Fund. Inform., 38:149–161, 1999.
[560] C. Ding, C. Li, N. Li, and Z. Zhou. Three-weight cyclic codes and their weight
distributions. Discrete Math., 339:415–427, 2016.
[561] C. Ding, C. Li, and Y. Xia. Another generalisation of the binary Reed-Muller codes
and its applications. Finite Fields Appl., 53:144–174, 2018.
[562] C. Ding and S. Ling. A q-polynomial approach to cyclic codes. Finite Fields Appl.,
20:1–14, 2013.

[563] C. Ding and H. Niederreiter. Cyclotomic linear codes of order 3. IEEE Trans.
Inform. Theory, 53:2274–2277, 2007.
[564] C. Ding, D. Pei, and A. Salomaa. Chinese Remainder Theorem: Applications in
Computing, Coding, Cryptography. World Scientific Publishing Co., Inc., River Edge,
New Jersey, 1996.
[565] C. Ding and V. S. Pless. Cyclotomy and duadic codes of prime lengths. IEEE Trans.
Inform. Theory, 45:453–466, 1999.
[566] C. Ding and A. Salomaa. Secret sharing schemes with nice access structures. Fund.
Inform., 73:51–62, 2006.

[567] C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers, volume
561 of Lecture Notes in Comput. Sci. Springer, Berlin, Heidelberg, 1991.
[568] C. Ding and J. Yang. Hamming weights in irreducible cyclic codes. Discrete Math.,
313:434–446, 2013.
[569] C. Ding, Y. Yang, and X. Tang. Optimal sets of frequency hopping sequences from
linear cyclic codes. IEEE Trans. Inform. Theory, 56:3605–3612, 2010.
[570] C. Ding and J. Yuan. Covering and secret sharing with linear codes. In C. S. Calude,
M. J. Dinneen, and V. Vajnovszki, editors, Discrete Mathematics and Theoretical
Computer Science, volume 2731 of Lecture Notes in Comput. Sci., pages 11–25.
Springer, Berlin, Heidelberg, 2003.
[571] C. Ding and Z. Zhou. Binary cyclic codes from explicit polynomials over GF(2m ).
Discrete Math., 321:76–89, 2014.
[572] K. Ding and C. Ding. A class of two-weight and three-weight codes and their appli-
cations in secret sharing. IEEE Trans. Inform. Theory, 61:5835–5842, 2015.
[573] H. Q. Dinh. Negacyclic codes of length 2s over Galois rings. IEEE Trans. Inform.
Theory, 51:4252–4262, 2005.
[574] H. Q. Dinh. Repeated-root constacyclic codes of length 2s over Z2a . In Algebra and
its Applications, volume 419 of Contemp. Math., pages 95–110. Amer. Math. Soc.,
Providence, Rhode Island, 2006.
[575] H. Q. Dinh. Structure of some classes of repeated-root constacyclic codes over inte-
gers modulo 2m . In A. Giambruno, C. P. Milies, and S. K. Sehgal, editors, Groups,
Rings and Group Rings, volume 248 of Lecture Notes Pure Appl. Math., pages 105–
117. Chapman & Hall/CRC, Boca Raton, Florida, 2006.
[576] H. Q. Dinh. Complete distances of all negacyclic codes of length 2s over Z2a . IEEE
Trans. Inform. Theory, 53:147–161, 2007.
[577] H. Q. Dinh. On the linear ordering of some classes of negacyclic and cyclic codes
and their distance distributions. Finite Fields Appl., 14:22–40, 2008.
[578] H. Q. Dinh. Constacyclic codes of length 2s over Galois extension rings of F2 + uF2 .
IEEE Trans. Inform. Theory, 55:1730–1740, 2009.
[579] H. Q. Dinh. Constacyclic codes of length ps over Fpm + uFpm . J. Algebra, 324:940–
950, 2010.
[580] H. Q. Dinh. On some classes of repeated-root constacyclic codes of length a power
of 2 over Galois rings. In Advances in Ring Theory, Trends Math., pages 131–147.
Birkhäuser/Springer Basel AG, Basel, 2010.
[581] H. Q. Dinh. Repeated-root constacyclic codes of length 2ps . Finite Fields Appl.,
18:133–143, 2012.
[582] H. Q. Dinh, S. Dhompongsa, and S. Sriboonchitta. On constacyclic codes of length
4ps over Fpm + uFpm . Discrete Math., 340:832–849, 2017.
[583] H. Q. Dinh, H. Liu, X.-S. Liu, and S. Sriboonchitta. On structure and distances
of some classes of repeated-root constacyclic codes over Galois rings. Finite Fields
Appl., 43:86–105, 2017.
[584] H. Q. Dinh and S. R. López-Permouth. Cyclic and negacyclic codes over finite chain
rings. IEEE Trans. Inform. Theory, 50:1728–1744, 2004.
[585] H. Q. Dinh, S. R. López-Permouth, and S. Szabo. On the structure of cyclic and
negacyclic codes over finite chain rings. In P. Solé, editor, Codes Over Rings, vol-
ume 6 of Series on Coding Theory and Cryptology, pages 22–59. World Sci. Publ.,
Hackensack, New Jersey, 2009.
[586] H. Q. Dinh, B. T. Nguyen, A. K. Singh, and S. Sriboonchitta. Hamming and symbol-
pair distances of repeated-root constacyclic codes of prime power lengths over Fpm +
uFpm . IEEE Commun. Letters, 22:2400–2403, 2018.
[587] H. Q. Dinh, B. T. Nguyen, A. K. Singh, and S. Sriboonchitta. On the symbol-pair
distance of repeated-root constacyclic codes of prime power lengths. IEEE Trans.
Inform. Theory, 64:2417–2430, 2018.
[588] H. Q. Dinh, B. T. Nguyen, and S. Sriboonchitta. Skew constacyclic codes over finite
fields and finite chain rings. Math. Probl. Eng., Art. ID 3965789, 17 pages, 2016.
[589] H. Q. Dinh, B. T. Nguyen, S. Sriboonchitta, and T. M. Vo. On a class of constacyclic
codes of length 4ps over Fpm + uFpm . J. Algebra Appl., 18(2):1950022, 2019.
[590] H. Q. Dinh, B. T. Nguyen, S. Sriboonchitta, and T. M. Vo. On (α + uβ)-constacyclic
codes of length 4ps over Fpm + uFpm . J. Algebra Appl., 18(2):1950023, 2019.
[591] H. Q. Dinh and H. D. T. Nguyen. On some classes of constacyclic codes over poly-
nomial residue rings. Adv. Math. Commun., 6:175–191, 2012.
[592] H. Q. Dinh, H. D. T. Nguyen, S. Sriboonchitta, and T. M. Vo. Repeated-root
constacyclic codes of prime power lengths over finite chain rings. Finite Fields Appl.,
43:22–41, 2017.
[593] H. Q. Dinh, A. Sharma, S. Rani, and S. Sriboonchitta. Cyclic and negacyclic codes
of length 4ps over Fpm + uFpm . J. Algebra Appl., 17(9):1850173, 22, 2018.
[594] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. On cyclic DNA codes
over the ring Z4 + uZ4 . Unpublished.
[595] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. Cyclic DNA codes over
the ring F2 + uF2 + vF2 + uvF2 + v 2 F2 + uv 2 F2 . Des. Codes Cryptogr., 86:1451–1467,
2018.
[596] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. DNA cyclic codes
over the ring F2 [u, v]/hu2 − 1, v 3 − v, uv − vui. Internat. J. Biomath., 11(3):1850042,
19, 2018.
[597] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. Construction of cyclic
DNA codes over the ring Z4 [u]/hu2 − 1i based on the deletion distance. Theoret.
Comput. Sci., 773:27–42, 2019.

[598] H. Q. Dinh, L. Wang, and S. Zhu. Negacyclic codes of length 2ps over Fpm + uFpm .
Finite Fields Appl., 31:178–201, 2015.
[599] H. Q. Dinh, X. Wang, H. Liu, and S. Sriboonchitta. On the b-distance of repeated-
root constacyclic codes of prime power lengths. Discrete Math., 343(4):111780, 2020.

[600] L. A. Dissett. Combinatorial and Computational Aspects of Finite Geometries. PhD


thesis, University of Toronto, 2000.
[601] D. Divsalar, S. Dolinar, and C. Jones. Protograph LDPC codes over burst erasure
channels. In Proc. MILCOM ’06 – IEEE Military Communications Conference,
Washington, DC, 7 pages, October 2006.
[602] D. Divsalar, S. Dolinar, C. Jones, and J. Thorpe. Protograph LDPC codes with
minimum distance linearly growing with block size. In Proc. GLOBECOM ’05 –
IEEE Global Telecommunications Conference, volume 3, pages 1152–1156, St. Louis,
Missouri, November-December 2005.
[603] D. Divsalar and L. Dolocek. On the typical minimum distance of protograph-based
non-binary LDPC codes. In Proc. Information Theory and Applications Workshop,
pages 192–198, San Diego, California, February 2012.
[604] D. Divsalar, H. Jin, and R. J. McEliece. Coding theorems for turbo-like codes. In
Proc. 36th Allerton Conference on Communication, Control, and Computing, pages
201–210, Monticello, Illinois, September 1998.
[605] H. S. Dobbertin. One-to-one highly nonlinear power functions on GF(2n ). Appl.
Algebra Engrg. Comm. Comput., 9:139–152, 1998.
[606] H. S. Dobbertin. Almost perfect nonlinear power functions on GF(2n ): the Niho
case. Inform. and Comput., 151:57–72, 1999.
[607] H. S. Dobbertin. Almost perfect nonlinear power functions on GF(2n ): the Welch
case. IEEE Trans. Inform. Theory, 45:1271–1275, 1999.
[608] H. S. Dobbertin. Kasami power functions, permutation polynomials and cyclic dif-
ference sets. In Difference Sets, Sequences and Their Correlation Properties (Bad
Windsheim, 1998), volume 542 of NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci.,
pages 133–158. Kluwer Acad. Publ., Dordrecht, Netherlands, 1999.
[609] H. S. Dobbertin. Almost perfect nonlinear power functions on GF(2n ): a new case
for n divisible by 5. In D Jungnickel and H. Niederreiter, editors, Proc. 5th Interna-
tional Conference on Finite Fields and Applications (Augsburg 1999), pages 113–121.
Springer-Verlag, Berlin, Heidelberg, 2001.
[610] H. S. Dobbertin, P. Felke, T. Helleseth, and P. Rosendahl. Niho type cross-correlation
functions via Dickson polynomials and Kloosterman sums. IEEE Trans. Inform.
Theory, 52:613–627, 2006.
[611] S. Dodunekov and J. Simonis. Codes and projective multisets. Electron. J. Combin.,
5:Research Paper 37, 23 pages, 1998.
[612] L. Dolecek, Z. Zhang, V. Vnantharam, M. J. Wainwright, and B. Nikolic. Analysis
of absorbing sets and fully absorbing sets of array-based LDPC codes. IEEE Trans.
Inform. Theory, 56:181–201, 2010.
[613] R. G. L. D’Oliveira and M. Firer. The packing radius of a code and partitioning
problems: the case for poset metrics on finite vector spaces. Discrete Math., 338:2143–
2167, 2015.
[614] R. G. L. D’Oliveira and M. Firer. Channel metrization. European J. Combin.,
80:107–119, 2019.
[615] R. G. L. D’Oliveira and M. Firer. A distance between channels: the average error of
mismatched channels. Des. Codes Cryptogr., 87:481–493, 2019.
[616] R. A. Dontcheva, A. J. van Zanten, and S. M. Dodunekov. Binary self-dual codes
with automorphisms of composite order. IEEE Trans. Inform. Theory, 50:311–318,
2004.
[617] T. J. Dorsey. Morphic and principal-ideal group rings. J. Algebra, 318:393–411, 2007.
[618] M. Dostert, C. Guzman, F. M. de Oliveira Filho, and F. Vallentin. New upper
bounds for the density of translative packings of three-dimensional convex bodies
with tetrahedral symmetry. Discrete Comput. Geom., 58:449–481, 2017.
[619] S. T. Dougherty. Algebraic Coding Theory over Finite Commutative Rings. Springer-
Briefs in Mathematics. Springer International Publishing, New York, 2017.
[620] S. T. Dougherty and C. Fernández-Córdoba. Codes over Z2k , Gray map and self-dual
codes. Adv. Math. Commun., 5:571–588, 2011.
[621] S. T. Dougherty, P. Gaborit, M. Harada, A. Munemasa, and P. Solé. Type IV self-
dual codes over rings. IEEE Trans. Inform. Theory, 45:2345–2360, 1999.
[622] S. T. Dougherty, P. Gaborit, M. Harada, and P. Solé. Type II codes over F2 + uF2 .
IEEE Trans. Inform. Theory, 45:32–45, 1999.

[623] S. T. Dougherty, J. Gildea, R. Taylor, and A. Tylyshchak. Group rings, G-codes


and constructions of self-dual and formally self-dual codes. Des. Codes Cryptogr.,
86:2115–2138, 2018.
[624] S. T. Dougherty, T. A. Gulliver, and M. Harada. Type II self-dual codes over finite
rings and even unimodular lattices. J. Algebraic Combin., 9:233–250, 1999.
[625] S. T. Dougherty, M. Harada, and P. Solé. Self-dual codes over rings and the Chinese
remainder theorem. Hokkaido Math. J., 28:253–283, 1999.
[626] S. T. Dougherty, S. Karadeniz, and B. Yildiz. Cyclic codes over Rk . Des. Codes
Cryptogr., 63:113–126, 2012.

[627] S. T. Dougherty, J.-L. Kim, and H. Kulosman. MDS codes over finite principal ideal
rings. Des. Codes Cryptogr., 50:77–92, 2009.
[628] S. T. Dougherty, J.-L. Kim, H. Kulosman, and H. Liu. Self-dual codes over commu-
tative Frobenius rings. Finite Fields Appl., 16:14–26, 2010.

[629] S. T. Dougherty, J.-L. Kim, B. Özkaya, L. Sok, and P. Solé. The combinatorics of
LCD codes: linear programming bound and orthogonal matrices. Internat. J. Inform.
Coding Theory, 4:116–128, 2017.
[630] S. T. Dougherty, J.-L. Kim, and P. Solé. Open problems in coding theory. In S. T.
Dougherty, A. Facchini, A. Leroy, E. Puczylowski, and P. Solé, editors, Noncommu-
tative Rings and Their Applications, volume 634 of Contemp. Math., pages 79–99.
Amer. Math. Soc., Providence, Rhode Island, 2015.
[631] S. T. Dougherty and S. Ling. Cyclic codes over Z4 of even length. Des. Codes
Cryptogr., 39:127–153, 2006.

[632] S. T. Dougherty and H. Liu. Independence of vectors in codes over rings. Des. Codes
Cryptogr., 51:55–68, 2009.
[633] S. T. Dougherty, S. Mesnager, and P. Solé. Secret-sharing schemes based on self-
dual codes. In F. R. Kschischang and E.-H. Yang, editors, Proc. IEEE International
Symposium on Information Theory, pages 338–342, Toronto, Canada, July 2008.
[634] S. T. Dougherty and K. Shiromoto. Maximum distance codes over rings of order 4.
IEEE Trans. Inform. Theory, 47:400–404, 2001.
[635] S. T. Dougherty and K. Shiromoto. Maximum distance codes in Matn,s (Zk ) with
a non-Hamming metric and uniform distributions. Des. Codes Cryptogr., 33:45–61,
2004.
[636] S. T. Dougherty and M. M. Skriganov. MacWilliams duality and the Rosenbloom-
Tsfasman metric. Mosc. Math. J., 2:81–97, 2002.

[637] S. T. Dougherty and M. M. Skriganov. Maximum distance separable codes in the ρ


metric over arbitrary alphabets. J. Algebraic Combin., 16:71–81, 2002.
[638] S. T. Dougherty, B. Yildiz, and S. Karadeniz. Codes over Rk , Gray maps and their
binary images. Finite Fields Appl., 17:205–219, 2011.
[639] S. T. Dougherty, B. Yildiz, and S. Karadeniz. Self-dual codes over Rk and binary
self-dual codes. Eur. J. Pure Appl. Math., 6:89–106, 2013.
[640] J. Doyen, X. Hubaut, and M. Vandensavel. Ranks of incidence matrices of steiner
triple systems. Math. Z., 163:251–259, 1978.
[641] P. B. Dragon, O. I. Hernandez, J. Sawada, A. Williams, and D. Wong. Constructing
de Bruijn sequences with co-lexicographic order: the k-ary Grandmama sequence.
European J. Combin., 72:1–11, 2018.
[642] P. B. Dragon, O. I. Hernandez, and A. Williams. The Grandmama de Bruijn sequence
for binary strings. In E. Kranakis, G. Navarro, and E. Chávez, editors, LATIN 2016:
Theoretical Informatics, volume 9644 of Lecture Notes in Comput. Sci., pages 347–
361. Springer, Berlin, Heidelberg, 2016.
[643] N. Drucker, S. Gueron, and D. Kostic. Fast polynomial inversion for post quantum
QC-MDPC cryptography. In S. Dolev, V. Kolesnikov, S. Lodha, and G. Weiss,
editors, Cyber Security Cryptography and Machine Learning, volume 12161 of Lecture
Notes in Comput. Sci., pages 110–127. Springer, Berlin, Heidelberg, 2020.

[644] N. Drucker, S. Gueron, and D. Kostic. QC-MDPC decoders with several shades
of gray. In J. Ding and J.-P. Tillich, editors, Post-Quantum Cryptography, volume
12100 of Lecture Notes in Comput. Sci., pages 35–50. Springer, Berlin, Heidelberg,
2020.
[645] J. Ducoat. Generalized rank weights: a duality statement. In G. Kyureghyan,
G. Mullen, and A. Pott, editors, Topics in Finite Fields, volume 632 of Contemp.
Math., pages 101–109. Amer. Math. Soc., Providence, Rhode Island, 2015.
[646] I. Dumer. Two decoding algorithms for linear codes (in Russian). Problemy Peredači
Informacii, 25(1):24–32, 1989 (English translation in Probl. Inform. Transm.,
25(1):17–23, 1989).

[647] I. Dumer. On minimum distance decoding of linear codes. In Proc. 5th Joint Soviet-
Swedish Workshop on Information Theory, pages 50–52, Moscow, USSR, 1991.
[648] I. Dumer. Concatenated Codes and Their Multilevel Generalizations. In V. S. Pless
and W. C. Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 23,
pages 1911–1988. North-Holland, Amsterdam, 1998.
[649] I. Dumer. Soft-decision decoding of Reed-Muller codes: a simplified algorithm. IEEE
Trans. Inform. Theory, 52:954–963, 2006.
[650] I. Dumer, D. Micciancio, and M. Sudan. Hardness of approximating the minimum
distance of a linear code. IEEE Trans. Inform. Theory, 49:22–37, 2003.
[651] I. Dumer and K. Shabunov. Soft-decision decoding of Reed-Muller codes: recursive
lists. IEEE Trans. Inform. Theory, 52:1260–1266, 2006.
[652] C. F. Dunkl. Discrete quadrature and bounds on t-designs. Michigan Math. J.,
26:81–102, 1979.
[653] N. Durante and A. Siciliano. Non-linear maximum rank distance codes in the cyclic
model for the field reduction of finite geometries. Electron. J. Combin., 24:Paper
2.33, 18, 2017.
[654] I. M. Duursma. Algebraic decoding using special divisors. IEEE Trans. Inform.
Theory, 39:694–698, 1993.
[655] I. M. Duursma and H. Dau. Low bandwidth repair of the RS(10, 4) Reed-Solomon
code. In Proc. Information Theory and Applications Workshop, San Diego, Califor-
nia, 10 pages, February 2017.
[656] I. M. Duursma, R. Kirov, and S. Park. Distance bounds for algebraic geometric
codes. J. Pure Appl. Algebra, 215:1863–1878, 2011.
[657] I. M. Duursma, X. Li, and H. Wang. Multilinear algebra for distributed storage.
arXiv:2006.08911 [cs.IT], June 2020.
[658] I. M. Duursma and S. Park. Coset bounds for algebraic geometric codes. Finite
Fields Appl., 16:36–55, 2010.
[659] Z. Dvir. On the size of Kakeya sets in finite fields. J. Amer. Math. Soc., 22:1093–1097,
2009.
[660] Z. Dvir, S. Kopparty, S. Saraf, and M. Sudan. Extensions to the method of multiplici-
ties, with applications to Kakeya sets and mergers. In Proc. 50th IEEE Symposium on
Foundations of Computer Science, pages 181–190, Atlanta, Georgia, October 2009.
[661] W. Ebeling. Lattices and Codes. Advanced Lectures in Mathematics. Springer Spek-
trum, Wiesbaden, 3rd edition, 2013. A course partially based on lectures by Friedrich
Hirzebruch.

[662] Y. Edel. Parameters of some GF(3)-linear quantum twisted codes. https://www.


mathi.uni-heidelberg.de/~yves/Matritzen/QTBCH/QTBCHTab3.html. Accessed
on 2019-01-17.
[663] Y. Edel and J. Bierbrauer. Twisted BCH-codes. J. Combin. Des., 5:377–389, 1997.
[664] J. Egan and I. M. Wanless. Enumeration of MOLS of small order. Math. Comp.,
85:799–824, 2016.
[665] D. Ehrhard. Achieving the designed error capacity in decoding algebraic-geometric
codes. IEEE Trans. Inform. Theory, 39:743–751, 1993.
[666] H. El Gamal and M. Damen. Universal space-time coding. IEEE Trans. Inform.
Theory, 49:1097–1119, 2003.
[667] S. I. El-Zanati, O. Heden, G. F. Seelinger, P. A. Sissokho, L. E. Spence, and C. Van-
den Eynden. Partitions of the 8-dimensional vector space over GF(2). J. Combin.
Des., 18:462–474, 2010.
[668] S. I. El-Zanati, H. Jordon, G. F. Seelinger, P. A. Sissokho, and L. E. Spence. The
maximum size of a partial 3-spread in a finite vector space over GF(2). Des. Codes
Cryptogr., 54:101–107, 2010.

[669] S. I. El-Zanati, G. F. Seelinger, P. A. Sissokho, L. E. Spence, and C. Vanden Eynden.


On partitions of finite vector spaces of low dimension over GF(2). Discrete Math.,
309:4727–4735, 2009.
[670] C. Eldert, H. M. Gurk, H. J. Gray, and M. Rubinoff. Shifting counters. Trans. Amer.
Inst. of Electrical Engineers, Part I: Communication and Electronics, 77:70–74, 1958.

[671] P. Elia, K. R. Kumar, S. A. Pawar, P. V. Kumar, and H.-F. Lu. Explicit space-
time codes achieving the diversity-multiplexing gain tradeoff. IEEE Trans. Inform.
Theory, 52:3869–3884, 2006.
[672] P. Elia, F. Oggier, and P. V. Kumar. Asymptotically optimal cooperative wireless
networks with reduced signaling complexity. IEEE J. Selected Areas Commun.,
25:258–267, 2007.
[673] P. Elia, B. A. Sethuraman, and P. V Kumar. Perfect space-time codes with minimum
and non-minimum delay for any number of antennas. In International Conference
on Wireless Networks, Communications and Mobile Computing, volume 1, pages
722–727. IEEE, Piscataway, New Jersey, 2005.

[674] P. Elias. Coding for noisy channels. IRE Conv. Rec., 4:37–46, 1955.
[675] P. Elias, A. Feinstein, and C. E. Shannon. A note on the maximum flow through a
network. IRE Trans. Inform. Theory, 2:117–119, 1956.
[676] N. D. Elkies. Explicit modular towers. In T. Basar and A. Vardy, editors, Proc.
35th Allerton Conference on Communication, Control, and Computing, pages 23–32,
Monticello, Illinois, September 1997.
[677] N. D. Elkies. Explicit towers of Drinfeld modular curves. In C. Casacuberta,
R. M. Miró-Roig, J. Verdera, and S. Xambó-Descamps, editors, European Congress
of Mathematics, Vol. II (Barcelona, 2000), volume 202 of Progress in Mathematics,
pages 189–198. Birkhäuser, Basel, 2001.
[678] N. D. Elkies. Still better nonlinear codes from modular curves. arXiv:math/0308046
[math.NT], August 2003.
[679] J. S. Ellenberg and D. C. Gijswijt. On large subsets of Fnq with no three-term
arithmetic progression. Ann. of Math. (2), 185:339–343, 2017.

[680] M. Elyasi and S. Mohajer. Determinant coding: a novel framework for exact-repair
regenerating codes. IEEE Trans. Inform. Theory, 62:6683–6697, 2016.
[681] M. Elyasi and S. Mohajer. Cascade codes for distributed storage systems.
arXiv:1901.00911 [cs.IT], January 2019.
[682] K. Engdahl and K. Sh. Zigangirov. To the theory of low-density convolutional codes I
(in Russian). Problemy Peredači Informacii, 35(4):12–28, 1999. (English translation
in Probl. Inform. Transm., 35(4):295–310, 1999).
[683] P. Erdős and Z. Füredi. The greatest angle among n points in the d-dimensional Eu-
clidean space. In Combinatorial Mathematics (Marseille-Luminy, 1981), volume 75
of North-Holland Math. Stud., pages 275–283. North-Holland, Amsterdam, 1983.
[684] T. Ericson and V. A. Zinov’ev. Codes on Euclidean Spheres. North-Holland Mathe-
matical Library. Elsevier Science, Amsterdam, 2001.

[685] H. Esfahanizadeh, A. Hareedy, and L. Dolecek. Finite-length construction of high


performance spatially-coupled codes via optimized partitioning and lifting. IEEE
Trans. Commun., 67:3–16, 2019.
[686] M. Esmaeili, T. A. Gulliver, N. P. Secord, and S. A. Mahmoud. A link between
quasi-cyclic codes and convolutional codes. IEEE Trans. Inform. Theory, 44:431–
435, 1998.
[687] J. Etesami, F. Hu, and W. Henkel. LCD codes and iterative decoding by projec-
tions, a first step towards an intuitive description of iterative decoding. In Proc.
GLOBECOM ’11 – IEEE Global Telecommunications Conference, Houston, Texas,
December 2011, 4 pages.

[688] O. Etesami and M. A. Shokrollahi. Raptor codes on binary memoryless symmetric


channels. IEEE Trans. Inform. Theory, 52:2033–2051, 2006.
[689] T. Etzion and M. Firer. Metrics based on finite directed graphs. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 1336–1340, Barcelona, Spain,
July 2016.

[690] T. Etzion, M. Firer, and R. A. Machado. Metrics based on finite directed graphs
and coding invariants. IEEE Trans. Inform. Theory, 64:2398–2409, 2018.
[691] T. Etzion, E. Gorla, A. Ravagnani, and A. Wachter-Zeh. Optimal Ferrers diagram
rank-metric codes. IEEE Trans. Inform. Theory, 62:1616–1630, 2016.

[692] T. Etzion and N. Silberstein. Error-correcting codes in projective spaces via rank-
metric codes and Ferrers diagrams. IEEE Trans. Inform. Theory, 55:2909–2919,
2009.
[693] T. Etzion, A. Trachtenberg, and A. Vardy. Which codes have cycle-free Tanner
graphs? IEEE Trans. Inform. Theory, 45:2173–2181, 1999.

[694] T. Etzion and A. Vardy. Perfect binary codes: constructions, properties and enu-
meration. IEEE Trans. Inform. Theory, 40:754–763, 1994.
[695] T. Etzion and A. Vardy. Error-correcting codes in projective space. IEEE Trans.
Inform. Theory, 57:1165–1173, 2011.

[696] M. F. Ezerman, S. Jitman, H. M. Kiah, and S. Ling. Pure asymmetric quantum MDS
codes from CSS construction: a complete characterization. Internat. J. Quantum Inf.,
11(3):1350027, 2013.
[697] M. F. Ezerman, S. Jitman, S. Ling, and D. V. Pasechnik. CSS-like constructions of
asymmetric quantum codes. IEEE Trans. Inform. Theory, 59:6732–6754, 2013.
[698] M. F. Ezerman, H. T. Lee, S. Ling, K. Nguyen, and H. Wang. A provably secure
group signature scheme from code-based assumptions. In T. Iwata and J. H. Cheon,
editors, Advances in Cryptology – ASIACRYPT 2015, Part 1, volume 9452 of Lecture
Notes in Comput. Sci., pages 260–285. Springer, Berlin, Heidelberg, 2015.

[699] M. F. Ezerman, S. Ling, B. Özkaya, and P. Solé. Good stabilizer codes from quasi-
cyclic codes over F4 and F9 . In Proc. IEEE International Symposium on Information
Theory, pages 2898–2902, Paris, France, July 2019.
[700] M. F. Ezerman, S. Ling, B. Özkaya, and J. Tharnnukhroh. Spectral bounds for quasi-
twisted codes. In Proc. IEEE International Symposium on Information Theory, pages
1922–1926, Paris, France, July 2019.
[701] A. Faldum. Radikalcodes. Diploma Thesis, Mainz, 1993.
[702] G. Falkner, B. Kowol, W. Heise, and E. Zehendner. On the existence of cyclic optimal
codes. Atti Sem. Mat. Fis. Univ. Modena, 28(2):326–341 (1980), 1979.

[703] J. L. Fan. Array codes as low-density parity-check codes. In Proc. 2nd Interna-
tional Symposium on Turbo Codes and Related Topics, pages 543–546, Brest, France,
September 2000.
[704] P. Fan and M. Darnell. Sequence Design for Communications Applications. Commu-
nications Systems, Techniques, and Applications Series. J. Wiley, New York, 1996.

[705] J.-C. Faugère, V. Gauthier-Umaña, A. Otmani, L. Perret, and J.-P. Tillich. A distin-
guisher for high-rate McEliece cryptosystems. IEEE Trans. Inform. Theory, 59:6830–
6844, 2013.
[706] J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich. Algebraic cryptanalysis of
McEliece variants with compact keys. In H. Gilbert, editor, Advances in Cryptology –
EUROCRYPT 2010, volume 6110 of Lecture Notes in Comput. Sci., pages 279–298.
Springer, Berlin, Heidelberg, 2010.
[707] J.-C. Faugère, L. Perret, and F. de Portzamparc. Algebraic attack against variants
of McEliece with Goppa polynomial of a special form. In P. Sarkar and T. Iwata,
editors, Advances in Cryptology – ASIACRYPT 2014, Part 1, volume 8873 of Lecture
Notes in Comput. Sci., pages 21–41. Springer, Berlin, Heidelberg, 2014.
[708] C. Faure and L. Minder. Cryptanalysis of the McEliece cryptosystem over hyperel-
liptic codes. In Proc. 11th International Workshop on Algebraic and Combinatorial
Coding Theory, pages 99–107, Pamporovo, Bulgaria, June 2008.

[709] G. Fazekas and V. I. Levenshtein. On upper bounds for code distance and covering
radius of designs in polynomial metric spaces. J. Combin. Theory Ser. A, 70:267–288,
1995.
[710] J. Feldman. Decoding Error-Correcting Codes via Linear Programming. PhD thesis,
Massachusetts Institute of Technology, 2003.

[711] J. Feldman, M. J. Wainwright, and D. R. Karger. Using linear programming to


decode binary linear codes. IEEE Trans. Inform. Theory, 51:954–972, 2005.
[712] L. V. Felix and M. Firer. Canonical-systematic form for codes in hierarchical poset
metrics. Adv. Math. Commun., 6:315–328, 2012.
[713] G.-L. Feng and T. R. N. Rao. Decoding algebraic-geometric codes up to the designed
minimum distance. IEEE Trans. Inform. Theory, 39:37–45, 1993.
[714] K. Feng, S. Ling, and C. Xing. Asymptotic bounds on quantum codes from algebraic
geometry codes. IEEE Trans. Inform. Theory, 52:986–991, 2006.

[715] K. Feng and Z. Ma. A finite Gilbert-Varshamov bound for pure stabilizer quantum
codes. IEEE Trans. Inform. Theory, 50:3323–3325, 2004.
[716] K. Feng, L. Xu, and F. J. Hickernell. Linear error-block codes. Finite Fields Appl.,
12:638–652, 2006.

[717] T. Feng and Q. Xiang. Strongly regular graphs from unions of cyclotomic classes.
J. Combin. Theory Ser. B, 102:982–995, 2012.
[718] C. Fernández-Córdoba, J. Pujol, and M. Villanueva. On rank and kernel of Z4 -
linear codes. In Á. Barbero, editor, Coding Theory and Applications, volume 5228
of Lecture Notes in Comput. Sci., pages 46–55. Springer, Berlin, Heidelberg, 2008.

[719] C. Fernández-Córdoba, J. Pujol, and M. Villanueva. Z2 Z4 -linear codes: rank and


kernel. Des. Codes Cryptogr., 56:43–59, 2010.
[720] S. Ferret and L. Storme. Minihypers and linear codes meeting the Griesmer bound:
improvements to results of Hamada, Helleseth and Maekawa. Des. Codes Cryptogr.,
25:143–162, 2002.
[721] T. Feulner. The automorphism groups of linear codes and canonical representatives
of their semilinear isometry classes. Adv. Math. Commun., 3:363–383, 2009.
[722] T. Feulner. Classification and nonexistence results for linear codes with prescribed
minimum distances. Des. Codes Cryptogr., 70:127–138, 2014.

[723] T. Feulner and G. Nebe. The automorphism group of an extremal [72, 36, 16] code
does not contain Z7 , Z3 × Z3 , or D10 . IEEE Trans. Inform. Theory, 58:6916–6924,
2012.
[724] R. P. Feynman. Simulating physics with computers. Int. J. Theor. Phys., 21:467–488,
1982.
[725] C. M. Fiduccia and Y. Zalcstein. Algebras having linear multiplicative complexities.
J. ACM, 24:311–331, 1977.
[726] F. Fiedler and M. Klin. A strongly regular graph with the parameters
(512, 73, 438, 12, 10) and its dual graph. Preprint MATH-AL-7-1998, Technische Uni-
versität Dresden, 23 pages, July 1998.
[727] J. E. Fields, P. Gaborit, W. C. Huffman, and V. S. Pless. On the classification of
extremal even formally self-dual codes. Des. Codes Cryptogr., 18:125—-148, 1999.
[728] J. E. Fields, P. Gaborit, W. C. Huffman, and V. S. Pless. On the classification of
extremal even formally self-dual codes of lengths 20 and 22. Discrete Appl. Math.,
111:75—-86, 2001.
[729] M. Finiasz, P. Gaborit, and N. Sendrier. Improved fast syndrome based crypto-
graphic hash functions. In V. Rijmen, editor, ECRYPT Hash Workshop, 2007.
[730] M. Finiasz and N. Sendrier. Security bounds for the design of code-based cryptosys-
tems. In M. Matsui, editor, Advances in Cryptology – ASIACRYPT 2009, volume
5912 of Lecture Notes in Comput. Sci., pages 88–105. Springer, Berlin, Heidelberg,
2009.
[731] M. Firer, M. M. S. Alves, J. A. Pinheiro, and L. Panek. Poset Codes: Partial Orders,
Metrics and Coding Theory. SpringerBriefs in Mathematics. Springer, Cham, 2018.
[732] M. Firer and J. L. Walker. Matched metrics and channels. IEEE Trans. Inform.
Theory, 62:1150–1156, 2016.
[733] J.-B. Fischer and J. Stern. An efficient pseudo-random generator provably as secure
as syndrome decoding. In U. Maurer, editor, Advances in Cryptology – EUROCRYPT
’96, volume 1070 of Lecture Notes in Comput. Sci., pages 245–255. Springer, Berlin,
Heidelberg, 1996.
[734] J. L. Fisher and S. K. Sehgal. Principal ideal group rings. Comm. Algebra, 4:319–325,
1976.
[735] N. L. Fogarty. On Skew-Constacyclic Codes. PhD thesis, University of Kentucky,
2016.
[736] N. L. Fogarty and H. Gluesing-Luerssen. A circulant approach to skew-constacyclic
codes. Finite Fields Appl., 35:92–114, 2015.
[737] M. A. Forbes and S. Yekhanin. On the locality of codeword symbols in non-linear
codes. Discrete Math., 324:78–84, 2014.
[738] L. R. Ford, Jr. and D. R. Fulkerson. Maximal flow through a network. Canad. J.
Math., 8:399–404, 1956.
[739] E. Fornasini and G. Marchesini. Structure and properties of two dimensional systems.
In S. G. Tzafestas, editor, Multidimensional Systems, Techniques and Applications,
pages 37–88. CRC Press, Boca Raton, Florida, 1986.
[740] G. D. Forney, Jr. Convolutional codes I: algebraic structure. IEEE Trans. Inform.
Theory, 16:720–738, 1970.
[741] G. D. Forney, Jr. Correction to: “Convolutional codes I: algebraic structure” [IEEE
Trans. Inform. Theory 16:720–738, 1970]. IEEE Trans. Inform. Theory, 17:360,
1971.
[742] G. D. Forney, Jr. Structural analysis of convolutional codes via dual codes. IEEE
Trans. Inform. Theory, 19:512–518, 1973.
[743] G. D. Forney, Jr. Convolutional codes II: maximum-likelihood decoding. Inform.
and Control, 25:222–266, 1974.
[744] G. D. Forney, Jr. Codes on graphs: normal realizations. IEEE Trans. Inform. Theory,
47:520–548, 2001.
[745] G. D. Forney, Jr., R. G. Gallager, G. R. Lang, F. M. Longstaff, and S. U. Qureshi.
Efficient modulation for band-limited channels. IEEE J. Selected Areas Commun.,
2:632–647, 1984.
[746] G. D. Forney, Jr., M. Grassl, and S. Guha. Convolutional and tail-biting quantum
error-correcting codes. IEEE Trans. Inform. Theory, 53:865–880, 2007.
[747] G. D. Forney, Jr. and L.-F. Wei. Multidimensional constellations I: Introduction, fig-
ures of merit, and generalized cross constellations. IEEE J. Selected Areas Commun.,
7:877–892, 1989.
[748] G. J. Foschini and M. J. Gans. On limits of wireless communication in a fading
environment when using multiple antennas. Wireless Personal Communications,
6:311–335, 1998.
[749] D. A. Foulser and M. J. Kallaher. Solvable, flag-transitive, rank 3 collineation groups.
Geom. Dedicata, 7:111–130, 1978.

[750] C. Fragouli and E. Soljanin. Network coding fundamentals. Found. Trends Network-
ing, 2:1–133, 2007.
[751] J. B. Fraleigh. A First Course in Abstract Algebra. Addison-Wesley, New York, 7th
edition, 2003.
[752] P. Frankl and N. Tokushige. Invitation to intersection problems for finite sets. J.
Combin. Theory Ser. A, 144:157–211, 2016.
[753] P. Frankl and R. M. Wilson. The Erdős-Ko-Rado theorem for vector spaces. J.
Combin. Theory Ser. A, 43:228–236, 1986.
[754] H. Fredricksen. Generation of the Ford sequence of length 2n , n large. J. Combina-
torial Theory Ser. A, 12:153–154, 1972.
[755] H. Fredricksen. A survey of full length nonlinear shift register cycle algorithms.
SIAM Rev., 24:195–221, 1982.
[756] H. Fredricksen and I. J. Kessler. An algorithm for generating necklaces of beads in
two colors. Discrete Math., 61:181–188, 1986.

[757] H. Fredricksen and J. Maiorana. Necklaces of beads in k colors and k-ary de Bruijn
sequences. Discrete Math., 23:207–210, 1978.
[758] W. Fulton. Algebraic Curves. Advanced Book Classics. Addison-Wesley Publishing
Company, Advanced Book Program, Redwood City, California, 1989. An introduc-
tion to algebraic geometry. Notes written with the collaboration of Richard Weiss;
reprint of 1969 original.
[759] È. M. Gabidulin. Combinatorial metrics in coding theory. In B. N. Petrov and
F. Csádki, editors, Proc. 2nd IEEE International Symposium on Information The-
ory, Tsahkadsor, Armenia, USSR, September 2-8, 1971, pages 169–176. Akadémiai
Kiadó, Budapest, 1973.
[760] È. M. Gabidulin. Theory of codes with maximum rank distance (in Russian). Prob-
lemy Peredači Informacii, 21(1):3–16, 1985 (English translation in Probl. Inform.
Transm., 21(1):1–12, 1985).
[761] È. M. Gabidulin. Rank q-cyclic and pseudo-q-cyclic codes. In Proc. IEEE Interna-
tional Symposium on Information Theory, pages 2799–2802, Seoul, Korea, June-July
2009.
[762] È. M. Gabidulin. A brief survey of metrics in coding theory. Math. Distances and
Appl., 66:66–84, 2012.
[763] È. M. Gabidulin and M. Bossert. Hard and soft decision decoding of phase ro-
tation invariant block codes. In Proc. International Zurich Seminar on Broadband
Communications: Accessing, Transmission, Networking. (Cat. No.98TH8277), pages
249–251, February 1998.

[764] È. M. Gabidulin and M. Bossert. Codes for network coding. In F. R. Kschischang and
E.-H. Yang, editors, Proc. IEEE International Symposium on Information Theory,
pages 867–870, Toronto, Canada, July 2008.
[765] È. M. Gabidulin and V. A. Obernikhin. Codes in the Vandermonde F-metric and
their application (in Russian). Problemy Peredači Informacii, 39(2):3–14, 2003. (En-
glish translation in Probl. Inform. Transm., 39(2):159–169, 2003).
[766] È. M. Gabidulin, A. V. Paramonov, and O. V. Tretjakov. Ideals over a non-
commutative ring and their application in cryptology. In D. W. Davies, editor,
Advances in Cryptology – EUROCRYPT ’91, volume 547 of Lecture Notes in Com-
put. Sci., pages 482–489. Springer, Berlin, Heidelberg, 1991.
[767] È. M. Gabidulin and J. Simonis. Metrics generated by families of subspaces. IEEE
Trans. Inform. Theory, 44:1336–1341, 1998.
[768] È. M. Gabidulin and J. Simonis. Perfect codes for metrics generated by primitive
2-error-correcting binary BCH codes. In Proc. IEEE International Symposium on
Information Theory, page 68, Cambridge, Massachussets, August 1998.
[769] P. Gaborit. Shorter keys for code based cryptography. In Proc. 4th International
Workshop on Coding and Cryptography, Book of Extended Abstracts, pages 81–91,
Bergen, Norway, March 2005. https://www.unilim.fr/pages\_perso/philippe.
gaborit/shortIC.ps.
[770] P. Gaborit and C. Aguilar-Melchor. Cryptographic method for communicating
confidential information. https://patents.google.com/patent/EP2537284B1/en,
2010.
[771] P. Gaborit and M. Girault. Lightweight code-based identification and signature. In
Proc. IEEE International Symposium on Information Theory, pages 191–195, Nice,
France, June 2007.
[772] P. Gaborit, A. Hauteville, and J.-P. Tillich. RankSynd: a PRNG based on rank
metric. In T. Takagi, editor, Post-Quantum Cryptography, volume 9606 of Lecture
Notes in Comput. Sci., pages 18–28. Springer, Berlin, Heidelberg, 2016.

[773] P. Gaborit, C. Lauradoux, and N. Sendrier. SYND: a fast code-based stream cipher
with a security reduction. In Proc. IEEE International Symposium on Information
Theory, pages 186–190, Nice, France, June 2007.
[774] P. Gaborit, G. Murat, O. Ruatta, and G. Zémor. Low rank parity check codes and
their application to cryptography. In Proc. 8th International Workshop on Coding
and Cryptography, Bergen, Norway, April 2013.

[775] P. Gaborit, O. Ruatta, and J. Schrek. On the complexity of the rank syndrome
decoding problem. IEEE Trans. Inform. Theory, 62:1006–1019, 2016.
[776] P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor. RankSign: an efficient signature
algorithm based on the rank metric. In M. Mosca, editor, Post-Quantum Cryptogra-
phy, volume 8772 of Lecture Notes in Comput. Sci., pages 88–107. Springer, Berlin,
Heidelberg, 2014; extended version at arXiv:1606.00629 [cs.CR].
[777] P. Gaborit and J. Schrek. Efficient code-based one-time signature from automor-
phism groups with syndrome compatibility. In Proc. IEEE International Symposium
on Information Theory, pages 1982–1986, Cambridge, Massachussets, July 2012.
[778] P. Gaborit, J. Schrek, and G. Zémor. Full cryptanalysis of the Chen identification
protocol. In B.-Y. Yang, editor, Post-Quantum Cryptography, volume 7071 of Lecture
Notes in Comput. Sci., pages 35–50. Springer, Berlin, Heidelberg, 2011.
[779] P. Gaborit and G. Zémor. Asymptotic improvement of the Gilbert-Varshamov bound
for linear codes. IEEE Trans. Inform. Theory, 54:3865–3872, 2008.
[780] P. Gaborit and G. Zémor. On the hardness of the decoding and the minimum distance
problems for rank codes. IEEE Trans. Inform. Theory, 62:7245–7252, 2016.
[781] D. Gabric, J. Sawada, A. Williams, and D. Wong. A framework for constructing de
Bruijn sequences via simple successor rules. Discrete Math., 341:2977–2987, 2018.
[782] M. Gadouleau and Z. Yan. MacWilliams identities for the rank metric. In Proc.
IEEE International Symposium on Information Theory, pages 36–40, Nice, France,
June 2007.
[783] M. Gadouleau and Z. Yan. Packing and covering properties of rank metric codes.
IEEE Trans. Inform. Theory, 54:3873–3883, 2008.
[784] C. Galindo, O. Geil, F. Hernando, and D. Ruano. Improved constructions of nested
code pairs. IEEE Trans. Inform. Theory, 64:2444–2459, 2018.
[785] C. Galindo, O. Geil, F. Hernando, and D. Ruano. New binary and ternary LCD
codes. IEEE Trans. Inform. Theory, 65:1008–1016, 2019.
[786] C. Galindo, F. Hernando, and R. Matsumoto. Quasi-cyclic constructions of quantum
codes. Finite Fields Appl., 52:261–280, 2018.
[787] R. G. Gallager. Low Density Parity Check Codes. M.I.T. Press, Cambridge, Mas-
sachusetts, 1963.

[788] F. R. Gantmacher. The Theory of Matrices, volume I. AMS Chelsea Publishing,


Providence, Rhode Island, 1977.
[789] J. Gao, L. Shen, and F.-W. Fu. A Chinese remainder theorem approach to skew
generalized quasi-cyclic codes over finite fields. Cryptogr. Commun., 8:51–66, 2016.

[790] A. Garcı́a and H. Stichtenoth. A tower of Artin-Schreier extensions of function fields


attaining the Drinfeld-Vlăduţ bound. Invent. Math., 121:211–222, 1995.
[791] C. Garcı́a Pillado, S. González, V. T. Markov, C. Martı́nez, and A. A. Nechaev. When
are all group codes of a noncommutative group abelian (a computational approach)?
J. Math. Sci. (N. Y.), 186:578–585, 2012.

[792] C. Garcı́a Pillado, S. González, V. T. Markov, C. Martı́nez, and A. A. Nechaev. New


examples of non-abelian group codes. Adv. Math. Commun., 10:1–10, 2016.
[793] C. Garcı́a Pillado, S. González, C. Martı́nez, V. T. Markov, and A. A. Nechaev.
Group codes over non-abelian groups. J. Algebra Appl., 12(7):1350037, 20, 2013.
[794] G. Garg, T. Helleseth, and P. V. Kumar. Recent advances in low-correlation se-
quences. In V. Tarokh, editor, New Directions in Wireless Communications Research,
pages 63–92. Springer, Boston, Massachusetts, 2009.
[795] B. Gärtner and J. Matoušek. Approximation Algorithms and Semidefinite Program-
ming. Springer, Heidelberg, 2012.
[796] A. Gaur and B. D. Sharma. Codes correcting limited patterns of random error using
SK-metric. Cybern. Inf. Technol., 13:34–45, 2013.
[797] A. Gaur and B. D. Sharma. Upper bound on correcting partial random errors.
Cybern. Inf. Technol., 13:41–49, 2013.
[798] G. Ge, Q. Xiang, and T. Yuan. Constructions of strongly regular Cayley graphs
using index four Gauss sums. J. Algebraic Combin., 37:313–329, 2013.
[799] O. Geil, R. Matsumoto, and D. Ruano. Feng-Rao decoding of primary codes. Finite
Fields Appl., 23:35–52, 2013.
[800] C. Gentry, C. Peikert, and V. Vaikuntanathan. Trapdoors for hard lattices and new
cryptographic constructions. In Proc. 40th Annual ACM Symposium on the Theory
of Computing, pages 197–206, Victoria, British Columbia, Canada, May 2008.
[801] D. N. Gevorkyan, A. M. Avetisyan, and G. A. Tigranyan. On the structure of two-
error-correcting in Hamming metric over Galois fields (in Russian). In Computational
Techniques, volume 3, pages 19–21. Kuibyshev, 1975.
[802] M. Giesbrecht. Factoring in skew-polynomial rings over finite fields. J. Symbolic
Comput., 26:463–486, 1998.
[803] D. C. Gijswijt. Block diagonalization for algebras associated with block codes.
arXiv:0910.4515 [math.OC], October 2009.
[804] D. C. Gijswijt, H. D. Mittelmann, and A. Schrijver. Semidefinite code bounds based
on quadruple distances. IEEE Trans. Inform. Theory, 58:2697–2705, 2012.
[805] D. C. Gijswijt, A. Schrijver, and H. Tanaka. New upper bounds for nonbinary codes
based on the Terwilliger algebra and semidefinite programming. J. Combin. Theory
Ser. A, 113:1719–1731, 2006.
[806] E. N. Gilbert. A comparison of signaling alphabets. Bell System Tech. J., 31:504–522,
1952. (Also reprinted in [169] pages 14–19 and [212] pages 24–42).
[807] H. Gluesing-Luerssen and B. Langfeld. A class of one-dimensional MDS convolutional
codes. J. Algebra Appl., 5:505–520, 2006.
[808] H. Gluesing-Luerssen, K. Morrison, and C. Troha. Cyclic orbit codes and stabilizer
subfields. Adv. Math. Commun., 9:177–197, 2015.
[809] H. Gluesing-Luerssen, J. Rosenthal, and R. Smarandache. Strongly-MDS convolu-
tional codes. IEEE Trans. Inform. Theory, 52:584–598, 2006.
[810] D. G. Glynn. Two new sequences of ovals in finite Desarguesian planes of even
order. In L. R. A. Casse, editor, Combinatorial Mathematics X, volume 1036 of
Lecture Notes in Math., pages 217–229. Springer, Berlin, Heidelberg, 1983.
[811] D. G. Glynn. The nonclassical 10-arc of PG(4, 9). Discrete Math., 59:43–51, 1986.

[812] I. Gnana Sudha and R. S. Selvaraj. Codes with a pomset metric and constructions.
Des. Codes Cryptogr., 86:875–892, 2018.
[813] C. D. Godsil. Polynomial spaces. Discrete Math., 73:71–88, 1988.
[814] C. D. Godsil. Algebraic Combinatorics. Chapman and Hall Mathematics Series.
Chapman & Hall, New York, 1993.
[815] N. Goela, E. Abbe, and M. Gastpar. Polar codes for broadcast channels. IEEE
Trans. Inform. Theory, 61:758–782, 2015.
[816] J.-M. Goethals. Two dual families of nonlinear binary codes. Electron. Lett., 10:471–
472, 1974.
[817] J.-M. Goethals. The extended Nadler code is unique. IEEE Trans. Information
Theory, 23:132–135, 1977.
[818] J.-M. Goethals and P. Delsarte. On a class of majority-logic decodable cyclic codes.
IEEE Trans. Inform. Theory, 14:182–188, 1968.

[819] J.-M. Goethals and J. J. Seidel. Strongly regular graphs derived from combinatorial
designs. Canad. J. Math., 22:597–614, 1970.
[820] M. J. E. Golay. Notes on digital coding. Proc. IRE, 37:657, 1949. (Also reprinted in
[169] page 13 and [212] page 9).

[821] R. Gold. Optimal binary sequences for spread spectrum multiplexing. IEEE Trans.
Inform. Theory, 13:619–621, 1967.
[822] R. Gold. Maximal recursive sequences with 3-valued recursive cross-correlation func-
tions. IEEE Trans. Inform. Theory, 14:154–156, 1968.

[823] D. Goldin and D. Burshtein. Improved bounds on the finite length scaling of polar
codes. IEEE Trans. Inform. Theory, 60:6966–6978, 2014.
[824] S. W. Golomb. Shift Register Sequences. World Scientific, Hackensack, New Jersey,
3rd edition, 2017.
[825] S. W. Golomb and G. Gong. Signal Design for Good Correlation: For Wireless
Communication, Cryptography, and Radar. Cambridge University Press, Cambridge,
UK, 2005.
[826] S. W. Golomb and E. C. Posner. Rook domains, Latin squares, affine planes, and
error-distributing codes. IEEE Trans. Inform. Theory, 10:196–208, 1964.

[827] J. Gómez-Torrecillas, F. J. Lobillo, and G. Navarro. Peterson-Gorenstein-Zierler


algorithm for skew RS codes. Linear Multilinear Algebra, 66:469–487, 2018.
[828] J. Gómez-Torrecillas, F. J. Lobillo, G. Navarro, and A. Neri. Hartmann-Tzeng bound
and skew cyclic codes of designed Hamming distance. Finite Fields Appl., 50:84–112,
2018.

[829] P. Gopalan, C. Huang, B. Jenkins, and S. Yekhanin. Explicit maximally recoverable


codes with locality. IEEE Trans. Inform. Theory, 60:5245–5256, 2014.
[830] P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin. On the locality of codeword
symbols. IEEE Trans. Inform. Theory, 58:6925–6934, 2012.
[831] S. Goparaju and A. R. Calderbank. Binary cyclic codes that are locally repairable.
In Proc. IEEE International Symposium on Information Theory, pages 676–680,
Honolulu, Hawaii, June-July 2014.
[832] S. Goparaju, A. Fazeli, and A. Vardy. Minimum storage regenerating codes for all
parameters. IEEE Trans. Inform. Theory, 63:6318–6328, 2017.
[833] S. Goparaju, I. Tamo, and A. R. Calderbank. An improved sub-packetization bound
for minimum storage regenerating codes. IEEE Trans. Inform. Theory, 60:2770–
2779, 2014.

[834] V. D. Goppa. A new class of linear correcting codes (in Russian). Problemy
Peredači Informacii, 6(3):24–30, 1970 (English translation in Probl. Inform. Transm.,
6(3):207–212, 1970).
[835] V. D. Goppa. Rational representation of codes and (L, g)-codes (in Russian). Prob-
lemy Peredači Informacii, 7(3):41–49, 1971 (English translation in Probl. Inform.
Transm., 7(3):223–229, 1971).
[836] V. D. Goppa. Codes associated with divisors (in Russian). Problemy Peredači Infor-
macii, 13(1):33–39, 1977 (English translation in Probl. Inform. Transm., 13(1):22–27,
1977).
[837] V. D. Goppa. Codes on algebraic curves (in Russian). Dokl. Akad. Nauk SSSR,
259:1289–1290, 1981.
[838] V. D. Goppa. Algebraic-geometric codes (in Russian). Izv. Akad. Nauk SSSR Ser.
Mat., 46(4):762–781, 896, 1982 (English translation in Mathematics of the USSR-
Izvestiya, 21(1):75–91, 1983).
[839] B. Gordon, W. H. Mills, and L. R. Welch. Some new difference sets. Canadian J.
Math., 14:614–625, 1962.
[840] D. C. Gorenstein and N. Zierler. A class of error-correcting codes in pm symbols. J.
Soc. Indust. Appl. Math., 9:207–214, 1961. (Also reprinted in [169] pages 87–89 and
[212] pages 194–201).
[841] E. Gorla, R. Jurrius, H. H. López, and A. Ravagnani. Rank-metric codes and q-
polymatroids. arXiv:1803.10844 [cs.IT], April 2019.
[842] E. Gorla and A. Ravagnani. Codes Endowed with the Rank Metric. In M. Greferath,
M. Pavčević, N. Silberstein, and M. Vázquez-Castro, editors, Network Coding and
Subspace Designs. Signals and Communication Technology, chapter 1, pages 3–23.
Springer, 2018.
[843] D. E. Gottesman. Stabilizer Codes and Quantum Error Correction. PhD thesis,
California Institute of Technology, 1997.
[844] R. L. Graham and F. J. MacWilliams. On the number of information symbols in
difference-set cyclic codes. Bell System Tech. J., 45:1057–1070, 1966.
[845] M. Grassl. Code tables: Bounds on the parameters of various types of codes. http:
//www.codetables.de.
[846] M. Grassl. Code tables: Bounds on the parameters of various types of codes. http:
//www.codetables.de. Accessed on 2020-07-05.
[847] M. Grassl. Code tables: Bounds on the parameters of various types of codes: Quan-
tum error-correcting codes. http://www.codetables.de. Accessed on 2020-02-20.
[848] M. Grassl. Variations on encoding circuits for stabilizer quantum codes. In Y. M.
Chee, Z. Guo, S. Ling, F. Shao, Y. Tang, H. Wang, and C. Xing, editors, Coding and
Cryptology, volume 6639 of Lecture Notes in Comput. Sci., pages 142–158. Springer,
Berlin, Heidelberg, 2011.
[849] M. Grassl, T. Beth, and M. Rotteler. On optimal quantum codes. Int. J. Quantum
Inform., 2:55–64, 2004.
[850] M. Grassl and M. Rötteler. Quantum MDS codes over small fields. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 1104–1108, Hong Kong, China,
June 2015.
[851] M. Greferath. Cyclic codes over finite rings. Discrete Math., 177:273–277, 1997.
[852] M. Greferath, M. Pavčević, N. Silberstein, and M. Á. Vázquez-Castro, editors.
Network Coding and Subspace Designs. Signals and Communication Technology.
Springer, Cham, 2018.
[853] M. Greferath and S. E. Schmidt. Gray isometries for finite chain rings and a nonlinear
ternary (36, 312 , 15) code. IEEE Trans. Inform. Theory, 45:2522–2524, 1999.
[854] M. Greferath and S. E. Schmidt. Finite-ring combinatorics and MacWilliams’ equiv-
alence theorem. J. Combin. Theory Ser. A, 92:17–28, 2000.
[855] J. H. Griesmer. A bound for error-correcting codes. IBM J. Research Develop.,
4:532–542, 1960.
[856] J. L. Gross and T. W. Tucker. Topological Graph Theory. Dover Publications, Inc.,
Mineola, NY, 2001.
[857] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial
Optimization. Springer-Verlag, Berlin, 1988.
[858] L. K. Grover. A fast quantum mechanical algorithm for database search. In Proc. 28th
Annual ACM Symposium on the Theory of Computing, pages 212–219, Phildelphia,
Pennsylvania, May 1996.
[859] K. Guenda, T. A. Gulliver, S. Jitman, and S. Thipworawimon. Linear `-intersection
pairs of codes and their applications. Des. Codes Cryptogr., 88:133–152, 2020.
[860] T. A. Gulliver. A new two-weight code and strongly regular graph. Appl. Math.
Lett., 9(2):17–20, 1996.
[861] T. A. Gulliver. Two new optimal ternary two-weight codes and strongly regular
graphs. Discrete Math., 149:83–92, 1996.
[862] T. A. Gulliver and V. K. Bhargava. Nine good rate (m − 1)/pm quasi-cyclic codes.
IEEE Trans. Inform. Theory, 38:1366–1369, 1992.
[863] T. A. Gulliver and V. K. Bhargava. New good rate (m − 1)/pm ternary and quater-
nary quasi-cyclic codes. Des. Codes Cryptogr., 7:223–233, 1996.
[864] T. A. Gulliver and M. Harada. Classification of extremal double circulant self-dual
codes of lengths 64 to 72. Des. Codes and Cryptogr., 13:257–269, 1998.
[865] T. A. Gulliver and M. Harada. Classification of extremal double circulant self-dual
codes of lengths 74–88. Discrete Math., 306:2064–2072, 2006.
[866] T. A. Gulliver, M. Harada, and H. Miyabayashi. Double circulant and quasi-twisted
self-dual codes over F5 and F7 . Adv. Math. Commun., 1:223–238, 2007.

[867] T. A. Gulliver and P. R. J. Östergård. Binary optimal linear rate 1/2 codes. Discrete
Math., 283:255–261, 2004.
[868] C. Güneri and F. Özbudak. A bound on the minimum distance of quasi-cyclic codes.
SIAM J. Discrete Math., 26:1781–1796, 2012.

[869] C. Güneri and F. Özbudak. The concatenated structure of quasi-cyclic codes and an
improvement of Jensen’s bound. IEEE Trans. Inform. Theory, 59:979–985, 2013.
[870] C. Güneri, B. Özkaya, and S. Sayici. On linear complementary pair of nD cyclic
codes. IEEE Commun. Lett., 22:2404–2406, 2018.
[871] C. Güneri, B. Özkaya, and P. Solé. Quasi-cyclic complementary dual codes. Finite
Fields Appl., 42:67–80, 2016.
[872] C. Güneri, H. Stichtenoth, and İ. Taşkın. Further improvements on the designed
minimum distance of algebraic geometry codes. J. Pure Appl. Algebra, 213:87–97,
2009.
[873] A. Günther and G. Nebe. Automorphisms of doubly even self-dual binary codes.
Bull. Lond. Math. Soc., 41:769–778, 2009.
[874] Q. Guo, T. Johansson, and P. Stankovski. A key recovery attack on MDPC with CCA
security using decoding errors. In J. H. Cheon and T. Takagi, editors, Advances in
Cryptology – ASIACRYPT 2016, Part 1, volume 10031 of Lecture Notes in Comput.
Sci., pages 789–815. Springer, Berlin, Heidelberg, 2009.
[875] Gurobi Optimizer Reference Manual. gurobi.com.
[876] V. Guruswami. List Decoding of Error-Correcting Codes: Winning Thesis of the 2002
ACM Doctoral Dissertation Competition, volume 3282 of Lecture Notes in Comput.
Sci. Springer, Berlin, Heidelberg, 2005.
[877] V. Guruswami and W. Machmouchi. Explicit interleavers for a repeat accumulate
accumulate (RAA) code construction. In F. R. Kschischang and E.-H. Yang, edi-
tors, Proc. IEEE International Symposium on Information Theory, pages 1968–1972,
Toronto, Canada, July 2008.

[878] V. Guruswami and A. Rudra. Explicit codes achieving list decoding capacity: error-
correction with optimal redundancy. IEEE Trans. Inform. Theory, 54:135–150, 2008.
[879] V. Guruswami, A. Rudra, and M. Sudan. Essential Coding Theory. Draft
available at https://cse.buffalo.edu/faculty/atri/courses/coding-theory/
book/web-coding-book.pdf, 2012.
[880] V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-
geometry codes. IEEE Trans. Inform. Theory, 45:1757–1767, 1999.
[881] V. Guruswami and C. Wang. Linear-algebraic list decoding for variants of Reed-
Solomon codes. IEEE Trans. Inform. Theory, 59:3257–3268, 2013.
[882] V. Guruswami and M. Wootters. Repairing Reed-Solomon codes. IEEE Trans.
Inform. Theory, 63:5684–5698, 2017.
[883] V. Guruswami and P. Xia. Polar codes: speed of polarization and polynomial gap to
capacity. IEEE Trans. Inform. Theory, 61:3–16, 2015.

[884] L. Guth and N. H. Katz. Algebraic methods in discrete analogs of the Kakeya
problem. Adv. Math., 225:2828–2839, 2010.
[885] L. Guth and N. H. Katz. On the Erdős distinct distances problem in the plane. Ann.
of Math. (2), 181:155–190, 2015.

[886] J. Hagenauer, E. Offer, and L. Papke. Iterative decoding of binary block and con-
volutional codes. IEEE Trans. Inform. Theory, 42:429–445, 1996.
[887] M. Hall, Jr. A survey of difference sets. Proc. Amer. Math. Soc., 7:975–986, 1956.
[888] M. Hall, Jr. Combinatorial Theory. Blaisdell Publishing Company, 1967.
[889] N. Hamada. On the p-rank of the incidence matrix of a balanced or partially balanced
incomplete block design and its application to error correcting codes. Hiroshima
Math. J., 3:154–226, 1973.
[890] N. Hamada and M. Deza. A survey of recent works with respect to a characterization
of an (n, k, d; q)-code meeting the Griesmer bound using a min·hyper in a finite
projective geometry. Discrete Math., 77:75–87, 1989.
[891] N. Hamada and T. Helleseth. Arcs, blocking sets, and minihypers. Comput. Math.
Appl., 39:159–168, 2000.
[892] N. Hamada and H. Ohmori. On the BIB-design having the minimum p-rank. J.
Combin. Theory Ser. A, 18:131–140, 1975.
[893] Y. Hamdaoui and N. Sendrier. A non asymptotic analysis of information set decod-
ing. IACR Cryptology ePrint Archive, Report 2013/162, 2013. https://eprint.
iacr.org/2013/162, 2013.
[894] N. Hamilton. Strongly regular graphs from differences of quadrics. Discrete Math.,
256:465–469, 2002.
[895] R. W. Hamming. Error detecting and error correcting codes. Bell System Tech. J.,
29:10–23, 1950. (Also reprinted in [169] pages 9–12 and [212] pages 10–23).
[896] R. W. Hamming. Coding and Information Theory. Prentice Hall, Englewood Cliffs,
New Jersey, 2nd edition, 1986.
[897] A. R. Hammons and H. El Gamal. On the theory of space-time codes for PSK
modulation. IEEE Trans. Inform. Theory, 46:524–542, 2000.
[898] A. R. Hammons, Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Solé.
The Z4 -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans.
Inform. Theory, 40:301–319, 1994.
[899] J. Han and L. A. Lastras-Montano. Reliable memories with subline accesses. In
Proc. IEEE International Symposium on Information Theory, pages 2531–2535, Nice,
France, June 2007.
[900] J. P. Hansen. Codes on the Klein quartic, ideals, and decoding. IEEE Trans. Inform.
Theory, 33:923–925, 1987.
[901] J. P. Hansen. Group Codes on Algebraic Curves. Mathematica Gottingensis, heft 9,
1987.
[902] J. P. Hansen and H. Stichtenoth. Group codes on certain algebraic curves with many
rational points. Appl. Algebra Engrg. Comm. Comput., 1:67–77, 1990.
[903] J. Hao, S. T. Xia, and B. Chen. Some results on optimal locally repairable codes.
In Proc. IEEE International Symposium on Information Theory, pages 440–444,
Barcelona, Spain, July 2016.
[904] M. Harada. The existence of a self-dual [70, 35, 12] code and formally self-dual codes.
Finite Fields Appl., 3:131–139, 1997.
[905] M. Harada, T. A. Gulliver, and H. Kaneta. Classification of extremal double circulant
self-dual codes of length up to 62. Discrete Math., 188:127–136, 1998.
[906] M. Harada, W. H. Holzmann, H. Kharaghani, and M. Khorvash. Extremal ternary
self-dual codes constructed from negacirculant matrices. Graphs Combin., 23:401–
417, 2007.
[907] M. Harada, C. Lam, and V. D. Tonchev. Symmetric (4, 4)-nets and generalized
Hadamard matrices over groups of order 4. Des. Codes Cryptogr., 34:71–87, 2005.
[908] M. Harada and A. Munemasa. Database of self-dual codes. http://www.math.is.
tohoku.ac.jp/~munemasa/selfdualcodes.htm.
[909] M. Harada and A. Munemasa. A quasi-symmetric 2-(49, 9, 6) design. J. Combin.
Des., 10:173–179, 2002.
[910] M. Harada and A. Munemasa. Classification of self-dual codes of length 36. Adv.
Math. Commun., 6:229–235, 2012.
[911] M. Harada, E. Novak, and V. D. Tonchev. The weight distribution of the self-dual
[128, 64] polarity design code. Adv. Math. Commun., 10:643–648, 2016.
[912] M. Harada and P. R. J. Östergård. Classification of extremal formally self-dual even
codes of length 22. Graphs Combin., 18:507–516, 2002.
[913] J. Harshan, E. Viterbo, and J.-C. Belfiore. Practical encoders and decoders for
Euclidean codes from Barnes-Wall lattices. IEEE Trans. Commun., 61:4417–4427,
2013.
[914] C. R. P. Hartmann and K. K. Tzeng. Generalizations of the BCH bound. Inform.
and Control, 20:489–498, 1972.
[915] R. Hartshorne. Algebraic Geometry. Springer-Verlag, New York-Heidelberg, 1977.
Graduate Texts in Mathematics, No. 52.
[916] N. J. A. Harvey, D. R. Karger, and K. Murota. Deterministic network coding by
matrix completion. In Proc. 16th Annual ACM-SIAM Symposium on Discrete Algo-
rithms, pages 489–498, Vancouver, Canada, January 2005.
[917] S. A. Hashemi, C. Condo, and W. J. Gross. Fast and flexible successive-cancellation
list decoders for polar codes. IEEE Trans. Signal Process., 65:5756–5769, 2017.
[918] S. H. Hassani. Polarization and Spatial Coupling: Two Techniques to Boost Perfor-
mance. PhD thesis, École Polytechnique Fédérale de Lausanne, 2013.
[919] S. H. Hassani, K. Alishahi, and R. L. Urbanke. Finite-length scaling for polar codes.
IEEE Trans. Inform. Theory, 60:5875–5898, 2014.

[920] B. Hassibi and B. M. Hochwald. Cayley differential unitary space-time codes. IEEE
Trans. Inform. Theory, 48:1485–1503, 2002.
[921] B. Hassibi and B. M. Hochwald. High-rate codes that are linear in space and time.
IEEE Trans. Inform. Theory, 48:1804–1824, 2002.

[922] B. Hassibi and H. Vikalo. On the sphere decoding algorithm I. Expected complexity.
IEEE Trans. Signal Process., 53:2806–2818, 2005.
[923] J. Håstad. Clique is hard to approximate within n1− . Acta Math., 182:105–142,
1999.

[924] E. R. Hauge and T. Helleseth. De Bruijn sequences, irreducible codes and cyclotomy.
Discrete Math., 159:143–154, 1996.
[925] E. R. Hauge and J. Mykkeltveit. On the classification of de Bruijn sequences. Discrete
Math., 148:65–83, 1996.
[926] K. Haymaker, B. Malmskog, and G. L. Matthews. Locally recoverable codes with
availability t ≥ 2 from fiber products of curves. Adv. Math. Commun., 12:317–336,
2018.
[927] T. Head. Formal language theory and DNA: an analysis of the generative capacity
of specific recombinant behaviors. Bull. Math. Biol., 49:737–759, 1987.

[928] A. S. Hedayat, N. J .A. Sloane, and J. Stufken. Orthogonal Arrays. Springer Nature,
New York, 1999.
[929] O. Heden. A survey of perfect codes. Adv. Math. Commun., 2:223–247, 2008.
[930] O. Heden. On perfect codes over non prime power alphabets. In A. A. Bruen and
D. L. Wehlau, editors, Error-Correcting Codes, Finite Geometries and Cryptography,
volume 523 of Contemp. Math., pages 173–184. Amer. Math. Soc., Providence, Rhode
Island, 2010.
[931] O. Heden and C. Roos. The non-existence of some perfect codes over non-prime
power alphabets. Discrete Math., 311:1344–1348, 2011.

[932] W. Heise, T. Honold, and A. A. Nechaev. Weighted modules and representations of


codes. In Proc. 6th International Workshop on Algebraic and Combinatorial Coding
Theory, pages 123–129, Pskov, Russia, September 1998.
[933] M. Hell, T. Johansson, A. Maximov, and W. Meier. The Grain family of stream
ciphers. In M. Robshaw and O. Billet, editors, New Stream Cipher Designs, volume
4986 of Lecture Notes in Comput. Sci., pages 179–190. Springer, Berlin, Heidelberg,
2008.
[934] T. Helleseth. Some results about the cross-correlation function between two maximal
linear sequences. Discrete Math., 16:209–232, 1976.
[935] T. Helleseth. Nonlinear shift registers—a survey and challenges. In Algebraic Curves
and Finite Fields, volume 16 of Radon Ser. Comput. Appl. Math., pages 121–144.
De Gruyter, Berlin, 2014.
[936] T. Helleseth, L. Hu, A. Kholosha, X. Zeng, N. Li, and W. Jiang. Period-different m-
sequences with at most four-valued cross correlation. IEEE Trans. Inform. Theory,
55:3305–3311, 2009.
[937] T. Helleseth and A. Kholosha. Monomial and quadratic bent functions over the finite
fields of odd characteristic. IEEE Trans. Inform. Theory, 52:2018–2032, 2006.
[938] T. Helleseth and A. Kholosha. New binomial bent functions over the finite fields of
odd characteristic. IEEE Trans. Inform. Theory, 56:4646–4652, 2010.
[939] T. Helleseth, T. Kløve, and J. Mykkeltveit. The weight distribution of irreducible
cyclic codes with block lengths n1 ((q ` − 1)/n). Discrete Math., 18:179–211, 1977.
[940] T. Helleseth and P. V. Kumar. Sequences with Low Correlation. In V. S. Pless and
W. C. Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 21, pages
1765–1853. North-Holland, Amsterdam, 1998.
[941] T. Helleseth and P. Rosendahl. New pairs of m-sequences with 4-level cross-
correlation. Finite Fields Appl., 11:674–683, 2005.
[942] Z. L. Heng and C. Ding. A construction of q-ary linear codes with irreducible cyclic
codes. Des. Codes Cryptogr., 87:1087–1108, 2019.
[943] Z. L. Heng, C. Ding, and Z. Zhou. Minimal linear codes over finite fields. Finite
Fields Appl., 54:176–196, 2018.
[944] Z. L. Heng and Q. Yue. A class of binary linear codes with at most three weights.
IEEE Commun. Letters, 19:1488–1491, 2015.
[945] Z. L. Heng and Q. Yue. A class of q-ary linear codes derived from irreducible cyclic
codes. arXiv:1511.09174 [cs.IT], April 2016.
[946] F. Hergert. The equivalence classes of the Vasil’ev codes of length 15. In D. Jung-
nickel and K. Vedder, editors, Combinatorial Theory, volume 969 of Lecture Notes
in Math., pages 176–186. Springer-Verlag, Berlin, Heidelberg, 1982.
[947] A. O. Hero. Secure space-time communication. IEEE Trans. Inform. Theory,
49:3235–3249, 2003.
[948] D. Hertel. A note on the Kasami power function. Cryptology ePrint Archive, Report
2005/436, 2005. https://eprint.iacr.org/2005/436.
[949] M. Herzog and J. Schönheim. Group partition, factorization and the vector covering
problem. Canad. Math. Bull., 15:207–214, 1972.
[950] F. Hess. Computing Riemann-Roch spaces in algebraic function fields and related
topics. J. Symbolic Comput., 33:425–445, 2002.
[951] R. Hill. On the largest size of cap in S5, 3 . Atti Accad. Naz. Lincei Rend. Cl. Sci.
Fis. Mat. Nat. (8), 54:378–384 (1974), 1973.
[952] R. Hill. Caps and groups. In Colloquio Internazionale sulle Teorie Combinatorie
(Rome, 1973), Tomo II, pages 389–394. Atti dei Convegni Lincei, No. 17. Accad.
Naz. Lincei, Rome, 1976.
[953] R. Hill. An extension theorem for linear codes. Des. Codes Cryptogr., 17:151–157,
1999.
[954] R. Hill and E. Kolev. A survey of recent results on optimal linear codes. In Combina-
torial Designs and their Applications (Milton Keynes, 1997), volume 403 of Chapman
& Hall/CRC Res. Notes Math., pages 127–152. Chapman & Hall/CRC, Boca Raton,
Florida, 1999.
[955] R. Hill and H. N. Ward. A geometric approach to classifying Griesmer codes. Des.
Codes Cryptogr., 44:169–196, 2007.
[956] M. Hirotomo, M. Takita, and M. Morii. Syndrome decoding of symbol-pair codes.
In Proc. IEEE Information Theory Workshop, pages 162–166, Hobart, Tasmania,
November 2014.
[957] J. W. P. Hirschfeld. Rational curves on quadrics over finite fields of characteristic
two. Rend. Mat. (6), 4:773–795, 1971.
[958] J. W. P. Hirschfeld. Finite Projective Spaces of Three Dimensions. Oxford Math-
ematical Monographs. The Clarendon Press, Oxford University Press, New York,
1985. Oxford Science Publications.
[959] J. W. P. Hirschfeld. Projective Geometries over Finite Fields. Oxford Mathematical
Monographs. The Clarendon Press, Oxford University Press, New York, 2nd edition,
1998. Oxford Science Publications.
[960] J. W. P. Hirschfeld, G. Korchmáros, and F. Torres. Algebraic Curves Over a Fi-
nite Field. Princeton Series in Applied Mathematics. Princeton University Press,
Princeton, New Jersey, 2008.
[961] J. W. P. Hirschfeld and L. Storme. The packing problem in statistics, coding theory
and finite projective spaces: Update 2001. In Finite Geometries, volume 3 of Dev.
Math., pages 201–246. Kluwer Acad. Publ., Dordrecht, Netherlands, 2001.
[962] J. W. P. Hirschfeld and J. A. Thas. Open problems in finite projective spaces. Finite
Fields Appl., 32:44–81, 2015.
[963] J. W. P. Hirschfeld and J. A. Thas. General Galois Geometries. Springer Monographs
in Mathematics. Springer, London, 2016.
[964] T. Ho, M. Médard, R. Kötter, D. R. Karger, M. Effros, J. Shi, and B. Leong. A
random linear network coding approach to multicast. IEEE Trans. Inform. Theory,
52:4413–4430, 2006.
[965] S. A. Hobart. Bounds on subsets of coherent configurations. Michigan Math. J.,
58:231–239, 2009.
[966] S. A. Hobart and J. Williford. The absolute bound for coherent configurations.
Linear Algebra Appl., 440:50–60, 2014.
[967] B. M. Hochwald and T. L. Marzetta. Unitary space-time modulation for multiple-
antenna communications in Rayleigh flat fading. IEEE Trans. Inform. Theory,
46:543–564, 2000.
[968] A. Hocquenghem. Codes correcteurs d’erreurs. Chiffres (Paris), 2:147–156, 1959
(Also reprinted in [169] pages 72–74 and [212] pages 155–164).
[969] E. Hof and S. Shamai. Secrecy-achieving polar-coding for binary-input memoryless
symmetric wire-tap channels. arXiv:1005.2759 [cs.IT], August 2010.
[970] D. Hofheinz, K. Hövelmanns, and E. Kiltz. A modular analysis of the Fujisaki-
Okamoto transformation. In Y. Kalai and L. Reyzin, editors, Theory of Cryptography,
Part 1, volume 10677 of Lecture Notes in Comput. Sci., pages 341–371. Springer,
Berlin, Heidelberg, 2017.
[971] T. Høholdt and R. Pellikaan. On the decoding of algebraic-geometric codes. IEEE
Trans. Inform. Theory, 41:1589–1614, 1995.

[972] C. Hollanti, J. Lahtonen, and H.-F. Lu. Maximal orders in the design of dense
space-time lattice codes. IEEE Trans. Inform. Theory, 54:4493–4510, 2008.
[973] H. D. L. Hollmann. A relation between Levenshtein-type distances and insertion-and-
deletion correcting capabilities of codes. IEEE Trans. Inform. Theory, 39:1424–1427,
1993.

[974] H. D. L. Hollmann and Q. Xiang. A proof of the Welch and Niho conjectures on
cross-correlations of binary m-sequences. Finite Fields Appl., 7:253–286, 2001.
[975] Y. Hong. On the nonexistence of unknown perfect 6- and 8-codes in Hamming
schemes H(n, q) with q arbitrary. Osaka J. Math., 21:687–700, 1984.

[976] Y. Hong, E. Viterbo, and J.-C. Belfiore. Golden space-time trellis coded modulation.
IEEE Trans. Inform. Theory, 53:1689–1705, 2007.
[977] T. Honold, M. Kiermaier, and S. Kurz. Constructions and bounds for mixed-
dimension subspace codes. Adv. Math. Commun., 10:649–682, 2016.
[978] T. Honold and I. Landjev. Linear representable codes over chain rings. In Proc.
6th International Workshop on Algebraic and Combinatorial Coding Theory, pages
135–141, Pskov, Russia, September 1998.
[979] T. Honold and I. Landjev. Linearly representable codes over chain rings. Abh. Math.
Sem. Univ. Hamburg, 69:187–203, 1999.

[980] T. Honold and I. Landjev. Linear codes over finite chain rings. Electron. J. Combin.,
7:Research Paper 11, 22 pages, 2000.
[981] T. Honold and I. Landjev. Linear codes over finite chain rings and projective Hjelm-
slev geometries. In P. Solé, editor, Codes Over Rings, volume 6 of Series on Coding
Theory and Cryptology, pages 60–123. World Sci. Publ., Hackensack, New Jersey,
2009.
[982] S. Hoory, N. Linial, and A. Wigderson. Expander graphs and their applications.
Bull. Amer. Math. Soc. (N.S.), 43:439–561, 2006.
[983] N. J. Hopper and M. Blum. Secure human identification protocols. In C. Boyd,
editor, Advances in Cryptology – ASIACRYPT 2001, volume 2248 of Lecture Notes
in Comput. Sci., pages 52–66. Springer, Berlin, Heidelberg, 2001.
[984] A.-L. Horlemann-Trautmann and J. Rosenthal. Constructions of constant dimension
codes. In M. Greferath, M. Pavčević, N. Silberstein, and M. Á. Vázquez-Castro, edi-
tors, Network Coding and Subspace Designs. Signals and Communication Technology,
pages 25–42. Springer, Cham, 2018.
[985] A. Hottinen, O. Tirkkonen, and R. Wichman. Multi-Antenna Transceiver Techniques
for 3G and Beyond. John Wiley & Sons, Ltd., Chichester, UK, 2003.
[986] X.-D. Hou. A note on the proof of Niho’s conjecture. SIAM J. Discrete Math.,
18:313–319, 2004.
[987] X.-D. Hou, S. R. López-Permouth, and B. R. Parra-Avila. Rational power series,
sequential codes and periodicity of sequences. J. Pure Appl. Algebra, 213:1157–1169,
2009.
[988] S. K. Houghten. A table of bounds on optimal variable-length binary edit-metric
codes. https://www.cosc.brocku.ca/~houghten/binaryeditvar.html.
[989] S. K. Houghten. A table of bounds on optimal variable-length ternary edit-metric
codes. https://www.cosc.brocku.ca/~houghten/ternaryeditvar.html.
[990] S. K. Houghten, D. Ashlock, and J. Lenarz. Construction of optimal edit met-
ric codes. In Proc. IEEE Information Theory Workshop, pages 259–263, Chengdu,
China, October 2006.
[991] S. K. Houghten, C. W. H. Lam, L. H. Thiel, and J. A. Parker. The extended quadratic
residue code is the only (48, 24, 12) self-dual doubly-even code. IEEE Trans. Inform.
Theory, 49:53–59, 2003.
[992] Y. Hu, Y. Xu, X. Wang, C. Zhan, and P. Li. Cooperative recovery of distributed
storage systems from multiple losses with network coding. IEEE J. Selected Areas
Commun., 28:268–276, 2010.
[993] L. K. Hua. A theorem on matrices over a field and its applications. Acta Math.
Sinica, 1:109–163, 1951.
[994] C. Huang, M. Chen, and J. Li. Pyramid codes: flexible schemes to trade space for
access efficiency in reliable data storage systems. In Proc. 6th IEEE International
Symposium on Network Computing and Applications, pages 79–86, Cambridge, Mas-
sachusetts, July 2007.
[995] C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin.
Erasure coding in Windows Azure Storage. In Proc. USENIX Annual Technical
Conference (ATC), pages 15–26, Boston, Massachusetts, June 2012.
[996] P. Huang, E. Yaakobi, H. Uchikawa, and P. H. Siegel. Cyclic linear binary locally
repairable codes. In Proc. IEEE Information Theory Workshop, pages 259–263,
Jerusalem, Israel, April-May 2015.
[997] K. Huber. Codes over Eisenstein-Jacobi integers. Contemp. Math., 168:165–165,
1994.
[998] K. Huber. Codes over Gaussian integers. IEEE Trans. Inform. Theory, 40:207–216,
1994.
[999] W. C. Huffman. Automorphisms of codes with applications to extremal doubly-even
codes of length 48. IEEE Trans. Inform. Theory, 28:511–521, 1982.
[1000] W. C. Huffman. Decomposing and shortening codes using automorphisms. IEEE
Trans. Inform. Theory, 32:833–836, 1986.
[1001] W. C. Huffman. On extremal self-dual quaternary codes of lengths 18 to 28, I. IEEE
Trans. Inform. Theory, 36:651–660, 1990.
[1002] W. C. Huffman. The automorphism groups of the generalized quadratic residue
codes. IEEE Trans. Inform. Theory, 41:378–386, 1995.

[1003] W. C. Huffman. Characterization of quaternary extremal codes of lengths 18 and


20. IEEE Trans. Inform. Theory, 43:1613–1616, 1997.
[1004] W. C. Huffman. Decompositions and extremal Type II codes over Z4 . IEEE Trans.
Inform. Theory, 44:800–809, 1998.

[1005] W. C. Huffman. On the classification and enumeration of self-dual codes. Finite


Fields Appl., 11:451–490, 2005.
[1006] W. C. Huffman. Additive self-dual codes over F4 with an automorphism of odd
prime order. Adv. Math. Commun., 1:357–398, 2007.

[1007] W. C. Huffman. Self-dual codes over F2 + uF2 with an automorphism of odd order.
Finite Fields Appl., 15:277–293, 2009.
[1008] W. C. Huffman and V. S. Pless. Fundamentals of Error-Correcting Codes. Cambridge
University Press, Cambridge, UK, 2003.

[1009] W. C. Huffman and V. D. Tonchev. The existence of extremal self-dual [50, 25, 10]
codes and quasi-symmetric 2-(49, 9, 6) designs. Des. Codes Cryptogr., 6:97–106, 1995.
[1010] W. C. Huffman and V. Y. Yorgov. A [72, 36, 16] doubly even code does not have an
automorphism of order 11. IEEE Trans. Inform. Theory, 33:749–752, 1987.
[1011] B. L. Hughes. Differential space-time modulation. IEEE Trans. Inform. Theory,
46:2567–2578, 2000.
[1012] G. Hughes. Structure theorems for group ring codes with an application to self-dual
codes. Des. Codes Cryptogr., 24:5–14, 2001.
[1013] B. Huppert and N. Blackburn. Finite Groups II, volume 242 of Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences].
Springer-Verlag, Berlin-New York, 1982.
[1014] R. Hutchinson. The existence of strongly MDS convolutional codes. SIAM J. Control
Optim., 47:2812–2826, 2008.
[1015] R. Hutchinson, J. Rosenthal, and R. Smarandache. Convolutional codes with maxi-
mum distance profile. Systems Control Lett., 54:53–63, 2005.
[1016] J. Y. Hyun and H. K. Kim. The poset structures admitting the extended binary
Hamming code to be a perfect code. Discrete Math., 288:37–47, 2004.
[1017] J. Y. Hyun, H. K. Kim, and J. Rye Park. The weighted poset metrics and directed
graph metrics. arXiv:1703.00139 [math.CO], March 2017.
[1018] J. Y. Hyun, J. Lee, and Y. Lee. Explicit criteria for construction of plateaued
functions. IEEE Trans. Inform. Theory, 62:7555–7565, 2016.
[1019] J. Y. Hyun and Y. Lee. MDS poset-codes satisfying the asymptotic Gilbert-
Varshamov bound in Hamming weights. IEEE Trans. Inform. Theory, 57:8021–8026,
2011.
[1020] IBM ILOG CPLEX Optimization Studio. ibm.com.
[1021] Y. Ihara. Some remarks on the number of rational points of algebraic curves over
finite fields. J. Fac. Sci. Univ. Tokyo Sect. IA Math., 28:721–724 (1982), 1981.
[1022] T. Ikuta and A. Munemasa. A new example of non-amorphous association schemes.
Contrib. Discrete Math., 3(2):31–36, 2008.
[1023] T. Ikuta and A. Munemasa. Pseudocyclic association schemes and strongly regular
graphs. European J. Combin., 31:1513–1519, 2010.
[1024] S. P. Inamdar and N. S. Narasimha Sastry. Codes from Veronese and Segre embed-
dings and Hamada’s formula. J. Combin. Theory Ser. A, 96:20–30, 2001.
[1025] L. Ioffe and M. Mézard. Asymmetric quantum error-correcting codes. Physical
Review A, 75(3):032345, March 2007.
[1026] Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Zero-knowledge proofs from
secure multiparty computation. SIAM J. Comput., 39:1121–1152, 2009.
[1027] W. A. Jackson, K. M. Martin, and C. M. O’Keefe. Multi-secret sharing schemes.
In Y. G. Desmedt, editor, Advances in Cryptology – CRYPTO ’94, volume 839 of
Lecture Notes in Comput. Sci., pages 150–163. Springer, Berlin, Heidelberg, 1994.
[1028] N. Jacobson. The Theory of Rings, volume II of Amer. Math. Soc. Mathematical
Surveys. Amer. Math. Soc., New York, 1943.
[1029] N. Jacobson. Finite-Dimensional Division Algebras over Fields. Springer-Verlag,
Berlin, 1996.
[1030] H. Jafarkhani. A quasi-orthogonal space-time block code. IEEE Trans. Commun.,
49:1–4, 2001.
[1031] D. B. Jaffe. Optimal binary linear codes of length ≤ 30. Discrete Math., 223:135–155,
2000.
[1032] D. B. Jaffe and J. Simonis. New binary linear codes which are dual transforms of
good codes. IEEE Trans. Inform. Theory, 45:2136–2137, 1999.
[1033] D. B. Jaffe and V. D. Tonchev. Computing linear codes and unitals. Des. Codes
Cryptogr., 14:39–52, 1998.
[1034] S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. M. G. M.
Tolhuizen. Polynomial time algorithms for multicast network code construction.
IEEE Trans. Inform. Theory, 51:1973–1982, 2005.
[1035] Y. Jang and J. Park. On a MacWilliams type identity and a perfectness for a binary
linear (n, n − 1, j)-poset code. Discrete Math., 265:85–104, 2003.
[1036] C. J. A. Jansen, W. G. Franx, and D. E. Boekee. An efficient algorithm for the
generation of de Bruijn cycles. IEEE Trans. Inform. Theory, 37:1475–1478, 1991.
[1037] H. L. Janwa and A. K. Lal. On expander graphs: parameters and applications.
arXiv:cs/0406048 [cs.IT], June 2004.
[1038] H. L. Janwa and O. Moreno. McEliece public key cryptosystems using algebraic-
geometric codes. Des. Codes Cryptogr., 8:293–307, 1996.
[1039] H. L. Janwa and R. M. Wilson. Hyperplane sections of Fermat varieties in P 3
in char. 2 and some applications to cyclic codes. In G. D. Cohen, T. Mora, and
O. Moreno, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, volume 673 of Lecture Notes in Comput. Sci., pages 180–194. Springer, Berlin,
Heidelberg, 1993.
[1040] J. Jedwab, D. J. Katz, and K.-U. Schmidt. Advances in the merit factor problem
for binary sequences. J. Combin. Theory Ser. A, 120:882–906, 2013.
[1041] S. A. Jennings. The structure of the group ring of a p-group over a modular field.
Trans. Amer. Math. Soc., 50:175–185, 1941.

[1042] J. M. Jensen. The concatenated structure of cyclic and abelian codes. IEEE Trans.
Inform. Theory, 31:788–793, 1985.
[1043] Y. Jia, S. Ling, and C. Xing. On self-dual cyclic codes over finite fields. IEEE Trans.
Inform. Theory, 57:2243–2251, 2011.

[1044] H. Jin, R. Khandekar, and R. J. McEliece. Irregular repeat-accumulate codes. In


Proc. 2nd International Symposium on Turbo Codes and Related Topics, pages 1–8,
Brest, France, September 2000.
[1045] Y. Jing and B. Hassibi. Design of full-diverse multiple-antenna codes based on Sp(2).
IEEE Trans. Inform. Theory, 50:2639–2656, 2004.

[1046] Y. Jing and B. Hassibi. Three-transmit-antenna space-time codes based on SU(3).


IEEE Trans. Signal Process., 53:3688–3702, 2005.
[1047] Y. Jing and B. Hassibi. Distributed space-time coding in wireless relay networks.
IEEE Trans. Wireless Commun., 5:3524–3536, 2006.

[1048] G. R. Jithamitra and B. Sundar Rajan. Minimizing the complexity of fast sphere
decoding of STBCs. In A. Kuleshov, V. M. Blinovsky, and A. Ephremides, editors,
Proc. IEEE International Symposium on Information Theory, pages 1846–1850, St.
Petersburg, Russia, July-August 2011.
[1049] S. Jitman, S. Ling, H. Liu, and X. Xie. Checkable codes from group rings.
arXiv:1012.5498 [cs.IT], December 2010.
[1050] S. Jitman, S. Ling, H. Liu, and X. Xie. Abelian codes in principal ideal group
algebras. IEEE Trans. Inform. Theory, 59:3046–3058, 2013.
[1051] R. Johannesson and K. S. Zigangirov. Fundamentals of Convolutional Coding. IEEE
Series on Digital & Mobile Communication. IEEE Press, New York, 1999.
[1052] S. J. Johnson and S. R. Weller. Regular low-density parity-check codes from combi-
natorial designs. In Proc. IEEE Information Theory Workshop, pages 90–92, Cairns,
Australia, September 2001.
[1053] S. J. Johnson and S. R. Weller. Codes for low-density parity check codes from Kirk-
man triple systems. In Proc. GLOBECOM ’02 – IEEE Global Telecommunications
Conference, volume 2, pages 970–974, Taipei, Taiwan, November 2002.
[1054] S. J. Johnson and S. R. Weller. Codes for iterative decoding from partial geometries.
IEEE Trans. Commun., 52:236–243, 2004.
[1055] G. C. Jorge, A. A. de Andrade, S. I. R. Costa, and J. E. Strapasson. Algebraic
constructions of densest lattices. J. Algebra, 429:218–235, 2015.
[1056] D. Jungnickel. Characterizing geometric designs, II. J. Combin. Theory Ser. A,
118:623–633, 2011.
[1057] D. Jungnickel and A. Pott. Perfect and almost perfect sequences. Discrete Appl.
Math., 95:331–359, 1999.
[1058] D. Jungnickel and V. D. Tonchev. Polarities, quasi-symmetric designs, and Hamada’s
conjecture. Des. Codes Cryptogr., 51:131–140, 2009.
[1059] D. Jungnickel and V. D. Tonchev. The number of designs with geometric parameters
grows exponentially. Des. Codes Cryptogr., 55:131–140, 2010.
[1060] D. Jungnickel and V. D. Tonchev. The classification of antipodal two-weight linear
codes. Finite Fields Appl., 50:372–381, 2018.
[1061] R. Jurrius and R. Pellikaan. On defining generalized rank weights. Adv. Math.
Commun., 11:225–235, 2017.
[1062] R. Jurrius and R. Pellikaan. Defining the q-analogue of a matroid. Electron. J.
Combin., 25(3):Paper 3.2, 32, 2018.
[1063] J. Justesen. A class of constructive asymptotically good algebraic codes. IEEE
Trans. Inform. Theory, 18:652–656, 1972.
[1064] J. Justesen. An algebraic construction of rate 1/v convolutional codes. IEEE Trans.
Inform. Theory, 21:577–580, 1975.
[1065] J. Justesen, K. J. Larsen, H. E. Jensen, A. Havemose, and T. Høholdt. Construction
and decoding of a class of algebraic geometry codes. IEEE Trans. Inform. Theory,
35:811–821, 1989.
[1066] G. A. Kabatianskii, E. A. Krouk, and B. Smeets. A digital signature scheme based
on random error-correcting codes. In M. Darnell, editor, Crytography and Coding,
volume 1355 of Lecture Notes in Comput. Sci., pages 161–167. Springer, Berlin,
Heidelberg, 1997.
[1067] G. A. Kabatianskii and V. I. Levenshtein. On bounds for packings on a sphere
and in space (in Russian). Problemy Peredači Informacii, 14(1):3–25, 1978. (English
translation in Probl. Inform. Transm., 14(1):1–17, 1978).
[1068] G. A. Kabatianskii and V. I. Panchenko. Packings and coverings of the Hamming
space by balls of unit radius (in Russian). Problemy Peredači Informacii, 24(4):3–16,
1988 (English translation in Probl. Inform. Transm., 24(4):261–272, 1988).
[1069] G. Kachigar and J.-P. Tillich. Quantum information set decoding algorithms. In
T. Lange and T. Takagi, editors, Post-Quantum Cryptography, volume 10346 of Lec-
ture Notes in Comput. Sci., pages 69–89. Springer, Berlin, Heidelberg, 2017.
[1070] S. Kadhe and A. R. Calderbank. Rate optimal binary linear locally repairable codes
with small availability. In Proc. IEEE International Symposium on Information
Theory, pages 166–170, Aachen, Germany, June 2017.
[1071] X. Kai, S. Zhu, and P. Li. A construction of new MDS symbol-pair codes. IEEE
Trans. Inform. Theory, 61:5828–5834, 2015.
[1072] X. Kai, S. Zhu, and L. Wang. A family of constacyclic codes over F2 + uF2 + vF2 +
uvF2 . J. Syst. Sci. Complex., 25:1032–1040, 2012.
[1073] T. Kailath. Linear Systems. Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1980.

[1074] J. G. Kalbfleisch and R. G. Stanton. A combinatorial problem in matching. J.


London Math. Soc., 44:60–64, 1969. Corrigendum appears in [J. London Math Soc.
(2) 1 (1969), 398].
[1075] G. M. Kamath, N. Prakash, V. Lalitha, and P. V. Kumar. Codes with local regen-
eration and erasure correction. IEEE Trans. Inform. Theory, 60:4637–4660, 2014.

[1076] W. M. Kantor. An exponential number of generalized Kerdock codes. Inform. and


Control, 53:74–80, 1982.
[1077] W. M. Kantor. Spreads, translation planes and Kerdock sets. I. SIAM J. Algebraic
Discrete Methods, 3:151–165, 1982.

[1078] W. M. Kantor. Spreads, translation planes and Kerdock sets. II. SIAM J. Algebraic
Discrete Methods, 3:308–318, 1982.
[1079] W. M. Kantor. Exponential numbers of two-weight codes, difference sets and sym-
metric designs. Discrete Math., 46:95–98, 1983.
[1080] W. M. Kantor. On the inequivalence of generalized Preparata codes. IEEE Trans.
Inform. Theory, 29:345–348, 1983.
[1081] P. Kanwar and S. R. López-Permouth. Cyclic codes over the integers modulo pm .
Finite Fields Appl., 3:334–352, 1997.
[1082] A. Karatsuba and Y. Ofman. Multiplication of multi-digit numbers on automata.
Soviet Physics Doklady, 7:595–596, 1963.
[1083] E. D. Karnin, J. W. Greene, and M. E. Hellman. On secret sharing systems. IEEE
Trans. Inform. Theory, 29:35–41, 1983.
[1084] R. Karp, M. G. Luby, and M. A. Shokrollahi. Finite length analysis of LT codes.
In Proc. IEEE International Symposium on Information Theory, page 39, Chicago,
Illinois, June-July 2004.
[1085] M. Karzand and E. E. Telatar. Polar codes for q-ary source coding. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 909–912, Austin, Texas, June
2010.

[1086] T. Kasami. Weight distribution formula for some class of cyclic codes. Technical
Report No. R-285, Coordinated Science Laboratory, University of Illinois at Urbana-
Champaign, 1966.
[1087] T. Kasami. The weight enumerators for several classes of subcodes of the 2nd order
binary Reed-Muller codes. Inform. and Control, 18:369–394, 1971.

[1088] T. Kasami. A Gilbert-Varshamov bound for quasi-cyclic codes of rate 1/2. IEEE
Trans. Inform. Theory, 20:679, 1974.
[1089] T. Kasami, S. Lin, and W. Peterson. New generalizations of the Reed–Muller
codes. Part I: primitive codes. IEEE Trans. Inform. Theory, 14:189–199, 1968. (Also
reprinted in [212] pages 323–333).
[1090] P. Kaski and P. R. J. Östergård. Classification Algorithms for Codes and Designs,
volume 15 of Algorithms and Computation in Mathematics. Springer-Verlag, Berlin,
2006. With 1 DVD-ROM (Windows, Macintosh and UNIX).

[1091] P. Kaski and O. Pottonen. Libexact User’s Guide: Version 1.0. Number 2008-1 in
HIIT technical reports. Helsinki Institute for Information Technology HIIT, Finland,
2008.
[1092] G. L. Katsman and M. A. Tsfasman. A remark on algebraic geometric codes. In
Representation Theory, Group Rings, and Coding Theory, volume 93 of Contemp.
Math., pages 197–199. Amer. Math. Soc., Providence, Rhode Island, 1989.
[1093] D. J. Katz. Sequences with low correlation. In L. Budaghyan and F. Rodrı́guez-
Henrı́quez, editors, Arithmetic of Finite Fields, volume 11321 of Lecture Notes in
Comput. Sci., pages 149–172. Springer, Berlin, Heidelberg, 2018.

[1094] M. L. Kaushik. Necessary and sufficient number of parity checks in codes correcting
random errors and bursts with weight constraints under a new metric. Information
Sciences, 19:81–90, 1979.
[1095] C. A. Kelley. On codes designed via algebraic lifts of graphs. In Proc. 46th Allerton
Conference on Communication, Control, and Computing, pages 1254–1261, Monti-
cello, Illinois, September 2008.
[1096] C. A. Kelley. Minimum distance and pseudodistance lower bound for generalized
LDPC codes. Internat. J. Inform. Coding Theory, 1:313–333, 2010.
[1097] C. A. Kelley. Algebraic design and implementation of protograph codes using non-
commuting permutation matrices. IEEE Trans. Commun., 61:910–918, 2013.

[1098] C. A. Kelley and D. Sridhara. Eigenvalue bounds on the pseudocodeword weight of


expander codes. Adv. Math. Commun., 1:287–307, 2007.
[1099] C. A. Kelley and D. Sridhara. Pseudocodewords of Tanner graphs. IEEE Trans.
Inform. Theory, 53:4013–4038, 2007.

[1100] C. A. Kelley, D. Sridhara, and J. Rosenthal. Pseudocodeword weights for non-binary


LDPC codes. In Proc. IEEE International Symposium on Information Theory, pages
1379–1383, Seattle, Washington, July 2006.
[1101] C. A. Kelley, D. Sridhara, and J. Rosenthal. Tree-based construction of LDPC codes
having good pseudocodeword weights. IEEE Trans. Inform. Theory, 53:287–307,
2007.
[1102] C. A. Kelley, D. Sridhara, J. Xu, and J. Rosenthal. Pseudocodeword weights and
stopping sets. In Proc. IEEE International Symposium on Information Theory,
page 67, Chicago, Illinois, June-July 2004.

[1103] C. A. Kelley and J. Walker. LDPC codes from voltage graphs. In F. R. Kschischang
and E.-H. Yang, editors, Proc. IEEE International Symposium on Information The-
ory, pages 792–796, Toronto, Canada, July 2008.
[1104] M. G. Kendall. A new measure of rank correlation. Biometrika, 30:81–93, 1938.
[1105] G. Kennedy and V. S. Pless. On designs and formally self-dual codes. Des. Codes
Cryptogr., 4:43—-55, 1994.
[1106] A. Kerber. Applied Finite Group Actions, volume 19 of Algorithms and Combina-
torics. Springer-Verlag, Berlin, 2nd edition, 1999.
[1107] A. M. Kerdock. A class of low-rate nonlinear binary codes. Inform. and Control,
20:182–187, 1972; ibid, 21:395, 1972.
[1108] A. M. Kermarrec, N. L. Scouarnec, and G. Straub. Repairing multiple failures with
coordinated and adaptive regenerating codes. In Proc. International Symposium on
Networking Coding, Beijing, China, 6 pages, July 2011.
[1109] A. Ketkar, A. Klappenecker, S. Kumar, and P. K. Sarvepalli. Nonbinary stabilizer
codes over finite fields. IEEE Trans. Inform. Theory, 52:4892–4914, 2006.
[1110] A. Khaleghi, D. Silva, and F. R. Kschischang. Subspace codes. In M. G. Parker,
editor, Cryptography and Coding, volume 5921 of Lecture Notes in Comput. Sci.,
pages 1–21. Springer, Berlin, Heidelberg, 2009.
[1111] A. Khina, Y. Kochman, and A. Khisti. Decomposing the MIMO wiretap channel.
In Proc. IEEE International Symposium on Information Theory, pages 206–210,
Honolulu, Hawaii, June-July 2014.
[1112] H. M. Kiah, K. H. Leung, and S. Ling. Cyclic codes over GR(p2 , m) of length pk .
Finite Fields Appl., 14:834–846, 2008.
[1113] H. M. Kiah, G. J. Puleo, and O. Milenkovic. Codes for DNA sequence profiles. IEEE
Trans. Inform. Theory, 62:3125–3146, 2016.
[1114] M. Kiermaier, S. Kurz, P. Solé, and A. Wassermann. On strongly walk regular
graphs, triple sum sets and their codes. In preparation, 2020.
[1115] M. Kiermaier and A. Wassermann. Minimum weights and weight enumerators of Z4 -
linear quadratic residue codes. IEEE Trans. Inform. Theory, 58:4870–4883, 2012.
[1116] M. Kiermaier and J. Zwanzger. A Z4 -linear code of high minimum Lee distance
derived from a hyperoval. Adv. Math. Commun., 5:275–286, 2011.
[1117] M. Kiermaier and J. Zwanzger. New ring-linear codes from dualization in projective
Hjelmslev geometries. Des. Codes Cryptogr., 66:39–55, 2013.
[1118] H. K. Kim and D. S. Krotov. The poset metrics that allow binary codes of codi-
mension m to be m, (m − 1), or (m − 2)-perfect. IEEE Trans. Inform. Theory,
54:5241–5246, 2008.
[1119] J.-L. Kim. New extremal self-dual codes of lengths 36, 38 and 58. IEEE Trans.
Inform. Theory, 47:1575–1580, 2001.
[1120] J.-L. Kim and N. Lee. Secret sharing schemes based on additive codes over GF(4).
Appl. Algebra Engrg. Comm. Comput., 28:79–97, 2017.
[1121] J.-L. Kim, U. Peled, I. Perepelitsa, V. S. Pless, and S. Friedland. Explicit construction
of families of LDPC codes with no 4-cycles. IEEE Trans. Inform. Theory, 50:2378–
2388, 2004.
[1122] T. Kiran and B. S. Rajan. STBC-schemes with non-vanishing determinant for certain
number of transmit antennas. IEEE Trans. Inform. Theory, 51:2984–2992, 2005.
[1123] T. Kiran and B. S. Rajan. Distributed space-time codes with reduced decoding
complexity. In Proc. IEEE International Symposium on Information Theory, pages
542–546, Seattle, Washington, July 2006.
[1124] C. Kirfel and R. Pellikaan. The minimum distance of codes in an array coming from
telescopic semigroups. IEEE Trans. Inform. Theory, 41:1720–1732, 1995.
[1125] A. Y. Kitaev. Fault-tolerant quantum computation by anyons. Ann. Physics, 303:2–
30, 2003.
[1126] B. Kitchens. Symbolic dynamics and convolutional codes. In Codes, Systems, and
Graphical Models (Minneapolis, MN, 1999), volume 123 of IMA Vol. Math. Appl.,
pages 347–360. Springer, New York, 2001.
[1127] E. Kleinfeld. Finite Hjelmslev planes. Illinois J. Math., 3:403–407, 1959.
[1128] T. Kløve. Error Correction Codes for the Asymmetric Channel. Department of
Informatics, University of Bergen, Norway, 1983, bibliography updated 1995.
[1129] W. Knapp and P. Schmid. Codes with prescribed permutation group. J. Algebra,
67:415–435, 1980.
[1130] E. Knill and R. Laflamme. Theory of quantum error-correcting codes. Physical
Review A, 55:900–911, February 1997.
[1131] E. Knill, R. Laflamme, and W. H. Zurek. Resilient quantum computation. Science,
279(5349):342–345, 1998.
[1132] D. E. Knuth. The Art of Computer Programming. Volume 4A: Combinatorial Algo-
rithms, Part 1. Addison-Wesley Professional, 2011.
[1133] D. E. Knuth. The Art of Computer Programming. Volume 4. Fascicle 5: Mathemat-
ical Preliminaries Redux; Introduction to Backtracking; Dancing Links. Addison-
Wesley, 2015.
[1134] D. E. Knuth. The Art of Computer Programming. Volume 4: Satisfiability. Addison-
Wesley Professional, 2015.
[1135] A. Kohnert. Update on the extension of good linear codes. In Combinatorics 2006,
volume 26 of Electron. Notes Discrete Math., pages 81–85. Elsevier Sci. B. V., Am-
sterdam, 2006.
[1136] A. Kohnert. Constructing two-weight codes with prescribed groups of automor-
phisms. Discrete Appl. Math., 155:1451–1457, 2007.
[1137] A. Kohnert. Construction of linear codes having prescribed primal-dual minimum
distance with applications in cryptography. Albanian J. Math., 2:221–227, 2008.
[1138] A. Kohnert. (l, s)-extension of linear codes. Discrete Math., 309:412–417, 2009.
[1139] A. Kohnert and S. Kurz. Construction of large constant dimension codes with a
prescribed minimum distance. In J. Calmet, W. Geiselmann, and J. Müller-Quade,
editors, Mathematical Methods in Computer Science: Essays in Memory of Thomas
Beth, volume 5393 of Lecture Notes in Comput. Sci., pages 31–42. Springer, Berlin,
Heidelberg, 2008.
[1140] A. Kohnert and A. Wassermann. Construction of binary and ternary self-orthogonal
linear codes. Discrete Appl. Math., 157:2118–2123, 2009.
[1141] A. Kohnert and J. Zwanzger. New linear codes with prescribed group of automor-
phisms found by heuristic search. Adv. Math. Commun., 3:157–166, 2009.
[1142] J. I. Kokkala, D. S. Krotov, and P. R. J. Östergård. On the classification of MDS
codes. IEEE Trans. Inform. Theory, 61:6485–6492, 2015.
[1143] J. I. Kokkala and P. R. J. Östergård. Further results on the classification of MDS
codes. Adv. Math. Commun., 10:489–498, 2016.
[1144] D. König. Graphok és matrixok. Mat. Fiz. Lapok, 38:115–119, 1931.
[1145] S. Kopparty. List-decoding multiplicity codes. In Electronic Colloquium on Compu-
tational Complexity (ECCC), volume 19, Report No. 44, 26 pages, 2012.
[1146] S. Kopparty, V. F. Lev, S. Saraf, and M. Sudan. Kakeya-type sets in finite vector
spaces. J. Algebraic Combin., 34:337–355, 2011.
[1147] S. Kopparty, N. Ron-Zewi, S. Saraf, and M. Wootters. Improved decoding of folded
Reed-Solomon and multiplicity codes. In M. Thorup, editor, Proc. 59th IEEE Sym-
posium on Foundations of Computer Science, pages 212–223, Paris, France, October
2018.
[1148] S. B. Korada. Polar Codes for Channel and Source Coding. PhD thesis, École
Polytechnique Fédérale de Lausanne, 2009.
[1149] S. B. Korada, E. Şaşoğlu, and R. L. Urbanke. Polar codes: characterization of expo-
nent, bounds, and constructions. arXiv:0901.0536 [cs.IT], January 2009.
[1150] S. B. Korada, E. Şaşoğlu, and R. L. Urbanke. Polar codes: characterization of expo-
nent, bounds, and constructions. IEEE Trans. Inform. Theory, 56:6253–6264, 2010.
[1151] S. B. Korada, A. Montanari, E. Telatar, and R. L. Urbanke. An empirical scaling
law for polar codes. In Proc. IEEE International Symposium on Information Theory,
pages 884–888, Austin, Texas, June 2010.
[1152] S. B. Korada and R. L. Urbanke. Polar codes are optimal for lossy source coding.
IEEE Trans. Inform. Theory, 56:1751–1768, 2010.
[1153] W. Kositwattanarerk and F. Oggier. Connections between Construction D and re-
lated constructions of lattices. Des. Codes Cryptogr., 73:441–455, 2014.
[1154] W. Kositwattanarerk, S. S. Ong, and F. Oggier. Construction A of lattices over
number fields and block fading (wiretap) coding. IEEE Trans. Inform. Theory,
61:2273–2282, 2015.
[1155] R. Kötter. A unified description of an error locating procedure for linear codes. In
D. Yorgov, editor, Proc. 3rd International Workshop on Algebraic and Combinatorial
Coding Theory, pages 113–117, Voneshta Voda, Bulgaria, June 1992. Hermes.
[1156] R. Kötter and F. R. Kschischang. Coding for errors and erasures in random network
coding. IEEE Trans. Inform. Theory, 54:3579–3591, 2008.
[1157] R. Kötter and M. Médard. An algebraic approach to network coding. IEEE/ACM
Trans. Networking, 11:782–795, 2003.
[1158] R. Kötter and P. O. Vontobel. Graph covers and iterative decoding of finite-length
codes. In Proc. 3rd International Symposium on Turbo Codes and Related Topics,
pages 75–82, Brest, France, September 2003.
[1159] Y. Kou, Lin. S., and M. P. C. Fossorier. Low-density parity-check codes based on
finite geometries: a rediscovery and more. IEEE Trans. Inform. Theory, 47:2711–
2736, 2001.
[1160] I. Kra and S. R. Simanca. On circulant matrices. Notices Amer. Math. Soc.,
59(3):368–377, 2012.
[1161] E. S. Kramer and D. M. Mesner. t-designs on hypergraphs. Discrete Math., 15:263–
296, 1976.
[1162] D. L. Kreher and D. R. Stinson. Combinatorial Algorithms: Generation, Enumera-
tion, and Search. CRC Press, Boca Raton, Florida, 1999.
[1163] E. I. Krengel and P. V. Ivanov. Two constructions of binary sequences with optimal
autocorrelation magnitude. Electron. Lett., 52:1457–1459, 2016.
[1164] M. N. Krishnan and P. V. Kumar. On MBR codes with replication. In Proc. IEEE
International Symposium on Information Theory, pages 71–75, Barcelona, Spain,
July 2016.
[1165] M. N. Krishnan, M. Vajha, V. Ramkumar, B. Sasidharan, S. B. Balaji, and P. V.
Kumar. Erasure coding for big data. Advanced Computing and Communications
(ACCS), 3(1):6 pages, 2019.
[1166] D. S. Krotov, P. R. J. Östergård, and O. Pottonen. On optimal binary one-error-
correcting codes of lengths 2m −4 and 2m −3. IEEE Trans. Inform. Theory, 57:6771–
6779, 2011.
[1167] E. A. Krouk. Decoding complexity bound for linear block codes (in Russian). Prob-
lemy Peredači Informacii, 25(3):103–107, 1989 (English translation in Probl. Inform.
Transm., 25(3):251–254, 1989).
[1168] V. Krčadinac. Steiner 2-designs S(2, 4, 28) with nontrivial automorphisms. Glasnik
Matematički, 37:259–268, 2002.
[1169] F. R. Kschischang. An introduction to network coding. In M. Médard and
A. Sprintson, editors, Network Coding: Fundamentals and Applications, chapter 1.
Academic Press, Waltham, Massachusetts, 2012.
[1170] F. R. Kschischang, B. Frey, and H.-A. Loeliger. Factor graphs and the sum-product
algorithm. IEEE Trans. Inform. Theory, 47:498–519, 2001.
[1171] A. Kshevetskiy and È. M. Gabidulin. The new construction of rank codes. In Proc.
IEEE International Symposium on Information Theory, pages 2105–2108, Adelaide,
Australia, September 2005.
[1172] S. Kudekar, T. J. Richardson, and R. L. Urbanke. Threshold saturation via spatial
coupling: why convolutional LDPC ensembles perform so well over the BEC. IEEE
Trans. Inform. Theory, 57:803–834, 2011.
[1173] S. Kudekar, T. J. Richardson, and R. L. Urbanke. Spatially coupled ensembles
universally achieve capacity under belief propagation. IEEE Trans. Inform. Theory,
59:7761–7783, 2013.
[1174] K. R. Kumar and G. Caire. Construction of structured LaST codes. In Proc. IEEE
International Symposium on Information Theory, pages 2834–2838, Seattle, Wash-
ington, July 2006.
[1175] N. Kumar and A. K. Singh. DNA computing over the ring Z4 [v]/hv 2 − vi. Internat.
J. Biomath., 11(7):1850090, 18, 2018.
[1176] P. V. Kumar, R. A. Scholtz, and L. R. Welch. Generalized bent functions and their
properties. J. Combin. Theory Ser. A, 40:90–107, 1985.
[1177] S.-Y. Kung, B. C. Lévy, M. Morf, and T. Kailath. New results in 2-D systems
theory, part II: 2-D state-space models—realization and the notions of controllability,
observability, and minimality. Proc. of IEEE, 65:945–961, 1977.

[1178] J. Kurihara, R. Matsumoto, and T. Uyematsu. Relative generalized rank weight of


linear codes and its applications to network coding. IEEE Trans. Inform. Theory,
61:3912–3936, 2015.
[1179] S. Kurz. Improved upper bounds for partial spreads. Des. Codes Cryptogr., 85:97–
106, 2017.

[1180] S. Kurz. LinCode – computer classification of linear codes. arXiv:1912.09357


[math.CO], December 2019.
[1181] D. K. Kythe and P. K. Kythe. Algebraic and Stochastic Coding Theory. CRC Press,
Boca Raton, Florida, 2012.

[1182] G. B. Kyung and C. C. Wang. Finding the exhaustive list of small fully absorbing
sets and designing the corresponding low error-floor decoder. IEEE Trans. Commun.,
60:1487–1498, 2012.
[1183] G. G. La Guardia. Asymmetric quantum codes: new codes from old. Quantum
Inform. Process., 12:2771–2790, 2013.

[1184] G. G. La Guardia. Erratum to: Asymmetric quantum codes: new codes from old.
Quantum Inform. Process., 12:2791, 2013.
[1185] H. Laakso. Nonexistence of nontrivial perfect codes in the case q = pa1 pb2 pc3 , e ≥ 3.
Ann. Univ. Turku. Ser. A I, 177, 43 pages, 1979. Dissertation, University of Turku,
Turku, 1979.

[1186] A. Laaksonen and P. R. J. Östergård. Constructing error-correcting binary codes


using transitive permutation groups. Discrete Appl. Math., 233:65–70, 2017.
[1187] R. Laflamme, C. Miquel, J. P. Paz, and W. H. Zurek. Perfect quantum error cor-
recting code. Physical Review Lett., 77:198–201, July 1996.

[1188] C. Lai and A. Ashikhmin. Linear programming bounds for entanglement-assisted


quantum error-correcting codes by split weight enumerators. IEEE Trans. Inform.
Theory, 64:622–639, 2018.
[1189] K. Lally. Quasicyclic codes of index l over Fq viewed as Fq [x]-submodules of
Fql [x]/hxm − 1i. In M. Fossorier, T. Høholdt, and A. Poli, editors, Applied Algebra,
Algebraic Algorithms and Error-Correcting Codes, volume 2643 of Lecture Notes in
Comput. Sci., pages 244–253. Springer, Berlin, Heidleberg, 2003.
[1190] K. Lally. Algebraic lower bounds on the free distance of convolutional codes. IEEE
Trans. Inform. Theory, 52:2101–2110, 2006.
[1191] K. Lally and P. Fitzpatrick. Algebraic structure of quasi-cyclic codes. Discrete Appl.
Math., 111:157–175, 2001.
[1192] C. W. H. Lam and L. Thiel. Backtrack search with isomorph rejection and consis-
tency check. J. Symbolic Comput., 7:473–485, 1989.
[1193] T. Y. Lam. A general theory of Vandermonde matrices. Exposition. Math., 4:193–
215, 1986.
[1194] T. Y. Lam and A. Leroy. Vandermonde and Wronskian matrices over division rings.
J. Algebra, 119:308–336, 1988.
[1195] T. Y. Lam and A. Leroy. Wedderburn polynomials over division rings. I. J. Pure
Appl. Algebra, 186:43–76, 2004.
[1196] T. Y. Lam, A. Leroy, and A. Ozturk. Wedderburn polynomials over division rings.
II. In S. K. Jain and S. Parvathi, editors, Noncommutative Rings, Group Rings,
Diagram Algebras and Their Applications, volume 456 of Contemp. Math., pages
73–98. Amer. Math. Soc., Providence, Rhode Island, 2008.
[1197] J. Lambek. Lectures on Rings and Modules. Blaisdell Publishing Co. Ginn and Co.,
Waltham, Mass.-Toronto, Ont.-London, 1966.
[1198] I. N. Landjev. The geometric approach to linear codes. In Finite Geometries, vol-
ume 3 of Dev. Math., pages 247–256. Kluwer Acad. Publ., Dordrecht, Netherlands,
2001.
[1199] I. N. Landjev and P. Vandendriessche. A study of (xvt , xvt−1 )-minihypers in PG(t, q).
J. Combin. Theory Ser. A, 119:1123–1131, 2012.
[1200] P. Landrock. Finite Group Algebras and Their Modules, volume 84 of London Math.
Soc. Lecture Note Ser. Cambridge University Press, Cambridge, UK, 1983.
[1201] P. Landrock and O. Manz. Classical codes as ideals in group algebras. Des. Codes
Cryptogr., 2:273–285, 1992.
[1202] J. N. Laneman and G. W. Wornell. Distributed space-time-coded protocols for
exploiting cooperative diversity in wireless network. IEEE Trans. Inform. Theory,
49:2415–2425, 2003.
[1203] S. Lang. Algebra, volume 211 of Graduate Texts in Mathematics. Springer-Verlag,
New York, revised 3rd edition, 2002.
[1204] J. B. Lasserre. An explicit equivalent positive semidefinite program for nonlinear 0-1
programs. SIAM J. Optim., 12:756–769, 2002.
[1205] M. Laurent. A comparison of the Sherali-Adams, Lovász-Schrijver, and Lasserre
relaxations for 0-1 programming. Math. Oper. Res., 28:470–496, 2003.
[1206] M. Laurent. Strengthened semidefinite programming bounds for codes. Math. Pro-
gram. Ser. B, 109:239–261, 2007.
[1207] M. Laurent and F. Vallentin. A Course on Semidefinite Optimization. Cambridge
University Press, Cambridge, UK, in preparation.
[1208] M. Lavrauw, L. Storme, and G. Van de Voorde. Linear codes from projective spaces.
In A. A. Bruen and D. L. Wehlau, editors, Error-Correcting Codes, Finite Geometries
and Cryptography, volume 523 of Contemp. Math., pages 185–202. Amer. Math. Soc.,
Providence, Rhode Island, 2010.
[1209] F. Lazebnik and V. A. Ustimenko. Explicit construction of graphs with arbitrary
large girth and of large size. Discrete Appl. Math., 60:275–284, 1997.

[1210] D. Le Brigand and J.-J. Riesler. Algorithme de Brill–Noether et codes de Goppa.


Bull. Soc. Math. France, 116:231–253, 1988.
[1211] C. Y. Lee. Some properties of nonbinary error-correcting codes. IRE Trans. Inform.
Theory, 4:77–82, 1958.

[1212] P. J. Lee and E. F. Brickell. An observation on the security of McEliece’s public-


key cryptosystem. In J. Stoer, N. Wirth, and C. G. Günther, editors, Advances in
Cryptology – EUROCRYPT ’88, volume 330 of Lecture Notes in Comput. Sci., pages
275–280. Springer, Berlin, Heidelberg, 1988.
[1213] W. Lee, Y.-S. Kim, Y.-W. Lee, and J.-S. No. Post quantum signature scheme
based on modified Reed-Muller code pqsigRM. First round submission to the NIST
post-quantum cryptography call: https://csrc.nist.gov/CSRC/media/Projects/
Post-Quantum-Cryptography/documents/round-1/submissions/pqsigRM.zip,
November 2017.
[1214] J. Lehmann and O. Heden. Some necessary conditions for vector space partitions.
Discrete Math., 312:351–361, 2012.
[1215] H. W. Lenstra, Jr. Two theorems on perfect codes. Discrete Math., 3:125–132, 1972.
[1216] M. Lentmaier, D. Truhachev, and K. Sh. Zigangirov. To the Theory of Low-Density
Convolutional Codes II. IEEE Trans. Inform. Theory, 37:288–306, 2001.
[1217] J. S. Leon. Computing automorphism groups of error-correcting codes. IEEE Trans.
Inform. Theory, 28:496–511, 1982.
[1218] J. S. Leon. A probabilistic algorithm for computing minimum weights of large error-
correcting codes. IEEE Trans. Inform. Theory, 34:1354–1359, 1988.
[1219] J. S. Leon. Partitions, refinements, and permutation group computation. In
L. Finkelstein and W. M. Kantor, editors, Groups and Computation, II (New
Brunswick, NJ, 1995), volume 28 of DIMACS Ser. Discrete Math. Theoret. Comput.
Sci., pages 123–158. Amer. Math. Soc., Providence, Rhode Island, 1997.
[1220] J. S. Leon, J. M. Masley, and V. S. Pless. Duadic codes. IEEE Trans. Inform.
Theory, 30:709–714, 1984.
[1221] A. Leon-Garcia and I. Widjaja. Communication Networks: Fundamental Concepts
and Key Architectures. McGraw-Hill, New York, 2004.
[1222] M. Lequesne and J.-P. Tillich. Attack on the Edon-K key encapsulation mechanism.
In Proc. IEEE International Symposium on Information Theory, pages 981–985, Vail,
Colorado, June 2018.
[1223] A. Leroy. Noncommutative polynomial maps. J. Algebra Appl., 11(4):1250076, 16,
2012.
[1224] S. Leung-Yan-Cheong and M. Hellman. Concerning a bound on undetected error
probability. IEEE Trans. Inform. Theory, 22:235–237, 1976.
[1225] V. I. Levenshtein. Binary codes capable of correcting deletions, insertions, and re-
versals. Soviet Physics Dokl., 10:707–710, 1965.
[1226] V. I. Levenshtein. On bounds for packings in n-dimensional Euclidean space (in
Russian). Soviet Math. Doklady, 20:417–421, 1979.

[1227] V. I. Levenshtein. Bounds for packings in metric spaces and certain applications (in
Russian). Probl. Kibernet., 40:44–110, 1983.
[1228] V. I. Levenshtein. Designs as maximum codes in polynomial metric spaces. Acta
Appl. Math., 29:1–82, 1992.

[1229] V. I. Levenshtein. Krawtchouk polynomials and universal bounds for codes and
designs in Hamming spaces. IEEE Trans. Inform. Theory, 41:1303–1321, 1995.
[1230] V. I. Levenshtein. Universal Bounds for Codes and Designs. In V. S. Pless and W. C.
Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 6, pages 499–648.
North-Holland, Amsterdam, 1998.

[1231] V. I. Levenshtein. Equivalence of Delsarte’s bounds for codes and designs in sym-
metric association schemes, and some applications. Discrete Math., 197/198:515–536,
1999.
[1232] V. I. Levenshtein. New lower bounds on aperiodic crosscorrelation of binary codes.
IEEE Trans. Inform. Theory, 45:284–288, 1999.
[1233] V. I. Levenshtein. Bounds for deletion/insertion correcting codes. In Proc. IEEE
International Symposium on Information Theory, page 370, Lausanne, Switzerland,
June-July 2002.
[1234] B. C. Lévy. 2-D Polynomial and Rational Matrices, and their Applications for the
Modeling of 2-D Dynamical Systems. PhD thesis, Standford University, 1981.
[1235] B. Li, H. Shen, and D. Tse. An adaptive successive cancellation list decoder for polar
codes with cyclic redundancy check. IEEE Commun. Letters, 16:2044–2047, 2012.
[1236] C. Li, C. Ding, and S. Li. LCD cyclic codes over finite fields. IEEE Trans. Inform.
Theory, 63:4344–4356, 2017.
[1237] C. Li and Q. Yue. The Walsh transform of a class of monomial functions and cyclic
codes. Cryptogr. Commun., 7:217–228, 2015.
[1238] C. Li, X. Zeng, T. Helleseth, C. Li, and L. Hu. The properties of a class of linear
FSRs and their applications to the construction of nonlinear FSRs. IEEE Trans.
Inform. Theory, 60:3052–3061, 2014.
[1239] C. Li, X. Zeng, C. Li, and T. Helleseth. A class of de Bruijn sequences. IEEE Trans.
Inform. Theory, 60:7955–7969, 2014.
[1240] C. Li, X. Zeng, C. Li, T. Helleseth, and M. Li. Construction of de Bruijn sequences
from LFSRs with reducible characteristic polynomials. IEEE Trans. Inform. Theory,
62:610–624, 2016.
[1241] J. Li and B. Li. Erasure coding for cloud storage systems: a survey. Tsinghua Science
and Technology, 18:259–272, 2013.
[1242] J. Li and X. Tang. A systematic construction of MDS codes with small sub-
packetization level and near optimal repair bandwidth. arXiv:1901.08254 [cs.IT],
January 2019.
[1243] J. Li, X. Tang, and C. Tian. A generic transformation to enable optimal repair in
MDS codes for distributed storage systems. IEEE Trans. Inform. Theory, 64:6257–
6267, 2018.
[1244] M. Li and D. Lin. De Bruijn sequences, adjacency graphs, and cyclotomy. IEEE
Trans. Inform. Theory, 64:2941–2952, 2018.

[1244a] N. Li and S. Mesnager. Recent results and problems on constructions of linear codes
from cryptographic functions. Cryptogr. Commun., 12:965–986, 2020.
[1245] S. Li. The minimum distance of some narrow-sense primitive BCH codes. SIAM J.
Discrete Math., 31:2530–2569, 2017.
[1246] S. Li, C. Ding, M. Xiong, and G. Ge. Narrow-sense BCH codes over GF(q) with
m
−1
length n = qq−1 . IEEE Trans. Inform. Theory, 63:7219–7236, 2017.

[1247] S. Li, C. Li, C. Ding, and H. Liu. Two families of LCD BCH codes. IEEE Trans.
Inform. Theory, 63:5699–5717, 2017.
[1248] S.-Y. R. Li, R. W. Yeung, and N. Cai. Linear network coding. IEEE Trans. Inform.
Theory, 49:371–381, 2003.
[1249] X.-B. Liang. Orthogonal designs with maximal rates. IEEE Trans. Inform. Theory,
49:2468–2503, 2003.
[1250] X.-B. Liang and X.-G. Xia. Unitary signal constellations for differential space-time
modulation with two transmit antennas: parametric codes, optimal designs, and
bounds. IEEE Trans. Inform. Theory, 48:2291–2322, 2002.
[1251] H. Liao and X.-G. Xia. Some designs of full rate space-time codes with nonvanishing
determinant. IEEE Trans. Inform. Theory, 53:2898–2908, 2007.
[1252] D. A. Lidar and T. A. Brun, editors. Quantum Error Correction. Cambridge Uni-
versity Press, Cambridge, UK, 2013.
[1253] R. Lidl, G. L. Mullen, and G. Turnwald. Dickson Polynomials, volume 65 of Pitman
Monographs and Surveys in Pure and Applied Mathematics. Longman Scientific &
Technical, Harlow; copublished in the United States with John Wiley & Sons, Inc.,
New York, 1993.

[1254] R. Lidl and H. Niederreiter. Finite Fields, volume 20 of Encyclopedia of Mathematics


and its Applications. Cambridge University Press, Cambridge, UK, 2nd edition, 1997.
[1255] J. Lieb. Complete MDP convolutional codes. J. Algebra Appl., 18(6):1950105, 13,
2019.

[1256] M. W. Liebeck. The affine permutation groups of rank three. Proc. London Math.
Soc. (3), 54:477–516, 1987.
[1257] D. Liebhold, G. Nebe, and M. Á. Vázquez-Castro. Generalizing subspace codes
to flag codes using group actions. In M. Greferath, M. Pavčević, N. Silberstein,
and M. Á. Vázquez-Castro, editors, Network Coding and Subspace Designs. Signals
and Communication Technology, Signals Commun. Technol., pages 67–89. Springer,
Cham, 2018.
[1258] D. J. Lin and B. Bose. On the maximality of the group theoretic single error correct-
ing and all unidirectional error detecting (SEC-AUED) codes. In R. M. Capocelli,
editor, Sequences: Combinatorics, Compression, Security, and Transmission, pages
506–529. Springer-Verlag, New York, 1990.
[1259] H.-P. Lin, S. Lin, and K. A. S. Abdel-Ghaffar. Linear and nonlinear binary kernels
of polar codes of small dimensions with maximum exponents. IEEE Trans. Inform.
Theory, 61:5253–5270, 2015.
[1260] S. Lin and D. J. Costello, Jr. Error Control Coding: Fundamentals and Applications.
Prentice-Hall, Upper Saddle River, New Jersey, 2nd edition, 2004.
[1261] S. Lin, Q. Diao, and I. F. Blake. Error floors and finite geometries. In Proc. 8th In-
ternational Symposium on Turbo Codes and Iterative Information Processing, pages
42–46, Bremen, Germany, August 2014.
[1262] S. Lin and E. J. Weldon, Jr. Long BCH codes are bad. Inform. and Control, 11:445–
451, 1967.
[1263] S.-J. Lin and W. Chung. Novel repair-by-transfer codes and systematic exact-MBR
codes with lower complexities and smaller field sizes. IEEE Trans. Parallel Distrib.
Syst., 25:3232–3241, 2014.
[1264] D. Lind and B. Marcus. An Introduction to Symbolic Dynamics and Coding. Cam-
bridge University Press, Cambridge, UK, 1995.
[1265] B. Lindström. On group and nongroup perfect codes in q symbols. Math. Scand.,
25:149–158, 1969.
[1266] C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé. Semantically secure lattice codes for
the Gaussian wiretap channel. IEEE Trans. Inform. Theory, 60:6399–6416, 2014.
[1267] S. Ling, J. Luo, and C. Xing. Generalization of Steane’s enlargement construction of
quantum codes and applications. IEEE Trans. Inform. Theory, 56:4080–4084, 2010.
[1268] S. Ling, H. Niederreiter, and P. Solé. On the algebraic structure of quasi-cyclic codes
IV: repeated roots. Des. Codes Cryptogr., 38:337–361, 2006.
[1269] S. Ling and P. Solé. On the algebraic structure of quasi-cyclic codes I: finite fields.
IEEE Trans. Inform. Theory, 47:2751–2760, 2001.

[1270] S. Ling and P. Solé. Good self-dual quasi-cyclic codes exist. IEEE Trans. Inform.
Theory, 49:1052–1053, 2003.
[1271] S. Ling and P. Solé. On the algebraic structure of quasi-cyclic codes II: chain rings.
Des. Codes Cryptogr., 30:113–130, 2003.

[1272] S. Ling and P. Solé. On the algebraic structure of quasi-cyclic codes III: generator
theory. IEEE Trans. Inform. Theory, 51:2692–2700, 2005.
[1273] P. Lisoněk and V. Singh. Quantum codes from nearly self-orthogonal quaternary
linear codes. Des. Codes Cryptogr., 73:417–424, 2014.
[1274] B. Litjens. Semidefinite bounds for mixed binary/ternary codes. Discrete Math.,
341:1740–1748, 2018.
[1275] B. Litjens, S. Polak, and A. Schrijver. Semidefinite bounds for nonbinary codes based
on quadruples. Des. Codes Cryptogr., 84:87–100, 2017.
[1276] J. B. Little. Algebraic geometry codes from higher dimensional varieties. In
E. Martı́nez-Moro, C. Munuera, and D. Ruano, editors, Advances in Algebraic Ge-
ometry Codes, volume 5 of Ser. Coding Theory Cryptol., pages 257–293. World Sci.
Publ., Hackensack, New Jersey, 2008.
[1277] H. Liu, C. Ding, and C. Li. Dimensions of three types of BCH codes over GF(q).
Discrete Math., 340:1910–1927, 2017.
[1278] H. Liu, Y. Li, L. Ma, and J. Chen. On the smallest absorbing sets of LDPC codes
from finite planes. IEEE Trans. Inform. Theory, 58:4014–4020, 2012.
[1279] H. Liu and Y. Maouche. Two or few-weight trace codes over Fq + uFq . IEEE Trans.
Inform. Theory, 65:2696–2703, 2019.
[1280] J. Liu, S. Mesnager, and L. Chen. New constructions of optimal locally recoverable
codes via good polynomials. IEEE Trans. Inform. Theory, 64:889–899, 2018.
[1281] J. Liu, S. Mesnager, and D. Tang. Constructions of optimal locally recoverable codes
via Dickson polynomials. Des. Codes Cryptogr., 88:1759–1780, 2020.
[1282] S. Liu, F. Manganiello, and F. R. Kschischang. Construction and decoding of gen-
eralized skew-evaluation codes. In Proc. 14th Canadian Workshop on Information
Theory, pages 9–13, St. John’s, Canada, July 2015.
[1283] S. Liu and F. Oggier. An overview of coding for distributed storage systems. In
Network Coding and Subspace Designs, Signals Commun. Technol., pages 363–383.
Springer, Cham, 2018.
[1284] Z. Liu and D. A. Pados. LDPC codes from generalized polygons. IEEE Trans.
Inform. Theory, 51:3890–3898, 2005.
[1285] P. Loidreau. Étude et optimisation de cryptosystèmes à clé publique fondés sur la
théorie des codes correcteurs. PhD thesis, École Polytechnique, Paris, 2001.
[1286] B. Long, P. Zhang, and J. Hu. A generalized QS-CDMA system and the design of
new spreading codes. IEEE Trans. Vehicular Tech., 47:1268–1275, 1998.
[1287] S. R. López-Permouth, B. R. Parra-Avila, and S. Szabo. Dual generalizations of the
concept of cyclicity of codes. Adv. Math. Commun., 3:227–234, 2009.
[1288] L. Lovász. On the Shannon capacity of a graph. IEEE Trans. Inform. Theory,
25:1–7, 1979.
[1289] H.-F. Lu and P. V. Kumar. A unified construction of space-time codes with optimal
rate-diversity tradeoff. IEEE Trans. Inform. Theory, 51:1709–1730, 2005.
[1290] J. Lu, J. Harshan, and F. Oggier. Performance of lattice coset codes on Universal
Software Radio Peripherals. Physical Commun., 24:94–102, 2017.
[1291] A. Lubotzky, R. Phillips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8:261–
277, 1988.
[1292] M. G. Luby. LT codes. In Proc. 43rd Annual IEEE Symposium on Foundations of
Computer Science, pages 271–280, Vancouver, Canada, November 2002.
[1293] M. G. Luby and M. Mitzenmacher. Verification-based decoding for packet-based
low-density parity-check codes. IEEE Trans. Inform. Theory, 51:120–127, 2005.
[1294] M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi. Analysis of random processes
via And-Or tree evaluation. In Proc. 9th Annual ACM-SIAM Symposium on Discrete
Algorithms, pages 364–373, San Francisco, California, January 1998. ACM Press,
New York.
[1295] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Speileman, and V. Stenman.
Practical loss-resilient codes. In Proc. 29th Annual ACM Symposium on the Theory
of Computing, pages 150–159, El Paso, Texas, May 1997. ACM Press, New York.
[1296] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Speilman. Improved
low-density parity-check codes using irregular graphs. IEEE Trans. Inform. Theory,
47:585–598, 2001.
[1297] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Analysis of
low density codes and improved designs using irregular graphs. In Proc. 30th Annual
ACM Symposium on the Theory of Computing, pages 249–258, Dallas, Texas, May
1998. ACM Press, New York.
[1298] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Efficient
erasure correcting codes. IEEE Trans. Inform. Theory, 47:569–584, 2001.
[1299] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Improved
low-density parity-check codes using irregular graphs. IEEE Trans. Inform. Theory,
47:585–598, 2001.
[1300] H. D. Lüke and H. D. Schotten. Odd-perfect, almost binary correlation sequences.
IEEE Trans. Aerospace and Electronic Systems, 31:495–498, 1995.
[1301] H. D. Lüke, H. D. Schotten, and H. Hadinejad-Mahram. Generalised Sidelńikov
sequences with optimal autocorrelation properties. Electron. Lett., 36:525–527, 2000.
[1302] H. D. Lüke, H. D. Schotten, and H. Hadinejad-Mahram. Binary and quadriphase
sequences with optimal autocorrelation properties: a survey. IEEE Trans. Inform.
Theory, 49:3271–3282, 2003.
[1303] G. Lunardon, R. Trombetti, and Y. Zhou. Generalized twisted Gabidulin codes. J.
Combin. Theory Ser. A, 159:79–106, 2018.
[1304] B. Lundell and J. McCullough. A generalized floor bound for the minimum distance
of geometric Goppa codes. J. Pure Appl. Algebra, 207:155–164, 2006.
[1305] H. Lüneburg. Gray-codes. Abh. Math. Sem. Univ. Hamburg, 52:208–227, 1982.
[1306] G. Luo and X. Cao. A construction of linear codes and strongly regular graphs from
q-polynomials. Discrete Math., 340:2262–2274, 2017.
[1307] G. Luo and X. Cao. Five classes of optimal two-weight linear codes. Cryptogr.
Commun., 10:1119–1135, 2018.
[1308] G. Luo, X. Cao, G. Xu, and S. Xu. A new class of optimal linear codes with flexible
parameters. Discrete Appl. Math., 237:126–131, 2018.
[1309] L. Luzzi, G. R.-B. Othman, J.-C. Belfiore, and E. Viterbo. Golden space-time block
coded modulation. IEEE Trans. Inform. Theory, 55:584–597, 2009.
[1310] V. Lyubashevsky. Lattice signatures without trapdoors. In D. Pointcheval and
T. Johansson, editors, Advances in Cryptology – EUROCRYPT 2012, volume 7237
of Lecture Notes in Comput. Sci., pages 738–755. Springer, Berlin, Heidelberg, 2012.
[1311] G. Maatouk and M. A. Shokrollahi. Analysis of the second moment of the LT decoder.
In Proc. IEEE International Symposium on Information Theory, pages 2326–2330,
Seoul, Korea, June-July 2009.
[1312] J. E. MacDonald. Design methods for maximum minimum-distance error-correcting
codes. IBM J. Research Develop., 4:43–57, 1960.
[1313] R. A. Machado, J. A. Pinheiro, and M. Firer. Characterization of metrics induced
by hierarchical posets. IEEE Trans. Inform. Theory, 63:3630–3640, 2017.
[1314] D. J. C. MacKay. Information Theory, Inference, and Learning Algorithms. Cam-
bridge University Press, Cambridge, UK, 2003.
[1315] D. J. C. MacKay and M. C. Davey. Evaluation of Gallager codes for short block
length and high rate applications. In B. Marcus and J. Rosenthal, editors, Codes,
Systems, and Graphical Models (Minneapolis, MN, 1999), volume 123 of IMA Vol.
Math. Appl., pages 113–130. Springer, New York, 2001.
[1316] D. J. C. MacKay and R. M. Neal. Near Shannon limit performance of low density
parity check codes. IEEE Electronic Letters, 32:1645–1646, 1996.
[1317] F. J. MacWilliams. Error-correcting codes for multiple-level transmission. Bell Sys-
tem Tech. J., 40:281–308, 1961.
[1318] F. J. MacWilliams. Combinatorial Problems of Elementary Abelian Groups. PhD
thesis, Harvard University, 1962.
[1319] F. J. MacWilliams. A theorem on the distribution of weights in a systematic code.
Bell System Tech. J., 42:79–94, 1963. (Also reprinted in [169] pages 261–265 and
[212] pages 241–257).
[1320] F. J. MacWilliams. Codes and ideals in group algebras. In R. C. Bose and T. A. Dowl-
ing, editors, Combinatorial Mathematics and its Applications (Proc. Conf., Univ.
North Carolina, Chapel Hill, NC, 1967), pages 317–328. Univ. North Carolina Press,
Chapel Hill, NC, 1969.
[1321] F. J. MacWilliams. Binary codes which are ideals in the group algebra of an abelian
group. Bell System Tech. J., 49:987–1011, 1970.
[1322] F. J. MacWilliams and H. B. Mann. On the p-rank of the design matrix of a difference
set. Inform. and Control, 12:474–488, 1968.
[1323] F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes.
North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977.
[1324] F. J. MacWilliams, N. J. A. Sloane, and J. G. Thompson. Good self-dual codes exist.
Discrete Math., 3:153–162, 1972.
[1325] H. Maharaj, G. L. Matthews, and G. Pirsic. Riemann-Roch spaces of the Hermitian
function field with applications to algebraic geometry codes and low-discrepancy
sequences. J. Pure Appl. Algebra, 195:261–280, 2005.
[1326] H. Mahdavifar and A. Vardy. Achieving the secrecy capacity of wiretap channels
using polar codes. IEEE Trans. Inform. Theory, 57:6428–6443, 2011.
[1327] E. Maneva and M. A. Shokrollahi. New model for rigorous analysis of LT-codes.
In Proc. IEEE International Symposium on Information Theory, pages 2677–2679,
Seattle, Washington, July 2006.
[1328] F. Manganiello, E. Gorla, and J. Rosenthal. Spread codes and spread decoding in
network coding. In F. R. Kschischang and E.-H. Yang, editors, Proc. IEEE Inter-
national Symposium on Information Theory, pages 881–885, Toronto, Canada, July
2008.
[1329] B. Marcus. Symbolic dynamics and connections to coding theory, automata theory
and system theory. In A. R. Calderbank, editor, Different Aspects of Coding Theory
(San Francisco, CA, 1995), volume 50 of Proc. Sympos. Appl. Math., pages 95–108.
Amer. Math. Soc., Providence, Rhode Island, 1995.
[1330] G. A. Margulis. Explicit construction of graphs without short cycles and low density
codes. Combinatorica, 2:71–78, 1982.
[1331] N. Markin and F. Oggier. Iterated space-time code constructions from cyclic algebras.
IEEE Trans. Inform. Theory, 59:5966–5979, 2013.
[1332] I. Márquez-Corbella, E. Martı́nez-Moro, and R. Pellikaan. Evaluation of public-key
cryptosystems based on algebraic geometry codes. In J. Borges and M. Villanueva,
editors, Proc. 3rd International Castle Meeting on Coding Theory and Applications,
pages 199–204, Cardona Castle in Catalonia, Spain, September 2011.
[1333] M. H. Martin. A problem in arrangements. Bull. Amer. Math. Soc., 40:859–864,
1934.
[1334] W. J. Martin and H. Tanaka. Commutative association schemes. European J. Com-
bin., 30:1497–1525, 2009.
[1335] J. Martinet. Perfect Lattices in Euclidean Spaces, volume 327 of Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences].
Springer-Verlag, Berlin, 2003.
[1336] C. Martı́nez, M. Moreto, R. Beivide, and È. M. Gabidulin. A generalization of
perfect Lee codes over Gaussian integers. In Proc. IEEE International Symposium
on Information Theory, pages 1070–1074, Seattle, Washington, July 2006.
[1337] E. Martı́nez-Moro and I. F. Rúa. Multivariable codes over finite chain rings: serial
codes. SIAM J. Discrete Math., 20:947–959, 2006.
[1338] E. Martı́nez-Moro and I. F. Rúa. On repeated-root multivariable codes over a finite
chain ring. Des. Codes Cryptogr., 45:219–227, 2007.
[1339] U. Martı́nez-Peñas. On the roots and minimum rank distance of skew cyclic codes.
Des. Codes Cryptogr., 83:639–660, 2017.
[1340] U. Martı́nez-Peñas. Skew and linearized Reed-Solomon codes and maximum sum
rank distance codes over any division ring. J. Algebra, 504:587–612, 2018.
[1341] U. Martı́nez-Peñas and R. Matsumoto. Relative generalized matrix weights of matrix
codes for universal security on wire-tap networks. IEEE Trans. Inform. Theory,
64:2529–2549, 2018.
[1342] C. Martı́nez-Pérez and W. Willems. Self-dual codes and modules for finite groups
in characteristic two. IEEE Trans. Inform. Theory, 50:1798–1803, 2004.
[1343] M. Martis, J. Bamberg, and S. Morris. An enumeration of certain projective ternary
two-weight codes. J. Combin. Des., 24:21–35, 2016.
[1344] T. Maruta. A characterization of some minihypers and its application to linear codes.
Geom. Dedicata, 74:305–311, 1999.
[1345] A. Maschietti. Difference sets and hyperovals. Des. Codes Cryptogr., 14:89–98, 1998.
[1346] J. L. Massey. Reversible codes. Inform. and Control, 7:369–380, 1964.
[1347] J. L. Massey. Linear codes with complementary duals. Discrete Math., 106/107:337–
342, 1992.
[1348] J. L. Massey. Minimal codewords and secret sharing. In Proc. 6th Joint Swedish-
Russian Workshop on Information Theory, pages 276–279, Molle, Sweden, August
1993.
[1349] J. L. Massey. Some applications of coding theory. In P. G. Ferell, editor, Cryptog-
raphy, Codes and Ciphers: Cryptography and Coding IV, pages 33–47. Formara Ltd,
Essex, 1995.
[1350] J. L. Massey, D. J. Costello, Jr., and J. Justesen. Polynomial weights and code
constructions. IEEE Trans. Inform. Theory, 19:101–110, 1973.
[1351] J. L. Massey and M. K. Sain. Codes, automata, and continuous systems: explicit
interconnections. IEEE Trans. Automat. Control, 12:644–650, 1967.
[1352] É. Mathieu. Mémoire sur l’étude des fonctions de plusieurs quantités, sur la manière
de les former et sur les substitutions qui les laissent invariables. J. de Mathématiques
Pures et Appliquées, 6:241–323, 1861.
[1353] É. Mathieu. Sur la fonction cinq fois transitive de 24 quantités. J. de Mathématiques
Pures et Appliquées, 18:25–46, 1873.
[1354] R. Matsumoto. Two Gilbert-Varshamov-type existential bounds for asymmetric
quantum error-correcting codes. Quantum Inform. Process., 16(12):Paper No. 285,
7 pages, 2017.
[1355] V. C. Mavron, T. P. McDonough, and V. D. Tonchev. On affine designs and
Hadamard designs with line spreads. Discrete Math., 308:2742–2750, 2008.
e 0.054n ).
[1356] A. May, A. Meurer, and E. Thomae. Decoding random linear codes in O(2
In D. H. Lee and X. Wang, editors, Advances in Cryptology – ASIACRYPT 2011,
volume 7073 of Lecture Notes in Comput. Sci., pages 107–124. Springer, Berlin,
Heidelberg, 2011.
[1357] A. May and I. Ozerov. On computing nearest neighbors with applications to decoding
of binary linear codes. In E. Oswald and M. Fischlin, editors, Advances in Cryptology
– EUROCRYPT 2015, volume 9056 of Lecture Notes in Comput. Sci., pages 203–228.
Springer, Berlin, Heidelberg, 2015.
[1358] P. Maymounkov. Online codes. New York University Technical Report TR2002–833,
2002.
[1359] B. R. McDonald. Finite Rings with Identity. Marcel Dekker, Inc., New York, 1974.
Pure and Applied Mathematics, Vol. 28.
[1360] R. J. McEliece. Weight congruences of p-ary cyclic codes. Discrete Math., 3:177–192,
1972.

[1361] R. J. McEliece. A public-key system based on algebraic coding theory. DSN Progress
Report 44, pages 114–116, Jet Propulsion Laboratory, Pasadena, California, 1978.
[1362] R. J. McEliece. Finite Fields for Computer Scientists and Engineers. Kluwer Acad.
Pub., Boston, 1987.

[1363] R. J. McEliece. The Algebraic Theory of Convolutional Codes. In V. S. Pless and


W. C. Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 12, pages
1065–1138. North-Holland, Amsterdam, 1998.
[1364] R. J. McEliece, E. R. Rodemich, and H. Rumsey, Jr. The Lovász bound and some
generalizations. J. Combin. Inform. System Sci., 3:134–152, 1978.

[1365] R. J. McEliece, E. R. Rodemich, H. Rumsey, Jr., and L. Welch. New upper bounds on
the rate of a code via the Delsarte–MacWilliams inequalities. IEEE Trans. Inform.
Theory, 23:157–166, 1977.
[1366] R. J. McEliece and H. Rumsey, Jr. Euler products, cyclotomy, and coding. J. Number
Theory, 4:302–311, 1972.
[1367] R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes.
Commun. ACM, 24:583–584, 1981.
[1368] G. McGuire, V. D. Tonchev, and H. N. Ward. Characterizing the Hermitian and
Ree unitals on 28 points. Des. Codes Cryptogr., 13:57–61, 1998.

[1369] B. D. McKay. Isomorph-free exhaustive generation. J. Algorithms, 26:306–324, 1998.


[1370] B. D. McKay and A. Piperno. Practical graph isomorphism, II. J. Symbolic Comput.,
60:94–112, 2014.
[1371] I. McLoughlin. A group ring construction of the [48,24,12] type II linear block code.
Des. Codes Cryptogr., 63:29–41, 2012.
[1372] I. McLoughlin and T. Hurley. A group ring construction of the extended binary
Golay code. IEEE Trans. Inform. Theory, 54:4381–4383, 2008.
[1373] M. Mehrabi and M. Ardakani. On minimum distance of locally repairable codes. In
Proc. 15th Canadian Workshop on Information Theory, Quebec, Canada, 5 pages,
June 2017.
[1374] K. Menger. Zur allgemeinen Kurventheorie. Fund. Math., 10:96–115, 1927.
[1375] R. Meshulam. On the maximal rank in a subspace of matrices. Q. J. Math., 36:225–
229, 1985.
[1376] S. Mesnager. Characterizations of plateaued and bent functions in characteristic p.
In K.-U. Schmidt and A. Winterhof, editors, Sequences and Their Applications –
SETA 2014, volume 8865 of Lecture Notes in Comput. Sci., pages 72–82. Springer,
Berlin, Heidelberg, 2014.
[1377] S. Mesnager. On semi-bent functions and related plateaued functions over the Galois
field F2n . In Ç. K. Koç, editor, Open Problems in Mathematics and Computational
Science, pages 243–273. Springer, Cham, 2014.
[1378] S. Mesnager. Bent Functions: Fundamentals and Results. Springer, Cham, 2016.
[1379] S. Mesnager. Linear codes with few weights from weakly regular bent functions based
on a generic construction. Cryptogr. Commun., 9:71–84, 2017.
[1380] S. Mesnager, F. Özbudak, and A. Sınak. A new class of three-weight linear codes
from weakly regular plateaued functions. In Proc. 10th International Workshop on
Coding and Cryptography, Saint Petersburg, Russia, September 2017.
[1381] S. Mesnager, F. Özbudak, and A. Sınak. Linear codes from weakly regular plateaued
functions and their secret sharing schemes. Des. Codes Cryptogr., 87:463–480, 2019.
[1382] S. Mesnager and A. Sınak. Several classes of minimal linear codes with few weights
from weakly regular plateaued functions. arXiv:1808.03877 [cs.IT], August 2018.
[1383] R. Metz. On a class of unitals. Geom. Dedicata, 8:125–126, 1979.
[1384] D. Micciancio and O. Regev. Lattice-based cryptography. In Post-Quantum Cryp-
tography, pages 147–191. Springer, Berlin, 2009.
[1385] G. Micheli. Constructions of locally recoverable codes which are optimal. IEEE
Trans. Inform. Theory, 66:167–175, 2020.
[1386] Microsoft Research Blog: A Better Way to Store Data. https://www.microsoft.
com/en-us/research/blog/better-way-store-data/. Accessed: 2018-Mar-29.
[1387] O. Milenkovic, E. Soljanin, and P. Whiting. Asymptotic trapping set spectra in
regular and irregular LDPC code ensembles. IEEE Trans. Inform. Theory, 53:39–
55, 2007.
[1388] L. Minder. Cryptography Based on Error Correcting Codes. PhD thesis, École Poly-
technique Fédérale de Lausanne, 2007.
[1389] L. Minder, M. A. Shokrollahi, M. Watson, M. G. Luby, and T. Stockhammer. Rap-
torQ Forward Error Correction Scheme for Object Delivery. RFC 6330, August
2011.
[1390] D. Mirandola and G. Zémor. Critical pairs for the product Singleton bound. IEEE
Trans. Inform. Theory, 61:4928–4937, 2015.
[1391] R. Misoczki and P. S. L. M. Barreto. Compact McEliece keys from Goppa codes. In
M. J. Jacobson, Jr., V. Rijmen, and R. Safavi-Naini, editors, Selected Areas in Cryp-
tography, volume 5867 of Lecture Notes in Comput. Sci., pages 376–392. Springer,
Berlin, Heidelberg, 2009.
[1392] R. Misoczki, J.-P. Tillich, N. Sendrier, and P. S. L. M. Barreto. MDPC-McEliece:
new McEliece variants from moderate density parity-check codes. In Proc. IEEE
International Symposium on Information Theory, pages 2069–2073, Istanbul, Turkey,
July 2013.
[1393] T. Mittelholzer and J. Lahtonen. Group codes generated by finite reflection groups.
IEEE Trans. Inform. Theory, 42:519–528, 1996.
[1394] K. Momihara. Strongly regular Cayley graphs, skew Hadamard difference sets, and
rationality of relative Gauss sums. European J. Combin., 34:706–723, 2013.
[1395] Koji Momihara. Certain strongly regular Cayley graphs on F22(2s+1) from cyclotomy.
Finite Fields Appl., 25:280–292, 2014.
[1396] M. Mondelli, S. H. Hassani, I. Sason, and R. L. Urbanke. Achieving Marton’s region
for broadcast channels using polar codes. IEEE Trans. Inform. Theory, 61:783–800,
2015.
[1397] M. Mondelli, S. H. Hassani, and R. L. Urbanke. Scaling exponent of list decoders
with applications to polar codes. In Proc. IEEE Information Theory Workshop,
Seville, Spain, 5 pages, September 2013.
[1398] M. Mondelli, S. H. Hassani, and R. L. Urbanke. Scaling exponent of list decoders
with applications to polar codes. arXiv:1304.5220 [cs.IT], September 2014.

[1399] J. V. S. Morales and H. Tanaka. An Assmus-Mattson theorem for codes over com-
mutative association schemes. Des. Codes Cryptogr., 86:1039–1062, 2018.
[1400] P. Moree. On the divisors of ak + bk . Acta Arith., 80(3):197–212, 1997.
[1401] C. Moreno. Algebraic Curves over Finite Fields, volume 97 of Cambridge Tracts in
Mathematics. Cambridge University Press, Cambridge, UK, 1991.

[1402] M. Morf, B. C. Lévy, and S.-Y. Kung. New results in 2-D systems theory, part I:
2-D polynomial matrices, factorization, and coprimeness. Proc. of IEEE, 65:861–872,
1977.
[1403] R. Mori and T. Tanaka. Performance and construction of polar codes on symmet-
ric binary-input memoryless channels. In Proc. IEEE International Symposium on
Information Theory, pages 1496–1500, Seoul, Korea, June-July 2009.
[1404] R. Mori and T. Tanaka. Performance of polar codes with the construction using
density evolution. IEEE Commun. Letters, 13:519–521, 2009.
[1405] R. Mori and T. Tanaka. Channel polarization on q-ary discrete memoryless channels
by arbitrary kernels. In Proc. IEEE Information Theory Workshop, pages 894–898,
Austin, Texas, June 2010.
[1406] R. Mori and T. Tanaka. Source and channel polarization over finite fields and Reed-
Solomon matrices. IEEE Trans. Inform. Theory, 60:2720–2736, 2014.

[1407] L. Mroueh, S. Rouquette, and J.-C. Belfiore. Application of perfect space time codes:
PEP bounds and some practical insights. IEEE Trans. Commun., 60:747–755, 2012.
[1408] G. L. Mullen and D. Panario, editors. Handbook of Finite Fields. Discrete Mathe-
matics and its Applications. CRC Press, Boca Raton, Florida, 2013.
[1409] D. E. Muller. Application of Boolean algebra to switching circuit design and to error
detection. IEEE Trans. Comput., 3:6–12, 1954. (Also reprinted in [169] pages 20–26
and [212] pages 43–49).
[1410] D. Mumford. Varieties defined by quadratic equations. In E. Marchionna, editor,
Questions on Algebraic Varieties (C.I.M.E., III Ciclo, Varenna, 1969), pages 29–
100. Edizioni Cremonese, Rome, 1970.
[1411] O. R. Musin. The kissing number in four dimensions. Ann. of Math. (2), 168:1–32,
2008.
[1412] D. Napp, C. Perea, and R. Pinto. Input-state-output representations and construc-
tions of finite support 2D convolutional codes. Adv. Math. Commun., 4:533–545,
2010.
[1413] D. Napp and F. Santana. Multi-shot network coding. In M. Greferath, M. Pavčević,
N. Silberstein, and M. Á. Vázquez-Castro, editors, Network Coding and Subspace
Designs. Signals and Communication Technology, Signals Commun. Technol., pages
91–104. Springer, Cham, 2018.
[1414] D. Napp and R. Smarandache. Constructing strongly-MDS convolutional codes with
maximum distance profile. Adv. Math. Commun., 10:275–290, 2016.
[1415] E. L. Năstase and P. A. Sissokho. The maximum size of a partial spread in a finite
projective space. J. Combin. Theory Ser. A, 152:353–362, 2017.
[1416] L. P. Natarajan, Y. Hong, and E. Viterbo. Lattice index coding. IEEE Trans.
Inform. Theory, 61:6505–6525, 2015.
[1417] L. P. Natarajan and B. S. Rajan. Fast group-decodable STBCs via codes over GF(4).
In Proc. IEEE International Symposium on Information Theory, pages 1056–1060,
Austin, Texas, June 2010.
[1418] L. P. Natarajan and B. S. Rajan. Asymptotically-optimal, fast-decodable, full-
diversity STBCs. In Proc. IEEE International Conference on Communications, Ky-
oto, Japan, 6 pages, June 2011.

[1419] L. P. Natarajan and B. S. Rajan. Fast-group-decodable STBCs via codes over GF(4):
further results. In Proc. IEEE International Conference on Communications, Kyoto,
Japan, 6 pages, June 2011.
[1420] I. P. Naydenova. Error Detection and Correction for Symmetric and Asymmetric
Channels. PhD thesis, University of Bergen, 2007.

[1421] G. Nebe. A generalisation of Turyn’s construction of self-dual codes. In RIMS


Workshop Report: Research into Vector Operator Algebras, Finite Groups and Com-
binatorics, volume 1756, pages 51–59, Kyoto, Japan, December 2010.
[1422] G. Nebe. An extremal [72, 36, 16] binary code has no automorphism group containing
Z2 × Z4 , Q8 , or Z10 . Finite Fields Appl., 18:563–566, 2012.

[1423] G. Nebe, E. Rains, and N. J. A. Sloane. Self-Dual Codes and Invariant Theory.
Springer-Verlag, Berlin, Heidelberg, 2006.
[1424] G. Nebe and A. Schäfer. A nilpotent non abelian group code. Algebra Discrete
Math., 18:268–273, 2014.

[1425] A. A. Nechaev. Trace functions in Galois rings and noise-stable codes. In Proc. 5th
All-Union Symposium on the Theory of Rings, Algebras and Modules, page 97, 1982.
[1426] A. A. Nechaev. Kerdock’s code in cyclic form (in Russian). Diskret. Mat., 1(4):123–
139, 1989. (English translation in Discrete Math. Appl. 1(4):365–384, 1991).
[1427] A. A. Nechaev. Linear recurrence sequences over commutative rings (in Russian).
Diskret. Mat., 3(4):105–127, 1991. (English translation in Discrete Math. Appl.
2(6):659–683, 1992).
[1428] A. A. Nechaev and D. A. Mikhaı̆lov. A canonical system of generators of a unitary
polynomial ideal over a commutative Artinian chain ring (in Russian). Diskret. Mat.,
13(4):3–42, 2001. (English translation in Discrete Math. Appl. 11(6):545–586, 2001).
[1429] A. Nemirovski. Advances in convex optimization: conic programming. In M. Sanz-
Solé, J. Soria, J. L. Varona, and J. Verdera, editors, Proc. International Congress of
Mathematicians (Madrid, 2006), pages 413–444. Eur. Math. Soc., Zürich, 2007.
[1430] S.-L. Ng and M. B. Paterson. Functional repair codes: a view from projective geom-
etry. Des. Codes Cryptogr., 87:2701–2722, 2019.
[1431] X. T. Ngo, S. Bahsin, J.-L. Danger, S. Guilley, and Z. Najim. Linear complemen-
tary dual code improvement to strengthen encoded circuit against hardware Trojan
horses. In Proc. IEEE International Symposium on Hardware Oriented Security and
Trust (HOST), pages 82–87, McLean, Virginia, May 2015.
[1432] H. Niederreiter. Knapsack-type cryptosystems and algebraic coding theory. Problems
Control Inform. Theory/Problemy Upravlen. Teor. Inform., 15(2):159–166, 1986.
[1433] H. Niederreiter. Point sets and sequences with small discrepancy. Monatsh. Math.,
104:273–337, 1987.
[1434] H. Niederreiter. A combinatorial problem for vector spaces over finite fields. Discrete
Math., 96:221–228, 1991.
[1435] H. Niederreiter. Orthogonal arrays and other combinatorial aspects in the theory of
uniform point distributions in unit cubes. Discrete Math., 106/107:361–367, 1992.
[1436] H. Niederreiter and F. Özbudak. Constructive asymptotic codes with an improve-
ment on the Tsfasman-Vlăduţ-Zink and Xing bounds. In K. Feng, H. Niederreiter,
and C. Xing, editors, Coding, Cryptography and Combinatorics, volume 23 of Progr.
Comput. Sci. Appl. Logic, pages 259–275. Birkhäuser Verlag Basel, 2004.
[1437] H. Niederreiter and C. Xing. Rational Points on Curves over Finite Fields: Theory
and Applications, volume 285 of London Math. Soc. Lecture Note Ser. Cambridge
University Press, Cambridge, UK, 2001.
[1438] Y. Niho. Multi-Valued Cross-Correlation Functions Between Two Maximal Linear
Recursive Sequences. PhD thesis, University of Southern California, 1972.
[1439] A. Nijenhuis and H. S. Wilf. Combinatorial Algorithms. Academic Press, Inc. [Har-
court Brace Jovanovich, Publishers], New York-London, 2nd edition, 1978. For com-
puters and calculators, Computer Science and Applied Mathematics.
[1440] S. Nishimura and T. Hiramatsu. A generalization of the Lee distance and error
correcting codes. Discrete Appl. Math., 156:588–595, 2008.
[1441] NIST. Post-quantum cryptography standardization. https:
//csrc.nist.gov/Projects/post-quantum-cryptography/
Post-Quantum-Cryptography-Standardization, 2017.
[1442] K. Niu and K. Chen. CRC-aided decoding of polar codes. IEEE Commun. Letters,
16:1668–1671, 2012.
[1443] K. Niu and K. Chen. Stack decoding of polar codes. Electron. Lett., 48:695–697,
2012.
[1444] J.-S. No, S. W. Golomb, G. Gong, H.-K. Lee, and P. Gaal. Binary pseudorandom
sequences of period 2n − 1 with ideal autocorrelation. IEEE Trans. Inform. Theory,
44:814–817, 1998.
[1445] R. W. Nóbrega and B. F. Uchôa-Filho. Multishot codes for network coding: bounds
and a multilevel construction. In Proc. IEEE International Symposium on Informa-
tion Theory, pages 428–432, Seoul, Korea, June-July 2009.

[1446] A. W. Nordstrom and J. P. Robinson. An optimum nonlinear code. Inform. and


Control, 11:613–616, 1967.
[1447] G. H. Norton and A. Sălăgean. On the Hamming distance of linear codes over a
finite chain ring. IEEE Trans. Inform. Theory, 46:1060–1067, 2000.
[1448] G. H. Norton and A. Sălăgean. On the structure of linear and cyclic codes over a
finite chain ring. Appl. Algebra Engrg. Comm. Comput., 10:489–506, 2000.
[1449] G. H. Norton and A. Sălăgean. Cyclic codes and minimal strong Gröbner bases over
a principal ideal ring. Finite Fields Appl., 9:237–249, 2003.
[1450] K. Nyberg. Constructions of bent functions and difference sets. In I. B. Damgård,
editor, Advances in Cryptology – EUROCRYPT ’90, volume 473 of Lecture Notes in
Comput. Sci., pages 151–160. Springer, Berlin, Heidelberg, 1991.
[1451] K. Nyberg. Perfect nonlinear S-boxes. In D. W. Davies, editor, Advances in Cryp-
tology – EUROCRYPT ’91, volume 547 of Lecture Notes in Comput. Sci., pages
378–386. Springer, Berlin, Heidelberg, 1991.

[1452] K. Nyberg. On the construction of highly nonlinear permutations. In R. A. Rueppel,


editor, Advances in Cryptology – EUROCRYPT ’92, volume 658 of Lecture Notes in
Comput. Sci., pages 92–98. Springer, Berlin, Heidelberg, 1993.
[1453] K. Nyberg. Differentially uniform mappings for cryptography. In T. Helleseth,
editor, Advances in Cryptology – EUROCRYPT ’93, volume 765 of Lecture Notes in
Comput. Sci., pages 55–64. Springer, Berlin, Heidelberg, 1994.
[1454] K. Nyberg and L. R. Knudsen. Provable security against differential cryptanalysis.
In E. F. Brickell, editor, Advances in Cryptology – CRYPTO ’92, volume 740 of
Lecture Notes in Comput. Sci., pages 566–574. Springer, Berlin, Heidelberg, 1993.

[1455] F. Oggier. A survey of algebraic unitary codes. In Y. M. Chee, C. Li, S. Ling,


H. Wang, and C. Xing, editors, Coding and Cryptology, volume 5557 of Lecture
Notes in Comput. Sci., pages 171–187. Springer, Berlin, Heidelberg, 2009.
[1456] F. Oggier and B. Hassibi. Algebraic Cayley differential space-time codes. IEEE
Trans. Inform. Theory, 53:1911–1919, 2007.

[1457] F. Oggier and B. Hassibi. An algebraic coding scheme for wireless relay networks
with multiple-antenna nodes. IEEE Trans. Signal Process., 56:2957–2966, 2008.
[1458] F. Oggier, G. Rekaya, J.-C. Belfiore, and E. Viterbo. Perfect space-time block codes.
IEEE Trans. Inform. Theory, 52:3885–3902, 2006.
[1459] F. Oggier and A. Sboui. On the existence of generalized rank weights. In Proc.
IEEE International Symposium on Information Theory and its Applications, pages
406–410, Honolulu, Hawaii, October 2012.
[1460] F. Oggier, P. Solé, and J.-C. Belfiore. Codes over matrix rings for space-time coded
modulations. IEEE Trans. Inform. Theory, 58:734–746, 2012.
[1461] F. Oggier, P. Solé, and J.-C. Belfiore. Lattice codes for the wiretap Gaussian channel:
construction and analysis. IEEE Trans. Inform. Theory, 62:5690–5708, 2016.
[1462] F. Oggier and E. Viterbo. Algebraic number theory and code design for Rayleigh
fading channels. Found. Trends Commun. and Inform. Theory, 1:333–415, 2004.
[1463] C. M. O’Keefe and T. Penttila. A new hyperoval in PG(2, 32). J. Geom., 44:117–139,
1992.
[1464] T. Okuyama and Y. Tsushima. On a conjecture of P. Landrock. J. Algebra, 104:203–
208, 1986.
[1465] O. Olmez and A. Ramamoorthy. Fractional repetition codes with flexible repair from
combinatorial designs. IEEE Trans. Inform. Theory, 62:1565–1591, 2016.
[1466] O. Ore. Theory of non-commutative polynomials. Ann. of Math. (2), 34:480–508,
1933.
[1467] P. R. J. Östergård. Classifying subspaces of Hamming spaces. Des. Codes Cryptogr.,
27:297–305, 2002.
[1468] P. R. J. Östergård. On the size of optimal three-error-correcting binary codes of
length 16. IEEE Trans. Inform. Theory, 57:6824–6826, 2011.
[1469] P. R. J. Östergård. The sextuply shortened binary Golay code is optimal. Des. Codes
Cryptogr., 87:341–347, 2019.
[1470] P. R. J. Östergård and M. K. Kaikkonen. New single-error-correcting codes. IEEE
Trans. Inform. Theory, 42:1261–1262, 1996.
[1471] P. R. J. Östergård and O. Pottonen. There exists no Steiner system S(4, 5, 17). J.
Combin. Theory Ser. A, 115:1570–1573, 2008.
[1472] P. R. J. Östergård and O. Pottonen. The perfect binary one-error-correcting codes of
length 15: Part I—Classification. IEEE Trans. Inform. Theory, 55:4657–4660, 2009.
[1473] P. R. J. Östergård, O. Pottonen, and K. T. Phelps. The perfect binary one-error-
correcting codes of length 15: Part II—Properties. IEEE Trans. Inform. Theory,
56:2571–2582, 2010.
[1474] M. E. O’Sullivan. Decoding of codes on surfaces. In Proc. IEEE Information Theory
Workshop, pages 33–34, Killarney, Ireland, June 1998.
[1475] P. Oswald and M. A. Shokrollahi. Capacity-achieving sequences for the erasure
channel. IEEE Trans. Inform. Theory, 48:3017–3028, 2002.
[1476] K. Otal and F. Özbudak. Cyclic subspace codes via subspace polynomials. Des.
Codes Cryptogr., 85:191–204, 2017.
[1477] A. Otmani and J.-P. Tillich. An efficient attack on all concrete KKS proposals. In
B.-Y. Yang, editor, Post-Quantum Cryptography, volume 7071 of Lecture Notes in
Comput. Sci., pages 98–116. Springer, Berlin, Heidelberg, 2011.
[1478] A. Otmani, J.-P. Tillich, and L. Dallot. Cryptanalysis of two McEliece cryptosystems
based on quasi-cyclic codes. Math. Comput. Sci., 3:129–140, 2010.
[1479] R. Overbeck. A new structural attack for GPT and variants. In E. Dawson and
S. Vaudenay, editors, Progress in Cryptology – Mycrypt 2005, volume 3715 of Lecture
Notes in Comput. Sci., pages 50–63. Springer, Berlin, Heidelberg, 2005.
[1480] M. Özen and I. Şiap. Linear codes over Fq [u]/(us ) with respect to the Rosenbloom-
Tsfasman metric. Des. Codes Cryptogr., 38:17–29, 2006.

[1481] M. Özen and V. Şiap. The MacWilliams identity for m-spotty weight enumerators
of linear codes over finite fields. Comput. Math. Appl., 61:1000–1004, 2011.
[1482] M. Özen and V. Şiap. The MacWilliams identity for m-spotty Rosenbloom-Tsfasman
weight enumerator. J. Franklin Inst., 351:743–750, 2014.
[1483] N. Pace and A. Sonnino. On linear codes admitting large automorphism groups.
Des. Codes Cryptogr., 83:115–143, 2017.
[1484] R. E. A. C. Paley. On orthogonal matrices. J. Mathematics and Physics, 12:311–320,
1933.
[1485] L. Pamies-Juarez, H. D. L. Hollmann, and F. Oggier. Locally repairable codes with
multiple repair alternatives. In Proc. IEEE International Symposium on Information
Theory, pages 892–896, Istanbul, Turkey, July 2013.
[1486] L. Panek, M. Firer, and M. M. S. Alves. Classification of Niederreiter-Rosenbloom-
Tsfasman block codes. IEEE Trans. Inform. Theory, 56:5207–5216, 2010.
[1487] L. Panek, M. Firer, H. K. Kim, and J. Y. Hyun. Groups of linear isometries on poset
structures. Discrete Math., 308:4116–4123, 2008.
[1488] E. Paolini, G. Liva, B. Matuz, and M. Chiani. Maximum likelihood erasure decod-
ing of LDPC codes: pivoting algorithms and code design. IEEE Trans. Commun.,
60:3209–3220, 2012.

[1489] D. S. Papailiopoulos and A. G. Dimakis. Locally repairable codes. IEEE Trans.


Inform. Theory, 60:5843–5855, 2014.
[1490] Y. H. Park. Modular independence and generator matrices for codes over Zm . Des.
Codes Cryptogr., 50:147–162, 2009.
[1491] F. Parvaresh and A. Vardy. Correcting errors beyond the Guruswami-Sudan radius
in polynomial time. In Proc. 46th IEEE Symposium on Foundations of Computer
Science, pages 285–294, Pittsburgh, Pennsylvania, October 2005.
[1492] D. S. Passman. Observations on group rings. Comm. Algebra, 5:1119–1162, 1977.
[1493] N. J. Patterson. The algebraic decoding of Goppa codes. IEEE Trans. Inform.
Theory, 21:203–207, 1975.
[1494] S. Pawar, N. Noorshams, S. Y. E. Rouayheb, and K. Ramchandran. DRESS codes for
the storage cloud: simple randomized constructions. In A. Kuleshov, V. M. Blinovsky,
and A. Ephremides, editors, Proc. IEEE International Symposium on Information
Theory, pages 2338–2342, St. Petersburg, Russia, July-August 2011.
[1495] S. Pawar, S. Y. E. Rouayheb, and K. Ramchandran. Securing dynamic distributed
storage systems against eavesdropping and adversarial attacks. IEEE Trans. Inform.
Theory, 57:6734–6753, 2011.
[1496] S. E. Payne. A new infinite family of generalized quadrangles. Congr. Numer.,
49:115–128, 1985.
[1497] C. Peikert. A decade of lattice cryptography. Found. Trends Commun. and Inform.
Theory, 10:283–424, 2016.
[1498] R. Pellikaan. On decoding linear codes by error correcting pairs. Preprint, Technical
University Eindhoven, 1988.
[1499] R. Pellikaan. On a decoding algorithm for codes on maximal curves. IEEE Trans.
Inform. Theory, 35:1228–1232, 1989.
[1500] R. Pellikaan. On decoding by error location and dependent sets of error positions.
Discrete Math., 106/107:369–381, 1992.
[1501] R. Pellikaan. On the efficient decoding of algebraic-geometric codes. In P. Camion,
P. Charpin, and S. Harari, editors, Proc. International Symposium on Information
Theory – EUROCODE 1992, volume 339 of CISM Courses and Lect., pages 231–253.
Springer, Vienna, 1993.
[1502] T. Penttila and G. F. Royle. Sets of type (m, n) in the affine and projective planes
of order nine. Des. Codes Cryptogr., 6:229–245, 1995.
[1503] U. Pereg and I. Tal. Channel upgradation for non-binary input alphabets and MACs.
In Proc. IEEE International Symposium on Information Theory, pages 411–415,
Honolulu, Hawaii, June-July 2014.
[1504] W. W. Peterson. Encoding and error-correction procedures for the Bose-Chaudhuri
codes. IRE Trans. Inform. Theory, 6:459–470, 1960.
[1505] W. W. Peterson. Error-Correcting Codes. MIT Press, Cambridge, Massachusetts,
1961.
[1506] W. W. Peterson and E. J. Weldon, Jr. Error-Correcting Codes. MIT Press, Cam-
bridge, Massachusetts, 2nd edition, 1972.
[1507] K. T. Phelps. A combinatorial construction of perfect codes. SIAM J. Algebraic
Discrete Methods, 4:398–403, 1983.
[1508] K. T. Phelps. A general product construction for error correcting codes. SIAM J.
Algebraic Discrete Methods, 5:224–228, 1984.
[1509] K. T. Phelps. A product construction for perfect codes over arbitrary alphabets.
IEEE Trans. Inform. Theory, 30:769–771, 1984.
[1510] J. A. Pinheiro, R. A. Machado, and M. Firer. Combinatorial metrics: MacWilliams-
type identities, isometries and extension property. Des. Codes Cryptogr., 87:327–340,
2019.
[1511] P. Piret. Structure and constructions of cyclic convolutional codes. IEEE Trans.
Information Theory, 22:147–155, 1976.
[1512] J. S. Plank and M. Blaum. Sector-disk (SD) erasure codes for mixed failure modes
in RAID systems. ACM Trans. on Storage, 10(1):4:1–4:17, 2014.
[1513] V. S. Pless. Power moment identities on weight distributions in error correcting
codes. Inform. and Control, 6:147–152, 1963. (Also reprinted in [169] pages 266–267
and [212] pages 257–262).
[1514] V. S. Pless. On the uniqueness of the Golay codes. J. Combin. Theory, 5:215–228,
1968.
[1515] V. S. Pless. A classification of self-orthogonal codes over GF(2). Discrete Math.,
3:209–246, 1972.
[1516] V. S. Pless. 23 does not divide the order of the group of a (72, 36, 16) doubly even
code. IEEE Trans. Inform. Theory, 28:113–117, 1982.
[1517] V. S. Pless. Q-codes. J. Combin. Theory Ser. A, 43:258–276, 1986.

[1518] V. S. Pless. More on the uniqueness of the Golay code. Discrete Math., 106/107:391–
398, 1992.
[1519] V. S. Pless. Duadic codes and generalizations. In P. Camion, P. Charpin, and
S. Harari, editors, Proc. International Symposium on Information Theory – EU-
ROCODE 1992, volume 339 of CISM Courses and Lect., pages 3–15. Springer, Vi-
enna, 1993.
[1520] V. S. Pless. Introduction to the Theory of Error-Correcting Codes. J. Wiley & Sons,
New York, 3rd edition, 1998.
[1521] V. S. Pless and W. C. Huffman, editors. Handbook of Coding Theory, Vol. I, II.
North-Holland, Amsterdam, 1998.

[1522] V. S. Pless and Z. Qian. Cyclic codes and quadratic residue codes over Z4 . IEEE
Trans. Inform. Theory, 42:1594–1600, 1996.
[1523] V. S. Pless and N. J. A. Sloane. On the classification and enumeration of self-dual
codes. J. Combin. Theory Ser. A, 18:313–335, 1975.

[1524] V. S. Pless, P. Solé, and Z. Qian. Cyclic self-dual Z4 -codes. Finite Fields Appl.,
3:48–69, 1997.
[1525] V. S. Pless and J. G. Thompson. 17 does not divide the order of the group of a
(72, 36, 16) doubly even code. IEEE Trans. Inform. Theory, 28:537–541, 1982.

[1526] M. Plotkin. Binary Codes with Specified Minimum Distance. Master’s thesis, Moore
School of Electrical Engineering, University of Pennsylvania, 1952.
[1527] M. Plotkin. Binary codes with specified minimum distances. IRE Trans. Inform.
Theory, 6:445–450, 1960. (Also reprinted in [169] pages 238–243).
[1528] D. Pointcheval and J. Stern. Security proofs for signature schemes. In U. Maurer,
editor, Advances in Cryptology – EUROCRYPT ’96, volume 1070 of Lecture Notes
in Comput. Sci., pages 387–398. Springer, Berlin, Heidelberg, 1996.
[1529] S. C. Polak. Semidefinite programming bounds for Lee codes. arXiv:1810.05066
[math.CO], October 2018.
[1530] S. C. Polak. Semidefinite programming bounds for constant weight codes. IEEE
Trans. Inform. Theory, 65:28–39, 2019.
[1531] A. Poli. Important algebraic calculations for n-variables polynomial codes. Discrete
Math., 56:255–263, 1985.

[1532] A. Poli and L. Huguet. Error Correcting Codes. Prentice Hall International, Hemel
Hempstead; Masson, Paris, 1992; Translated from the 1989 French original by Iain
Craig.
[1533] O. Polverino and F. Zullo. Codes arising from incidence matrices of points and
hyperplanes in PG(n, q). J. Combin. Theory Ser. A, 158:1–11, 2018.
[1534] N. Prakash, G. M. Kamath, V. Lalitha, and P. V. Kumar. Optimal linear codes
with a local-error-correction property. In Proc. IEEE International Symposium on
Information Theory, pages 2776–2780, Cambridge, Massachusetts, July 2012.
[1535] N. Prakash, V. Lalitha, S. B. Balaji, and P. V. Kumar. Codes with locality for two
erasures. IEEE Trans. Inform. Theory, 65:7771–7789, 2019.
[1536] E. Prange. Cyclic Error-Correcting Codes in Two Symbols. TN-57-103, Air Force
Cambridge Research Labs, Bedford, Massachusetts, September 1957.
[1537] E. Prange. Some Cyclic Error-Correcting Codes with Simple Decoding Algorithms.
TN-58-156, Air Force Cambridge Research Labs, Bedford, Massachusetts, April 1958.
[1538] E. Prange. An Algorithm for Factoring xn − 1 over a Finite Field. TN-59-175, Air
Force Cambridge Research Labs, Bedford, Massachusetts, October 1959.
[1539] E. Prange. The Use of Coset Equivalence in the Analysis and Decoding of Groups
Codes. TN-59-164, Air Force Cambridge Research Labs, Bedford, Massachusetts,
1959.
[1540] E. Prange. The use of information sets in decoding cyclic codes. IRE Trans. Inform.
Theory, 8:S 5–S 9, 1962.
[1541] F. P. Preparata. A class of optimum nonlinear double-error-correcting codes. Inform.
and Control, 13:378–400, 1968 (Also reprinted in [212] pages 366–388).
[1542] J. Preskill. Fault-tolerant quantum computation. In H.-K. Lo, S. Popescu, and
T. Spiller, editors, Introduction to Quantum Computation and Information, pages
213–269. World Sci. Publ., River Edge, New Jersey, 1998.
[1543] N. Presman. Methods in Polar Coding. PhD thesis, Tel Aviv University, 2015.

[1544] N. Presman and S. Litsyn. Recursive descriptions of polar codes. Adv. Math. Com-
mun., 11:1–65, 2017.
[1545] N. Presman, O. Shapira, and S. Litsyn. Mixed-kernels constructions of polar codes.
IEEE J. Selected Areas Commun., 34:239–253, 2016.

[1546] N. Presman, O. Shapira, S. Litsyn, T. Etzion, and A. Vardy. Binary polarization


kernels from code decompositions. IEEE Trans. Inform. Theory, 61:2227–2239, 2015.
[1547] S. Pumplün and T. Unger. Space-time block codes from nonassociative division
algebras. Adv. Math. Commun., 5:449–471, 2011.
[1548] M. Putinar. Positive polynomials on compact semi-algebraic sets. Indiana Univ.
Math. J., 42:969–984, 1993.
[1549] L.-J. Qu, Y. Tan, and C. Li. On the Walsh spectrum of a family of quadratic APN
functions with five terms. Sci. China Inf. Sci., 57(2):028104, 7, 2014.
[1550] J. Quistorff. On Rosenbloom and Tsfasman’s generalization of the Hamming space.
Discrete Math., 307:2514–2524, 2007.
[1551] B. Qvist. Some remarks concerning curves of the second degree in a finite plane.
Ann. Acad. Sci Fenn., 134:1–27, 1952.
[1552] M. Rahman and I. F. Blake. Majority logic decoding using combinatorial designs.
IEEE Trans. Inform. Theory, 21:585–587, 1975.
[1553] E. M. Rains. Shadow bounds for self-dual codes. IEEE Trans. Inform. Theory,
44:134–139, 1998.
[1554] E. M. Rains. Nonbinary quantum codes. IEEE Trans. Inform. Theory, 45:1827–1832,
1999.
[1555] E. M. Rains and N. J. A. Sloane. Self-Dual Codes. In V. S. Pless and W. C.
Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 3, pages 177–294.
North-Holland, Amsterdam, 1998.
[1556] B. S. Rajan and M. U. Siddiqi. A generalized DFT for abelian codes over Zm . IEEE
Trans. Inform. Theory, 40:2082–2090, 1994.
[1557] A. Ralston. A new memoryless algorithm for de Bruijn sequences. J. Algorithms,
2:50–62, 1981.
[1558] A. Ralston. De Bruijn sequences—a model example of the interaction of discrete
mathematics and computer science. Math. Mag., 55:131–143, 1982.
[1559] H. Randriambololona. Bilinear complexity of algebras and the Chudnovsky-
Chudnovsky interpolation method. J. Complexity, 28:489–517, 2012.
[1560] H. Randriambololona. (2, 1)-separating systems beyond the probabilistic bound.
Israel J. Math., 195:171–186, 2013.
[1561] H. Randriambololona. Asymptotically good binary linear codes with asymptotically
good self-intersection spans. IEEE Trans. Inform. Theory, 59:3038–3045, 2013.
[1562] H. Randriambololona. An upper bound of Singleton type for componentwise prod-
ucts of linear codes. IEEE Trans. Inform. Theory, 59:7936–7939, 2013.
[1563] H. Randriambololona. Linear independence of rank 1 matrices and the dimension
of ∗-products of codes. In Proc. IEEE International Symposium on Information
Theory, pages 196–200, Hong Kong, China, June 2015.
[1564] H. Randriambololona. On products and powers of linear codes under componentwise
multiplication. In S. Ballet, M. Perret, and A. Zaytsev, editors, Algorithmic Arith-
metic, Geometry, and Coding Theory, volume 637 of Contemp. Math., pages 3–77.
Amer. Math. Soc., Providence, Rhode Island, 2015.
[1565] A. Rao and N. Pinnawala. A family of two-weight irreducible cyclic codes. IEEE
Trans. Inform. Theory, 56:2568–2570, 2010.
[1566] C. R. Rao. Factorial experiments derivable from combinatorial arrangements of
arrays. Suppl. to J. Roy. Statist. Soc., 9:128–139, 1947.
[1567] T. R. N. Rao and A. S. Chawla. Asymmetric error codes for some LSI semiconductor
memories. In Proc. 7th Southeastern Symposium on System Theory, pages 170–171,
Auburn-Tuskegee, Alabama, March 1975.
[1568] K. V. Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur, and K. Ramchandran.
A solution to the network challenges of data recovery in erasure-coded distributed
storage systems: a study on the Facebook Warehouse cluster. In Proc. 5th USENIX
Workshop on Hot Topics in Storage and File Systems, San Jose, California, 5 pages,
June 2013.
[1569] K. V. Rashmi, N. B. Shah, and P. V. Kumar. Optimal exact-regenerating codes for
distributed storage at the MSR and MBR points via a product-matrix construction.
IEEE Trans. Inform. Theory, 57:5227–5239, 2011.
[1570] K. V. Rashmi, N. B. Shah, P. V. Kumar, and K. Ramchandran. Explicit construction
of optimal exact regenerating codes for distributed storage. In Proc. 47th Allerton
Conference on Communication, Control, and Computing, pages 1243–1249, Monti-
cello, Illinois, September-October 2009.
[1571] K. V. Rashmi, N. B. Shah, and K. Ramchandran. A piggybacking design framework
for read-and download-efficient distributed storage codes. IEEE Trans. Inform. The-
ory, 63:5802–5820, 2017.
[1572] K. V. Rashmi, N. B. Shah, K. Ramchandran, and P. V. Kumar. Information-
theoretically secure erasure codes for distributed storage. IEEE Trans. Inform.
Theory, 64:1621–1646, 2018.
[1573] A. Ravagnani. Generalized weights: an anticode approach. J. Pure Appl. Algebra,
220:1946–1962, 2016.
[1574] A. Ravagnani. Rank-metric codes and their duality theory. Des. Codes Cryptogr.,
80:197–216, 2016.
[1575] A. Ravagnani. Duality of codes supported on regular lattices, with an application to
enumerative combinatorics. Des. Codes Cryptogr., 86:2035–2063, 2018.
[1576] A. S. Rawat. Secrecy capacity of minimum storage regenerating codes. In Proc.
IEEE International Symposium on Information Theory, pages 1406–1410, Aachen,
Germany, June 2017.
[1577] A. S. Rawat, O. O. Koyluoglu, N. Silberstein, and S. Vishwanath. Optimal locally
repairable and secure codes for distributed storage systems. IEEE Trans. Inform.
Theory, 60:212–236, 2014.
[1578] A. S. Rawat, O. O. Koyluoglu, and S. Vishwanath. Progress on high-rate MSR
codes: enabling arbitrary number of helper nodes. In Proc. Information Theory and
Applications Workshop, La Jolla, California, 6 pages, January-February 2016.
[1579] A. S. Rawat, A. Mazumdar, and S. Vishwanath. Cooperative local repair in dis-
tributed storage. EURASIP J. Adv. Signal Process., 2015:107, 2015.
[1580] A. S. Rawat, I. Tamo, V. Guruswami, and K. Efremenko. MDS code constructions
with small sub-packetization and near-optimal repair bandwidth. IEEE Trans. In-
form. Theory, 64:6506–6525, 2018.
[1581] I. S. Reed. A class of multiple-error-correcting codes and the decoding scheme. IRE
Trans. Inform. Theory, 4:38–49, 1954. (Also reprinted in [169] pages 27–38 and [212]
pages 50–61).

[1582] I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. J. Soc. Indust.
Appl. Math., 8:300–304, 1960. (Also reprinted in [169] pages 70–71 and [212] pages
189–193).
[1583] O. Regev. New lattice based cryptographic constructions. In Proc. 35th Annual ACM
Symposium on the Theory of Computing, pages 407–416, San Diego, California, June
2003. ACM Press, New York.
[1584] G. Regts. Upper Bounds for Ternary Constant Weight Codes from Semidefinite
Programming and Representation Theory. Master’s thesis, University of Amsterdam,
2009.

[1585] S. Reiger. Codes for the correction of “clustered” errors. IRE Trans. Inform. Theory,
6:16–21, 1960.
[1586] O. Reingold, S. Vadhan, and A. Wigderson. Entropy waves, the zig-zag graph prod-
uct, and new constant degree expanders and extractors. In Proc. 41st IEEE Sympo-
sium on Foundations of Computer Science, pages 3–13, Redondo Beach, California,
November 2000.
[1587] A. Renvall and C. Ding. The access structure of some secret-sharing schemes. In
J. Pieprzyk and J. Seberry, editors, Information Security and Privacy, volume 1172
of Lecture Notes in Comput. Sci., pages 67–78. Springer, Berlin, Heidelberg, 1996.
[1588] H. F. H. Reuvers. Some Non-existence Theorems for Perfect Codes over Arbitrary
Alphabets. Technische Hogeschool Eindhoven, Eindhoven, 1977. Written for confer-
ment of a Doctorate in Technical Sciences at the Technische Hogeschool, Eindhoven,
1977.
[1589] T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke. Design of capacity-
approaching irregular low-density parity-check codes. IEEE Trans. Inform. Theory,
47:619–637, 2001.
[1590] T. J. Richardson and R. L. Urbanke. The capacity of low-density parity-check codes
under message-passing decoding. IEEE Trans. Inform. Theory, 47:599–618, 2001.
[1591] T. J. Richardson and R. L. Urbanke. Modern Coding Theory. Cambridge University
Press, Cambridge, UK, 2008.

[1592] P. Rocha. Structure and Representation of 2-D Systems. PhD thesis, University of
Groningen, 1990.
[1593] B. G. Rodrigues. A projective two-weight code related to the simple group Co1 of
Conway. Graphs Combin., 34:509–521, 2018.

[1594] C. Roos. A new lower bound for the minimum distance of a cyclic code. IEEE Trans.
Inform. Theory, 29:330–332, 1983.
[1595] M. Y. Rosenbloom and M. A. Tsfasman. Codes for the m-metric (in Russian). Prob-
lemy Peredači Informacii, 33(1):55–63, 1997. (English translation in Probl. Inform.
Transm., 33(1):45–52, 1997).
[1596] J. Rosenthal. Connections between linear systems and convolutional codes. In
B. Marcus and J. Rosenthal, editors, Codes, Systems, and Graphical Models (Min-
neapolis, MN, 1999), volume 123 of IMA Vol. Math. Appl., pages 39–66. Springer,
New York, 2001.
[1597] J. Rosenthal, J. M. Schumacher, and E. V. York. On behaviors and convolutional
codes. IEEE Trans. Inform. Theory, 42:1881–1891, 1996.
[1598] J. Rosenthal and R. Smarandache. Maximum distance separable convolutional codes.
Appl. Algebra Engrg. Comm. Comput., 10:15–32, 1999.

[1599] J. Rosenthal and A.-L. Trautmann. A complete characterization of irreducible cyclic


orbit codes and their Plücker embedding. Des. Codes Cryptogr., 66:275–289, 2013.
[1600] J. Rosenthal and E. V. York. BCH convolutional codes. IEEE Trans. Inform. Theory,
45:1833–1844, 1999.
[1601] R. M. Roth. Maximum-rank array codes and their application to criss-cross error
correction. IEEE Trans. Inform. Theory, 37:328–336, 1991.
[1602] R. M. Roth. Introduction to Coding Theory. Cambridge University Press, Cambridge,
UK, 2006.
[1603] R. M. Roth and G. Seroussi. On generator matrices of MDS codes. IEEE Trans.
Inform. Theory, 31:826–830, 1985.
[1604] R. M. Roth and G. Seroussi. On cyclic MDS codes of length q over GF(q). IEEE
Trans. Inform. Theory, 32:284–285, 1986.
[1605] R. M. Roth and P. H. Siegel. Lee-metric BCH codes and their application to con-
strained and partial-response channels. IEEE Trans. Inform. Theory, 40:1083–1096,
1994.
[1606] O. S. Rothaus. On “bent” functions. J. Combinatorial Theory Ser. A, 20:300–305,
1976.

[1607] S. Y. E. Rouayheb and K. Ramchandran. Fractional repetition codes for repair in


distributed storage systems. arXiv:1010.2551 [cs.IT], October 2010.
[1608] G. F. Royle. An orderly algorithm and some applications in finite geometry. Discrete
Math., 185:105–115, 1998.
[1609] L. D. Rudolph. A class of majority-logic decodable codes. IEEE Trans. Inform.
Theory, 13:305–307, 1967.
[1610] SAGE. Delsarte, a.k.a. linear programming (LP), upper bounds. http:
//doc.sagemath.org/html/en/reference/coding/sage/coding/delsarte_
bounds.html. Accessed: 2018-08-31.

[1611] A. Sălăgean. Repeated-root cyclic and negacyclic codes over a finite chain ring.
Discrete Appl. Math., 154:413–419, 2006.
[1612] S. Saraf and M. Sudan. An improved lower bound on the size of Kakeya sets over
finite fields. Anal. PDE, 1:375–379, 2008.
[1613] G. Sarkis, P. Giard, A. Vardy, C. Thibeault, and W. J. Gross. Fast polar decoders:
algorithm and implementation. IEEE J. Selected Areas Commun., 32:946–957, 2014.
[1614] G. Sarkis, I. Tal, P. Giard, A. Vardy, C. Thibeault, and W. J. Gross. Flexible
and low-complexity encoding and decoding of systematic polar codes. IEEE Trans.
Commun., 64:2732–2745, 2016.
[1615] P. K. Sarvepalli, A. Klappenecker, and M Rötteler. Asymmetric quantum codes: con-
structions, bounds and performance. Proc. Roy. Soc. London Ser. A, 465(2105):1645–
1672, 2009.

[1616] D. V. Sarwate and M. B. Pursley. Correction to “Crosscorrelation properties of


pseudorandom and related sequences” [Proceedings of the IEEE, 68:593–619, 1980].
Proceedings of the IEEE, 68:1554, 1980.
[1617] D. V. Sarwate and M. B. Pursley. Crosscorrelation properties of pseudorandom and
related sequences. Proceedings of the IEEE, 68:593–619, 1980.

[1618] B. Sasidharan, G. K. Agarwal, and P. V. Kumar. Codes with hierarchical locality.


In Proc. IEEE International Symposium on Information Theory, pages 1257–1261,
Hong Kong, China, June 2015.
[1619] B. Sasidharan, G. K. Agarwal, and P. V. Kumar. A high-rate MSR code with polyno-
mial sub-packetization level. In Proc. IEEE International Symposium on Information
Theory, pages 2051–2055, Hong Kong, China, June 2015.
[1620] B. Sasidharan, K. Senthoor, and P. V. Kumar. An improved outer bound on the stor-
age repair-bandwidth tradeoff of exact-repair regenerating codes. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 2430–2434, Honolulu, Hawaii,
June-July 2014.

[1621] B. Sasidharan, M. Vajha, and P. V. Kumar. An explicit, coupled-layer construction


of a high-rate MSR code with low sub-packetization level, small field size and all-node
repair. arXiv:1607.07335 [cs.IT], 2016.
[1622] E. Saşoğlu, E. Telatar, and E. Arıkan. Polarization for arbitrary discrete memoryless
channels. In Proc. IEEE Information Theory Workshop, pages 144–148, Taormina,
Italy, October 2009.
[1623] E. Saşoğlu, E. Telatar, and E. Yeh. Polar codes for the two-user binary-input
multiple-access channel. In Proc. IEEE Information Theory Workshop, Cairo, Egypt,
5 pages, January 2010.

[1624] M. Sathiamoorthy, M. Asteris, D. S. Papailiopoulos, A. G. Dimakis, R. Vadali,


S. Chen, and D. Borthakur. XORing elephants: novel erasure codes for big data.
Proc. VLDB Endowment (PVLDB), 6:325–336, 2013.
[1625] J. Sawada, A. Williams, and D. Wong. A surprisingly simple de Bruijn sequence
construction. Discrete Math., 339:127–131, 2016.

[1626] A. Sboui. Special numbers of rational points on hypersurfaces in the n-dimensional


projective space over a finite field. Discrete Math., 309:5048–5059, 2009.
[1627] B. Schmidt and C. White. All two-weight irreducible cyclic codes? Finite Fields
Appl., 8:1–17, 2002.
[1628] W. M. Schmidt. Diophantine Approximation, volume 785 of Lecture Notes in Math.
Springer, Berlin, 1980.
[1629] W. M. Schmidt. Equations Over Finite Fields: An Elementary Approach. Kendrick
Press, Heber City, Utah, 2nd edition, 2004.
[1630] J. Schönheim. On linear and nonlinear single-error-correcting q-nary perfect codes.
Inform. and Control, 12:23–26, 1968.
[1631] H. D. Schotten. Optimum complementary sets and quadriphase sequences derived
from q-ary m-sequences. In Proc. IEEE International Symposium on Information
Theory, page 485, Ulm, Germany, June-July 1997.
[1632] A. Schrijver. A comparison of the Delsarte and Lovász bounds. IEEE Trans. Inform.
Theory, 25:425–429, 1979.
[1633] A. Schrijver. Theory of Linear and Integer Programming. Wiley-Interscience Series
in Discrete Mathematics. John Wiley & Sons, Ltd., Chichester, UK, 1986.
[1634] A. Schrijver. New code upper bounds from the Terwilliger algebra and semidefinite
programming. IEEE Trans. Inform. Theory, 51:2859–2866, 2005.
[1635] B. Schumacher. Quantum coding. Physical Review A, 51:2738–2747, April 1995.
[1636] M. Schwartz and A. Vardy. On the stopping distance and stopping redundancy
of codes. In Proc. IEEE International Symposium on Information Theory, pages
975–979, Adelaide, Australia, September 2005.
[1637] G. F. Seelinger, P. A. Sissokho, L. E. Spence, and C. Vanden Eynden. Partitions of
V (n, q) into 2- and s-dimensional subspaces. J. Combin. Des., 20:467–482, 2012.
[1638] B. Segre. Curve razionali normali e k-archi negli spazi finiti. Ann. Mat. Pura Appl.
(4), 39:357–379, 1955.
[1639] B. Segre. Ovals in a finite projective plane. Canad. J. Math., 7:414–416, 1955.
[1640] B. Segre. Sui k-archi nei piani finiti di caratteristica due. Rev. Math. Pures Appl.,
2:289–300, 1957.
[1641] B. Segre. Ovali e curve σ nei piani di Galois di caratteristica due (in Italian). Atti
Accad. Naz. Lincei Rend. Cl. Sci. Fis. Mat. Nat. (8), 32:785–790, 1962.
[1642] E. S. Selmer. Linear Recurrence Relations Over Finite Fields. Department of Infor-
matics, University of Bergen, 1966.
[1643] N. V. Semakov and V. A. Zinov’ev. Equidistant q-ary codes and resolved balanced
incomplete block designs (in Russian). Problemy Peredači Informacii, 4(2):3–10,
1968. (English translation in Probl. Inform. Transm., 4(2):1–7, 1968).
[1644] N. V. Semakov, V. A. Zinov’ev, and G. V. Zaitsev. Class of maximal equidistant codes
(in Russian). Problemy Peredači Informacii, 5(2):84–87, 1969. (English translation
in Probl. Inform. Transm., 5(2):65–68, 1969).
[1645] P. Semenov and P. Trifonov. Spectral method for quasi-cyclic code analysis. IEEE
Commun. Letters, 16:1840–1843, 2012.
[1646] N. Sendrier. On the structure of a randomly permuted concatenated code. In
P. Charpin, editor, EUROCODE 94 – Livre des résumés, pages 169–173. INRIA,
1994.
[1647] N. Sendrier. Finding the permutation between equivalent linear codes: the support
splitting algorithm. IEEE Trans. Inform. Theory, 46:1193–1203, 2000.
[1648] N. Sendrier. Linear codes with complementary duals meet the Gilbert-Varshamov
bound. Discrete Math., 285:345–347, 2004.
[1649] N. Sendrier. Decoding one out of many. In B.-Y. Yang, editor, Post-Quantum
Cryptography, volume 7071 of Lecture Notes in Comput. Sci., pages 51–67. Springer,
Berlin, Heidelberg, 2011.
[1650] N. Sendrier and D. E. Simos. The hardness of code equivalence over Fq and its
application to code-based cryptography. In P. Gaborit, editor, Post-Quantum Cryp-
tography, volume 7932 of Lecture Notes in Comput. Sci., pages 203–216. Springer,
Berlin, Heidelberg, 2013.
[1651] N. Sendrier and V. Vasseur. On the decoding failure rate of QC-MDPC bit-flipping
decoders. In J. Ding and R. Steinwandt, editors, Post-Quantum Cryptography, vol-
ume 11505 of Lecture Notes in Comput. Sci., pages 404–416. Springer, Berlin, Hei-
delberg, 2019.
[1652] K. Senthoor, B. Sasidharan, and P. V. Kumar. Improved layered regenerating codes
characterizing the exact-repair storage-repair bandwidth tradeoff for certain param-
eter sets. In Proc. IEEE Information Theory Workshop, pages 224–228, Jerusalem,
Israel, April-May 2015.
[1653] J.-P. Serre. Nombres de points des courbes algébriques sur Fq . In Seminar on Number
Theory, 1982–1983 (Talence, 1982/1983), pages Exp. No. 22, 8. Univ. Bordeaux I,
Talence, 1983.
[1654] J.-P. Serre. Lettre à M. Tsfasman. Astérisque, 198-200(11):351–353, 1991/1992.
[1655] B. A. Sethuraman and B. S. Rajan. An algebraic description of orthogonal de-
signs and the uniqueness of the Alamouti code. In Proc. GLOBECOM ’02 – IEEE
Global Telecommunications Conference, volume 2, pages 1088–1093, Taipei, Taiwan,
November 2002.
[1656] B. A. Sethuraman, B. S. Rajan, and V. Shashidhar. Full-diversity, high-rate space-
time block codes from division algebras. IEEE Trans. Inform. Theory, 49:2596–2616,
2003.
[1657] I. R. Shafarevich. Basic Algebraic Geometry 1: Varieties in Projective Space.
Springer-Verlag, Berlin, 2nd edition, 1994. Translated from the 1988 Russian edition
and with notes by Miles Reid.
[1658] N. B. Shah, K. V. Rashmi, P. V. Kumar, and K. Ramchandran. Distributed storage
codes with repair-by-transfer and nonachievability of interior points on the storage-
bandwidth tradeoff. IEEE Trans. Inform. Theory, 58:1837–1852, 2012.
[1659] A. Shamir. How to share a secret. Commun. ACM, 22:612–613, 1979.
[1660] K. Shanmugam, D. S. Papailiopoulos, A. G. Dimakis, and G. Caire. A repair frame-
work for scalar MDS codes. IEEE J. Selected Areas Commun., 32:998–1007, 2014.
[1661] C. E. Shannon. A mathematical theory of communication. Bell System Tech. J.,
27:379–423 and 623–656, 1948.
[1662] C. E. Shannon. Communication theory of secrecy systems. Bell System Tech. J.,
28:656–715, 1949.
[1663] C. E. Shannon. The zero error capacity of a noisy channel. IRE Trans. Inform.
Theory, 2:8–19, 1956.

[1664] S. Shao, T. Liu, C. Tian, and C. Shen. On the tradeoff region of secure exact-repair
regenerating codes. IEEE Trans. Inform. Theory, 63:7253–7266, 2017.
[1665] A. Sharma and A. K. Sharma. MacWilliams identities for m-spotty weight enumer-
ators of codes over rings. Australas. J. Combin., 58:67–105, 2014.

[1666] V. Shashidhar, B. S. Rajan, and B. A. Sethuraman. Information-lossless space-time


block codes from crossed-product algebras. IEEE Trans. Inform. Theory, 52:3913–
3935, 2006.
[1667] J. Sheekey. A new family of linear maximum rank distance codes. Adv. Math.
Commun., 10:475–488, 2016.

[1668] M. Shi, A. Alahmadi, and P. Solé. Codes and Rings: Theory and Practice. Academic
Press, 2017.
[1669] M. Shi, Y. Guan, and P. Solé. Two new families of two-weight codes. IEEE Trans.
Inform. Theory, 63:6240–6246, 2017.

[1670] M. Shi, Y. Guan, C. Wang, and P. Solé. Few-weight codes from trace codes over Rk .
Bull. Aust. Math. Soc., 98:167–174, 2018.
[1671] M. Shi, D. Huang, and P. Solé. Optimal ternary cubic two-weight codes. Chinese J.
Electronics, 27:734–738, 2018.

[1672] M. Shi, Y. Liu, and P. Solé. Optimal two-weight codes from trace codes over F2 +uF2 .
IEEE Commun. Letters, 20:2346–2349, 2016.
[1673] M. Shi, Y. Liu, and P. Solé. Optimal binary codes from trace codes over a non-chain
ring. Discrete Appl. Math., 219:176–181, 2017.

[1674] M. Shi, Y. Liu, and P. Solé. Two-weight and three-weight codes from trace codes
over Fp + uFp + vFp + uvFp . Discrete Math., 341:350–357, 2018.
[1675] M. Shi, L. Q. Qian, and P. Solé. Few-weight codes from trace codes over a local ring.
Appl. Algebra Engrg. Comm. Comput., 29:335–350, 2018.
[1676] M. Shi, R. S. Wu, Y. Liu, and P. Solé. Two and three weight codes over Fp + uFp .
Cryptogr. Commun., 9:637–646, 2017.
[1677] M. Shi, R. S. Wu, L. Q. Qian, L. Sok, and P. Solé. New classes of p-ary few weight
codes. Bull. Malays. Math. Sci. Soc., 42:1393–1412, 2019.
[1678] M. Shi, R. S. Wu, and P. Solé. Asymptotically good additive cyclic codes exist. IEEE
Commun. Letters, 22:1980–1983, 2018.
[1679] M. Shi, H. Zhu, and P. Solé. Optimal three-weight cubic codes. Appl. Comput.
Math., 17:175–184, 2018.
[1680] M. Shi, S. Zhu, and S. Yang. A class of optimal p-ary codes from one-weight codes
over Fp [u]/(um ). J. Franklin Inst., 350:929–937, 2013.
[1681] K. Shimizu. A parallel LSI architecture for LDPC decoder improving message-
passing schedule. In Proc. IEEE International Symposium on Circuits and Systems,
pages 5099–5102, Island of Kos, Greece, May 2006.
[1682] K. Shiromoto. Singleton bounds for codes over finite rings. J. Algebraic Combin.,
12:95–99, 2000.
[1683] K. Shiromoto. Matroids and codes with the rank metric. arXiv:1803.06041
[math.CO], March 2018.
[1684] M. A. Shokrollahi. New sequences of linear time erasure codes approaching the
channel capacity. In M. Fossorier, H. Imai, S. Shu Lin, and A. Poli, editors, Applied
Algebra, Algebraic Algorithms and Error-Correcting Codes, volume 1719 of Lecture
Notes in Comput. Sci., pages 65–76. Springer, Berlin, Heidelberg, 1999.
[1685] M. A. Shokrollahi. Codes and graphs. In H. Reichel and S. Tison, editors, STACS
2000 – Symposium on Theoretical Aspects of Computer Science, volume 1770 of
Lecture Notes in Comput. Sci., pages 1–12. Springer, Berlin, Heidelberg, 2000.
[1686] M. A. Shokrollahi. Capacity-achieving sequences. In M. Brian and J. Rosenthal,
editors, Codes, Systems, and Graphical Models (Minneapolis, MN 1999), volume 123
of The IMA Volumes in Mathematics and its Applications, pages 153–166. Springer,
New York, 2001.
[1687] M. A. Shokrollahi. Raptor codes. IEEE Trans. Inform. Theory, 52:2551–2567, 2006.
[1688] M. A. Shokrollahi. Theory and applications of Raptor codes. In A. Quarteroni,
editor, MATHKNOW—Mathematics, Applied Sciences and Real Life, volume 3 of
MS&A. Model. Simul. Appl., pages 59–89. Springer-Verlag Italia, Milan, 2009.
[1689] M. A. Shokrollahi, B. Hassibi, B. M. Hochwald, and W. Sweldens. Representation
theory for high-rate multiple-antenna code design. IEEE Trans. Inform. Theory,
47:2335–2367, 2001.
[1690] M. A. Shokrollahi, S. Lassen, and R. Karp. Systems and processes for decoding
chain reaction codes through inactivation. http://www.freepatentsonline.com/
6856263.html, February 2005.
[1691] M. A. Shokrollahi and M. G. Luby. Raptor codes. Found. Trends Commun. and
Inform. Theory, 6:213–322, 2009.
[1692] M. A. Shokrollahi, T. Stockhammer, M. G. Luby, and M. Watson. Raptor Forward
Error Correction Scheme for Object Delivery. RFC 5053, October 2007.
[1693] M. A. Shokrollahi and H. Wasserman. List decoding of algebraic-geometric codes.
IEEE Trans. Inform. Theory, 45:432–437, 1999.
[1694] P. W. Shor. Algorithms for quantum computation: discrete logarithms and factoring.
In S. Goldwasser, editor, Proc. 35th IEEE Symposium on Foundations of Computer
Science, pages 124–134, Santa Fe, New Mexico, 1994. IEEE Comput. Soc. Press, Los
Alamitos, California.
[1695] P. W. Shor. Scheme for reducing decoherence in quantum computer memory. Physical
Review A, 52:R2493–R2496, October 1995.
[1696] P. W. Shor. Polynomial-time algorithms for prime factorization and discrete loga-
rithms on a quantum computer. SIAM J. Comput., 26:1484–1509, 1997.
[1697] I. E. Shparlinski, M. A. Tsfasman, and S. G. Vlădaţ. Curves with many points
and multiplication in finite fields. In H. Stichtenoth and M. A. Tsfasman, editors,
Coding Theory and Algebraic Geometry, volume 1518 of Lecture Notes in Math.,
pages 145–169. Springer, Berlin, Heidelberg, 1992.

[1698] K. W. Shum and Y. Hu. Cooperative regenerating codes. IEEE Trans. Inform.
Theory, 59:7229–7258, 2013.
[1699] I. Şiap. MacWilliams identity for m-spotty Lee weight enumerators. Appl. Math.
Lett., 23:13–16, 2010.

[1700] I. Şiap, T. Abualrub, and A. Ghrayeb. Cyclic DNA codes over the ring F2 [u]/(u2 −1)
based on the deletion distance. J. Franklin Inst., 346:731–740, 2009.
[1701] I. Şiap, N. Aydin, and D. K. Ray-Chaudhuri. New ternary quasi-cyclic codes with
better minimum distances. IEEE Trans. Inform. Theory, 46:1554–1558, 2000.
[1702] V. M. Sidelńikov. Some k-valued pseudo-random sequences and nearly equidistant
codes (in Russian). Problemy Peredači Informacii, 5(1):16–22, 1969 (English trans-
lation in Probl. Inform. Transm., 5(1):12–16, 1969).
[1703] V. M. Sidelńikov. On extremal polynomials used in bounds of code volume (in
Russian). Problemy Peredači Informacii, 16(3):17–30, 1980. (English translation in
Probl. Inform. Transm., 16(3):174–186, 1980).

[1704] V. M. Sidelńikov. A public-key cryptosytem based on Reed-Muller codes (in Rus-


sian). Diskret. Mat., 6(2):3–20, 1994 (English translation in Discrete Math. Appl.,
4(3):191–207, 1994).
[1705] V. M. Sidelńikov and S. O. Shestakov. On the insecurity of cryptosystems based
on generalized Reed-Solomon codes (in Russian). Diskret. Mat., 4(3):57–63, 1992
(English translation in Discrete Math. Appl., 2(4):439–444, 1992).
[1706] N. Silberstein and T. Etzion. Optimal fractional repetition codes based on graphs
and designs. IEEE Trans. Inform. Theory, 61:4164–4180, 2015.
[1707] N. Silberstein and A.-L. Trautmann. Subspace codes based on graph matchings,
Ferrers diagrams, and pending blocks. IEEE Trans. Inform. Theory, 61:3937–3953,
2015.
[1708] D. Silva. Error Control for Network Coding. PhD thesis, University of Toronto,
2009.

[1709] D. Silva and F. R. Kschischang. Fast encoding and decoding of Gabidulin codes.
In Proc. IEEE International Symposium on Information Theory, pages 2858–2862,
Seoul, Korea, June-July 2009.
[1710] D. Silva and F. R. Kschischang. On metrics for error correction in network coding.
IEEE Trans. Inform. Theory, 55:5479–5490, 2009.

[1711] D. Silva, F. R. Kschischang, and R. Kötter. A rank-metric approach to error control


in random network coding. IEEE Trans. Inform. Theory, 54:3951–3967, 2008.
[1712] F. G. Silva, V. Sousa, and Marinho L. High coded data rate and multicodeword
WiMAX LDPC decoding on the Cell/BE. IET Electronics Letters, 44:1415–1417,
2008.
[1713] J. H. Silverman. The Arithmetic of Elliptic Curves, volume 106 of Graduate Texts
in Mathematics. Springer, Dordrecht, 2nd edition, 2009.
[1714] B. Simon. A Course in Convexity—An Analytic Viewpoint. Cambridge University
Press, Cambridge, UK, 2011.
[1715] J. Simonis. The [18, 9, 6] code is unique. Discrete Math., 106/107:439—-448, 1992.
[1716] J. Singer. A theorem in finite projective geometry and some applications to number
theory. Trans. Amer. Math. Soc., 43:377–385, 1938.

[1717] R. C. Singleton. Maximum distance q-ary codes. IEEE Trans. Inform. Theory,
10:116–118, 1964.
[1718] M. Sinnokrot, J. R. Barry, , and V. Madisetti. Embedded Alamouti space-time
codes for high rate and low decoding complexity. In Proc. 42nd Asilomar Conference
on Signals, Systems and Computers, pages 1749–1753, Pacific Grove, California,
October 2008.
[1719] M. Sipser and D. Spielman. Expander codes. IEEE Trans. Inform. Theory, 42:1710–
1722, 1996.
[1720] A. N. Skorobogatov and S. G. Vlăduţ. On the decoding of algebraic-geometric codes.
IEEE Trans. Inform. Theory, 36:1051–1060, 1990.
[1721] M. M. Skriganov. Coding theory and uniform distributions. St. Petersburg Math.
J., 13:301–337, 2002.
[1722] D. Slepian. A class of binary signaling alphabets. Bell System Tech. J., 35:203–234,
1956. (Also reprinted in [169] pages 56–65 and [212] pages 83–114).

[1723] D. Slepian. A note on two binary signaling alphabets. IRE Trans. Inform. Theory,
2:84–86, 1956. (Also reprinted in [212] pages 115–117).
[1724] D. Slepian. Some further theory of group codes. Bell System Tech. J., 39:203–234,
1960. (Also reprinted in [212] pages 118–151).

[1725] D. Slepian. Group codes for the Gaussian channel. Bell System Tech. J., 47:575–602,
1968.
[1726] N. J. A. Sloane. Is there a (72, 36) d = 16 self-dual code? IEEE Trans. Inform.
Theory, 19:251, 1973.

[1727] N. J. A. Sloane and J. G. Thompson. Cyclic self-dual codes. IEEE Trans. Inform.
Theory, 29:364–366, 1983.
[1728] R. Smarandache, H. Gluesing-Luerssen, and J. Rosenthal. Constructions of MDS-
convolutional codes. IEEE Trans. Inform. Theory, 47:2045–2049, 2001.
[1729] R. Smarandache and J. Rosenthal. A state space approach for constructing MDS
rate 1/n convolutional codes. In Proc. IEEE Information Theory Workshop, pages
116–117, Killarney, Ireland, June 1998.
[1730] R. Smarandache and P. O. Vontobel. Quasi-cyclic LDPC codes: influence of proto-
and Tanner-graph structure on minimum Hamming distance upper bounds. IEEE
Trans. Inform. Theory, 58:585–607, 2012.
[1731] K. J. C. Smith. On the p-rank of the incidence matrix of points and hyperplanes in
a finite projective geometry. J. Combin. Theory, 7:122–129, 1969.
[1732] S. L. Snover. The Uniqueness of the Nordstrom–Robinson and the Golay Binary
Codes. PhD thesis, Michigan State University, 1973.
[1733] P. Solé. Asymptotic bounds on the covering radius of binary codes. IEEE Trans.
Inform. Theory, 36:1470–1472, 1990.
[1734] P. Solé. The covering radius of spherical designs. European J. Combin., 12:423–431,
1991.
[1735] P. Solé, editor. Codes Over Rings, volume 6 of Series on Coding Theory and Cryp-
tology. World Sci. Publ., Hackensack, New Jersey, 2009.
[1736] G. Solomon and H. C. A. van Tilborg. A connection between block and convolutional
codes. SIAM J. Appl. Math., 37:358–369, 1979.

[1737] W. Song, K. Cai, C. Yuen, K. Cai, and G. Han. On sequential locally repairable
codes. IEEE Trans. Inform. Theory, 64:3513–3527, 2017.
[1738] W. Song, S. H. Dau, C. Yuen, and T. J. Li. Optimal locally repairable linear codes.
IEEE J. Selected Areas Commun., 32:1019–1036, 2014.

[1739] W. Song and C. Yuen. Locally repairable codes with functional repair and multiple
erasure tolerance. arXiv:1507.02796 [cs.IT], 2015.
[1740] Y. Song, Y. Li, Z. Li, and J. Li. A new multi-use multi-secret sharing scheme based
on the duals of minimal linear codes. Security and Commun. Networks, 8:202–211,
2015.

[1741] A. B. Sørensen. Projective Reed-Muller codes. IEEE Trans. Inform. Theory,


37:1567–1576, 1991.
[1742] E. Spiegel. Codes over Zm . Inform. and Control, 35:48–51, 1977.
[1743] E. Spiegel. Codes over Zm , revisited. Inform. and Control, 37:100–104, 1978.

[1744] D. A. Spielman. Linear-time encodable and decodable error-correcting codes. IEEE


Trans. Inform. Theory, 42:1723–1731, 1996.
[1745] A. Sridharan, M. Lentmaier, D. J. Costello, Jr., and K. Sh. Zigangirov. Terminated
LDPC convolutional codes with thresholds close to capacity. In Proc. IEEE Inter-
national Symposium on Information Theory, pages 1372–1376, Adelaide, Australia,
September 2005.
[1746] R. Srikant and L. Ying. Communication Networks: An Optimization, Control, and
Stochastic Networks Perspective. Cambridge University Press, Cambridge, UK, 2014.
[1747] K. P. Srinath and B. S. Rajan. Low ML-decoding complexity, large coding gain,
full-diversity STBCs for 2 × 2 and 4 × 2 MIMO systems. IEEE J. Selected Topics
Signal Process., 3:916–927, 2010.
[1748] M. K. Srinivasan. Symmetric chains, Gelfand-Tsetlin chains, and the Terwilliger
algebra of the binary Hamming scheme. J. Algebraic Combin., 34:301–322, 2011.
[1749] A. M. Steane. Multiple-particle interference and quantum error correction. Proc.
Roy. Soc. London Ser. A, 452(1954):2551–2577, 1996.
[1750] A. M. Steane. Enlargement of Calderbank-Shor-Steane quantum codes. IEEE Trans.
Inform. Theory, 45:2492–2495, 1999.
[1751] A. M. Steane. Overhead and noise threshold of fault-tolerant quantum error correc-
tion. Physical Review A, 68(4):042322, October 2003.
[1752] J. Stern. A method for finding codewords of small weight. In G. D. Cohen and
J. Wolfmann, editors, Coding Theory and Applications, volume 388 of Lecture Notes
in Comput. Sci., pages 106–113. Springer, Berlin, Heidelberg, 1989.
[1753] J. Stern. A new identification scheme based on syndrome decoding. In D. R. Stinson,
editor, Advances in Cryptology – CRYPTO ’93, volume 773 of Lecture Notes in
Comput. Sci., pages 13–21. Springer, Berlin, Heidelberg, 1994.
[1754] H. Stichtenoth. Transitive and self-dual codes attaining the Tsfasman-Vlăduţ-Zink
bound. IEEE Trans. Inform. Theory, 52:2218–2224, 2006.
[1755] H. Stichtenoth. Algebraic Function Fields and Codes, volume 254 of Graduate Texts
in Mathematics. Springer-Verlag, Berlin, 2nd edition, 2009.
[1756] H. Stichtenoth and C. Xing. Excellent nonlinear codes from algebraic function fields.
IEEE Trans. Inform. Theory, 51:4044–4046, 2005.
[1757] D. R. Stinson and R. Wei. Combinatorial properties and constructions of traceability
schemes and frameproof codes. SIAM J. Discrete Math., 11:41–53, 1998.
[1758] L. Storme. Linear codes meeting the Griesmer bound, minihypers and geometric
applications. Le Matematiche, 59:367–392, 2004.
[1759] V. Strassen. Gaussian elimination is not optimal. Numer. Math., 13:354–356, 1969.
[1760] S. Suda and H. Tanaka. A cross-intersection theorem for vector spaces based on
semidefinite programming. Bull. London Math. Soc., 46:342–348, 2014.
[1761] S. Suda, H. Tanaka, and N. Tokushige. A semidefinite programming approach to
a cross-intersection problem with measures. Math. Program. Ser. A, 166:113–130,
2017.
[1762] M. Sudan. Decoding of Reed-Solomon codes beyond the error-correction bound. J.
Complexity, 13:180–193, 1997.
[1763] Y. Sugiyama, M. Kasahara, S. Hirasawa, and T. Namekawa. Further results on
Goppa codes and their applications to constructing efficient binary codes. IEEE
Trans. Inform. Theory, 22:518–526, 1976.
[1764] C. Suh and K. Ramchandran. Exact-repair MDS code construction using interference
alignment. IEEE Trans. Inform. Theory, 57:1425–1442, 2011.
[1765] K. Suzuki, H. Kaneko, and E. Fujiwara. MacWilliams identity for m-spotty weight
enumerator. In Proc. IEEE International Symposium on Information Theory, pages
31–35, Nice, France, June 2007.
[1766] G. Szegö. Orthogonal Polynomials. Colloquium publications. Amer. Math. Soc., New
York, 1939.
[1767] T. Szőnyi and Z. Weiner. Stability of k mod p multisets and small weight codewords
of the code generated by the lines of PG(2, q). J. Combin. Theory Ser. A, 157:321–
333, 2018.
[1768] M. Takenaka, K. Okamoto, and T. Maruta. On optimal non-projective ternary linear
codes. Discrete Math., 308:842–854, 2008.
[1769] I. Tal and A. Vardy. How to construct polar codes. IEEE Trans. Inform. Theory,
59:6562–6582, 2013.
[1770] I. Tal and A. Vardy. List decoding of polar codes. IEEE Trans. Inform. Theory,
61:2213–2226, 2015.
[1771] I. Tamo and A. Barg. Bounds on locally recoverable codes with multiple recovering
sets. In Proc. IEEE International Symposium on Information Theory, pages 691–695,
Honolulu, Hawaii, June-July 2014.
[1772] I. Tamo and A. Barg. A family of optimal locally recoverable codes. IEEE Trans.
Inform. Theory, 60:4661–4676, 2014.
[1773] I. Tamo, A. Barg, S. Goparaju, and A. R. Calderbank. Cyclic LRC codes, binary
LRC codes, and upper bounds on the distance of cyclic codes. Internat. J. Inform.
Coding Theory, 3:345–364, 2016.

[1774] I. Tamo, Z. Wang, and J. Bruck. Zigzag codes: MDS array codes with optimal
rebuilding. IEEE Trans. Inform. Theory, 59:1597–1616, 2013.
[1775] I. Tamo, Z. Wang, and J. Bruck. Access versus bandwidth in codes for storage. IEEE
Trans. Inform. Theory, 60:2028–2037, 2014.
[1776] I. Tamo, M. Ye, and A. Barg. The repair problem for Reed-Solomon codes: optimal
repair of single and multiple erasures with almost optimal node size. IEEE Trans.
Inform. Theory, 65:2673–2695, 2019.
[1777] H. Tanaka. New proofs of the Assmus-Mattson theorem based on the Terwilliger
algebra. European J. Combin., 30:736–746, 2009.

[1778] C. Tang, N. Li, Y. Qi, Z. Zhou, and T. Helleseth. Linear codes with two or three
weights from weakly regular bent functions. IEEE Trans. Inform. Theory, 62:1166–
1176, 2016.
[1779] C. Tang, Y. Qi, and M. Xu. A note on cyclic codes from APN functions. Appl.
Algebra Engrg. Comm. Comput., 25:21–37, 2014.

[1780] H. Tang, J. Xu, Lin. S., and K. Abdel-Ghaffar. Codes on finite geometries. IEEE
Trans. Inform. Theory, 52:572–596, 2005.
[1781] X. Tang and C. Ding. New classes of balanced quaternary and almost balanced
binary sequences with optimal autocorrelation value. IEEE Trans. Inform. Theory,
56:6398–6405, 2010.

[1782] X. Tang, P. Fan, and S. Matsufuji. Lower bounds on correlation of spreading sequence
set with low or zero correlation zone. Electron. Lett., 36:551–552, 2000.
[1783] X. Tang and G. Gong. New constructions of binary sequences with optimal autocor-
relation value/magnitude. IEEE Trans. Inform. Theory, 56:1278–1286, 2010.
[1784] R. M. Tanner. A recursive approach to low complexity codes. IEEE Trans. Inform.
Theory, 27:533–547, 1981.
[1785] R. M. Tanner. A transform theory for a class of group-invariant codes. IEEE Trans.
Inform. Theory, 34:752–775, 1988.
[1786] R. M. Tanner. On quasi-cyclic repeat accumulate codes. In Proc. 37th Allerton
Conference on Communication, Control, and Computing, pages 249–259, Monticello,
Illinois, September 1999.
[1787] R. M. Tanner. Minimum distance bounds by graph analysis. IEEE Trans. Inform.
Theory, 47:808–821, 2001.
[1788] R. M. Tanner, D. Sridhara, and T. E. Fuja. A class of group structured LDPC codes.
In Proc. 6th International Symposium on Communication Theory and Applications,
pages 365–370, Ambleside, UK, July 2001.
[1789] R. M. Tanner, D. Sridhara, A. Sridharan, D. J. Costello, Jr., and T. E. Fuja. LDPC
block and convolutional codes from circulant matrices. IEEE Trans. Inform. Theory,
50:2966–2984, 2004.
[1790] T. Tao and V. H. Vu. Additive Combinatorics, volume 105 of Cambridge Studies in
Advanced Mathematics. Cambridge University Press, Cambridge, UK, 2006.
[1791] L. F. Tapia Cuitiño and A. L. Tironi. Some properties of skew codes over finite
fields. Des. Codes Cryptogr., 85:359–380, 2017.
[1792] V. Tarokh, H. Jafarkhani, and A. R. Calderbank. Space-time block codes from
orthogonal design. IEEE Trans. Inform. Theory, 45:1456–1466, 1999.
[1793] V. Tarokh, N. Seshadri, and A. R. Calderbank. Space-time codes for high data rate
wireless communication: performance criterion and code construction. IEEE Trans.
Inform. Theory, 44:744–765, 1998.
[1794] O. Taussky and J. Todd. Covering theorems for groups. Ann. Soc. Polon. Math.,
21:303–305, 1948.
[1795] L. Teirlinck. On projective and affine hyperplanes. J. Combin. Theory Ser. A,
28:290–306, 1980.
[1796] E. Telatar. Capacity of multi-antenna Gaussian channels. European Trans. on
Telecommun., 10:585–596, 1999.
[1797] S. Ten Brink. Convergence of iterative decoding. IEEE Electronic Letters, 35:806–
808, 1999.
[1798] S. Ten Brink. Convergence behavior of iteratively decoded parallel concatenated
codes. IEEE Trans. Inform. Theory, 49:1727–1737, 2001.
[1799] A. Thangaraj and S. W. McLaughlin. Quantum codes from cyclic codes over GF(4m ).
IEEE Trans. Inform. Theory, 47:1176–1178, 2001.
[1800] J. G. Thompson. Weighted averages associated to some codes. Scripta Math., 29:449–
452, 1973.
[1801] T. M. Thompson. From Error-Correcting Codes Through Sphere Packings to Simple
Groups, volume 21, Carus Mathematical Monographs. Mathematical Association of
America, Washington DC, 1983.
[1802] J. Thorpe. Low-density parity-check codes constructed from protographs. IPN
Progress Report, pages 42–154, 2003.
[1803] C. Tian. Characterizing the rate region of the (4, 3, 3) exact-repair regenerating
codes. IEEE J. Selected Areas Commun., 32:967–975, 2014.
[1804] C. Tian, B. Sasidharan, V. Aggarwal, V. A. Vaishampayan, and P. V. Kumar. Lay-
ered exact-repair regenerating codes via embedded error correction and block designs.
IEEE Trans. Inform. Theory, 61:1933–1947, 2015.

[1805] A. Tietäväinen. On the nonexistence of perfect codes over finite fields. SIAM J.
Appl. Math., 24:88–96, 1973.
[1806] A. Tietäväinen. Nonexistence of nontrivial perfect codes in case q = pr1 ps2 , e ≥ 3.
Discrete Math., 17:199–205, 1977.

[1807] A. Tietäväinen. An upper bound on the covering radius as a function of the dual
distance. IEEE Trans. Inform. Theory, 36:1472–1474, 1990.
[1808] A. Tietäväinen. Covering radius and dual distance. Des. Codes Cryptogr., 1:31–46,
1991.
[1809] J. Tits. Ovoı̈des à translations. Rend. Mat. e Appl. (5), 21:37–59, 1962.

[1810] V. Tomás, J. Rosenthal, and R. Smarandache. Decoding of convolutional codes over


the erasure channel. IEEE Trans. Inform. Theory, 58:90–108, 2012.
[1811] V. D. Tonchev. Quasi-symmetric 2-(31, 7, 7) designs and a revision of Hamada’s
conjecture. J. Combin. Theory Ser. A, 42:104–110, 1986.

[1812] V. D. Tonchev. Combinatorial Configurations, Designs, Codes, Graphs. John Wiley


& Sons, Inc. New York, 1988.
[1813] V. D. Tonchev. A class of Steiner 4-wise balanced designs derived from Preparata
codes. J. Combin. Des., 4:203–204, 1996.

[1814] V. D. Tonchev. Codes and Designs. In V. S. Pless and W. C. Huffman, editors,


Handbook of Coding Theory, Vol. I, II, chapter 15, pages 1229–1267. North-Holland,
Amsterdam, 1998.
[1815] V. D. Tonchev. Linear perfect codes and a characterization of the classical designs.
Des. Codes Cryptogr., 17:121–128, 1999.

[1816] V. D. Tonchev. Codes. In C. J. Colbourn and J. H. Dinitz, editors, The CRC Hand-
book of Combinatorial Designs, chapter VII.1, pages 677–702. Chapman & Hall/CRC
Press, 2nd edition, 2007.
[1817] V. D. Tonchev. On resolvable Steiner 2-designs and maximal arcs in projective
planes. Des. Codes Cryptogr., 84:165–172, 2017.

[1818] A.-L. Trautmann, F. Manganiello, M. Braun, and J. Rosenthal. Cyclic orbit codes.
IEEE Trans. Inform. Theory, 59:7386–7404, 2013.
[1819] P. Trifonov. Efficient design and decoding of polar codes. IEEE Trans. Commun.,
60:3221–3227, 2012.
[1820] H. Trinker. The triple distribution of codes and ordered codes. Discrete Math.,
311:2283–2294, 2011.
[1821] M. A. Tsfasman, S. G. Vlăduţ, and D. Nogin. Algebraic Geometric Codes: Basic
Notions, volume 139 of Mathematical Surveys and Monographs. Amer. Math. Soc.,
Providence, Rhode Island, 2007.
[1822] M. A. Tsfasman, S. G. Vlăduţ, and T. Zink. Modular curves, Shimura curves, and
Goppa codes, better than Varshamov-Gilbert bound. Math. Nachr., 109:21–28, 1982.
[1823] L. Tunçel. Polyhedral and Semidefinite Programming Methods in Combinatorial Op-
timization. Amer. Math. Soc., Providence, Rhode Island; Fields Institute for Re-
search in Mathematical Sciences, Toronto, Canada, 2010.
[1824] M. Vajha, S. B. Balaji, and P. V. Kumar. Explicit MSR codes with optimal access,
optimal sub-packetization and small field size for d = k+1, k+2, k+3. In Proc. IEEE
International Symposium on Information Theory, pages 2376–2380, Vail, Colorado,
June 2018.
[1825] M. Vajha, V. Ramkumar, B. Puranik, G. R. Kini, E. Lobo, B. Sasidharan, P. V.
Kumar, A. Barg, M. Ye, S. Narayanamurthy, S. Hussain, and S. Nandi. Clay codes:
moulding MDS codes to yield an MSR code. In Proc. 16th USENIX Conference on
File and Storage Technologies, pages 139–154, Oakland, California, February 2018.

[1826] M. E. Valcher and E. Fornasini. On 2D finite support convolutional codes: an alge-


braic approach. Multidimens. Systems Signal Process., 5:231–243, 1994.
[1827] A. E. A. Valdebenito and A. L. Tironi. On the duals codes of skew constacyclic
codes. Adv. Math. Commun., 12:659–679, 2018.

[1828] F. Vallentin. Lecture notes: Semidefinite programming and harmonic analysis.


arXiv:0809.2017 [math.OC], September 2008.
[1829] F. Vallentin. Symmetry in semidefinite programs. Linear Algebra Appl., 430:360–369,
2009.
[1830] M. van Dijk. A linear construction of perfect secret sharing schemes. In A. DeSantis,
editor, Advances in Cryptology – EUROCRYPT ’94, volume 950 of Lecture Notes in
Comput. Sci., pages 23–34. Springer, Berlin, Heidelberg, 1995.
[1831] M. van Eupen. Some new results for ternary linear codes of dimension 5 and 6. IEEE
Trans. Inform. Theory, 41:2048–2051, 1995.

[1832] J. H. van Lint. Recent results on perfect codes and related topics. In M. Hall,
Jr. and J. H. van Lint, editors, Combinatorics. Part 1: Theory of Designs, Finite
Geometry and Coding Theory, volume 55 of Math. Centre Tracts, pages 158–178.
Math. Centrum, Amsterdam, 1974.
[1833] J. H. van Lint. A survey on perfect codes. Rocky Mountain J. Math., 5:199–224,
1975.
[1834] J. H. van Lint. Kerdock codes and Preparata codes. Congr. Numer., 39:25–41, 1983.
[1835] J. H. van Lint. Repeated-root cyclic codes. IEEE Trans. Inform. Theory, 37:343–345,
1991.
[1836] J. H. van Lint. Introduction to Coding Theory. Springer-Verlag, Berlin, Heidelberg,
3rd edition, 1999.
[1837] J. H. van Lint and A. Schrijver. Construction of strongly regular graphs, two-weight
codes and partial geometries by finite fields. Combinatorica, 1:63–73, 1981.
[1838] J. H. van Lint and R. M. Wilson. On the minimum distance of cyclic codes. IEEE
Trans. Inform. Theory, 32:23–40, 1986.
[1839] J. H. van Lint and R. M. Wilson. A Course in Combinatorics. Cambridge University
Press, Cambridge, UK, 2nd edition, 2001.
[1840] J. van Tilburg. On the McEliece public-key cryptosystem. In S. Goldwasser, editor,
Advances in Cryptology – CRYPTO ’88, volume 403 of Lecture Notes in Comput.
Sci., pages 119–131. Springer, Berlin, Heidelberg, 1990.
[1841] J. van Tilburg. Security-Analysis of a Class of Cryptosystems Based on Linear
Error-Correcting Codes. PhD thesis, Technical University Eindhoven, 1994.
[1842] G. J. M. van Wee. On the nonexistence of certain perfect mixed codes. Discrete
Math., 87:323–326, 1991.
[1843] A. Vardy. The intractability of computing the minimum distance of a code. IEEE
Trans. Inform. Theory, 43:1757–1766, 1997.
[1844] R. R. Varshamov. The evaluation of signals in codes with correction of errors (in
Russian). Dokl. Akad. Nauk SSSR, 117:739–741, 1957. (English translation in [212]
pages 68–71).
[1845] R. R. Varshamov. Some features of linear codes that correct asymmetric errors.
Soviet Physics Doklady, 9:538, 1965.
[1846] B. Vasic, S. K. Chilappagari, D. V. Nguyen, and S. K. Planjery. Trapping set ontol-
ogy. In Proc. 47th Allerton Conference on Communication, Control, and Computing,
pages 1–7, Monticello, Illinois, September-October 2009.
[1847] J. L. Vasil’ev. On nongroup close-packed codes (in Russian). Probl. Kibernet., 8:337–
339, 1962. (English translation in [212] pages 351–357).
[1848] G. Vega. A critical review and some remarks about one- and two-weight irreducible
cyclic codes. Finite Fields Appl., 33:1–13, 2015.
[1849] R. Vehkalahti, C. Hollanti, and F. Oggier. Fast-decodable asymmetric space-time
codes from division algebras. IEEE Trans. Inform. Theory, 58:2362–2385, 2012.
[1850] J. M. Velazquez-Gutierrez and C. Vargas-Rosales. Sequence sets in wireless com-
munication systems: a survey. IEEE Commun. Surveys & Tutorials, 19:1225–1248,
2017.
[1851] P. Véron. A fast identification scheme. In Proc. IEEE International Symposium on
Information Theory, page 359, Whistle, British Columbia, Canada, September 1995.
[1852] M. G. Vides. Métricas Sobre Grupos y Anilloscon Aplicaciones a la Teorı́a de
Códigos. PhD thesis, Universidad Nacional de Córdoba, 2018.
[1853] M. Villanueva, F. Zeng, and J. Pujol. Efficient representation of binary nonlinear
codes: constructions and minimum distance computation. Des. Codes Cryptogr.,
76:3–21, 2015.
[1854] A. Viterbi. Error bounds for convolutional codes and an asymptotically optimum
decoding algorithm. IEEE Trans. Inform. Theory, 13:260–269, 1967.
[1855] E. Viterbo and J. Boutros. A universal lattice code decoder for fading channels.
IEEE Trans. Inform. Theory, 45:1639–1642, 1999.
[1856] S. G. Vlăduţ. On the decoding of algebraic-geometric codes over Fq for q ≥ 16. IEEE
Trans. Inform. Theory, 36:1461–1463, 1990.
[1857] S. G. Vlăduţ and V. G. Drinfeld. The number of points of an algebraic curve (in
Russian). Funktsional. Anal. i Prilozhen., 17:68–69, 1983 (English translation in
Funct. Anal. Appl., 17:53–54, 1983).
[1858] A. vom Felde. A new presentation of Cheng-Sloane’s [32, 17, 8]-code. Arch. Math.
(Basel), 60:508–511, 1993.
[1859] P. Vontobel and R. M. Tanner. Construction of codes based on finite generalized
quadrangles for iterative decoding. In Proc. IEEE International Symposium on In-
formation Theory, page 223, Washington, DC, June 2001.
[1860] Z.-X. Wan. A proof of the automorphisms of linear groups over a field of characteristic
2. Scientia Sinica, 11:1183–1194, 1962.
[1861] Z.-X. Wan. Quaternary Codes, volume 8 of Series on Applied Mathematics. World
Scientific Publishing Co., Inc., River Edge, New Jersey, 1997.
[1862] Z.-X. Wan. Cyclic codes over Galois rings. Algebra Colloq., 6:291–304, 1999.
[1863] Z.-X. Wan. The MacWilliams identity for linear codes over Galois rings. In
I. Althöfer, N. Cai, G. Dueck, L. Khachatrian, M. S. Pinsker, A. Sárközy, I. We-
gener, and Z. Zhang, editors, Numbers, Information and Complexity, pages 333–338.
Kluwer Acad. Publ., Boston, 2000.
[1864] Z.-X. Wan. Lectures on Finite Fields and Galois Rings. World Scientific Publishing
Co., Inc., River Edge, New Jersey, 2003.
[1865] A. Wang and Z. Zhang. Exact cooperative regenerating codes with minimum-repair-
bandwidth for distributed storage. In Proc. 32nd IEEE International Conference on
Computer Communications, pages 400–404, Turin, Italy, April 2013.
[1866] A. Wang and Z. Zhang. Repair locality with multiple erasure tolerance. IEEE Trans.
Inform. Theory, 60:6979–6987, 2014.
[1867] A. Wang and Z. Zhang. An integer programming-based bound for locally repairable
codes. IEEE Trans. Inform. Theory, 61:5280–5294, 2015.
[1868] A. Wang, Z. Zhang, and D. Lin. Bounds and constructions for linear locally repairable
codes over binary fields. In Proc. IEEE International Symposium on Information
Theory, pages 2033–2037, Aachen, Germany, June 2017.
[1869] A. Wang, Z. Zhang, and M. Liu. Achieving arbitrary locality and availability in
binary codes. In Proc. IEEE International Symposium on Information Theory, pages
1866–1870, Hong Kong, China, June 2015.
[1870] H. Wang, C. Xing, and R. Safavi-Naini. Linear authentication codes: bounds and
constructions. IEEE Trans. Inform. Theory, 49:866–872, 2003.
[1871] L. Wang, K. Feng, S. Ling, and C. Xing. Asymmetric quantum codes: characteriza-
tion and constructions. IEEE Trans. Inform. Theory, 56:2938–2945, 2010.
[1872] Q. Wang, K. Ding, and R. Xue. Binary linear codes with two weights. IEEE Com-
mun. Letters, 19:1097–1100, 2015.

[1873] H. N. Ward. Divisible codes. Arch. Math. (Basel), 36:485–494, 1981.


[1874] H. N. Ward. Multilinear forms and divisors of codeword weights. Quart. J. Math.
Oxford Ser. (2), 34(133):115–128, 1983.
[1875] H. N. Ward. Divisors of codes of Reed-Muller type. Discrete Math., 131:311–323,
1994.
[1876] H. N. Ward. Quadratic Residue Codes and Divisibility. In V. S. Pless and W. C.
Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 9, pages 827–870.
North-Holland, Amsterdam, 1998.

[1877] H. N. Ward. Divisible codes—a survey. Serdica Math. J., 27:263–278, 2001.
[1878] H. S. Warren. Hacker’s Delight. Addison-Wesley Professional, 2nd edition, 2012.
[1879] A. Wassermann. Finding simple t-designs with enumeration techniques. J. Combin.
Des., 6:79–90, 1998.

[1880] A. Wassermann. Attacking the market split problem with lattice point enumeration.
J. Comb. Optim., 6:5–16, 2002.
[1881] A. Wassermann. Computing the minimum distance of linear codes. In Proc. 8th
International Workshop on Algebraic and Combinatorial Coding Theory, pages 254–
257, Tsarskoe Selo, Russia, September 2002.

[1882] V. K. Wei. Generalized Hamming weights for linear codes. IEEE Trans. Inform.
Theory, 37:1412–1418, 1991.
[1883] P. Weiner. Multidimensional Convolutional Codes. PhD thesis, University of Notre
Dame, 1998.

[1884] L. R. Welch. Lower bounds on the maximum cross correlation of signals. IEEE
Trans. Inform. Theory, 20:397–399, 1974.
[1885] L. R. Welch, R. J. McEliece, and H. Rumsey, Jr. A low-rate improvement on the
Elias bound. IEEE Trans. Inform. Theory, 20:676–678, 1974.
[1886] E. J. Weldon, Jr. Difference-set cyclic codes. Bell System Tech. J., 45:1045–1055,
1966.
[1887] E. J. Weldon, Jr. New generalizations of the Reed–Muller codes. Part II: nonprimitive
codes. IEEE Trans. Inform. Theory, 14:199–205, 1968. (Also reprinted in [212] pages
334–340).

[1888] D. B. West. Introduction to Graph Theory. Prentice Hall, Inc., Upper Saddle River,
New Jersey, 2nd edition, 2001.
[1889] N. Wiberg. Codes and Decoding on General Graphs. PhD thesis, Electrical Engi-
neering, Linköping University, Sweden, 1996.
[1890] C. Wieschebrink. Two NP-complete problems in coding theory with an application
in code based cryptography. In Proc. IEEE International Symposium on Information
Theory, pages 1733–1737, Seattle, Washington, July 2006.
[1891] M. M. Wilde and T. A. Brun. Optimal entanglement formulas for entanglement-
assisted quantum coding. Physical Review A, 77(6):064302, June 2008.
[1892] J. C. Willems. From time series to linear system I: finite-dimensional linear time
invariant systems. Automatica J. IFAC, 22:561–580, 1986.
[1893] W. Willems. A note on self-dual group codes. IEEE Trans. Inform. Theory, 48:3107–
3109, 2002.
[1894] R. A. Wilson. An Atlas of sporadic group representations. In R. T. Curtis and R. A.
Wilson, editors, The Atlas of Finite Groups: Ten Years On (Birmingham, 1995),
volume 249 of London Math. Soc. Lecture Note Ser., pages 261–273. Cambridge
University Press, Cambridge, UK, 1998.
[1895] S. Winograd. Some bilinear forms whose multiplicative complexity depends on the
field of constants. Mathematical Systems Theory, 10:169–180, 1977.
[1896] M. Wirtz. On the parameters of Goppa codes. IEEE Trans. Inform. Theory, 34:1341–
1343, 1988.
[1897] J. K. Wolf. Efficient maximum-likelihood decoding of linear block codes using a
trellis. IEEE Trans. Inform. Theory, 24:76–80, 1978.
[1898] J. Wolfmann. Codes projectifs à deux ou trois poids associés aux hyperquadriques
d’une géométrie finie. Discrete Math., 13:185–211, 1975.
[1899] J. Wolfmann. New bounds on cyclic codes from algebraic curves. In G. D. Cohen
and J. Wolfmann, editors, Coding Theory and Applications, volume 388 of Lecture
Notes in Comput. Sci., pages 47–62. Springer, Berlin, Heidelberg, 1989.
[1900] J. Wolfmann. Bent functions and coding theory. In A. Pott, V. Kumaran, T. Helle-
seth, and D. Jungnickel, editors, Difference Sets, Sequences and Their Correlation
Properties, volume 542 of NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci., pages
393–418. Kluwer Acad. Publ., Dordrecht, Netherlands, 1999.
[1901] J. Wolfmann. Negacyclic and cyclic codes over Z4 . IEEE Trans. Inform. Theory,
45:2527–2532, 1999.
[1902] J. Wolfmann. Binary images of cyclic codes over Z4 . IEEE Trans. Inform. Theory,
47:1773–1779, 2001.
[1903] S. Wolfram. Idea Makers: Personal Perspectives on the Lives & Ideas of Some
Notable People. Wolfram Media, Inc., Champaign, Illinois, 2016.
[1904] H. Wolkowicz, R. Saigal, and L. Vandenberghe, editors. Handbook of Semidefinite
Programming. Kluwer Acad. Pub., Boston, 2000.
[1905] J. A. Wood. Extension theorems for linear codes over finite rings. In T. Mora
and H. F. Mattson, Jr., editors, Applied Algebra, Algebraic Algorithms and Error-
Correcting Codes, volume 1255 of Lecture Notes in Comput. Sci., pages 329–340.
Springer, Berlin, Heidelberg, 1997.
[1906] J. A. Wood. Duality for modules over finite rings and applications to coding theory.
Amer. J. Math., 121:555–575, 1999.
[1907] W. K. Wootters and W. H. Zurek. A single quantum cannot be cloned. Nature,
299:802–803, 1982.
[1908] S. J. Wright. Primal-dual Interior-point Methods. Society for Industrial and Applied
Mathematics (SIAM), Philadelphia, 1997.
[1909] B. Wu and Z. Liu. Linearized polynomials over finite fields revisited. Finite Fields
Appl., 22:79–100, 2013.
[1910] F. Wu. Constructions of strongly regular Cayley graphs using even index Gauss
sums. J. Combin. Des., 21:432–446, 2013.
[1911] Y. Wu, N. Li, and X. Zeng. Linear codes with few weights from cyclotomic classes
and weakly regular bent functions. Des. Codes Cryptogr., 88:1255–1272, 2020.
[1912] S.-T. Xia and F.-W. Fu. On the stopping distance of finite geometry LDPC codes.
IEEE Commun. Letters, 10:381–383, 2006.
[1913] S.-T. Xia and F.-W. Fu. Johnson type bounds on constant dimension codes. Des.
Codes Cryptogr., 50:163–172, 2009.
[1914] C. Xiang. It is indeed a fundamental construction of all linear codes.
arXiv:1610.06355 [cs.IT], October 2016.
[1915] C. Xing. Asymptotic bounds on frameproof codes. IEEE Trans. Inform. Theory,
48:2991–2995, 2002.
[1916] C. Xing. Nonlinear codes from algebraic curves improving the Tsfasman-Vlăduţ-Zink
bound. IEEE Trans. Inform. Theory, 49:1653–1657, 2003.
[1917] E. Yaakobi, J. Bruck, and P. H. Siegel. Decoding of cyclic codes over symbol-pair
read channels. In Proc. IEEE International Symposium on Information Theory,
pages 2891–2895, Cambridge, Massachussets, July 2012.
[1918] E. Yaakobi, J. Bruck, and P. H. Siegel. Constructions and decoding of cyclic codes
over b-symbol read channels. IEEE Trans. Inform. Theory, 62:1541–1551, 2016.
[1919] S. Yang and J.-C. Belfiore. Optimal space-time codes for the MIMO amplify-and-
forward cooperative channel. IEEE Trans. Inform. Theory, 53:647–663, 2007.
[1920] X. Yang and J. L. Massey. The condition for a cyclic code to have a complementary
dual. Discrete Math., 126:391–393, 1994.
[1921] Y. Yang and X. Tang. Generic construction of binary sequences of period 2N with
optimal odd correlation magnitude based on quaternary sequences of odd period N .
IEEE Trans. Inform. Theory, 64:384–392, 2018.
[1922] N. Yankov. A putative doubly even [72, 36, 16] code does not have an automorphism
of order 9. IEEE Trans. Inform. Theory, 58:159–163, 2012.
[1923] H. Yao and G. W. Wornell. Achieving the full MIMO diversity-multiplexing frontier
with rotation-based space-time codes. In Proc. 41st Allerton Conference on Com-
munication, Control, and Computing, pages 400–409, Monticello, Illinois, October
2003.
[1924] F. Ye, K. W. Shum, and R. W. Yeung. The rate region for secure distributed storage
systems. IEEE Trans. Inform. Theory, 63:7038–7051, 2017.
[1925] M. Ye and A. Barg. Explicit constructions of high-rate MDS array codes with optimal
repair bandwidth. IEEE Trans. Inform. Theory, 63:2001–2014, 2017.
[1926] M. Ye and A. Barg. Explicit constructions of optimal-access MDS codes with nearly
optimal sub-packetization. IEEE Trans. Inform. Theory, 63:6307–6317, 2017.

[1927] M. Ye and A. Barg. Cooperative repair: constructions of optimal MDS codes for all
admissible parameters. IEEE Trans. Inform. Theory, 65:1639–1656, 2019.
[1928] V. Y. Yorgov. Binary self-dual codes with an automorphism of odd order (in Rus-
sian). Problemy Peredači Informacii, 19(4):11–24, 1983. (English translation in Probl.
Inform. Transm., 19(4):260–270, 1983).
[1929] V. Y. Yorgov. A method for constructing inequivalent self-dual codes with applica-
tions to length 56. IEEE Trans. Inform. Theory, 33:77–82, 1987.
[1930] V. Y. Yorgov. On the automorphism group of a putative code. IEEE Trans. Inform.
Theory, 52:1724–1726, 2006.

[1931] V. Y. Yorgov and D. Yorgov. The automorphism group of a self-dual [72, 36, 16] code
does not contain Z4 . IEEE Trans. Inform. Theory, 60:3302–3307, 2014.
[1932] E. V. York. Algebraic Description and Construction of Error Correcting Codes: A
Linear Systems Point of View. PhD thesis, University of Notre Dame, 1997.

[1933] D. C. Youla and P. F. Pickel. The Quillen-Suslin theorem and the structure of n-
dimensional elementary polynomial matrices. IEEE Trans. Circuits and Systems,
31:513–518, 1984.
[1934] N. Y. Yu and G. Gong. New binary sequences with optimal autocorrelation magni-
tude. IEEE Trans. Inform. Theory, 54:4771–4779, 2008.

[1935] J. Yuan and C. Ding. Secret sharing schemes from three classes of linear codes. IEEE
Trans. Inform. Theory, 52:206–212, 2006.
[1936] V. A. Yudin. Minimum potential energy of a point system of charges (in Rus-
sian). Diskret. Mat., 4(2):115–121, 1992. (English translation in Discrete Math. Appl.,
3(1):75–81, 1993).
[1937] R. Zamir. Lattices are everywhere. In Proc. Information Theory and Applications
Workshop, pages 392–421, San Diego, California, February 2009.
[1938] R. Zamir. Lattice Coding for Signals and Networks: A Structured Coding Approach to
Quantization, Modulation, and Multiuser Information Theory. Cambridge University
Press, Cambridge, UK, 2014.
[1939] S. K. Zaremba. Covering problems concerning abelian groups. J. London Math. Soc.,
27:242–246, 1952.
[1940] A. Zeh and S. Ling. Decoding of quasi-cyclic codes up to a new lower bound for the
minimum distance. In Proc. IEEE International Symposium on Information Theory,
pages 2584–2588, Honolulu, Hawaii, June-July 2014.
[1941] G. Zémor. Minimum distance bounds by graph analysis. IEEE Trans. Inform.
Theory, 47:835–837, 2001.
[1942] J. Zhang, X. Wang, and G. Ge. Some improvements on locally repairable codes.
arXiv:1506.04822 [cs.IT], June 2015.
[1943] S. Zhang. On the nonexistence of extremal self-dual codes. Discrete Appl. Math.,
91:277–286, 1999.

[1944] D. Zheng, X. Li, and K. Chen. Code-based ring signature scheme. Internat. J.
Network Security, 5:154–157, 2007.
[1945] L. Zheng and D. N. C. Tse. Diversity and multiplexing: a fundamental tradeoff in
multiple-antenna channels. IEEE Trans. Inform. Theory, 49:1073–1096, 2003.

[1946] Z. Zhou and C. Ding. A class of three-weight cyclic codes. Finite Fields Appl.,
25:79–93, 2014.
[1947] Z. Zhou, N. Li, C. Fan, and T. Helleseth. Linear codes with two or three weights
from quadratic bent functions. Des. Codes Cryptogr., 81:283–295, 2016.

[1948] V. A. Zinov’ev. Generalized cascade codes (in Russian). Problemy Peredači Infor-
macii, 12(1):5–15, 1976. (English translation in Probl. Inform. Transm., 12(1):2–9,
1976).
[1949] V. A. Zinov’ev and V. K. Leont’ev. On non-existence of perfect codes over Galois
fields (in Russian). Probl. Control and Inform. Theory, 2:123–132, 1973.

[1950] J. Zumbragel, M. F. Flanagan, and V. Skachek. On the pseudocodeword redundancy.


In Proc. IEEE International Symposium on Information Theory, pages 759–763,
Austin, Texas, June 2010.
[1951] J. Zwanzger. Computergestützte Suche Nach Optimalen Linearen Codes Über
Endlichen Kettenringen Unter Verwendung Heuristischer Methoden. PhD thesis,
University of Bayreuth, 2011.

You might also like