Previewpdf
Previewpdf
of Coding Theory
Concise Encyclopedia
of Coding Theory
Edited by
W. Cary Huffman
Loyola University Chicago, USA
Jon-Lark Kim
Sogang University, Republic of Korea
Patrick Solé
University Aix-Marseille, Marseilles, France.
First edition published 2021
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
Paintings, front, and back cover images used with permission from Gayle Imamura-Huffman.
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright
holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowl-
edged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including pho-
tocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission
from the publishers.
For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are
not available on CCC please contact [email protected]
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Preface xxiii
Contributors xxix
I Coding Fundamentals 1
1 Basics of Coding Theory 3
W. Cary Huffman, Jon-Lark Kim, and Patrick Solé
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Finite Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Generator and Parity Check Matrices . . . . . . . . . . . . . . . . . . . . 8
1.5 Orthogonality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6 Distance and Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.7 Puncturing, Extending, and Shortening Codes . . . . . . . . . . . . . . . 12
1.8 Equivalence and Automorphisms . . . . . . . . . . . . . . . . . . . . . . . 13
1.9 Bounds on Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.9.1 The Sphere Packing Bound . . . . . . . . . . . . . . . . . . . . . . 16
1.9.2 The Singleton Bound . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.3 The Plotkin Bound . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.4 The Griesmer Bound . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.5 The Linear Programming Bound . . . . . . . . . . . . . . . . . . 18
1.9.6 The Gilbert Bound . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.9.7 The Varshamov Bound . . . . . . . . . . . . . . . . . . . . . . . . 20
1.9.8 Asymptotic Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.10 Hamming Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.11 Reed–Muller Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.12 Cyclic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.13 Golay Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.14 BCH and Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . . . . 30
1.15 Weight Distributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.16 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.17 Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.18 Shannon’s Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
vii
viii Contents
4 Self-Dual Codes 79
Stefka Bouyuklieva
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4.2 Weight Enumerators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
4.3 Bounds for the Minimum Distance . . . . . . . . . . . . . . . . . . . . . . 84
4.4 Construction Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.4.1 Gluing Theory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
4.4.2 Circulant Constructions . . . . . . . . . . . . . . . . . . . . . . . 89
4.4.3 Subtraction Procedure . . . . . . . . . . . . . . . . . . . . . . . . 90
4.4.4 Recursive Constructions . . . . . . . . . . . . . . . . . . . . . . . 90
4.4.5 Constructions of Codes with Prescribed Automorphisms . . . . . 92
4.5 Enumeration and Classification . . . . . . . . . . . . . . . . . . . . . . . . 93
9.5 Additive Codes Which Are Cyclic in the Monomial Sense . . . . . . . . . 193
9.5.1 The Linear Case m = 1 . . . . . . . . . . . . . . . . . . . . . . . . 194
9.5.2 The General Case m ≥ 1 . . . . . . . . . . . . . . . . . . . . . . . 195
20.4.5 Codes with Few Weights from Semi-Bent Boolean Functions . . . 482
20.4.6 Linear Codes from Quadratic Boolean Functions . . . . . . . . . . 483
20.4.7 Binary Codes CDf with Three Weights . . . . . . . . . . . . . . . 484
20.4.8 Binary Codes CDf with Four Weights . . . . . . . . . . . . . . . . 484
20.4.9 Binary Codes CDf with at Most Five Weights . . . . . . . . . . . 485
20.4.10 A Class of Two-Weight Binary Codes from the Preimage of a Type
of Boolean Function . . . . . . . . . . . . . . . . . . . . . . . . . . 486
20.4.11 Binary Codes from Boolean Functions Whose Supports are Rela-
tive Difference Sets . . . . . . . . . . . . . . . . . . . . . . . . . . 487
20.4.12 Binary Codes with Few Weights from Plateaued Boolean Functions 487
20.4.13 Binary Codes with Few Weights from Almost Bent Functions . . 488
20.4.14 Binary Codes CD(G) from Functions on F2m of the Form G(x) =
F (x) + F (x + 1) + 1 . . . . . . . . . . . . . . . . . . . . . . . . . 489
20.4.15 Binary Codes from the Images of Certain Functions on F2m . . . 489
20.5 Constructions of Cyclic Codes from Functions: The Sequence Approach . 490
20.5.1 A Generic Construction of Cyclic Codes with Polynomials . . . . 490
20.5.2 Binary Cyclic Codes from APN Functions . . . . . . . . . . . . . 492
20.5.3 Non-Binary Cyclic Codes from Monomials and Trinomials . . . . 495
20.5.4 Cyclic Codes from Dickson Polynomials . . . . . . . . . . . . . . . 498
20.6 Codes with Few Weights from p-Ary Functions with p Odd . . . . . . . . 503
20.6.1 Codes with Few Weights from p-Ary Weakly Regular Bent Func-
tions Based on the First Generic Construction . . . . . . . . . . . 503
20.6.2 Linear Codes with Few Weights from Cyclotomic Classes and
Weakly Regular Bent Functions . . . . . . . . . . . . . . . . . . . 504
20.6.3 Codes with Few Weights from p-Ary Weakly Regular Bent Func-
tions Based on the Second Generic Construction . . . . . . . . . . 507
20.6.4 Codes with Few Weights from p-Ary Weakly Regular Plateaued
Functions Based on the First Generic Construction . . . . . . . . 508
20.6.5 Codes with Few Weights from p-Ary Weakly Regular Plateaued
Functions Based on the Second Generic Construction . . . . . . . 510
20.7 Optimal Linear Locally Recoverable Codes from p-Ary Functions . . . . . 521
20.7.1 Constructions of r-Good Polynomials for Optimal LRC Codes . . 523
20.7.1.1 Good Polynomials from Power Functions . . . . . . . . . 523
20.7.1.2 Good Polynomials from Linearized Functions . . . . . . 523
20.7.1.3 Good Polynomials from Function Composition . . . . . 523
20.7.1.4 Good Polynomials from Dickson Polynomials of the First
Kind . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 524
20.7.1.5 Good Polynomials from the Composition of Functions In-
volving Dickson Polynomials . . . . . . . . . . . . . . . . 525
Bibliography 823
Index 941
Preface
xxiii
xxiv Preface
codes, reversible cyclic codes, BCH codes, duadic codes, punctured generalized Reed–Muller
codes, and a new generalization of the punctured binary Reed–Muller codes.
Shannon’s proof of the existence of good codes is non-constructive and therefore of little
use for applications, where one needs one or all codes with specific (small) parameters.
Techniques for constructing and classifying codes are considered in Chapter 3, written by
Patric R. J. Östergård, with an emphasis on computational methods. Some classes of codes
are discussed in more detail: perfect codes, MDS codes, and general binary codes.
Self-dual codes form one of the important classes of linear codes because of their rich
algebraic structure and their close connections with other combinatorial configurations like
block designs, lattices, graphs, etc. Topics covered in Chapter 4, by Stefka Bouyuklieva,
include construction methods, results on enumeration and classification, and bounds for
the minimum distance of self-dual codes over fields of size 2, 3, and 4.
Combinatorial designs often arise in codes that are optimal with respect to certain
bounds and are used in some decoding algorithms. Chapter 5, written by Vladimir D.
Tonchev, summarizes links between combinatorial designs and perfect codes, optimal codes
meeting the restricted Johnson Bound, and linear codes admitting majority logic decoding.
Chapters 1–5 explore codes over fields; Chapter 6, by Steven T. Dougherty, introduces
codes over rings. The chapter begins with a discussion of quaternary codes over the integers
modulo 4 and their Gray map, which popularized the study of codes over more general
rings. It then discusses codes over rings in a very broad sense describing families of rings,
the Chinese Remainder Theorem applied to codes, generating matrices, and bounds. It also
gives a description of the MacWilliams Identities for codes over rings.
Quasi-cyclic codes form an important class of algebraic codes that includes cyclic codes
as a special subclass. Chapter 7, coauthored by Cem Güneri, San Ling, and Buket Özkaya,
focuses on the algebraic structure of quasi-cyclic codes. Based on these structural properties,
some asymptotic results, minimum distance bounds, and further applications, such as the
trace representation and characterization of certain subfamilies of quasi-cyclic codes, are
elaborated upon.
Cyclic and quasi-cyclic codes are studied as ideals in ordinary polynomial rings. Chap-
ter 8, by Heide Gluesing-Luerssen, is a survey devoted to skew-polynomial rings and skew-
cyclic block codes. After discussing some relevant algebraic properties of skew polynomials,
the basic notions of skew-cyclic codes, such as generator polynomial, parity check polyno-
mial, and duality are investigated. The basic tool is a skew-circulant matrix. The chapter
concludes with results on constructions of skew-BCH codes.
The coauthors Jürgen Bierbrauer, Stefano Marcugini, and Fernanda Pambianco of Chap-
ter 9 develop the theory of cyclic additive codes, both in the permutation sense and in the
monomial sense when the code length is coprime to the characteristic of the underlying field.
This generalizes the classical theory of cyclic and constacyclic codes, respectively, from the
category of linear codes to the category of additive codes. The cyclic quantum codes corre-
spond to a special case when the codes are self-orthogonal with respect to the symplectic
bilinear form.
Up to this point the codes considered are block codes where codewords all have fixed
length. That is no longer the case in Chapter 10, coauthored by Julia Lieb, Raquel Pinto,
and Joachim Rosenthal. This chapter provides a survey of convolutional codes stressing the
connections to module theory and systems theory. Constructions of codes with maximal
possible distance and distance profile are provided.
Chapter 11, written by Elisa Gorla, provides a mathematical introduction to rank-
metric codes, beginning with the definition of the rank metric and the corresponding codes,
whose elements can be either vectors or matrices. This is followed by the definition of code
equivalence and the notion of support for a codeword and for a code. This chapter treats
some of the basic concepts in the mathematical theory of rank-metric codes: duality, weight
Preface xxv
enumerators and the MacWilliams Identities, higher rank weights, MRD codes, optimal
anticodes, and q-polymatroids associated to a rank-metric code.
The final two chapters of Part I deal with the important technique of linear programming
and a related generalization to produce bounds. As described in Chapter 12, coauthored by
Peter Boyvalenkov and Danyo Danev, general linear programming methods imply universal
bounds for codes and designs. The explanation is organized in the Levenshtein framework
extended with recent developments on universal bounds for the energy of codes, including
the concept of universal optimality. The exposition is done separately for codes in Hamming
spaces and for spherical codes.
Linear programming bounds, initially developed by Delsarte, belong to the most power-
ful and flexible methods to obtain bounds for extremal problems in coding theory. In recent
years, after the pioneering work of Schrijver, semidefinite programming bounds have been
developed with two aims: to strengthen linear programming bounds and to find bounds
for more general spaces. Chapter 13, by Frank Vallentin, introduces semidefinite program-
ming bounds with an emphasis on error-correcting codes and its relation to semidefinite
programming hierarchies for difficult combinatorial optimization problems.
The next eight chapters make up Part II of the Concise Encyclopedia of Coding Theory,
where the focus is on specific families of codes. The codes presented fall into two categories,
with some overlap. Some of them are generalizations of classical codes from Part I. The rest
have a direct connection to algebraic, geometric, or graph theoretic structures. They all are
interesting theoretically and often possess properties useful for application.
There are many problems in coding theory which are equivalent to geometrical prob-
lems in Galois geometries. Certain formulations of some of the classical codes have direct
connections to geometry. Chapter 14, written by Leo Storme, describes a number of the
many links between coding theory and Galois geometries, and shows how these two research
areas influence and stimulate each other.
Chapter 15, written by Alain Couvreur and Hugues Randriambololona, surveys the
development of the theory of algebraic geometry codes since their discovery in the late
1970s. The authors summarize the major results on various problems such as asymptotic
parameters, improved estimates on the minimum distance, and decoding algorithms. In
addition, the chapter describes various modern applications of these codes such as public-
key cryptography, algebraic complexity theory, multiparty computation, and distributed
storage.
Very often the parameters of good/optimal linear codes can be realized by group codes,
that is, ideals in a group algebra FG where G is a finite group and F is a finite field. Such
codes, the topic of Chapter 16 written by Wolfgang Willems, carry more algebraic structure
than only linear codes, which leads to an easier analysis of the codes. In particular, the full
machinery of representation theory of finite groups can be applied to prove interesting
coding theoretical properties.
Chapter 17, coauthored by Hai Q. Dinh and Sergio R. López-Permouth, discusses foun-
dational and theoretical aspects of the role of finite rings as alphabets in coding theory, with
a concentration on the class of constacyclic codes over finite commutative chain rings. The
chapter surveys both the simple-root and repeated-root cases. Several directions in which
the notion of constacyclicity has been extended are also presented.
The next three chapters focus on codes with few weights; such codes have applications
delineated throughout this encyclopedia. As described in Chapter 18, written by Minjia Shi,
one important construction technique for few-weight codes is to use trace codes. For example
the simplex code, a one-weight code, can be constructed as a trace code by using finite field
extensions. In recent years, this technique has been refined by using ring extensions of a
xxvi Preface
finite field coupled with a linear Gray map. Moreover, these image codes can be applied to
secret sharing schemes.
Codes with few weights often have an interesting geometric structure. Chapter 19, writ-
ten by Andries E. Brouwer, focuses specifically on codes with exactly two nonzero weights.
The chapter discusses the relationship between two-weight linear codes, strongly regular
graphs, and 2-character subsets of a projective space.
Functions in general and more specifically cryptographic functions, that is highly non-
linear functions (PN, APN, bent, AB, plateaued), have important applications in coding
theory since they are used to construct optimal linear codes and linear codes useful for
applications such as secret sharing, two-party computation, and storage. The ultimate goal
of Chapter 20, by Sihem Mesnager, is to provide an overview and insights into linear codes
with good parameters that are constructed from functions and polynomials over finite fields
using multiple approaches.
Chapter 21 by Christine A. Kelley, the concluding chapter of Part II, gives an overview of
graph-based codes and iterative message-passing decoding algorithms for these codes. Some
important classes of low-density parity check codes, such as finite geometry codes, expander
codes, protograph codes, and spatially coupled codes are discussed. Moreover, analysis tech-
niques of the decoding algorithm for both the finite length case and the asymptotic length
case are summarized. While the area of codes over graphs is vast, a few other families such
as repeat accumulate and turbo-like codes are briefly mentioned.
The final chapter of Part II provides a natural bridge to the applications in Part III
as codes from graphs were designed to facilitate communication. The thirteen chapters of
Part III examine several applications that fall into two categories, again with some overlap.
Some of the applications present codes developed for specific uses; other applications use
codes to produce other structures that themselves become the main application.
The first chapter in Part III is again a bridge between the previous and successive
chapters as it has a distinct theoretical slant but its content is useful as well in applications.
Chapter 22, written by Marcelo Firer, gives an account of many metrics used in the context
of coding theory, mainly for decoding purposes. The chapter tries to stress the role of some
metric related invariants and aspects that are eclipsed at the usual setting of the Hamming
metric.
Chapter 23, written by Alfred Wassermann, examines algorithms for computer construc-
tion of “good” linear codes and methods to determine the minimum distance and weight
enumerator of a linear code. For code construction the focus is on the geometric view: a
linear code can be seen as a suitable set of points in a projective geometry. The search then
reduces to an integer linear programming problem. The chapter explores how the search
space can be much reduced by prescribing a group of symmetries and how to construct
special code types such as self-orthogonal codes or LCD codes.
In Chapter 24 by Swastik Kopparty we will see some algorithmic ideas based on polyno-
mial interpolation for decoding algebraic codes, applied to generalized Reed–Solomon and
interleaved generalized Reed–Solomon codes. These ideas will power decoding algorithms
that can decode algebraic codes beyond half the minimum distance.
The theory of pseudo-noise sequences has close connections with coding theory, cryptog-
raphy, combinatorics, and discrete mathematics. Chapter 25, coauthored by Tor Helleseth
and Chunlei Li, gives a brief introduction of two kinds of pseudo-noise sequences, namely
sequences with low correlation and shift register sequences with maximum periods, which
are of particular interest in modern communication systems.
Lattice coding is presented in Chapter 26, written by Frédérique Oggier, in the context
of Gaussian and fading channels, where channel models are presented. Lattice constructions
Preface xxvii
from both quadratic fields and linear codes are described. Some variations of lattice coding
are also discussed.
A bridge between classical coding theory and quantum error control was firmly put in
place via the stabilizer formalism, allowing the capabilities of a quantum stabilizer code to
be inferred from the properties of the corresponding classical codes. Well-researched tools
and the wealth of results in classical coding theory often translate nicely to the design of
good quantum codes, the subject of Chapter 27 by Martianus Frederic Ezerman. Research
problems triggered by error-control issues in the quantum setup revive and expand studies
on specific aspects of classical codes, which were previously overlooked or deemed not so
interesting.
Chapter 28 on space-time coding, written by Frédérique Oggier, defines what space-time
coding actually is and what are variations of space-time coding problems. The chapter also
provides channel models and design criteria, together with several examples.
Chapter 29, by Frank R. Kschischang, describes error-correcting network codes for
packet networks employing random linear network coding. In such networks, packets sent
into the network by the transmitter are regarded as a basis for a vector space over a finite
field, and the network provides the receiver with random linear combinations of the trans-
mitted vectors, possibly also combined with noise vectors. Unlike classical coding theory—
where codes are collections of well-separated vectors, each of them a point of some ambient
vector space—here codes are collections of well-separated vector spaces, each of them a sub-
space of some ambient vector space. The chapter provides appropriate coding metrics for
such subspace codes, and describes various bounds and constructions, focusing particularly
on the case of constant-dimension codes whose codewords all have the same dimension.
Erasure codes have attained a position of importance for many streaming and file down-
load applications on the internet. Chapter 30, written by Ian F. Blake, outlines the devel-
opment of these codes from simple erasure correcting codes to the important Raptor codes.
Various decoding algorithms for these codes are developed and illustrated.
Chapter 31, with coauthors Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil
Krishnan, Birenjith Sasidharan, and P. Vijay Kumar, deals with the topic of designing
reliable and efficient codes for the storage and retrieval of large quantities of data over
storage devices that are prone to failure. Historically, the traditional objective has been one
of ensuring reliability against data loss while minimizing storage overhead. More recently,
a third concern has surfaced, namely, the need to efficiently recover from the failure of a
single storage unit corresponding to recovery from the erasure of a single code symbol. The
authors explain how coding theory has evolved to tackle this fresh challenge.
Polar codes are error-correcting codes that achieve the symmetric capacity of discrete
input memoryless channels with a polynomial encoding and decoding complexity. Chap-
ter 32, coauthored by Noam Presman and Simon Litsyn, provides a general presentation
of polar codes and their associated algorithms. At the same time, most of the examples in
the chapter use the basic Arıkan’s (u + v, v) original construction due to its simplicity and
wide applicability.
While one thinks of coding theory as the major tool to reveal correct information after
errors in that information have been introduced, the final two chapters of this encyclopedia
address the opposite problem: using coding theory as a tool to hide information. Chapter 33,
by Cunsheng Ding, first gives a brief introduction to secret sharing schemes, and then
introduces two constructions of secret sharing schemes with linear codes. It also documents
a construction of multisecret sharing schemes with linear codes. Basic results about these
secret sharing schemes are presented in this chapter.
Chapter 34, written by Philippe Gaborit and Jean-Christophe Deneuville, gives a gen-
eral overview of basic tools used for code-based cryptography. The security of the main diffi-
cult problem for code-based cryptography, the Syndrome Decoding problem, is considered,
xxviii Preface
together with its quasi-cyclic variations. The current state-of-the-art for the cryptographic
primitives of encryption, signature, and authentication is the main focus of the chapter.
The editors of the Concise Encyclopedia of Coding Theory thank the 48 other authors
for sharing their expertise to make this project come to pass. Their cooperation and patience
were invaluable to us. We also thank Gayle Imamura-Huffman for lending her transparent
watercolor Coded Information and opaque watercolor Linear Subspaces for use on the front
and back covers of this encyclopedia. Additionally we thank the editorial staff at CRC
Press/Taylor and Francis Group: Sarfraz Khan, who helped us begin this project; Callum
Fraser, who became the Mathematical Editor at CRC Press as the project progressed; and
Robin Lloyd-Starkes, who is Project Editor. Also with CRC Press, we thank Mansi Kabra
for handling permissions and copyrights and Kevin Craig who assisted with the cover design.
We thank Meeta Singh, Senior Project Manager at KnowledgeWorks Global Ltd., and her
team for production of this encyclopedia. And of course, we sincerely thank our families for
their support and encouragement throughout this journey.
– W. Cary Huffman
– Jon-Lark Kim
– Patrick Solé
Contributors
xxix
xxx Contributors
Coding Fundamentals
1
Chapter 1
Basics of Coding Theory
W. Cary Huffman
Loyola University, Chicago
Jon-Lark Kim
Sogang University
Patrick Solé
CNRS, Aix-Marseille Université
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 Finite Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Generator and Parity Check Matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.5 Orthogonality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
1.6 Distance and Weight . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1.7 Puncturing, Extending, and Shortening Codes . . . . . . . . . . . . . . . . . . 12
1.8 Equivalence and Automorphisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.9 Bounds on Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
1.9.1 The Sphere Packing Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.9.2 The Singleton Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.3 The Plotkin Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.9.4 The Griesmer Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.5 The Linear Programming Bound . . . . . . . . . . . . . . . . . . . . . . . . 18
1.9.6 The Gilbert Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
1.9.7 The Varshamov Bound . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.9.8 Asymptotic Bounds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
1.10 Hamming Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
1.11 Reed–Muller Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
1.12 Cyclic Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
1.13 Golay Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
1.14 BCH and Reed–Solomon Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
1.15 Weight Distributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.16 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
1.17 Decoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1.18 Shannon’s Theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
1.1 Introduction
Coding theory had it genesis in the late 1940s with the publication of works by Claude
Shannon, Marcel Golay, and Richard Hamming. In 1948 Shannon published a landmark
3
4 Concise Encyclopedia of Coding Theory
Message
Receiver
Source
6
e = e1 · · · en
x = x1 · · · xk noise e=x
x e1 · · · x
ek
message message
estimate
? ? y =c+e
c = c1 · · · cn received
Encoder codeword Channel vector Decoder
- -
paper A mathematical theory of communication [1661] which marked the beginning of both
information theory and coding theory. Given a communication channel, over which informa-
tion is transmitted and possibly corrupted, Shannon identified a number called the ‘channel
capacity’ and proved that arbitrarily reliable communication is possible at any rate below
the channel capacity. For example, when transmitting images of planets from deep space, it
is impractical to retransmit the images that have been altered by noise during transmission.
Shannon’s Theorem guarantees that the data can be encoded before transmission so that
the altered data can be decoded to the original, up to a specified degree of accuracy. Other
examples of communication channels include wireless communication devices and storage
systems such as DVDs or Blue-ray discs. In 1947 Hamming developed a code, now bearing
his name, in an attempt to correct errors that arose in the Bell Telephone Laboratories’
mechanical relay computer; his work was circulated through a series of memoranda at Bell
Labs and eventually published in [895]. Both Shannon [1661] and Golay [820] published
Hamming’s code, with Golay generalizing it. Additionally, Golay presented two of the four
codes that now bear his name. A monograph by T. M. Thompson [1801] traces the early
development of coding theory.
A simple communication channel is illustrated in Figure 1.1. At the source a mes-
sage, denoted x = x1 · · · xk in the figure, is to be sent. If no modification is made to x and
it is transmitted directly over the channel, any noise would distort x so that it could not
be recovered. The basic idea of coding theory is to embellish the message by adding some
redundancy so that hopefully the original message can be recovered after reception even if
noise corrupts the embellished message during transmission. The redundancy is added by
the encoder and the embellished message, called a codeword c = c1 · · · cn in the figure, is
sent over the channel where noise in the form of an error vector e = e1 · · · en distorts the
codeword producing a received vector y.1 The received vector is then sent to be decoded
where the errors are removed. The redundancy is then stripped off, and an estimate x e of
the original message is produced. Hopefully x e = x. (There is a one-to-one correspondence
1 Generally message and codeword symbols will come from a finite field F or a finite ring R. Messages
will be ‘vectors’ in Fk (or Rk ), and codewords will be ‘vectors’ in Fn (or Rn ). If c entered the channel and
y exited the channel, the difference y − c is what we have termed the error vector e in Figure 1.1. While
this is the normal scenario, other ambient spaces from which codes arise occur in this encyclopedia.
Basics of Coding Theory 5
between codewords and messages. In many cases, the real interest is not in the message x
but the codeword c. With this point of view, the job of the decoder is to obtain an estimate
e from y and hope that y
y e = c.) For example in deep space communication, the message
source is the satellite, the channel is outer space, the decoder is hardware at a ground sta-
tion on Earth, and the receiver is the people or computer processing the information; of
course, messages travel from Earth to the satellite as well. For a DVD or Blue-ray disc, the
message source is the voice, music, video, or data to be placed on the disc, the channel is
the disc itself, the decoder is the DVD or Blue-ray player, and the receiver is the listener or
viewer.
Shannon’s Theorem guarantees that the hope of successful recovery will be fulfilled a
certain percentage of the time. With the right encoding based on the characteristics of the
channel, this percentage can be made as high as desired, although not 100%. The proof of
Shannon’s Theorem is probabilistic and nonconstructive. No specific codes were produced
in the proof that give the desired accuracy for a given channel. Shannon’s Theorem only
guarantees their existence. In essence, the goal of coding theory is to produce codes that
fulfill the conditions of Shannon’s Theorem and make reliable communication possible.
There are numerous texts, ranging from introductory to research-level books, on coding
theory including (but certainly not limited to) [170, 209, 896, 1008, 1323, 1505, 1506, 1520,
1521, 1602, 1836]. There are two books, [169] edited by E. R. Berlekamp and [212] edited by
I. F. Blake, in which early papers in the development of coding theory have been reprinted.
Definition 1.2.1 A field F is a nonempty set with two binary operations, denoted + and
·, satisfying the following properties.
(a) For all α, β, γ ∈ F, α+β ∈ F, α·β ∈ F, α+β = β+α, α·β = β·α, α+(β+γ) = (α+β)+γ,
α · (β · γ) = (α · β) · γ, and α · (β + γ) = α · β + α · γ.
(b) F possesses an additive identity or zero, denoted 0, and a multiplicative identity
or unity, denoted 1, such that α + 0 = α and α · 1 = α for all α ∈ Fq .
(c) For all α ∈ F and all β ∈ F with β 6= 0, there exists α0 ∈ F, called the additive inverse
of α, and β ∗ ∈ F, called the multiplicative inverse of β, such that α + α0 = 0 and
β · β ∗ = 1.
The additive inverse of α will be denoted −α, and the multiplicative inverse of β will be
denoted β −1 . Usually the multiplication operation will be suppressed; that is, α · β will be
denoted αβ. If n is a positive integer and α ∈ F, nα = α+α+· · ·+α (n times), αn = αα · · · α
(n times), and α−n = α−1 α−1 · · · α−1 (n times when α 6= 0). Also α0 = 1 if α 6= 0. The
usual rules of exponentiation hold. If F is a finite set with q elements, F is called a finite
field of order q and denoted Fq .
Example 1.2.2 Fields include the rational numbers Q, the real numbers R, and the com-
plex numbers C. Finite fields include Zp , the set of integers modulo p, where p is a prime.
6 Concise Encyclopedia of Coding Theory
The following theorem gives some of the basic properties of finite fields.
Theorem 1.2.3 Let Fq be a finite field with q elements. The following hold.
(a) Fq is unique up to isomorphism.
(b) q = pm for some prime p and some positive integer m.
(c) Fq contains the subfield Fp = Zp .
(d) Fq is a vector space over Fp of dimension m.
(e) pα = 0 for all α ∈ Fq .
(f) If α, β ∈ Fq , (α + β)p = αp + β p .
(g) There exists an element γ ∈ Fq with the following properties.
(i) Fq = {0, 1 = γ 0 , γ, . . . , γ q−2 } and γ q−1 = 1,
(ii) {1 = γ 0 , γ, . . . , γ m−1 } is a basis of the vector space Fq over Fp , and
(iii) there exist a0 , a1 , . . . , am−1 ∈ Fp such that
γ m = a0 + a1 γ + · · · + am−1 γ m−1 . (1.1)
(h) For all α ∈ Fq , αq = α.
Definition 1.2.4 In Theorem 1.2.3, p is called the characteristic of Fq . The element γ is
called a primitive element of Fq .
Remark 1.2.5 Using Theorem 1.2.3(f), the map σp : Fq → Fq given by σp (α) = αp is
an automorphism of Fq , called the Frobenius automorphism of Fq . Once one primitive
element γ of Fq is found, the remaining primitive elements of Fq are precisely γ d where
gcd(d, q − 1) = 1.
The key to constructing a finite field is to find a primitive element γ in Fq and the
equation (1.1). We do not describe this process here, but refer the reader to the texts
mentioned at the beginning of the section. Assuming γ is found and the equation (1.1) is
known, we can construct addition and multiplication tables for Fq . This is done by writing
every element of Fq in two forms. The first form takes advantage of Theorem 1.2.3(g)(ii).
Every element α ∈ Fq is written uniquely in the form
α = a0 γ 0 + a1 γ + a2 γ 2 + · · · + am−1 γ m−1 with ai ∈ Fp = Zp for 0 ≤ i ≤ m − 1,
which we abbreviate α = a0 a1 a2 · · · am−1 , a vector in Zm p . Addition in Fq is accomplished
by ordinary vector addition in Zm
p . To each α ∈ F q , with α 6= 0, we associate a second form:
α = γ for some i with 0 ≤ i ≤ q − 2. Multiplication is accomplished by γ i γ j = γ i+j where
i
1.3 Codes
In this section we introduce the concept of codes over finite fields. We begin with some
notation.
The set of n-tuples with entries in Fq forms an n-dimensional vector space, denoted
Fnq = {x1 x2 · · · xn | xi ∈ Fq , 1 ≤ i ≤ n}, under componentwise addition of n-tuples and
componentwise multiplication of n-tuples by scalars in Fq . The vectors in Fnq will often be
denoted using bold Roman characters x = x1 x2 · · · xn . The vector 0 = 00 · · · 0 is the zero
vector in Fnq .
For positive integers m and n, Fm×n q denotes the set of all m × n matrices with
entries in Fq . The matrix in Fm×n q with all entries 0 is the zero matrix denoted 0m×n .
The identity matrix of Fn×n q will be denoted In . If A ∈ Fm×n
q , AT ∈ Fn×m
q will denote
m T
the transpose of A. If x ∈ Fq , x will denote x as a column vector of length m, that is,
an m × 1 matrix. The column vector 0T and the m × 1 matrix 0m×1 are the same.
If S is any finite set, its order or size is denoted |S|.
Definition 1.3.1 A subset C ⊆ Fnq is called a code of length n over Fq ; Fq is called the
alphabet of C, and Fnq is the ambient space of C. Codes over Fq are also called q-ary
codes. If the alphabet is F2 , C is binary. If the alphabet is F3 , C is ternary. The vectors
in C are the codewords of C. If C has M codewords (that is, |C| = M ) C is denoted an
(n, M )q code, or, more simply, an (n, M ) code when the alphabet Fq is understood. If C is a
linear subspace of Fnq , that is C is closed under vector addition and scalar multiplication, C
is called a linear code of length n over Fq . If the dimension of the linear code C is k, C is
denoted an [n, k]q code, or, more simply, an [n, k] code. An (n, M )q code that is also linear
is an [n, k]q code where M = q k . An (n, M )q code may be referred to as an unrestricted
code; a specific unrestricted code may be either linear or nonlinear. When referring to a
code, expressions such as (n, M ), (n, M )q , [n, k], or [n, k]q are called the parameters of
the code.
Example 1.3.2 Let C = {1100, 1010, 1001, 0110, 0101, 0011} ⊆ F42 . Then C is a (4, 6)2
binary nonlinear code. Let C1 = C ∪ {0000, 1111}. Then C1 is a (4, 8)2 binary linear code.
As C1 is a subspace of F42 of dimension 3, C1 is also a [4, 3]2 code.
Remark 1.3.3 Basic development of linear codes is found in papers by D. Slepian [1722,
1723, 1724]. In some chapters of this book, codes will be considered where the alphabet is
8 Concise Encyclopedia of Coding Theory
not necessarily a field but rather a ring R. In these situations, the vector space Fnq will be
replaced by an R-module such as Rn = {x1 x2 · · · xn | xi ∈ R, 1 ≤ i ≤ n}, and a code will
be considered linear if it is an R-submodule of that R-module. See for example Chapters 6,
17, and 18.
(b) If HGT = 0(n−k)×k , then G is a generator matrix for C if and only if H is a parity
check matrix for C.
Definition 1.4.6 Let C be an [n, k]q linear code with generator matrix G ∈ Fk×n q . For
any set of k independent columns of G, the corresponding set of coordinates forms an
information set for C; the remaining
n − k coordinates form a redundancy set for C.
If G has the form G = Ik | A , G is in standard form in which case {1, 2, . . . , k} is an
information set with {k + 1, k + 2, . . . , n} the corresponding redundancy set.
Theorem 1.4.7 ([1602,
Chapter
2.3]) If G = Ik | A is a generator matrix of an [n, k]q
T
code C, then H = −A | In−k is a parity check matrix for C.
Example 1.4.8 Continuing with Examples 1.3.2 and 1.4.2, the matrix G1 is in standard
form. Applying Theorem 1.4.7 to G1 , we get the parity check matrix H1 of Example 1.4.2.
The matrices G01 and G001 both row reduce to G1 ; so all three are generator matrices of the
same code, consistent with Remark 1.4.3. Any subset of {1, 2, 3, 4} of size 3 is an information
0T 00T
set for C1 . The fact that HGT
1 = HG1 = HG1 = 01×3 is consistent with Theorem 1.4.5.
Finally, let C2 = {0000, 1100, 0011, 1111} be the [4, 2]2 linear subcode of C1 . C2 does not
have a generator matrix in standard form; the only information sets for C2 are {1, 3}, {1, 4},
{2, 3}, and {2, 4}.
Example 1.4.9 Generator and parity check matrices for the [7, 4]2 binary linear Hamming
code H3,2 are
1 0 0 0 0 1 1
0 1 0 0 1 0 1 0 1 1 1 1 0 0
G3,2 = and H3,2 = 1 0 1 1 0 1 0 ,
0 0 1 0 1 1 0
1 1 0 1 0 0 1
0 0 0 1 1 1 1
respectively. G3,2 is in standard form. Two information sets for H3,2 are {1, 2, 3, 4} and
{1, 2, 3, 5} with corresponding redundancy sets {5, 6, 7} and {4, 6, 7}. The set {2, 3, 4, 5} is
not an information set. More general Hamming codes Hm,q are defined in Section 1.10.
1.5 Orthogonality
There is a natural inner product on Fnq that often proves useful in the study of codes.2
Definition 1.5.1 The ordinaryPinner product, also called the Euclidean inner prod-
n
uct, on Fnq is defined by x · y = i=1 xi yi where x = x1 x2 · · · xn and y = y1 y2 · · · yn . Two
n
vectors x, y ∈ Fq are orthogonal if x · y = 0. If C is an [n, k]q code,
Theorem 1.5.2 ([1323, Chapter 1.8]) Let C be an [n, k]q code with generator and parity
check matrices G and H, respectively. Then C ⊥ is an [n, n − k]q code with generator and
parity check matrices H and G, respectively. Additionally (C ⊥ )⊥ = C. Furthermore C is
n
self-dual if and only if C is self-orthogonal and k = .
2
Example 1.5.3 C2 from Example 1.4.8 is a [4, 2]2 self-dual code with generator and parity
check matrices both equal to
1 1 0 0
.
0 0 1 1
⊥
The dual of the Hamming [7, 4]2 code in Example 1.4.9 is a [7, 3]2 code H3,2 . H3,2 is a
⊥
generator matrix of H3,2 . As every row of H3,2 is orthogonal to itself and every other row
⊥ ⊥ ⊥ ⊥
of H3,2 , H3,2 is self-orthogonal. As H3,2 has dimension 3 and (H3,2 ) = H3,2 has dimension
⊥
4, H3,2 is not self-dual.
Definition 1.6.1 The (Hamming) distance between two vectors x, y ∈ Fnq , denoted
dH (x, y), is the number of coordinates in which x and y differ. The (Hamming) weight
of x ∈ Fnq , denoted wtH (x), is the number of coordinates in which x is nonzero.
where x ? y is the vector in Fn2 which has 1s precisely in those coordinates where both
x and y have 1s.
(g) If x, y ∈ Fn2 , then wtH (x ? y) ≡ x · y (mod 2). In particular, wtH (x) ≡ x · x (mod 2).
3 There are other notions of distance and weight used in coding theory. See for example Chapters 6, 7,
The minimum (Hamming) weight of a nonzero code C is the smallest weight of nonzero
codewords. The (Hamming) weight distribution of C is the list A0 (C), A1 (C), . . . , An (C)
where, for 0 ≤ i ≤ n, Ai (C) is the number of codewords of weight i. If C is understood,
the distance and weight distributions of C are denoted B0 , B1 , . . . , Bn and A0 , A1 , . . . , An ,
respectively.
Example 1.6.5 Let C be the (4, 6)2 code in Example 1.3.2. Its distance distribution is
B0 (C) = B4 (C) = 1, B2 (C) = 4, B1 (C) = B3 (C) = 0, and its minimum distance is 2. In par-
ticular C is a (4, 6, 2)2 code. The weight distribution of C is A2 (C) = 6 with Ai (C) = 0 other-
wise; its minimum weight is also 2. Let C 0 = 1000 + C = {0100, 0010, 0001, 1110, 1101, 1011}.
The distance distribution of C 0 agrees with the distance distribution of C making C 0 a
(4, 6, 2)2 code. However, the weight distribution of C 0 is A1 (C 0 ) = A3 (C 0 ) = 3 with Ai (C 0 ) = 0
otherwise; the minimum weight of C 0 is 1.
Theorem 1.6.6 ([1008, Chapter 1.4]) Let C be an [n, k, d]q linear code with k > 0. The
following hold.
(a) The minimum distance and minimum weight of C are the same.
(b) Ai (C) = Bi (C) for 0 ≤ i ≤ n.
n
X
(c) Ai (C) = q k .
i=0
Binary vectors possess an important relationship between weights and inner products. If
x, y ∈ Fn2 and each have even weight, Theorem 1.6.2(f) implies x + y also has even weight.
If x, y ∈ Fn2 are orthogonal and each have weights a multiple of 4, Theorem 1.6.2(f) and (g)
show that x + y has weight a multiple of 4. This leads to the following definition for binary
codes.
12 Concise Encyclopedia of Coding Theory
Definition 1.6.8 Let C be a binary linear code. C is called even if all of its codewords
have even weight. C is called doubly-even if all of its codewords have weights a multiple
of 4. An even binary code that is not doubly-even is singly-even.
Remark 1.6.9 By Theorem 1.6.6(e), self-orthogonal binary linear codes are even. The
converse is not true; code C1 from Example 1.3.2 is even but not self-orthogonal. Doubly-
even binary linear codes must be self-orthogonal by Theorem 1.6.2(f) and (g). There are
self-orthogonal binary codes that are singly-even; code C2 from Examples 1.4.8 and 1.5.3 is
singly-even and self-dual.
Example 1.6.10 Let H3,2 be the [7, 4]2 binary Hamming code of Example 1.4.9. With
Ai = Ai (H3,2 ), A0 = A7 = 1, A3 = A4 = 7, and A1 = A2 = A5 = A6 = 0, illustrating
⊥
Theorem 1.6.6(d) and (e), and showing H3,2 is a [7, 4, 3]2 code. The [7, 3]2 dual code H3,2
⊥
is self-orthogonal by Example 1.5.3 and hence even. Also by self-orthogonality, H3,2 ⊆
⊥ ⊥
(H3,2 ) = H3,2 ; the weight distribution of H3,2 shows that the 8 codewords of weights 0
⊥ ⊥
and 4 must be precisely the codewords of H3,2 . In particular, H3,2 is a doubly-even [7, 3, 4]2
⊥
code. H3,2 is called a simplex code, described further in Section 1.10.
The minimum weight of a linear code is determined by a parity check matrix for the
code; see [1008, Corollary 1.4.14 and Theorem 1.4.15].
Theorem 1.6.11 A linear code has minimum weight d if and only if its parity check matrix
has a set of d linearly dependent columns but no set of d−1 linearly dependent columns. Also,
if C is an [n, k, d]q code, then every n − d + 1 coordinate positions contain an information
set; furthermore, d is the largest number with this property.
Definition 1.7.1 Let C be an [n, k, d]q linear code with generator matrix G and parity
check matrix H.
(a) For some i with 1 ≤ i ≤ n, let C ∗ be the codewords of C with the ith component
deleted. The resulting code, called a punctured code, is an [n − 1, k ∗ , d∗ ] code. If
d > 1, k ∗ = k, and d∗ = d unless C has a minimum weight codeword that is nonzero
on coordinate i, in which case d∗ = d − 1. If d = 1, k ∗ = k and d∗ = 1 unless C has
a weight 1 codeword that is nonzero on coordinate i, in which case k ∗ = k − 1 and
d∗ ≥ 1 as long as C ∗ is nonzero. A generator matrix for C ∗ is obtained from G by
deleting column i; G∗ will have dependent rows if d∗ = 1 and k ∗ = k − 1. Puncturing
is often done on multiple coordinates in an analogous manner, one coordinate at a
time.
Pn+1
(b) Define Cb = c1 c2 · · · cn+1 ∈ Fn+1
q | c1 c2 · · · cn ∈ C where i=1 ci = 0 , called the
extended code. This is an [n + 1, k, d ]q code where d = d or d + 1. A generator
b b
Basics of Coding Theory 13
matrix Gb for Cb is obtained by adding a column on the right of G so that every row
sum in this k × (n + 1) matrix is 0. A parity check matrix H
b for Cb is
1 ··· 1 1
0
H
b = .. .
H .
0
(c) Let S be any set of s coordinates. Let C(S) be all codewords in C that are zero on
S. Puncturing C(S) on S results in the [n − s, kS , dS ]q shortened code CS where
dS ≥ d. If C ⊥ has minimum weight d⊥ and s < d⊥ , then kS = k − s.
Example 1.7.2 Let H3,2 be the [7, 4, 3]2 binary Hamming code of Examples 1.4.9 and
1.6.10. Extending this code, we obtain H
b3,2 with generator and parity check matrices
1 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1
b 3,2 = 0 1 0 0 1 0 1 1 and H b 3,2 = 0 1 1 1 1 0 0 0 ,
G 0 0 1 0 1 1 0 1 1 0 1 1 0 1 0 0
0 0 0 1 1 1 1 0 1 1 0 1 0 0 1 0
respectively. Given the weight distribution of H3,2 found in Example 1.6.10, the weight
distribution of H
b3,2 must be A0 (H b3,2 ) = A8 (H
b3,2 ) = 1, A4 (H
b3,2 ) = 14, and Ai (H
b3,2 ) = 0
otherwise, implying H b3,2 is doubly-even and self-dual; see Remark 1.6.9. Certainly if H b3,2
is punctured on its right-most coordinate, the resulting code is H3,2 .
There is a relationship between punctured and shortened codes via dual codes.
Remark 1.8.2 Applying a permutation matrix to a code simply permutes the coordinates;
applying a monomial matrix permutes and re-scales coordinates. Applying either a permu-
tation or monomial matrix to a vector does not change its weight. Also applying either
a permutation or monomial matrix to two vectors does not change the distance between
these two vectors. There is a third more general concept of equivalence, involving semi-linear
transformations, where two linear codes C1 and C2 over Fq are equivalent provided one
can be obtained from the other by permuting and re-scaling coordinates and then applying
an automorphism of the field Fq . Note that applying such maps to a vector or to a pair of
vectors preserves the weight of the vector and the distance between the two vectors, respec-
tively; see [1008, Section 1.7] for further discussion of this type of equivalence. There are
other concepts of equivalence that arise when the code may not be linear but has some spe-
cific algebraic structure (e.g., additive codes over Fq that are closed under vector addition
but not necessarily closed under scalar multiplication). The common theme when defining
equivalence of such codes is to use a set of maps which preserve distance between the two
vectors, which preserve the algebraic structure under consideration, and which form a group
under composition of these maps. We will follow this theme when we define equivalence of
unrestricted codes at the end of this section.
Remark 1.8.3 Let C1 and C2 be linear codes over Fq of length n. Define C1 ∼P C2 to mean
C1 is permutation equivalent to C2 ; similarly define C1 ∼M C2 to mean C1 is monomially
equivalent to C2 . Then both ∼P and ∼M are equivalence relations on the set of all linear
codes over Fq of length n; that is, both are reflexive, symmetric, and transitive. If q = 2,
the concepts of permutation and monomial equivalence are the same; if q > 2, they may
not be. Furthermore, two permutation or monomially equivalent codes have the same size,
weight and distance distributions, and minimum weight and distance. If two linear codes
are permutation equivalent and one code is self-orthogonal, so is the other; this may not be
true of two monomially equivalent codes.
Row reducing a generator matrix of a linear code to reduced echelon form and then
permuting columns yields the following result.
Theorem 1.8.4 Let C be a linear [n, k, d]q code with k ≥ 1. There is a code permutation
equivalent to C with a generator matrix in standard form.
Example 1.8.5 Let C be an [8, 4, 4]2 binary linear code.
By Theorem 1.8.4, C is permuta-
tion equivalent to a code with generator matrix G = I4 | A . A straightforward argument
using minimum weight 4 shows that columns of A can be permuted so that the resulting
generator matrix is Gb 3 from Example 1.7.2. This verifies that C is permutation equivalent
to H3,2 .
b
The following is a generalization of a result of MacWilliams [1318]; see also [229, 1876].
This result motivated Definition 1.8.1.
Theorem 1.8.6 (MacWilliams Extension) There is a weight preserving linear trans-
formation between equal length linear codes C1 and C2 over Fq if and only if C1 and C2 are
monomially equivalent. Furthermore, the linear transformation agrees with the associated
monomial transformation on every codeword in C1 .
Definition 1.8.7 Let C be a linear code over Fq of length n. If CP = C for some permutation
matrix P ∈ Fn×nq , then P is a permutation automorphism of C; the set of all permutation
automorphisms of C is a group under matrix multiplication, denoted PAut(C). Similarly, if
CM = C for some monomial matrix M ∈ Fn×n q , then M is a monomial automorphism of
C; the set of all monomial automorphisms of C is a matrix group, denoted MAut(C). Clearly
PAut(C) ⊆ MAut(C).
Basics of Coding Theory 15
We now consider when two unrestricted codes are equivalent. It should be noted that, in
this definition, a linear code may end up being equivalent to a nonlinear code. See Chapter 3
for more on this general equivalence.
Definition 1.8.8 Let C1 and C2 be unrestricted codes of length n over Fq of the same size.
Then C1 is equivalent to C2 provided the codewords of C2 are the images under a map
of the codewords of C1 where the map is a permutation of coordinates together with n
permutations of the alphabet Fq , independently within each coordinate.4
Definition 1.9.1 For positive integers n and d, Aq (n, d) is the largest number of code-
words in an (n, M, d)q code, linear or nonlinear. Bq (n, d) is the largest number of code-
words in a [n, k, d]q linear code. An (n, M, d)q code is optimal provided M = Aq (n, d);
an [n, k, d]q linear code is optimal if q k = Bq (n, d). The concept of ‘optimal’ can also be
used in other contexts. Given n and d, kq (n, d) denotes the largest dimension of a linear code
over Fq of length n and minimum weight d; an [n, kq (n, d), d]q code could be called ‘optimal
in dimension’. Notice that kq (n, d) = logq Bq (n, d). Similarly, dq (n, k) denotes the largest
minimum distance of a linear code over Fq of length n and dimension k; an [n, k, dq (n, k)]q
may be called ‘optimal in distance’. Analogously, nq (k, d) denotes the smallest length of a
linear code over Fq of dimension k and minimum weight d; an [nq (k, d), k, d]q code might
be called ‘optimal in length’.5
Clearly Bq (n, d) ≤ Aq (n, d). On-line tables relating parameters of various types of codes
are maintained by M. Grassl [845].
The following basic properties of Aq (n, d) and Bq (n, d) are easily derived; see [1008,
Chapter 2.1].
n, a self-dual [n, n2
, d]q code over Fq with largest minimum weight d is sometimes called an ‘optimal q-ary
self-dual code of length n’. Optimal codes are explored in chapters such as 2–5, 11, 12, 16, 18, 20, and 23.
16 Concise Encyclopedia of Coding Theory
Definition 1.9.3 The sphere of radius r centered at u ∈ Fnq is the set Sq,n,r (u) =
{v ∈ Fnq | dH (u, v) ≤ r} of all vectors in Fnq whose distance from u is at most r.
The next result is the basis of the Sphere Packing Bound; part (a) is a direct count and
part (b) follows from the triangle inequality of Theorem 1.6.2.
Proof: Let C be an (n, M, d)q code. By Theorem 1.9.5, the spheres of radius t centered at
t
X n
distinct codewords are disjoint, and each such sphere has α = (q − 1)i total vectors.
i=0
i
Thus M α cannot exceed the number q n of vectors in Fnq . The result is now clear.
Remark 1.9.7 The Sphere Packing Bound is an upper bound on the size of a code given its
length and minimum distance. Additionally the Sphere Packing Bound produces an upper
bound on the minimum distance d of an (n, M )q code in the following sense. Given n, M ,
qn
and q, compute the smallest positive integer s with M > Ps n
; for an (n, M, d)q
i=0 i (q − 1)
i
Example 1.9.9 The code H3,2 of Examples 1.4.9 and 1.6.10 is a [7, 4, 3]2 code. So in this
n
27
case t = 3−1 = 1 and Pt qn (q−1)i = 1+7
= 24 yielding equality in the Sphere Packing
2 (
i=0 i )
Bound. So H3,2 is perfect.
Remark 1.9.11 In addition to providing an upper bound on code size, the Singleton Bound
yields the upper bound d ≤ n − logq (M ) + 1 on the minimum distance of an (n, M, d)q code.
Definition 1.9.12 A code for which equality holds in the Singleton Bound is called max-
imum distance separable (MDS). No code of length n and minimum distance d has
more codewords than an MDS code with parameters n and d; equivalently, no code of length
n with M codewords has a larger minimum distance than an MDS code with parameters n
and M . MDS codes are discussed in Chapters 3, 6, 8, 14, and 33.
Theorem 1.9.13 C is an [n, k, n−k +1]q MDS code if and only if C ⊥ is an [n, n−k, k +1]q
MDS code.
Example 1.9.14 Let H2,3 be the [4, 2]3 ternary linear code with generator matrix
1 0 1 1
G2,3 = .
0 1 1 −1
Examining inner products of the rows of G2,3 , we see that H2,3 is self-orthogonal of dimen-
sion half its length; so it is self-dual. Using Theorem 1.6.2(h), A0 (H2,3 ) = 1, A3 (H2,3 ) = 8,
and Ai (H2,3 ) = 0 otherwise. In particular H2,3 is a [4, 2, 3]3 code and hence is MDS.
Theorem 1.9.16 (Generalized Plotkin Bound) If an (n, M, d)q code exists, then
q−2 X
X q−1
M (M − 1)d ≤ 2n Mi Mj
i=0 j=i+1
M +i
where Mi = .
q
Example 1.9.17 The Sphere Packing Bound yields A2 (17, 9) ≤ 131 072
3 214 and A2 (18, 10) ≤
262 144
4 048 ; so A2 (17, 9) ≤ 40 and A2 (18, 10) ≤ 64. The Singleton Bound produces A2 (17, 9) ≤
512 and A2 (18, 10) ≤ 512. The Binary Plotkin Bound gives A2 (17, 9) ≤ 18 and A2 (18, 10) ≤
10. Using Theorem 1.9.2(e), the Plotkin Bound is best with A2 (18, 10) = A2 (17, 9) ≤ 10.
According to [845], there is a (18, 10, 10)2 code implying A2 (18, 10) = A2 (17, 9) = 10.
Theorem 1.9.18 (Griesmer Bound) Let C be an [n, k, d]q linear code with k ≥ 1. Then
k−1
X
d
n≥ .
i=0
qi
Remark 1.9.19 One can interpret the Griesmer Bound as an upper bound on the code
size given its length and minimum weight. Specifically, Bq (n, d) ≤ q k where k is the largest
Pk−1
positive integer such that n ≥ i=0 qdi . This bound can also be interpreted as a lower
bound on thePk−1 length
of a linear code of given dimension and minimum weight; that is,
nq (k, d) ≥ i=0 qdi . Finally, the Griesmer Bound can be understood as an upper bound
on the minimum weight given the code length and dimension; given n and k, dq (n, k) is at
most the largest d for which the bound holds.
Let C be an (n,PnM, d)q code with distance distribution Bi (C) for 0 ≤ i ≤ n. By Re-
mark 1.6.7, M = i=0 Bi (C), B0 (C) = 1, and Bi (C) = 0 for 1 ≤ i ≤ d − 1. Although Bi (C)
may not be an integer, Bi (C) ≥ 0. By the Delsarte–MacWilliams Inequalities, we also have
Pn (n,q) (n,q)
i=0 Bi (C)Kk ≥ 0 for 0 ≤ i ≤ n. As K0 (i) = 1, the 0th Delsarte–MacWilliams
(i) P
n
Inequality is merely i=0 Bi (C) ≥ 0, which is clearly already true. If q = 2, there are addi-
tional inequalities that hold. When q = 2, it is straightforward to show that Bn (C) ≤ 1. Fur-
thermore when q = 2 and d is even, we may also assume that Bi (C) = 0 when i is odd by The-
(n,2) (n,2)
orem 1.9.2(f). Properties of binomial coefficients show that Kk (i) = (−1)i Kn−k (i); thus
th th
the k Delsarte–MacWilliams Inequality is the same as the (n−k) Delsarte–MacWilliams
Inequality because Bi (C) = 0 when i is odd. This discussion leads to the linear program
that is set up to establish an upper bound on Aq (n, d).
SometimesPadditional constraints can be added to the linear program and reduce the
n
size of max { i=0 Bi }. Linear Programming Bounds will be considered in more detail in
Chapters 12 and 13.
(n−1
i )(q−1) )e .
Pd−2 i
Bq (n, d) ≥ q n−dlogq (1+ i=0
Definition 1.9.26 The information rate, or simply rate, of an (n, M, d)q code is defined
logq M k
to be . If the code is actually an [n, k, d]q linear code, its rate is , measuring the
n n
number of information coordinates relative to the total number of coordinates. In either the
linear or nonlinear case, the higher the rate, the higher the proportion of coordinates in a
d
codeword that actually contain information rather than redundancy. The ratio is called
n
the relative distance of the code; as we will see later, the relative distance is a measure
of the error-correcting capability of the code relative to its length.
Each asymptotic bound will be either an upper or lower bound on the largest possible
rate for a family of (possibly nonlinear) codes over Fq of lengths going to infinity with
relative distances approaching δ. The function, called the asymptotic normalized rate
function, that determines this rate is
As the exact value of αq (δ) is unknown, we desire upper and lower bounds on this function.
An upper bound would indicate that all families with relative distances approaching δ have
rates, in the limit, at most this upper bound. A lower bound indicates that there exists a
family of codes of lengths approaching infinity and relative distances approaching δ whose
rates are at least this bound. Three of the bounds in the next theorem involve the entropy
function.
Discussion and proofs of the asymptotic bounds can be found in [1008, 1323, 1505, 1836].
The MRRW Bound, named after the authors of [1365] who developed the bound, is the
Asymptotic Linear Programming Bound. The MRRW Bound has been improved by M.
Aaltonnen [2] in the case q > 2.
The parameters of the Hamming codes in fact determine the code. That Hm,q is perfect
follows by direct computation from Definition 1.9.8.
Definition 1.11.1 For i ∈ {1, 2}, let Ci be linear codes both of length n over Fq . The
(u | u + v) construction produces the linear code C of length 2n given by C = {(u, u + v) |
u ∈ C1 , v ∈ C2 }.
Remark 1.11.2 Let Ci , for i ∈ {1, 2}, be [n, ki , di ]q codes with generator and parity check
matrices Gi and Hi , respectively. C obtained by the (u | u + v) construction is a [2n, k1 +
k2 , min {2d1 , d2 }]q code with generator and parity check matrices
G1 G1 H1 0(n−k1 )×n
G= and H = . (1.2)
0k2 ×n G2 −H2 H2
Definition 1.11.3 Let r and m be integers with 0 ≤ r ≤ m and 1 ≤ m. The rth or-
der binary Reed–Muller (RM) code of length 2m , denoted RM(r, m), is defined
recursively. The code RM(0, m) = {0, 1}, the [2m , 1, 2m ]2 binary repetition code, and
m
RM(m, m) = F2q , a [2m , 2m , 1]2 code. For 1 ≤ r < m, define
Remark 1.11.4
Let G(r, m) be a generator matrix of RM(r, m). By Definition 1.11.3,
G(0, m) = 1 1 · · · 1 and G(m, m) = I2m . By Definition 1.11.3 and (1.2), for 1 ≤ r < m,
G(r, m − 1) G(r, m − 1)
G(r, m) =
O G(r − 1, m − 1)
Using the definition of Reed–Muller codes and properties from the (u | u + v) construc-
tion, along with induction, the following hold; see [1008, Theorem 1.10.1].
Theorem 1.11.6 Let r and m be integers with 0 ≤ r ≤ m and 1 ≤ m. The following hold.
(a) RM(i, m) ⊆ RM(j, m) if 0 ≤ i ≤ j ≤ m.
(b) The dimension of RM(r, m) equals m m m
0 + 1 + ··· + r .
(c) The minimum weight of RM(r, m) equals 2m−r .
(d) RM(m, m)⊥ = {0}, and if 0 ≤ r < m, then RM(r, m)⊥ = RM(m − r − 1, m).
Remark 1.11.7 Theorem 1.11.6(a) is sometimes called the nesting property of Reed–
Muller codes. As observed in Example 1.11.5, RM(1, 3) = H b3,2 . Using Theorem 1.11.6(d),
it can be shown that RM(m−2, m) = Hm,2 ; see [1008, Exercise 61]. By Theorem 1.11.6(d),
b
RM(m − 1, m) = RM(0, m)⊥ . Since RM(0, m) = {0, 1}, RM(m − 1, m) must be all even
m
weight vectors in F22 , a fact observed for m = 2 and m = 3 in Example 1.11.5.
1957 to 1959. The 1961 book by W. W. Peterson [1505] compiled extensive results about
cyclic codes and laid the framework for much of the present-day theory. In 1972 this book
was expanded and published jointly by Peterson and E. J. Weldon [1506].
Up to this point, the coordinates of Fnq have been denoted {1, 2, . . . , n}. For cyclic codes,
the coordinates of Fnq will be denoted {0, 1, . . . , n − 1}.
Definition 1.12.1 Let C be a code of length n over Fq . C is cyclic provided that for all
c = c0 c1 · · · cn−1 ∈ C, the cyclic shift c0 = cn−1 c0 · · · cn−2 ∈ C.
Remark 1.12.2 The cyclic shift described in Definition 1.12.1 is cyclic shift to the right
by one position with wrap-around. The code C is cyclic if and only if P ∈ PAut(C) where
the permutation matrix P = [pi,j ] is defined by pi,i+1 = 1 for 0 ≤ i ≤ n − 2, pn−1,0 = 1,
and pi,j = 0 otherwise. Cyclic codes are closed under cyclic shifts with wrap-around of any
amount and in either the left or right directions.
Example 1.12.3 Let C be the [7, 4]2 code with generator matrix
1 1 0 1 0 0 0
0 1 1 0 1 0 0
G= 0 0 1 1
.
0 1 0
0 0 0 1 1 0 1
Labeling the rows of G as r1 , r2 , r3 , r4 top to bottom, we see that r5 = 1000110 = r1 +r2 +r3 ,
r6 = 0100011 = r2 + r3 + r4 , and r7 = 1010001 = r1 + r2 + r4 . Since C is spanned by
{r1 , r2 , . . . , r7 } and this list is closed under cyclic shifts, C must be a cyclic code. By row
reducing G, we obtain another generator matrix
1 0 0 0 1 1 0
0 1 0 0 0 1 1
G0 = 0 0 1 0 1 1 1 .
0 0 0 1 1 0 1
While cyclic codes can be nonlinear, throughout this section we will examine only those
that are linear. To study linear cyclic codes it is useful to consider elements of Fnq as
polynomials inside a certain quotient ring of polynomials. In that framework, linear cyclic
codes are precisely the ideals of that quotient ring. We now establish the framework.
(e) (Unique Coset Representatives) Let p(x) ∈ Fq [x] be nonzero. The distinct cosets
of the quotient ring Fq [x]/hp(x)i are uniquely representable as a(x) + hp(x)i where
a(x) = 0 or deg(a(x)) < deg(p(x)); Fq [x]/hp(x)i has order q deg(p(x)) . The quotient
ring Fq [x]/hp(x)i is also a vector space over Fq of dimension deg(p(x)).
(f) If p(x) is irreducible over Fq , then Fq [x]/hp(x)i is a field.
there are significant differences. When gcd(n, q) 6= 1, cyclic codes are called repeated-root cyclic codes.
Repeated-root cyclic codes were first examined in their most generality in [369, 1835].
26 Concise Encyclopedia of Coding Theory
Remark 1.12.8 A splitting field of xn − 1 over Fq is Fqt where t is the size of the q-
cyclotomic coset of 1 modulo n.
Theorem 1.12.9 ([1323, Chapter 7.5]) Let α be a primitive nth Qroot of unity in the
splitting field Fqt of xn − 1 over Fq . For 0 ≤ s < n define Mαs (x) = i∈Cs (x − αi ). Then
n
Mαs (x) ∈ Fq [x] and is irreducible over Fq . Furthermore, the uniqueQ factorization of x − 1
n
into monic irreducible polynomials over Fq is given by x − 1 = s Mαs (x) where s runs
through a set of representatives of all distinct q-cyclotomic cosets modulo n.
Example 1.12.10 The 2-cyclotomic cosets modulo 7 are C0 = {0}, C1 = {1, 2, 4}, and
C3 = {3, 6, 5}. By Remark 1.12.8, F23 = F8 is the splitting field of x7 − 1 over F2 . In
the notation of Table 1.3, α = δ is a primitive 7th root of unity. In the notation of The-
orem 1.12.9, Mα0 (x) = −1 + x = 1 + x, Mα = (x − α)(x − α2 )(x − α4 ) = 1 + x + x3 ,
Mα3 = (x − α3 )(x − α6 )(x − α5 ) = 1 + x2 + x3 , and x7 − 1 = Mα0 (x)Mα (x)Mα3 (x).
Using Theorem 1.12.9, we have the following basic theorem [1008, Theorem 4.2.1] de-
scribing the structure of cyclic codes over Fq . We remark that all of this theorem except
part (g) is valid when gcd(n, q) 6= 1. We note that if a(x), b(x) ∈ Fq [x], then a(x) divides
b(x), denoted a(x) | b(x), means that there exists c(x) ∈ Fq [x] such that b(x) = a(x)c(x).
Theorem 1.12.11 Let C be a nonzero linear cyclic code over Fq of length n viewed as an
ideal of Fq [x]/hxn − 1i. There exists a polynomial g(x) ∈ C with the following properties.
(a) g(x) is the unique monic polynomial of minimum degree in C.
(b) C = hg(x)i in Fq [x]/hxn − 1i.
(c) g(x) | (xn − 1).
Pn−k
With k = n − deg(g(x)), let g(x) = i=0 gi xi where gn−k = 1. Then
(d) the dimension of C is k and {g(x), xg(x), . . . , xk−1 g(x)} is a basis for C,
(e) every element of C is uniquely expressible as a product g(x)f (x) where f (x) = 0 or
deg(f (x)) < k,
(f) a generator matrix G of C is
and
Basics of Coding Theory 27
(g) if α is a primitive nth root of unity in the splitting field Fqt of xn − 1 over Fq , then
Y
g(x) = Mαs (x)
s
Definition 1.12.12 The polynomial g(x) in Theorem 1.12.11 is the generator polyno-
mial of C. By convention, the cyclic code C = {0} has generator polynomial g(x) = xn − 1.
Corollary 1.12.13 There are 2m linear cyclic codes of length n (including the zero code)
over Fq where m is the number of q-cyclotomic cosets modulo n.
Corollary 1.12.14 If g1 (x) and g2 (x) are generator polynomials of C1 and C2 , respectively,
and if g1 (x) | g2 (x), then C2 ⊆ C1 .
Definition 1.12.15 Let C be a linear cyclic code of length n over Fq with generator poly-
nomial g(x) | (xn −1). Let α be a fixed primitive nthQroot n
Q of unity in ia splitting field of x −1
over Fq . By Theorems 1.12.9 and 1.12.11, g(x) = s i∈Cs (x − α ) where s runsSthrough
some subset of representatives of the q-cyclotomic cosets Cs modulo n. Let T = s Cs be
the union of these q-cyclotomic cosets. The roots of unity {αi | i ∈ T } are called the zeros
of C; {αi | 0 ≤ i < n, i 6∈ T } are the nonzeros of C. The set T is called the defining set
of C relative to α.
Remark 1.12.16 In Definition 1.12.15, if you change the primitive nth root of unity, you
change the defining set T ; so T is computed relative to a fixed primitive root of unity.
Remark 1.12.17 Corollary 1.12.14 can be translated into the language of defining sets: If
T1 and T2 are defining sets of C1 and C2 , respectively, relative to the same primitive root of
unity, and if T1 ⊆ T2 , then C2 ⊆ C1 .
Example 1.12.18 Continuing with Example 1.12.10, Table 1.5 describes the 23 = 8 bi-
nary cyclic codes of length 7. The code with g(x) = 1 + x + x3 is H3,2 as discussed in
Example 1.12.3. The code with g(x) = 1 + x2 + x3 is permutation equivalent to H3,2 . The
code of dimension k = 1 is the binary repetition code {0,1}.
The dual code of a cyclic code is also cyclic. We can determine its generator polynomial
and defining set; see [1323, Chapter 7.4].
Theorem 1.12.19 Let C be an [n, k]q cyclic code with generator polynomial g(x). Define
xn − 1 xk h(x−1 )
h(x) = . Then C ⊥ is cyclic with generator polynomial g ⊥ (x) = . Let α be
g(x) h(0)
a primitive nth root of unity in a splitting field of xn − 1 over Fq . If T is the defining set of
C relative to α, the defining set of C ⊥ is T ⊥ = {0, 1, . . . , n − 1} \ (−1)T mod n.
28 Concise Encyclopedia of Coding Theory
TABLE 1.5: The [7, k, d]2 cyclic codes with generator polynomial g(x) and defining set T
relative to α
k d g(x) T
0 — 1 + x7 = 0 {0, 1, 2, 3, 4, 5, 6}
1 7 1 + x + x2 + x3 + x4 + x5 + x6 {1, 2, 3, 4, 5, 6}
3 4 1 + x2 + x3 + x4 {0, 1, 2, 4}
3 4 1 + x + x2 + x4 {0, 3, 5, 6}
4 3 1 + x + x3 {1, 2, 4}
4 3 1 + x2 + x3 {3, 5, 6}
6 2 1+x {0}
7 1 1 ∅
Example 1.12.20 Continuing with Example 1.12.18, the dual of any code in Table 1.5
must be a code in the table. By comparing dimensions, the codes of dimension 0 and
7 in the table are duals of each other as are the codes of dimension 1 and 6; this is
confirmed by examining the defining sets and using Theorem 1.12.19. By this theorem,
{0, 1, 2, 3, 4, 5, 6} \ (−1){1, 2, 4} mod 7 = {0, 1, 2, 3, 4, 5, 6} \ {6, 5, 3} = {0, 1, 2, 4} showing
that the codes with defining sets {0, 1, 2, 4} and {1, 2, 4} are duals of each other. By Re-
mark 1.12.17, as {1, 2, 4} ⊆ {0, 1, 2, 4}, h1+x+x3 i⊥ = h1+x2 +x3 +x4 i ⊆ h1+x+x3 i, a fact
we already observed in Example 1.6.10. Similarly, the codes with defining sets {0, 3, 5, 6}
and {3, 5, 6} are duals of each other.
The following is a somewhat surprising fact about cyclic self-orthogonal binary codes;
see [1008, Theorem 4.4.18].
Definition 1.12.23 Quasi-cyclic codes are a natural generalization of cyclic codes. Let C
be a code of length n and ` a positive integer dividing n. C is `-quasi-cyclic provided
whenever c0 c1 · · · cn−1 ∈ C then cn−` cn−`+1 · · · cn−1 c0 · · · cn−`−2 cn−`−1 ∈ C. Cyclic codes
are 1-quasi-cyclic codes. Quasi-cyclic codes will be studied in Chapter 7.
See Chapter 2 and Sections 8.6 and 20.5 for more on cyclic codes over fields.
Example 1.13.1 There are three 2-cyclotomic cosets modulo 23 with sizes 1, 11, and 11:
C0 = {0}, C1 = {1, 2, 4, 8, 16, 9, 18, 13, 3, 6, 12}, C5 = {5, 10, 20, 17, 11, 22, 21, 19, 15, 7, 14}.
Theorem 1.12.9 implies that, over F2 , x23 − 1 = x23 + 1 factors into 3 monic irreducible
Basics of Coding Theory 29
polynomials of degrees 1, 11, and 11. These irreducible factors are b0 (x) = 1 + x, b1 (x) =
1 + x + x5 + x6 + x7 + x9 + x11 , and b2 (x) = 1 + x2 + x4 + x5 + x6 + x10 + x11 . There are
8 binary linear cyclic codes of length 23 by Corollary 1.12.13. By Theorem 1.12.11(d), the
codes C1 = hb1 (x)i and C2 = hb2 (x)i are [23, 12]2 codes. The map that fixes coordinate 0
and switches coordinates i and 23 − i for 1 ≤ i ≤ 11 leads to a permutation matrix P where
C1 P = C2 . Any code permutation equivalent to C1 is termed the [23, 12]2 binary Golay
code of length 23 and is denoted G23 . The splitting field of x23 − 1 over F2 is F211 . In F211
there is a primitive 23rd root of unity α where the defining sets of C1 and C2 are C1 and
C5 , respectively, relative to α. Another primitive 23rd root of unity is β = α5 ; relative to β,
the defining sets of C1 and C2 are C5 and C1 , respectively. By Theorem 1.12.19 the defining
set of C1⊥ relative to α is C0 ∪ C1 implying by Remark 1.12.17 that C1⊥ ⊆ C1 showing C1⊥ is
self-orthogonal. Using Theorem 1.12.21, C1⊥ is the doubly-even [23, 11]2 code consisting of
all codewords in C1 of even weight.
Example 1.13.2 The 3-cyclotomic cosets modulo 11 are C0 = {0}, C1 = {1, 3, 9, 5, 4},
and C2 = {2, 6, 7, 10, 8} of sizes 1, 5, and 5, respectively. Theorem 1.12.9 implies that,
over F3 , x11 − 1 factors into 3 monic irreducible polynomials of degrees 1, 5, and 5. These
irreducible factors are t0 (x) = −1 + x, t1 (x) = −1 + x2 − x3 + x4 + x5 , and t2 (x) =
−1−x+x2 −x3 +x5 . There are 8 ternary linear cyclic codes of length 11 by Corollary 1.12.13.
By Theorem 1.12.11(d), the codes C1 = ht1 (x)i and C2 = ht2 (x)i are [11, 6]3 codes. The map
that fixes coordinate 0 and switches coordinates i and 11 − i for 1 ≤ i ≤ 5 leads to a
permutation matrix P where C1 P = C2 . Any code monomially equivalent to C1 is termed
the [11, 6]3 ternary Golay code of length 11 and is denoted G11 . The splitting field of
x11 − 1 over F3 is F35 . In F35 there is a primitive 11th root of unity α where the defining
sets of C1 and C2 are C1 and C2 , respectively, relative to α. Another primitive 11th root of
unity is β = α2 ; relative to β, the defining sets of C1 and C2 are C2 and C1 , respectively.
Definition 1.13.3 G23 can be extended as in Section 1.7 to a [24, 12]2 code Gb23 , denoted
G24 , and called the binary Golay code of length 24. Similarly G11 can be extended to a
[12, 6]3 code Gb11 , denoted G12 , and called the ternary Golay code of length 12.
Remark 1.13.4 The automorphism groups of the four Golay codes involve the Mathieu
groups Mp for p ∈ {11, 12, 23, 24} discovered by Émile Mathieu [1352, 1353]. These four
permutation groups on p points are 4-fold transitive, when p ∈ {11, 23}, and 5-fold transitive,
when p ∈ {12, 24}, simple groups. Properties of these groups and their relationship to Golay
codes can be found in [442].
The following two theorems give basic properties of the four Golay codes. Parts (a), (b),
and (c) of each theorem can be found in most standard coding theory texts. The uniqueness
of these codes in part (d) of each theorem is a culmination of work in [525, 1514, 1518, 1732]
with a self-contained proof in [1008, Chapter 10]. Part (e) of each theorem follows by direct
computation from Definition 1.9.8. The automorphism groups in part (f) of each theorem
can be found in [434], which is also [442, Chapter 10].
Theorem 1.13.5 The following properties hold for the binary Golay codes.
(a) G23 has minimum distance 7 and weight distribution A0 = A23 = 1, A7 = A16 = 253,
A8 = A15 = 506, A11 = A12 = 1288, and Ai = 0 otherwise.
(b) G24 has minimum distance 8 and weight distribution A0 = A24 = 1, A8 = A16 = 759,
A12 = 2576, and Ai = 0 otherwise.
(c) G24 is doubly-even and self-dual.
30 Concise Encyclopedia of Coding Theory
(d) Both a (23, M )2 and a (24, M )2 , possibly nonlinear, binary code each containing 0
with M ≥ 212 codewords and minimum distance 7 and 8, respectively, are unique
up to permutation equivalence. They are the [23, 12, 7]2 and [24, 12, 8]2 binary Golay
codes.
(e) G23 is perfect.
Theorem 1.13.6 The following properties hold for the ternary Golay codes.
(f) MAut(G11 ) = Mf11 and MAut(G12 ) = M f12 where M f11 and Mf12 are isomorphic to the
double covers, or the non-splitting central extensions by a center of order 2, of M11
and M12 .
Remark 1.13.7 If there is equality for given parameters of a code in a bound from Sec-
tion 1.9, we say the code meets the bound. Perfect codes are those meeting the Sphere
Packing Bound; MDS codes are those meeting the Singleton Bound. Using Theorem 1.10.5,
direct computation shows that the [(q m − 1)/(q − 1), m, q m−1 ]q simplex code meets the
Griesmer Bound, as do G11 and G12 . Neither G23 nor G24 meet the Griesmer Bound.
{b, b + 1, . . . , b + s − 1} mod n ⊆ T.
Remark 1.14.2 When considering the notion of consecutive, wrap-around is allowed. For
example if n = 10, {8, 9, 0, 1} is a consecutive set in T = {0, 1, 2, 5, 8, 9}.
Basics of Coding Theory 31
TABLE 1.6: The [7, k, d]2 BCH codes with defining set T relative to α, b, and Bose distance
δ
k d T b δ
0 — {0, 1, 2, 3, 4, 5, 6} = C1 ∪ C2 ∪ · · · ∪ C6 ∪ C0 1 —
1 7 {1, 2, 3, 4, 5, 6} = C1 ∪ C2 ∪ · · · ∪ C6 1 7
3 4 {0, 1, 2, 4} = C0 ∪ C1 ∪ C2 0 4
3 4 {0, 3, 5, 6} = C5 ∪ C6 ∪ C0 5 4
4 3 {1, 2, 4} = C1 ∪ C2 1 3
4 3 {3, 5, 6} = C5 ∪ C6 5 3
6 2 {0} = C0 0 2
Rather surprisingly, the existence of consecutive elements in the defining set of a cyclic
code determines a lower bound, called the BCH Bound, on the minimum distance of the
code. A proof of the following can be found in [1323, Chapter 7.6].
Theorem 1.14.3 (BCH Bound) Let C be a linear cyclic code of length n over Fq and
minimum distance d with defining set T relative to some primitive nth root of unity. Assume
T contains δ − 1 consecutive elements for some integer δ ≥ 2. Then d ≥ δ.
T = Cb ∪ Cb+1 ∪ · · · ∪ Cb+δ−2
relative to some primitive nth root of unity where Ci is the q-cyclotomic coset modulo n
containing i. As T contains the consecutive set {b, b+1, . . . , b+δ−2}, this code has minimum
distance at least δ by the BCH Bound. If b = 1, the code is narrow-sense; if n = q t − 1
for some t, the code is primitive.
Definition 1.14.5 Sometimes a BCH code can have more than one designed distance; the
largest designed distance is called the Bose distance.
Example 1.14.6 Consider the eight [7, k, d]2 binary cyclic codes from Example 1.12.18 and
presented in Table 1.5. All except the code with defining set T = ∅ are BCH codes as seen
in Table 1.6. As 7 = 23 − 1, all these BCH codes are primitive. Technically, the zero code
is primitive with designed distance 8; of course distance in the zero code is meaningless.
Of the six remaining codes, three are narrow-sense. Notice that the code with defining set
{1, 2, 4} is narrow-sense with two designed distances 2 and 3 as {1, 2, 4} = C1 = C1 ∪ C2 ;
the Bose distance is 3. The code with defining set {1, 2, 3, 4, 5, 6} is narrow-sense with
designed distances 4 through 7 as {1, 2, 3, 4, 5, 6} = C1 ∪ C2 ∪ C3 = C1 ∪ C2 ∪ C3 ∪ C4 =
C1 ∪ C2 ∪ C3 ∪ C4 ∪ C5 = C1 ∪ C2 ∪ C3 ∪ C4 ∪ C5 ∪ C6 ; the Bose distance is 7. The Bose
designed distance and the true minimum distance are the same for the seven nonzero BCH
codes.
Example 1.14.7 In the notation of Example 1.13.1, G23 has defining set T = C1 which
contains 4 consecutive elements {1, 2, 3, 4}. By the BCH Bound, G23 has minimum weight
at least 5; its true minimum weight is 7 from Theorem 1.13.5(a). As the defining set of G23
is T = C1 = C1 ∪ C2 ∪ C3 ∪ C4 , G23 is a narrow-sense8 BCH code of Bose designed distance
8G
23 is permutation equivalent to the BCH code with designed distance 5 and defining set C5 = C19 =
C19 ∪ C20 ∪ C21 ∪ C22 ; in this formulation G23 is not narrow-sense.
32 Concise Encyclopedia of Coding Theory
δ = 5 with b = 1. Similarly, G11 of Example 1.13.2 is a BCH code viewed in several ways.
G11 is a narrow-sense BCH code with b = 1, δ = 2 and defining set C1 = {1, 3, 4, 5, 9}. It is
also a BCH code with b = 3, δ = 2, 3, or 4 as {1, 3, 4, 5, 9} = C3 = C3 ∪ C4 = C3 ∪ C4 ∪ C5 .
The Bose distance of G11 is 4 while its true minimum distance is 5 from Theorem 1.13.6(a).
At about the same time as BCH codes appeared in the literature, I. S. Reed and G.
Solomon [1582] published their work on the codes that now bear their names. These codes,
which are now commonly presented as a special case of BCH codes, were actually first
constructed by K. A. Bush [319] in 1952 in the context of orthogonal arrays. Because
of their burst error-correction capabilities, Reed–Solomon codes are used to improve the
reliability of compact discs, digital audio tapes, and other data storage systems.
Example 1.14.10 Using Table 1.1, γ is both a primitive element of F9 and a primitive 8th
root of unity. Let C be the narrow-sense Reed–Solomon code over F9 of length 8 and designed
distance δ = 4. Then C has defining set {1, 2, 3} relative to γ and generator polynomial
g(x) = (x−γ)(x−γ 2 )(x−γ 3 ) = γ 2 +γx+γ 3 x2 +x3 . C is an [8, 5, 4]9 code. By Theorem 1.12.19,
C ⊥ has defining set T ⊥ = {0, 1, . . . , 7} \ (−1){1, 2, 3} mod 8 = {0, 1, . . . , 7} \ {7, 6, 5} =
{0, 1, 2, 3, 4} and hence generator polynomial g ⊥ (x) = (x−1)(x−γ)(x−γ 2 )(x−γ 3 )(x−γ 4 ) =
(x2 − 1)g(x) = γ 6 + γ 5 x + γ 5 x2 + γ 7 x3 + γ 3 x4 + x5 . So C ⊥ is an [8, 3, 6]9 non-narrow-sense
Reed–Solomon code with b = 0 and designed distance 6, consistent with Theorem 1.14.9(d).
As T ⊆ T ⊥ , C ⊥ ⊆ C by Remark 1.12.17.
The original formulation of Reed and Solomon for the narrow-sense Reed–Solomon codes
is different from that of Definition 1.14.8. This alternative formulation of narrow-sense
Reed–Solomon codes is of particular importance because it is the basis for the definitions
9 While this is a common definition of Reed–Solomon codes, there are other codes of lengths different
from q − 1 that are also called Reed–Solomon codes. See Remark 15.3.21.
Basics of Coding Theory 33
of generalized Reed–Solomon codes, Goppa codes, and algebraic geometry codes; see Chap-
ters 15 and 24.
For this formulation, let Pk,q = {p(x) ∈ Fq [x] | p(x) = 0 or deg(p(x)) < k} when k ≥ 0.
See [1008, Theorem 5.2.3] for a proof of the following.
Theorem 1.14.11 Let n = q − 1 and let α be a primitive nth root of unity in Fq . For
0 < k ≤ n = q − 1, let RS k (α) = p(α0 ), p(α), . . . , p(αq−2 ) ∈ Fnq | p(x) ∈ Pk,q . Then
RS k (α) is the narrow-sense [q − 1, k, q − k]q Reed–Solomon code.
In general, extending an MDS code may not produce an MDS code; however extending
a narrow-sense Reed–Solomon code does produce an MDS code. With Pq−2the notation of The-
orem 1.14.11, Fq = {0, 1 = α0 , α, α2 , . . . , αq−2 } and, when q ≥ 3, i=0 αi P
= 0. Using this,
it is straightforward to show that if q ≥ 3, k < q − 1, and p(x) ∈ Pk,q , then β∈Fq p(β) = 0.
This leads to the following result.
Theorem 1.14.12
With the notation of Theorem 1.14.11 and 0 < k < n = q − 1,
RS
d k (α) = p(α0 ), p(α), . . . , p(αq−2 ), p(0) ∈ Fnq | p(x) ∈ Pk,q is a [q, k, q − k + 1]q
MDS code.
Remark 1.14.13 The code RS q−1 (α) omitted from consideration in Theorem 1.14.12
equals Fq−1
q . Its extension is not as given in Theorem 1.14.12; however RS
d q−1 (α) is still a
[q, q − 1, 2]q MDS code.
Definition 1.15.1 Let C be a linear code of length n over Fq with weight distribution
Ai (C) for 0 ≤ i ≤ n. Let x and y be independent indeterminates over Fq . The (Hamming)
weight enumerator of C is defined to be
n
X
HweC (x, y) = Ai (C)xi y n−i .
i=0
Definition 1.15.2 The Stirling numbers S(r, ν) of the second kind are defined for
nonnegative integers r, ν by the equation
ν
1 X ν−i ν
S(r, ν) = (−1) ir ;
ν! i=0 i
ν!S(r, ν) is the number of ways to distribute r distinct objects into ν distinct boxes with
no box left empty.
34 Concise Encyclopedia of Coding Theory
The next theorem gives six equivalent formulations of the MacWilliams Identities or
MacWilliams Equations. The fourth in the list involves the Krawtchouck polynomials;
see Definition 1.9.21. The last two are the Pless Power Moments. One proof of the
equivalence of these identities is found in [1008, Chapter 7.2].
Theorem 1.15.3 (MacWilliams Identities and Pless Power Moments) Let C be a
linear [n, k]q code and C ⊥ its [n, n − k]q dual code. Let Ai = Ai (C) and A⊥ ⊥
i = Ai (C ), for
⊥
0 ≤ i ≤ n, be the weight distributions of C and C , respectively. The following are equivalent.
n−ν
X n − j ν
n−j
X
(a) Aj = q k−ν
A⊥
j for 0 ≤ ν ≤ n.
j=0
ν j=0
n − ν
n ν
n−j
X j X
(b) Aj = q k−ν (−1)j (q − 1)ν−j A⊥
j for 0 ≤ ν ≤ n.
j=ν
ν j=0
n − ν
1
(c) HweC ⊥ (x, y) = HweC (y − x, y + (q − 1)x).
|C|
n
1 X (n,q)
(d) A⊥
j = Ai Kj (i) for 0 ≤ j ≤ n.
|C| i=0
n min{n,r} r
−
X X X n j
(e) j r Aj = (−1)j A⊥j
ν!S(r, ν)q k−ν (q − 1)ν−j for 0 ≤ r.
j=0 j=0 ν=j
n − ν
n min{n,r} r
−
X X X n j
(f) (n − j)r Aj = A⊥
j
ν!S(r, ν)q k−ν for 0 ≤ r.
j=0 j=0 ν=j
n − ν
The unique solution to this system is A6 = 264, A9 = 440, and A12 = 24. Thus the weight
enumerator of G12 is
The MacWilliams Identities can be used to find the weight distribution of an MDS
code as found, for example, in [1323, Theorem 6 of Chapter 11]. A resulting corollary gives
bounding relations on the length, dimension, and field size.
Theorem 1.15.7 Let C be an [n, k, d]q MDS code over Fq . The weight distribution of C is
given by A0 (C) = 1, Ai (C) = 0 for 1 ≤ i < d = n − k + 1 and
i−d
X
n i
(−1)j q i+1−d−j − 1
Ai (C) =
i j=0 j
for d ≤ i ≤ n.
This corollary becomes a foundation for the MDS Conjecture 3.3.21 in Chapter 3.
1.16 Encoding
Figure 1.1 shows a simple communication channel that includes a component called an
encoder, in which a message is encoded to produce a codeword. In this section we examine
two encoding processes.
As in Figure 1.1, a message is any of the q k possible k-tuples x ∈ Fkq . The encoder will
convert x to an n-tuple c from a code C over Fq with q k codewords; that codeword will then
be transmitted over the communication channel.
36 Concise Encyclopedia of Coding Theory
Suppose that C is an [n, k, d]q linear code with generator matrix G and parity check
matrix H. We first describe an encoder that uses the generator matrix G. The most common
way to encode the message x is as x 7→ c = xG. If G is replaced by another generator matrix,
the encoding of x will, of course, be different. Anice relationship exists between message
and codeword if G is in standard form Ik | A . In that case the first k coordinates of
the codeword c are the information symbols x in order; the remaining n − k symbols are
the parity check symbols, that is, the redundancy added to x in order to help recover x
if errors occur during transmission. A similar relationship between message and codeword
can exist even if G is not in standard form. Specifically, suppose there exist column indices
i1 , i2 , . . . , ik such that the k×k matrix consisting of these k columns of G is the k×k identity
matrix. In that case the message is found in the k coordinates i1 , i2 , . . . , ik of the codeword
scrambled but otherwise unchanged; that is, the message symbol xj is in component ij of the
codeword. If this occurs where the message is embedded in the codeword, we say that the
encoder is a systematic encoder of C. We can always force an encoder to be systematic.
For example, if G is row reduced to a matrix G1 in reduced row echelon form, G1 remains
a generator matrix of C by Remark 1.4.3; the encoding x 7→ c = xG1 is systematic as G1
has k columns which together form Ik . Another way to force an encoder to be systematic
is as follows. By Theorem 1.8.4, C is permutation equivalent to an [n, k, d]q code C 0 with
generator matrix G0 in standard form. If the code C 0 is used in place of C, the encoder
x 7→ xG0 is a systematic encoder of C 0 .
Example 1.16.1 Let C be the [7, 4, 3]2 binary Hamming code H3,2 with generator matrix
G3,2 from Example 1.4.9. Encoding x = x1 x2 x3 x4 ∈ F42 as xG3,2 produces the codeword
c = x1 x2 x3 x4 (x2 + x3 + x4 )(x1 + x3 + x4 )(x1 + x2 + x4 ).
Example 1.16.2 Let C be an [n, k, d]q cyclic code with generator polynomial g(x) and
generator matrix G obtained from cyclic shifts of g(x) as in Theorem 1.12.11(f). Suppose
the message m = m0 m1 · · · mk−1 is to be encoded as c = mG. Using the polynomial m(x) =
m0 +m1 x+· · ·+mk−1 xk−1 to represent the message m and c(x) = c0 +c1 x+· · ·+cn−1 xn−1
to represent the codeword c, it is a simple calculation to show c(x) = m(x)g(x). Generally,
this encoding is not systematic. Recall from Examples 1.12.3 and 1.12.18 that the Hamming
[7, 4, 3]2 code H3,2 has a cyclic form with generator polynomial g(x) = 1 + x + x3 . The
nonsystematic encoder m(x) 7→ c(x) = m(x)g(x) yields c(x) = m0 + (m0 + m1 )x + (m1 +
m2 )x2 + (m0 + m2 + m3 )x3 + (m1 + m3 )x4 + m2 x5 + m3 x6 .
1 1 1
Thus c5 = x2 + x3 + x4 , c6 = x1 + x3 + x4 , and c7 = x1 + x2 + x4 , consistent with
Example 1.16.1.
Basics of Coding Theory 37
Example 1.16.4 Let C be an [n, k, d]q cyclic code with generator polynomial g(x). In
Example 1.16.2 a nonsystematic encoder was described that encodes a cyclic code using
g(x). There is a systematic encoder of C using the generator polynomial g ⊥ (x) of C ⊥ .
By Theorem 1.12.19, g ⊥ (x) = xk h(x−1 )/h(0) = h00 + h01 x + · · · + h0k−1 xk−1 + h0k xk where
h(x) = (xn −1)/g(x) and h0k = 1. Let H, which is a parity check matrix for C, be determined
from the shifts of g ⊥ (x) as follows:
0
h0 h01 h02 · · · h0k ··· ··· 0
0 h00 h01 · · · h0k−1 h0k · · · 0
H = ... ..
.
0 0 0 h00 ··· ··· ··· h0k
g ⊥ (x)
xg ⊥ (x)
↔ .. .
.
xn−k−1 g ⊥ (x)
Examining the generator matrix G for C in Theorem 1.12.11(f), {0, 1, . . . , k − 1} is an infor-
mation set for C. Let c = c0 c1 · · · cn−1 ∈ C; so c0 c1 · · · ck−1 can be considered the associated
message. The redundancy components ck ck+1 · · · cn−1 are determined from HcT = 0T and
can be computed in the order i = k, k + 1, . . . , n − 1 where
k−1
X
ci = − h0j ci−k+j . (1.3)
j=0
Example 1.16.5 We apply the systematic encoding of Example 1.16.4 to the cyclic version
of the Hamming [7, 4, 3]2 code H3,2 with generator polynomial g(x) = 1 + x + x3 ; see
Example 1.12.18. By Example 1.12.20, g ⊥ (x) = 1 + x2 + x3 + x4 and (1.3) yields c4 =
c0 + c2 + c3 , c5 = c1 + c3 + c4 , and c6 = c2 + c4 + c5 . In terms of the information bits
c0 c1 c2 c3 , we have c4 = c0 + c2 + c3 , c5 = c0 + c1 + c2 , and c6 = c1 + c2 + c3 .
As discussed in Section 1.1, sometimes the receiver is interested only in the sent code-
words rather than the sent messages. However, if there is interest in the actual message, a
question arises as to how to recover the message from a codeword. If the encoder x 7→ xG
is systematic, it is straightforward to recover the message. What can be done otherwise?
Because G has independent rows, there is an n × k matrix K such that GK = Ik ; K is
called a right inverse for G. A right inverse is not necessarily unique. As c = xG, the
message x = xGK = cK.
Example 1.16.6 In Example 1.16.2, we encoded the message m0 m1 m2 m3 using the
[7, 4, 3]2 cyclic version of H3,2 with generator polynomial g(x) = 1 + x + x3 . The resulting
codeword was c = m0 , m0 + m1 , m1 + m2 , m0 + m2 + m3 , m1 + m3 , m2 , m5 . The generator
matrix G obtained from g(x) as in Theorem 1.12.11(f) has right inverse
1 0 0 0
0 1 0 0
0 1 0 0
K= 0 1 0 0 .
0 1 0 0
0 0 1 0
0 0 0 1
Computing cK gives m0 m1 m2 m3 as expected.
38 Concise Encyclopedia of Coding Theory
1−%
s
1 H - s 1
HH
H H %
HH *
H
HH
jH
% H
HH
s
0 - Hs 0
1−%
send receive
1.17 Decoding
Decoding is the process of determining which codeword c was sent when a vector y is
received. Decoding is generally more complex than encoding. Decoding algorithms usually
vary with the type of code being used. In this section we discuss only the basics of hard-
decision decoding. Decoding is discussed more in depth in Chapters 15, 21, 24, 28–30, and
32.
Definition 1.17.1 A hard-decision decoder is a decoder that inputs ‘hard’ data from
the channel (e.g., elements from Fq ) and outputs hard data to the receiver. A soft-decision
decoder is one which inputs ‘soft’ data from the channel (e.g., estimates of the symbols
with attached probabilities) and generally outputs hard data.
Initially we focus our discussion to the decoding of binary codes. To set the stage for
decoding, we begin with one possible mathematical model of a channel that transmits binary
data. Before stating the model, we establish some notation. If E is an event, Prob(E) is
the probability that E occurs. If E1 and E2 are events, Prob(E1 | E2 ) is the conditional
probability that E1 occurs given that E2 occurs. The model for transmitting binary data
we explore is called the binary symmetric channel (BSC) with crossover probability
% as illustrated in Figure 1.2. In a BSC, we have the following conditional probabilities: For
y, c ∈ F2 ,
1 − % if y = c,
Prob(y is received | c is sent) = (1.4)
% if y 6= c.
In a BSC we also assume that the probability of error in one bit is independent of previous
bits. We will assume that it is more likely that a bit is received correctly than in error; so
% < 21 . 10
Let C be a binary code of length n. Assume that c ∈ C is sent and y ∈ Fn2 is received
and decoded as e c ∈ C. Of course the hope is that ec = c; otherwise the decoder has made a
decoding error. So Prob(c | y) is the probability that the codeword c is sent given that y
is received, and Prob(y | c) is the probability that y is received given that the codeword c
10 While % is usually very small, if % > 21 , the probability that a bit is received in error is higher than
the probability that it is received correctly. One strategy is to then immediately interchange 0 and 1 at
the receiving end. This converts the BSC with crossover probability % to a BSC with crossover probability
1 − % < 12 . This of course does not help if % = 21 ; in this case communication is not possible.
Basics of Coding Theory 39
where Prob(c) is the probability that c is sent and Prob(y) is the probability that y is
received. There are two natural means by which a decoder can make a choice based on
c ∈ C where Prob(e
these two probabilities. First the decoder could decode y as e c | y) is max-
imum; such a decoder is called a maximum a posteriori probability (MAP) decoder.
Symbolically a MAP decoder makes the decision
Here arg maxc∈C Prob(c | y) is the argument c of the probability function Prob(c | y) that
maximizes this probability. Alternately the decoder could decode y as e c ∈ C where
Prob(y | e
c) is maximum; such a decoder is called a maximum likelihood (ML) decoder.
Symbolically an ML decoder makes the decision
Definition 1.17.2 If a decoder decodes a received vector y as the codeword c with dH (y, c)
minimized, the decoder is called a nearest neighbor decoder.
From this discussion, on a BSC, maximum likelihood and nearest neighbor decoding are
the same. We can certainly perform nearest neighbor decoding on any code over any field.
Before presenting an example of a nearest neighbor decoder, we need to establish the
relationship between the minimum distance of a code and the error-correcting capability of
the code under nearest neighbor decoding. Notice this theorem is valid for any code, linear
or not, over any finite field.
Proof: By definition y ∈ Sq,n,t (c), the sphere of radius t in Fnq centered at c. By The-
orem 1.9.5(b), spheres of radius t centered at codewords are pairwise disjoint; hence if
y ∈ Sq,n,t (c1 ) with c1 ∈ C, then c = c1 .
40 Concise Encyclopedia of Coding Theory
Remark
d−1 d−1
q code C is t-error-correcting for any t ≤
1.17.5 By Theorem 1.17.3, an (n, M, d)
2 . Furthermore, when M > 1 and t = 2 , there exist two distinct codewords such
that the spheres of radius t + 1 about them are not disjoint; if this were not the case, the
minimum distance of C is in fact larger than d. Thus when M > 1 and t = d−1 2 , C is not
(t + 1)-error-correcting.11
The nearest neighbor decoding problem foran (n, M, d)q code becomes one of finding an
efficient algorithm that will correct up to t = d−12 errors. An obvious decoding algorithm
is to examine all codewords until one is found with distance t or less from the received
vector. This is a realistic decoding algorithm only for M small. Another obvious algorithm
is to make a table consisting of a nearest codeword for each of the q n vectors in Fnq and then
look up a received vector in the table to decode it. This is impractical if q n is very large.
For an [n, k, d]q linear code, we can devise an algorithm using a table with q n−k rather
than q n entries where one can find the nearest codeword by looking up one of these q n−k
entries. This general nearest neighbor decoding algorithm for linear codes is called syndrome
decoding, which is the subject of the remainder of the section.
Definition 1.17.6 Let C be an [n, k, d]q linear code. For y ∈ Fnq , the coset of C with coset
representative y is y + C = {y + c | c ∈ C}. The weight of the coset y + C is the smallest
weight of a vector in the coset, and any vector of this smallest weight in the coset is called
a coset leader.
The next result follows from the theory of finite groups as a linear code is a group under
addition.
Theorem 1.17.7 Let C be an [n, k, d]q linear code. The following hold for y, y0 , e ∈ Fnq .
(a) y + C = y0 + C if and only if y − y0 ∈ C.
(b) Cosets of C all have size q k .
(c) Cosets of C are either equal or disjoint. There are q n−k distinct cosets of C and they
partition Fnq .
(d) If e is a coset representative of y + C, then e + C = y + C. In particular, if e is a coset
leader of y + C, then e + C = y + C.
(e) Any coset of weight at most t = d−1
2 has a unique coset leader.
Let C be an [n, k, d]q code; fix a parity check matrix H of C. For y ∈ Fnq , syn(y) = HyT
is called the syndrome of y. Syndromes are column vectors in Fn−k q . The code C consists
of all vectors whose syndrome equals 0T . As H has rank n − k, every column vector in Fn−k q
is a syndrome. From Theorem 1.17.7, if y, y0 ∈ Fnq are in the same coset of C, then y − y0 =
T T
c ∈ C. Therefore syn(y) = HyT = H(y0 + c)T = Hy0 + HcT = Hy0 + 0T = syn(y0 ).
0 0 T T 0
Conversely, if syn(y) = syn(y ), then H(y − y ) = 0 and so y − y ∈ C. Thus we have
the following theorem.
11 In the trivial case where M = 1, C is n-error-correcting as every received vector decodes to the only
codeword in C. However, since the information rate (Definition 1.9.26 ) of such a code is 0, it is never used
in practice.
Basics of Coding Theory 41
Theorem 1.17.8 Two vectors belong to the same coset if and only if they have the same
syndrome.
Example 1.17.10 Let C be the [6, 3, 3]2 binary code with parity check matrix
0 1 1 1 0 0
H= 1 0 1 0 1 0 .
1 1 0 0 0 1
Notice that the coset with syndrome 111T has weight 2 and does not have a unique coset
leader. This coset has two other coset leaders: 010010 and 001001. All other cosets have
unique coset leaders by Theorem 1.17.7(e). We analyze three received vectors.
• Now suppose that y = 101000 is received. Then syn(y) = 101T and y is decoded as
y − 010000 = 111000. This was the sent codeword provided only 1 error was made.
• Finally suppose that y = 111111 is received. Then syn(y) = 111T and y is decoded
as y − 100100 = 011011 and at least 2 errors were made in transmission. If exactly 2
errors were made, and we had chosen one of the other two possible coset leaders for
the table, y would have been decoded as y −010010 = 101101 or y −001001 = 110110.
For this code, any received vector where 0 or 1 errors were made would be decoded correctly.
If 2 errors were made, the decoder would decode the received vector to one of three possible
equally likely codewords; there is no way to determine which was actually sent. If more than
2 errors were made, the decoder would always decode the received vector incorrectly.
Example 1.17.11 Nearest neighbor decoding of the binary Hamming code Hm,2 is par-
ticularly easy. The parity check matrix for this code consists of the 2m − 1 nonzero binary
m-tuples of column length m; these can be viewed as the binary expansions of the integers
1, 2, . . . , 2m −1. Choose the parity check matrix H for Hm,2 where column i is the associated
binary m-tuple expansion of i. Step 1 of the Syndrome Decoding Algorithm 1.17.9 can be
skipped and the algorithm becomes the following: If y is received, compute s = syn(y). If
s = 0T , decode y as the codeword y. Otherwise s represents the binary expansion of some
integer i; the nearest codeword c to y is obtained from y by adding 1 to the ith bit.
As an illustration, the parity check matrix to use for H4,2 is
0 0 0 0 0 0 0 1 1 1 1 1 1 1 1
0 0 0 1 1 1 1 0 0 0 0 1 1 1 1
H= 0 1 1 0 0 1 1 0 0 1 1 0 0 1 1 .
1 0 1 0 1 0 1 0 1 0 1 0 1 0 1
by (1.5). Therefore the probability that the syndrome decoder makes a correct decision
Basics of Coding Theory 43
Pn
averaged over all equally likely transmitted codewords is i=0 αi %i (1 − %)n−i where αi is
the number of coset leaders of weight i. Thus
n
X
Perr = 1 − αi %i (1 − %)n−i . (1.6)
i=0
Example 1.18.1 Suppose binary messages of length k are sent unencoded over a BSC
with crossover probability %. This in effect is the same as transmitting codewords from the
[k, k, 1]2 code C = Fk2 . This code has a unique coset, the code itself, and its leader is the
zero codeword of weight 0. Hence α0 = 1 and αi = 0 for i > 0. Therefore (1.6) shows that
the probability of decoder error is
This is precisely what we expect as the probability of no decoding error is the probability
(1 − %)k that the k bits are received without error. For instance if % = 0.01 and k = 4, Perr
without coding the length 4 messages is 0.03940399.
by (1.6). For example if % = 0.01, Perr = 0.00203104 · · · , significantly lower than the word er-
ror rate for unencoded transmissions of binary messages of length 4 found in Example 1.18.1.
For comparison, when transmitting 10 000 unencoded binary messages each of length 4, one
can expect about 394 to be received in error. On the other hand, when transmitting 10 000
binary messages each of length 4 encoded to length 7 codewords from H3,2 , one can expect
about 20 to be decoded in error.
Definition 1.18.3 For a BSC with crossover probability %, the capacity of the channel
is
C(%) = 1 + % log2 % + (1 − %) log2 (1 − %).
The capacity C(%) = 1 − H2 (%) where H2 (%) is the binary entropy function defined in more
generality in Section 1.9.8.12 See Figure 1.3.
The next theorem is Shannon’s Theorem for binary symmetric channels. Shannon’s orig-
inal theorem was stated for nonlinear codes but was later shown to be valid for linear codes
as well. The theorem also holds for other channels provided channel capacity is appropri-
ately defined. For discussion and proofs of various versions of Shannon’s Theorem, see for
example [467, 1314]. For binary symmetric channels, Shannon’s Theorem is as follows.
Theorem 1.18.4 (Shannon) Let δ > 0 and R < C(%). Then for large enough n, there
exists an [n, k]2 binary linear code C with nk ≥ R such that Perr < δ when C is used for
communication over a BSC with crossover probability %. Furthermore no such code exists if
R > C(%).
12 When 1
q = 2, the domain of the entropy function H2 (x) can be extended from 0 ≤ x < 2
to 0 ≤ x < 1.
44 Concise Encyclopedia of Coding Theory
R
6
1 pppp p
ppp ppp
ppp
ppp pp
ppp R = C(ρ) pp p
ppp
ppp pp
ppp pp
p
ppp pp
ppp
pppp
ppp pp
ppp pp
ppp p
ppp pp
ppp p
ppp p
ppp pp
ppp p p pp
ppp p pp
p p pp pp p
p p pp p p
p p p pp p ppp
p p p pp p
p pp p p p pp p p p p p p p p ppp pp
p pp p p pp p p p p p p p p p p p p p p - ρ
1 1
2
Theorem indicates that communication is not possible. This is not surprising; when ρ = 12 ,
whether a binary symbol is received correctly or incorrectly is essentially determined by a
coin flip. See Footnote 10.
Remark 1.18.6 Recall that nk is the information rate of the code as in Definition 1.9.26.
The proof of Shannon’s Theorem is nonconstructive, but the theorem does guarantee that
good codes exist with information rates just under channel capacity and decoding error rates
arbitrarily small; unfortunately these codes may have to be extremely long. The objective
becomes to find codes with a large number of codewords (to send many messages), large
minimum distance (to correct many errors), and short length (to minimize transmission
time or storage space). These goals conflict as seen in Section 1.9.
Bibliography
[1] M. Aaltonen. Linear programming bounds for tree codes. IEEE Trans. Inform.
Theory, 25:85–90, 1979.
[2] M. Aaltonen. A new upper bound on nonbinary block codes. Discrete Math., 83:139–
160, 1990.
[3] E. Abbe. Randomness and dependencies extraction via polarization. In Proc. Infor-
mation Theory and Applications Workshop, La Jolla, California, 7 pages, February
2011.
[4] E. Abbe. Randomness and dependencies extraction via polarization, with applica-
tions to Slepian-Wolf coding and secrecy. IEEE Trans. Inform. Theory, 61:2388–
2398, 2015.
[5] E. Abbe and E. Telatar. Polar codes for the m-user MAC. arXiv:1002.0777 [cs.IT],
February 2010.
[6] E. Abbe and E. Telatar. Polar codes for the m-user multiple access channel. IEEE
Trans. Inform. Theory, 58:5437–5448, 2012.
[7] N. Abdelghany and N. Megahed. Code-checkable group rings. J. Algebra Comb.
Discrete Struct. Appl., 4:115–122, 2017.
[9] T. Abualrub, A. Ghrayeb, and R. H. Oehmke. A mass formula and rank of Z4 cyclic
codes of length 2e . IEEE Trans. Inform. Theory, 50:3306–3312, 2004.
[10] T. Abualrub and R. H. Oehmke. On the generators of Z4 cyclic codes of length 2e .
IEEE Trans. Inform. Theory, 49:2126–2133, 2003.
[11] T. Abualrub and R. H. Oehmke. Correction to: “On the generators of Z4 cyclic
codes of length 2e ” [IEEE Trans. Inform. Theory 49:2126–2133, 2003]. IEEE Trans.
Inform. Theory, 51:3009, 2005.
[12] T. Abualrub and I. Şiap. Cyclic codes over the rings Z2 + uZ2 and Z2 + uZ2 + u2 Z2 .
Des. Codes Cryptogr., 42:273–287, 2007.
[13] L. M. Adleman. Molecular computation of solutions to combinatorial problems.
Science, 266:1021–1024, 1994.
[14] A. Agarwal, A. Barg, S. Hu, A. Mazumdar, and I. Tamo. Combinatorial alphabet-
dependent bounds for locally recoverable codes. IEEE Trans. Inform. Theory,
64:3481–3492, 2018.
[15] C. Aguilar-Melchor, N. Aragon, P. Barreto, S. Bettaieb, L. Bidoux, O. Blazy, J.-
C. Deneuville, P. Gaborit, S. Gueron, T. Güneysu, R. Misoczki, E. Persichetti,
N. Sendrier, J.-P. Tillich, and G. Zémor. BIKE. First round submission to the
NIST post-quantum cryptography call: https://bikesuite.org, November 2017.
[16] C. Aguilar-Melchor, N. Aragon, S. Bettaieb, L. Bidoux, O. Blazy, J.-C. Deneuville,
P. Gaborit, A. Hauteville, and G. Zémor. Ouroboros-R. First round submission to the
NIST post-quantum cryptography call: https://pqc-ouroborosr.org, November
2017.
[36] M. Alekhnovich. More on average case vs. approximation complexity. In Proc. 44th
IEEE Symposium on Foundations of Computer Science, pages 298–307, Cambridge,
Massachusetts, October 2003.
[37] A. M. Alhakim. A simple combinatorial algorithm for de Bruijn sequences. Amer.
Math. Monthly, 117:728–732, 2010.
[38] P. Aliferis and J. Preskill. Fault-tolerant quantum computation against biased noise.
Physical Review A, 78(5):052331, November 2008.
[39] P. Almeida, D. Napp, and R. Pinto. A new class of superregular matrices and MDP
convolutional codes. Linear Algebra Appl., 439:2145–2157, 2013.
[40] N. Alon and F. R. K. Chung. Explicit construction of linear sized tolerant networks.
Discrete Math., 72:15–19, 1988.
[41] N. Alon, O. Goldreich, J. Håstad, and R. Peralta. Simple constructions of almost
k-wise independent random variables. Random Structures Algorithms, 3:289–304,
1992.
[42] N. Alon and M. G. Luby. A linear time erasure-resilient code with nearly optimal
recovery. IEEE Trans. Inform. Theory, 42:1732–1736, 1996.
[43] J. L. Alperin and R. B. Bell. Groups and Representations, volume 162 of Graduate
Texts in Mathematics. Springer-Verlag, New York, 1995.
[88] C. Bachoc, A. Passuello, and F. Vallentin. Bounds for projective codes from semidef-
inite programming. Adv. Math. Comm., 7:127–145, 2013.
[89] C. Bachoc and F. Vallentin. New upper bounds for kissing numbers from semidefinite
programming. J. Amer. Math. Soc., 21:909–924, 2008.
[90] C. Bachoc and G. Zémor. Bounds for binary codes relative to pseudo-distances of k
points. Adv. Math. Commun., 4:547–565, 2010.
[91] B. Bagchi. On characterizing designs by their codes. In N. S. N. Sastry, editor,
Buildings, Finite Geometries and Groups, volume 10 of Springer Proc. Math., pages
1–14. Springer, New York, 2012.
[92] B. Bagchi and S. P. Inamdar. Projective geometric codes. J. Combin. Theory Ser.
A, 99:128–142, 2002.
[93] A. Baker. Transcendental Number Theory. Cambridge Mathematical Library. Cam-
bridge University Press, Cambridge, UK, 2nd edition, 1990.
[94] R. D. Baker, J. H. van Lint, and R. M. Wilson. On the Preparata and Goethals
codes. IEEE Trans. Inform. Theory, 29:342–345, 1983.
[95] S. B. Balaji, G. R. Kini, and P. V. Kumar. A tight rate bound and matching
construction for locally recoverable codes with sequential recovery from any number
of multiple erasures. IEEE Trans. Inform. Theory, 66:1023–1052, 2020.
[96] S. B. Balaji, M. N. Krishnan, M. Vajha, V. Ramkumar, B. Sasidharan, and P. V.
Kumar. Erasure coding for distributed storage: an overview. SCIENCE CHINA
Information Sciences, 61(10):100301:1–100301:45, 2018.
[97] S. B. Balaji and P. V. Kumar. Bounds on the rate and minimum distance of codes
with availability. In Proc. IEEE International Symposium on Information Theory,
pages 3155–3159, Aachen, Germany, June 2017.
[98] S. B. Balaji and P. V. Kumar. A tight lower bound on the sub-packetization level
of optimal-access MSR and MDS codes. In Proc. IEEE International Symposium on
Information Theory, pages 2381–2385, Vail, Colorado, June 2018.
[99] A. Balatsoukas-Stimming, M. B. Parizi, and A. Burg. LLR-based successive can-
cellation list decoding of polar codes. In Proc. IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP), pages 3903–3907, Florence, Italy,
May 2014.
[100] M. Baldi, A. Barenghi, F. Chiaraluce, G. Pelosi, and P. Santini. LEDAkem.
First round submission to the NIST post-quantum cryptography call:
https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/
documents/round-1/submissions/LEDAkem.zip, November 2017.
[101] M. Baldi, M. Bianchi, F. Chiaraluce, J. Rosenthal, and D. Schipani. Enhanced public
key security for the McEliece cryptosystem. J. Cryptology, 29:1–27, 2016.
[102] M. Baldi, M. Bodrato, and F. Chiaraluce. A new analysis of the McEliece cryp-
tosystem based on QC-LDPC codes. In R. Ostrovsky, R. De Prisco, and I. Visconti,
editors, Security and Cryptography for Networks, volume 5229 of Lecture Notes in
Comput. Sci., pages 246–262. Springer, Berlin, Heidelberg, 2008.
[107] S. Ballentine, A. Barg, and S. G. Vlăduţ. Codes with hierarchical locality from
covering maps of curves. IEEE Trans. Inform. Theory, 65:6056–6071, 2019.
[108] S. Ballet, J. Chaumine, J. Pieltant, M. Rambaud, H. Randriambololona, and R. Rol-
land. On the tensor rank of multiplication in finite extensions of finite fields and
related issues in algebraic geometry. arXiv:1906.07456 [math.AG], June 2019, to
appear Russian Math. Surveys.
[109] B. Ballinger, G. Blekherman, H. Cohn, N. Giansiracusa, E. Kelly, and A. Schürmann.
Experimental study of energy-minimizing point configurations on spheres. Experi-
ment. Math., 18:257–283, 2009.
[110] G. Banegas, P. S. L. M. Barreto, B. O. Boidje, P.-L. Cayrel, G. N. Dione,
K. Gaj, C. T. Gueye, R. Haeussler, J. B. Klamti, O. N’diaye, D. T. Nguyen,
E. Persichetti, and J. E. Ricardini. DAGS: key encapsulation for dyadic GS
codes. First round submission to the NIST post-quantum cryptography call:
https://csrc.nist.gov/CSRC/media/Projects/Post-Quantum-Cryptography/
documents/round-1/submissions/DAGS.zip, November 2017.
[111] Ei. Bannai and Et. Bannai. A survey on spherical designs and algebraic combinatorics
on spheres. European J. Combin., 30:1392–1425, 2009.
[112] Ei. Bannai, Et. Bannai, H. Tanaka, and Y. Zhu. Design theory from the viewpoint
of algebraic combinatorics. Graphs Combin., 33:1–41, 2017.
[113] Ei. Bannai and R. M. Damerell. Tight spherical designs, I. J. Math. Soc. Japan,
31:199–207, 1979.
[114] Ei. Bannai and R. M. Damerell. Tight spherical disigns, II. J. London Math. Soc.
(2), 21:13–30, 1980.
[115] Ei. Bannai, S. T. Dougherty, M. Harada, and M. Oura. Type II codes, even uni-
modular lattices, and invariant rings. IEEE Trans. Inform. Theory, 45:1194–1205,
1999.
[116] M. Barbier, C. Chabot, and G. Quintin. On quasi-cyclic codes as a generalization of
cyclic codes. Finite Fields Appl., 18:904–919, 2012.
[117] M. Bardet, É. Barelli, O. Blazy, R. Canto Torres, A. Couvreur, P. Gaborit, A. Ot-
mani, N. Sendrier, and J.-P. Tillich. BIG QUAKE. First round submission to
the NIST post-quantum cryptography call: https://bigquake.inria.fr, Novem-
ber 2017.
[118] M. Bardet, M. Bros, D. Cabarcas, P. Gaborit, R. Perlner, D. Smith-Tone, J.-P.
Tillich, and J. Verbel. Improvements of algebraic attacks for solving the rank decod-
ing and MinRank problems. arXiv:2002.08322 [cs.CR], February 2020.
[119] M. Bardet, J. Chaulet, V. Dragoi, A. Otmani, and J.-P. Tillich. Cryptanalysis of
the McEliece public key cryptosystem based on polar codes. In T. Takagi, editor,
Post-Quantum Cryptography, volume 9606 of Lecture Notes in Comput. Sci., pages
118–143. Springer, Berlin, Heidelberg, 2016.
[120] É. Barelli. Étude de la Sécurité de Certaines Clés Compactes pour le Schéma de
McEliece Utilisant des Codes Géométriques. PhD thesis, Université Paris-Saclay,
2018.
[121] É Barelli and A. Couvreur. An efficient structural attack on NIST submission DAGS.
In T. Peyrin and S. D. Galbraith, editors, Advances in Cryptology – ASIACRYPT
2018, Part 1, volume 11272 of Lecture Notes in Comput. Sci., pages 93–118. Springer,
Berlin, Heidelberg, 2018.
[122] A. Barg, K. Haymaker, E. W. Howe, G. L. Matthews, and A. Várilly-Alvarado. Lo-
cally recoverable codes from algebraic curves and surfaces. In E. W. Howe, K. E.
Lauter, and J. L. Walker, editors, Algebraic Geometry for Coding Theory and Cryp-
tography, volume 9 of Assoc. Women Math. Ser., pages 95–127. Springer, Cham,
2017.
[123] A. Barg and D. B. Jaffe. Numerical results on the asymptotic rate of binary codes.
In A. Barg and S. Litsyn, editors, Codes and Association Schemes: DIMACS Work-
shop Codes and Association Schemes, November 9-12, 1999, DIMACS Center, vol-
ume 56 of Discrete Mathematics and Theoretical Computer Science, pages 25–32.
Amer. Math. Soc., Providence, Rhode Island, 2001.
[124] A. Barg and A. Mazumdar. Codes in permutations and error correction for rank
modulation. IEEE Trans. Inform. Theory, 56:3158–3165, 2010.
[125] A. Barg and D. Y. Nogin. Bounds on packings of spheres in the Grassmann manifold.
IEEE Trans. Inform. Theory, 48:2450–2454, 2002.
[126] A. Barg and D. Y. Nogin. Spectral approach to linear programming bounds on codes
(in Russian). Problemy Peredači Informacii, 42(2):12–25, 2006. (English translation
in Probl. Inform. Transm., 42(2):77–89, 2006).
[127] A. Barg and W. Park. On linear ordered codes. Mosc. Math. J., 15:679–702, 2015.
[128] A. Barg, I. Tamo, and S. G. Vlădaţ. Locally recoverable codes on algebraic curves.
IEEE Trans. Inform. Theory, 63:4928–4939, 2017.
[129] A. Barg and W.-H. Yu. New bounds for spherical two-distance sets. Experiment.
Math., 22:187–194, 2013.
[130] E. Barker. Recommendation for key management, 2019. Draft NIST special publi-
cation 800–57 Part 1. https://doi.org/10.6028/NIST.SP.800-57pt1r5-draft.
[131] A. Barra and H. Gluesing-Luerssen. MacWilliams extension theorems and the local-
global property for codes over Frobenius rings. J. Pure Appl. Algebra, 219:703–728,
2015.
[132] P. S. L. M. Barreto, S. Gueron, T. Güneysu, R. Misoczki, E. Persichetti, N. Sendrier,
and J.-P. Tillich. CAKE: Code-based Algorithm for Key Encapsulation. In
M. O’Neill, editor, Cryptography and Coding, volume 10655 of Lecture Notes in Com-
put. Sci., pages 207–226. Springer, Berlin, Heidelberg, 2017.
[133] D. Bartoli, A. Sboui, and L. Storme. Bounds on the number of rational points of
algebraic hypersurfaces over finite fields, with applications to projective Reed-Muller
codes. Adv. Math. Commun., 10:355–365, 2016.
[134] A. Barvinok. A Course in Convexity. Amer. Math. Soc., Providence, Rhode Island,
2002.
[135] A. Bassa, P. Beelen, A. Garcia, and H. Stichtenoth. Towers of function fields over
non-prime finite fields. Mosc. Math. J., 15:1–29, 181, 2015.
[136] L. A. Bassalygo, V. A. Zinov’ev, V. K. Leont’ev, and N. I. Fel’dman. Nonexistence of
perfect codes for certain composite alphabets (in Russian). Problemy Peredači Infor-
macii, 11(3):3–13, 1975 (English translation in Probl. Inform. Transm., 11(3):181–
189, 1975).
[137] V. Batagelj. Norms and distances over finite groups. Department of Mathematics,
University of Ljubljana, Yugoslavia, 1990.
[138] L. M. Batten and J. M. Dover. Some sets of type (m, n) in cubic order planes. Des.
Codes Cryptogr., 16:211–213, 1999.
[139] H. Bauer, B. Ganter, and E. Hergert. Algebraic techniques for nonlinear codes.
Combinatorica, 3:21–33, 1983.
[140] L. D. Baumert and R. J. McEliece. Weights of irreducible cyclic codes. Inform. and
Control, 20:158–175, 1972.
[141] L. D. Baumert, W. H. Mills, and R. L. Ward. Uniform cyclotomy. J. Number Theory,
14:67–82, 1982.
[142] Leonard D. Baumert. Cyclic Difference Sets, volume 182 of Lecture Notes in Math.
Springer-Verlag, Berlin-New York, 1971.
[143] E. Bayer-Fluckiger, F. Oggier, and E. Viterbo. New algebraic constructions of ro-
tated Zn -lattice constellations for the Rayleigh fading channel. IEEE Trans. Inform.
Theory, 50:702–714, 2004.
[146] A. Becker, A. Joux, A. May, and A. Meurer. Decoding random binary linear codes
in 2n/20 : how 1 + 1 = 0 improves information set decoding. In D. Pointcheval and
T. Johansson, editors, Advances in Cryptology – EUROCRYPT 2012, volume 7237
of Lecture Notes in Comput. Sci., pages 520–536. Springer, Berlin, Heidelberg, 2012.
[147] P. Beelen. The order bound for general algebraic geometric codes. Finite Fields
Appl., 13:665–680, 2007.
[148] P. Beelen and T. Høholdt. The decoding of algebraic geometry codes. In Advances
in Algebraic Geometry Codes, volume 5 of Ser. Coding Theory Cryptol., pages 49–98.
World Sci. Publ., Hackensack, New Jersey, 2008.
[151] A. Beemer and C. A. Kelley. Avoiding trapping sets in SC-LDPC codes under
windowed decoding. In Proc. IEEE International Symposium on Information Theory
and its Applications, pages 206–210, Monterey, California, October-November 2016.
[152] J.-C. Belfiore and A. M. Cipriano. Space-Time Coding for Non-Coherent Channels.
In H. Boelcskei, D. Gesbert, C. Papadias, and A. J. van der Veen, editors, Space-Time
Wireless Systems: From Array Processing to MIMO Communications, chapter 10.
Cambridge University Press, Cambridge, UK, 2006.
[153] J.-C. Belfiore and F. Oggier. An error probability approach to MIMO wiretap chan-
nels. IEEE Trans. Commun., 61:3396–3403, 2013.
[154] J.-C. Belfiore, F. Oggier, and E. Viterbo. Cyclic division algebras: a tool for space-
time coding. Found. Trends Commun. and Inform. Theory, 4:1–95, 2007.
[155] J.-C. Belfiore and G. Rekaya. Quaternionic lattices for space-time coding. In Proc.
IEEE Information Theory Workshop, pages 267–270, Paris, France, April 2003.
[156] J.-C. Belfiore, G. Rekaya, and E. Viterbo. The golden code: a 2×2 full-rate space-time
code with non-vanishing determinants. IEEE Trans. Inform. Theory, 51:1432–1436,
2005.
[157] B. I. Belov, V. N. Logačev, and V. P. Sandimirov. Construction of a class of lin-
ear binary codes that attain the Varšamov-Griesmer bound (in Russian). Prob-
lemy Peredači Informacii, 10(3):36–44, 1974. (English translation in Probl. Inform.
Transm., 10(3):211–217, 1974).
[158] E. Ben-Sasson, T. Etzion, A. Gabizon, and N. Raviv. Subspace polynomials and
cyclic subspace codes. IEEE Trans. Inform. Theory, 62:1157–1165, 2016.
[164] T. P. Berger and P. Loidreau. Designing an efficient and secure public-key cryptosys-
tem based on reducible rank codes. In A. Canteaut and K. Viswanathan, editors,
Progress in Cryptology – INDOCRYPT 2004, volume 3348 of Lecture Notes in Com-
put. Sci., pages 218–229. Springer, Berlin, Heidelberg, 2005.
[165] T. P. Berger and P. Loidreau. How to mask the structure of codes for a cryptographic
use. Des. Codes Cryptogr., 35:63–79, 2005.
[166] G. Berhuy and F. Oggier. On the existence of perfect space–time codes. IEEE Trans.
Inform. Theory, 55:2078–2082, 2009.
[167] E. R. Berlekamp. Negacyclic codes for the Lee metric. In R. C. Bose and T. A. Dowl-
ing, editors, Combinatorial Mathematics and its Applications (Proc. Conf., Univ.
North Carolina, Chapel Hill, NC, 1967), pages 298–316. Univ. North Carolina Press,
Chapel Hill, NC, 1969.
[168] E. R. Berlekamp. Goppa codes. IEEE Trans. Inform. Theory, 19:590–592, 1973.
[169] E. R. Berlekamp, editor. Key Papers in the Development of Coding Theory. IEEE
Press, New York, 1974.
[170] E. R. Berlekamp. Algebraic Coding Theory. World Scientific Publishing Co. Pte.
Ltd., Hackensack, New Jersey, revised edition, 2015.
[173] S. D. Berman. Semisimple cyclic and abelian codes. II (in Russian). Kibernetika
(Kiev), 3:21–30, 1967. (English translation in Cybernetics, 3:17–23, 1967).
[174] S. D. Berman. On the theory of group codes. Cybernetics, 3:25–31, 1969.
[175] J. J. Bernal, Á. del Rı́o, and J. J. Simón. An intrinsical description of group codes.
Des. Codes Cryptogr., 51:289–300, 2009.
[176] F. Bernhardt, P. Landrock, and O. Manz. The extended Golay codes considered as
ideals. J. Combin. Theory Ser. A, 55:235–246, 1990.
[177] D. J. Bernstein, T. Chou, T. Lange, I. von Maurich, R. Mizoczki, R. Niederhagen,
E. Persichetti, C. Peters, P. Schwabe, N. Sendrier, J. Szefer, and W. Wen. Classic
McEliece: conservative code-based cryptography. Second round submission to the
NIST post-quantum cryptography call. https://classic.mceliece.org, March
2019.
[178] D. J. Bernstein, T. Lange, and C. Peters. Attacking and defending the McEliece
cryptosystem. In J. Buchmann and J. Ding, editors, Post-Quantum Cryptography,
volume 5299 of Lecture Notes in Comput. Sci., pages 31–46. Springer, Berlin, Hei-
delberg, 2008.
[179] D. J. Bernstein, T. Lange, and C. Peters. Smaller decoding exponents: ball-collision
decoding. In P. Rogaway, editor, Advances in Cryptology – CRYPTO 2011, volume
6841 of Lecture Notes in Comput. Sci., pages 743–760. Springer, Berlin, Heidelberg,
2011.
[180] D. J. Bernstein, T. Lange, and C. Peters. Wild McEliece. In A. Biryukov, G. Gong,
and D. R. Stinson, editors, Selected Areas in Cryptography – SAC 2010, volume 6544
of Lecture Notes in Comput. Sci., pages 143–158. Springer, Berlin, Heidelberg, 2011.
[181] D. J. Bernstein, T. Lange, C. Peters, and P. Schwabe. Really fast syndrome-
based hashing. In A. Nitaj and D. Pointcheval, editors, Progress in Cryptology –
AFRICACRYPT 2011, volume 6737 of Lecture Notes in Comput. Sci., pages 134–
152. Springer, Berlin, Heidelberg, 2011.
[182] D. J. Bernstein, T. Lange, C. Peters, and H.C.A. van Tilborg. Explicit bounds for
generic decoding algorithms for code-based cryptography. In Pre-Proc. International
Workshop on Coding and Cryptography, pages 168–180, Ullensvang, Norway, May
2009.
[183] C. Berrou, A. Glavieux, and P. Thitimajshima. Near Shannon limit error correcting
coding and decoding. In Proc. International Communications Conference, pages
1064–1070, Geneva, Switzerland, May 1983.
[184] M. Bertilsson and I. Ingemarsson. A construction of practical secret sharing schemes
using linear block codes. In J. Seberry and Y. Zheng, editors, Advances in Cryptol-
ogy – AUSCRYPT ’92, volume 718 of Lecture Notes in Comput. Sci., pages 67–79.
Springer, Berlin, Heidelberg, 1993.
[185] M. R. Best. Perfect codes hardly exist. IEEE Trans. Inform. Theory, 29:349–351,
1983.
[186] T. Beth and C. Ding. On almost perfect nonlinear permutations. In T. Helleseth,
editor, Advances in Cryptology – EUROCRYPT ’93, volume 765 of Lecture Notes in
Comput. Sci., pages 65–76. Springer, Berlin, Heidelberg, 1994.
[187] T. Beth, D. Jungnickel, and H. Lenz. Design Theory. Cambridge University Press,
Cambridge, UK, 2nd edition, 1999.
[188] K. Betsumiya, T. A. Gulliver, and M. Harada. On binary extremal formally self-dual
even codes. Kyushu J. Math., 53:421—-430, 1999.
[189] K. Betsumiya, M. Harada, and A. Munemasa. A complete classification of doubly
even self-dual codes of length 40. Electronic J. Combin., 19:#P18 (12 pages), 2012.
[190] A. Betten, M. Braun, H. Fripertinger, A. Kerber, A. Kohnert, and A. Wassermann.
Error-Correcting Linear Codes, volume 18 of Algorithms and Computation in Math-
ematics. Springer-Verlag, Berlin, 2006. Classification by isometry and applications,
with 1 CD-ROM (Windows and Linux).
[191] A. Betten, H. Fripertinger, A. Kerber, A. Wassermann, and K-H. Zimmermann.
Codierungstheorie – Konstruktion und Anwendung linearer Codes. Springer-Verlag,
Heidelberg, 1998.
[192] A. Betten, R. Laue, and A. Wassermann. Simple 7-designs with small parameters.
J. Combin. Des., 7:79–94, 1999.
[193] A. Beutelspacher. Partial spreads in finite projective spaces and partial designs.
Math. Z., 145:211–229, 1975.
[194] A. Beutelspacher. Correction to: “Partial spreads in finite projective spaces and
partial designs” [Math. Z., 145:211–229, 1975]. Math. Z., 147:303, 1976.
[195] A. Beutelspacher. On t-covers in finite projective spaces. J. Geom., 12:10–16, 1979.
[196] J. Bierbrauer. The theory of cyclic codes and a generalization to additive codes.
Des. Codes Cryptogr., 25:189–206, 2002.
[197] J. Bierbrauer. Cyclic additive and quantum stabilizer codes. In C. Carlet and
B. Sunar, editors, Arithmetic of Finite Fields, volume 4547 of Lecture Notes in Com-
put. Sci., pages 276–283. Springer, Berlin, Heidelberg, 2007.
[198] J. Bierbrauer. Cyclic additive codes. J. Algebra, 372:661–672, 2012.
[199] J. Bierbrauer. Introduction to Coding Theory. Discrete Mathematics and its Appli-
cations. Chapman & Hall/CRC, Boca Raton, Florida, 2nd edition, 2017.
[200] J. Bierbrauer, D. Bartoli, S. Marcugini, and F. Pambianco. Geometric constructions
of quantum codes. In A. A. Bruen and D. L. Wehlau, editors, Error-Correcting
Codes, Finite Geometries and Cryptography, volume 523 of Contemp. Math., pages
149–154. Amer. Math. Soc., Providence, Rhode Island, 2010.
[201] J. Bierbrauer and Y. Edel. Quantum twisted codes. J. Combin. Des., 8:174–188,
2000.
[207] T. Blackford. Cyclic codes over Z4 of oddly even length. Discrete Appl. Math.,
128:27–46, 2003.
[208] T. Blackford. Negacyclic codes over Z4 of even length. IEEE Trans. Inform. Theory,
49:1417–1424, 2003.
[209] R. E. Blahut. Theory and Practice of Error Control Codes. Addison-Wesley, Reading,
Massachusetts, 1983.
[210] R. E. Blahut. The Gleason–Prange theorem. IEEE Trans. Inform. Theory, 37:1269–
1273, 1991.
[211] I. F. Blake. Codes over certain rings. Inform. and Control, 20:396–404, 1972.
[212] I. F. Blake, editor. Algebraic Coding Theory History and Development. Dowden,
Hutchinson, & Ross, Inc. Stroudsburg, Pennsylvania, 1973.
[213] I. F. Blake. Codes over integer residue rings. Inform. and Control, 29:295–300, 1975.
[216] F. L. Blasco, G. Liva, and G. Bauch. LT code design for inactivation decoding.
In Proc. IEEE Information Theory Workshop, pages 441–445, Hobart, Tasmania,
November 2014.
[217] M. Blaum, P. G. Farrell, and H. C. A. van Tilborg. Array Codes. In V. S. Pless and
W. C. Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 22, pages
1855–1909. North-Holland, Amsterdam, 1998.
[218] M. Blaum, J. L. Hafner, and S. Hetzler. Partial-MDS codes and their application to
RAID type of architectures. IEEE Trans. Inform. Theory, 59:4510–4519, 2013.
[219] O. Blazy, P. Gaborit, J. Schrek, and N. Sendrier. A code-based blind signature.
In Proc. IEEE International Symposium on Information Theory, pages 2718–2722,
Aachen, Germany, June 2017.
[220] D. Bleichenbacher, A. Kiayias, and M. Yung. Decoding interleaved Reed-Solomon
codes over noisy channels. Theoret. Comput. Sci., 379:348–360, 2007.
[221] G. Blekherman, P. A. Parrilo, and R. R. Thomas, editors. Semidefinite Optimiza-
tion and Convex Algebraic Geometry. Society for Industrial and Applied Mathemat-
ics (SIAM); Mathematical Optimization Society (MPS), Philadelphia, Pennsylvania,
2013.
[222] È. L. Blokh and V. V. Zyablov. Coding of generalized concatenated codes (in Rus-
sian). Problemy Peredači Informacii, 10(3):45–50, 1974 (English translation in Probl.
Inform. Transm., 10(3):218–222, 1974).
[223] A. Blokhuis and M. Lavrauw. Scattered spaces with respect to a spread in PG(n, q).
Geom. Dedicata, 81:231–243, 2000.
[224] A. Blokhuis and M. Lavrauw. On two-intersection sets with respect to hyperplanes
in projective spaces. J. Combin. Theory Ser. A, 99:377–382, 2002.
[225] A. Blokhuis and G. E. Moorhouse. Some p-ranks related to orthogonal spaces. J.
Algebraic Combin., 4:295–316, 1995.
[226] C. Blundo, A. De Santis, G. Di Cresceno, A. Gaggia, and U. Vaccaro. Multi-secret
sharing schemes. In D. R. Stinson, editor, Advances in Cryptology – CRYPTO
’93, volume 773 of Lecture Notes in Comput. Sci., pages 126–135. Springer, Berlin,
Heidelberg, 1994.
[227] I. Bocharova, F. Hug, R. Johannesson, B. Kudryashov, and R. Satyukov. Some
voltage graph-based LDPC tailbiting codes with large girth. In A. Kuleshov, V. M.
Blinovsky, and A. Ephremides, editors, Proc. IEEE International Symposium on
Information Theory, pages 732–736, St. Petersburg, Russia, July-August 2011.
[228] M. Bogaerts and P. Dukes. Semidefinite programming for permutation codes. Dis-
crete Math., 326:34–43, 2014.
[229] K. Bogart, D. Goldberg, and J. Gordon. An elementary proof of the MacWilliams
theorem on equivalence of codes. Inform. and Control, 37:19–22, 1978.
[234] G. Bonik, S. Goreinov, and N. Zamarashkin. A variant of list plus CRC concatenated
polar code. arXiv:1207.4661 [cs.IT], July 2012.
[235] A. Bonnecaze, P. Solé, C. Bachoc, and B. Mourrain. Type II codes over Z4 . IEEE
Trans. Inform. Theory, 43:969–976, 1997.
[236] A. Bonnecaze, P. Solé, and A. R. Calderbank. Quaternary quadratic residue codes
and unimodular lattices. IEEE Trans. Inform. Theory, 41:366–377, 1995.
[237] A. Borel. Linear Algebraic Groups, volume 126 of Graduate Texts in Mathematics.
Springer-Verlag, New York, 2nd edition, 1991.
[238] M. Borello. The automorphism group of a self-dual [72, 36, 16] binary code does not
contain elements of order 6. IEEE Trans. Inform. Theory, 58:7240–7245, 2012.
[239] M. Borello. The automorphism group of a self-dual [72, 36, 16] code is not an ele-
mentary abelian group of order 8. Finite Fields Appl., 25:1–7, 2014.
[251] M. Bossert. On decoding using codewords of the dual code. arXiv:2001.02956 [cs.IT],
January 2020.
[252] M. Bossert and V. Sidorenko. Singleton-type bounds for blot-correcting codes. IEEE
Trans. Inform. Theory, 42:1021–1023, 1996.
[253] L. Both and A. May. Optimizing BJMM with nearest neighbors: full decoding in
22/21n and McEliece security. In Proc. 10th International Workshop on Coding and
Cryptography, Saint Petersburg, Russia, September 2017. Available at http://cits.
rub.de/imperia/md/content/may/paper/bjmm+.pdf.
[254] L. Both and A. May. Decoding linear codes with high error rate and its impact for
LPN security. In T. Lange and R. Steinwandt, editors, Post-Quantum Cryptogra-
phy, volume 10786 of Lecture Notes in Comput. Sci., pages 25–46. Springer, Berlin,
Heidelberg, 2018.
[255] D. Boucher. Construction and number of self-dual skew codes over Fp2 . Adv. Math.
Commun., 10:765–795, 2016.
[256] D. Boucher, W. Geiselmann, and F. Ulmer. Skew-cyclic codes. Appl. Algebra Engrg.
Comm. Comput., 18:379–389, 2007.
[257] D. Boucher, P. Solé, and F. Ulmer. Skew constacyclic codes over Galois rings. Adv.
Math. Commun., 2:273–292, 2008.
[258] D. Boucher and F. Ulmer. Codes as modules over skew polynomial rings. In M. G.
Parker, editor, Cryptography and Coding, volume 5921 of Lecture Notes in Comput.
Sci., pages 38–55. Springer, Berlin, Heidelberg, 2009.
[259] D. Boucher and F. Ulmer. Coding with skew polynomial rings. J. Symbolic Comput.,
44:1644–1656, 2009.
[260] D. Boucher and F. Ulmer. Linear codes using skew polynomials with automorphisms
and derivations. Des. Codes Cryptogr., 70:405–431, 2014.
[261] D. Boucher and F. Ulmer. Self-dual skew codes and factorization of skew polynomials.
J. Symbolic Comput., 60:47–61, 2014.
[262] M. Boulagouaz and A. Leroy. (σ, δ)-codes. Adv. Math. Commun., 7:463–474, 2013.
[263] S. Boumova, P. G. Boyvalenkov, and D. P. Danev. Necessary conditions for existence
of some designs in polynomial metric spaces. European J. Combin., 20:213–225, 1999.
[264] J. Boutros, E. Viterbo, C. Rastello, and J.-C. Belfiore. Good lattice constellations for
both Rayleigh fading and Gaussian channels. IEEE Trans. Inform. Theory, 42:502–
518, 1996.
[265] I. Bouyukliev. About the code equivalence. In T. Shaska, W. C. Huffman, D. Joyner,
and V. Ustimenko, editors, Advances in Coding Theory and Cryptography, volume 3
of Ser. Coding Theory Cryptol., pages 126–151. World Sci. Publ., Hackensack, New
Jersey, 2007.
[266] I. Bouyukliev. What is Q-extension? Serdica J. Comput., 1:115–130, 2007.
[267] I. Bouyukliev. Classification of Griesmer codes and dual transform. Discrete Math.,
309:4049–4068, 2009.
[294] M. Braun. Designs over the binary field from the complete monomial group. Aus-
tralas. J. Combin., 67:470–475, 2017.
[295] M. Braun, T. Etzion, P. R. J. Östergård, A. Vardy, and A. Wassermann. Existence
of q-analogs of Steiner systems. Forum Math. Pi, 4:e7, 14, 2016.
[300] M. Braun, P. R. J. Östergård, and A. Wassermann. New lower bounds for binary
constant-dimension subspace codes. Experiment. Math., 27:179–183, 2018.
[301] S. Bravyi, M. Suchara, and A. Vargo. Efficient algorithms for maximum likelihood
decoding in the surface code. Physical Review A, 90(3):032326, September 2014.
[302] E. F. Brickell. Some ideal secret sharing schemes. In J.-J. Quisquater and J. Van-
dewalle, editors, Proc. Advances in Cryptology – EUROCRYPT ’89, volume 434 of
Lecture Notes in Comput. Sci., pages 468–475. Springer, Berlin, Heidelberg, 1990.
[303] J. D. Bridwell and J. K. Wolf. Burst distance and multiple-burst correction. Bell
System Tech. J., 49:889–909, 1970.
[304] J. Bringer, C. Carlet, H. Cabanne, S. Guilley, and H. Maghrebi. Orthogonal direct
sum masking: a smartcard friendly computation paradigm in a code, with builtin
protection against side-channel and fault attacks. In D. Naccache and D. Sauveron,
editors, Information Security Theory and Practice. Securing the Internet of Things,
volume 8501 of Lecture Notes in Comput. Sci., pages 40–56. Springer, Berlin, Hei-
delberg, 2014.
[305] A. E. Brouwer. Personal homepage. http://www.win.tue.nl//~aeb/. Accessed:
2018-08-31.
[306] A. E. Brouwer. Some unitals on 28 points and their embeddings in projective planes
of order 9. In M. Aigner and D. Jungnickel, editors, Geometries and Groups, volume
893 of Lecture Notes in Math., pages 183–188. Springer-Verlag, Berlin, Heidelberg,
1981.
[307] A. E. Brouwer. Some new two-weight codes and strongly regular graphs. Discrete
Appl. Math., 10:111–114, 1985.
[308] A. E. Brouwer. Strongly regular graphs. In C. J. Colbourn and J. H. Dinitz, edi-
tors, The CRC Handbook of Combinatorial Designs, chapter VII.11, pages 852–868.
Chapman & Hall/CRC Press, 2nd edition, 2007.
[309] A. E. Brouwer, A. M. Cohen, and A. Neumaier. Distance-Regular Graphs, volume 18
of Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics
and Related Areas (3)]. Springer-Verlag, Berlin, 1989.
[310] A. E. Brouwer, A. V. Ivanov, and M. H. Klin. Some new strongly regular graphs.
Combinatorica, 9:339–344, 1989.
[311] A. E. Brouwer and S. C. Polak. Uniqueness of codes using semidefinite programming.
Des. Codes Cryptogr., 87:1881–1895, 2019.
[312] A. E. Brouwer and L. M. G. M. Tolhuizen. A sharpening of the Johnson bound for
binary linear codes and the nonexistence of linear codes with Preparata parameters.
Des. Codes Cryptogr., 3:95–98, 1993.
[313] A. E. Brouwer and M. van Eupen. The correspondence between projective codes
and 2-weight codes. Des. Codes Cryptogr., 11:261–266, 1997.
[314] A. E. Brouwer, R. M. Wilson, and Q. Xiang. Cyclotomy and strongly regular graphs.
J. Algebraic Combin., 10:25–28, 1999.
[315] R. A. Brualdi, J. S. Graves, and K. M. Lawrence. Codes with a poset metric. Discrete
Math., 147:57–72, 1995.
[316] A. A. Bruen and J. A. Thas. Hyperplane coverings and blocking sets. Math. Z.,
181:407–409, 1982.
[317] T. A. Brun, I. Devetak, and M.-H. Hsieh. Correcting quantum errors with entangle-
ment. Science, 314(5798):436–439, 2006.
[318] F. Buekenhout. Existence of unitals in finite translation planes of order q 2 with a
kernel of order q. Geom. Dedicata, 5:189–194, 1976.
[319] K. A. Bush. Orthogonal arrays of index unity. Ann. Math. Stat., 23:279–290, 1952.
[320] S. Buzaglo and T. Etzion. Bounds on the size of permutation codes with the Kendall
τ -metric. IEEE Trans. Inform. Theory, 61:3241–3250, 2015.
[321] J. W. Byers, M. G. Luby, M. Mitzenmacher, and A. Rege. A digital fountain ap-
proach to reliable distribution of bulk data. In Proc. ACM SIGCOMM Conference
on Applications, Technologies, Architectures, and Protocols for Computer Communi-
cation, pages 56–67, Vancouver, Canada, August-September 1998. ACM Press, New
York.
[322] E. Byrne. Lifting decoding schemes over a Galois ring. In S. Boztaş and I. E. Shpar-
linski, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
volume 2227 of Lecture Notes in Comput. Sci., pages 323–332. Springer, Berlin, Hei-
delberg, 2001.
[323] E. Byrne. Decoding a class of Lee metric codes over a Galois ring. IEEE Trans.
Inform. Theory, 48:966–975, 2002.
[324] E. Byrne and P. Fitzpatrick. Gröbner bases over Galois rings with an application to
decoding alternant codes. J. Symbolic Comput., 31:565–584, 2001.
[325] E. Byrne and P. Fitzpatrick. Hamming metric decoding of alternant codes over
Galois rings. IEEE Trans. Inform. Theory, 48:683–694, 2002.
[326] V. R. Cadambe, S. A. Jafar, H. Maleki, K. Ramchandran, and C. Suh. Asymptotic
interference alignment for optimal repair of MDS codes in distributed storage. IEEE
Trans. Inform. Theory, 59:2974–2987, 2013.
[327] V. R. Cadambe and A. Mazumdar. Bounds on the size of locally recoverable codes.
IEEE Trans. Inform. Theory, 61:5787–5794, 2015.
[328] Y. Cai and C. Ding. Binary sequences with optimal autocorrelation. Theoret. Com-
put. Sci., 410:2316–2322, 2009.
[333] S. Calkavur and P. Solé. Multisecret-sharing schemes and bounded distance decoding
of linear codes. Internat. J. Compt. Math., 94:107–114, 2017.
[334] E. T. Campbell, B. M. Terhal, and C. Vuillot. Roads towards fault-tolerant universal
quantum computation. Nature, 549:172–179, 2017.
[335] A. Canteaut and H. Chabanne. A further improvement of the work factor in an
attempt at breaking McEliece’s cryptosystem. In P. Charpin, editor, EUROCODE
94 – Livre des résumés, pages 169–173. INRIA, 1994.
[336] A. Canteaut and F. Chabaud. A new algorithm for finding minimum-weight words
in a linear code: application to McEliece’s cryptosystem and to narrow-sense BCH
codes of length 511. IEEE Trans. Inform. Theory, 44:367–378, 1998.
[337] A. Canteaut, P. Charpin, and G. M. Kyureghyan. A new class of monomial bent
functions. Finite Fields Appl., 14:221–241, 2008.
[338] A. Canteaut and N. Sendrier. Cryptanalysis of the original McEliece cryptosystem.
In K. Ohta and D. Pei, editors, Advances in Cryptology – ASIACRYPT ’98, volume
1514 of Lecture Notes in Comput. Sci., pages 187–199. Springer, Berlin, Heidelberg,
1998.
[339] R. Canto-Torres and N. Sendrier. Analysis of information set decoding for a sub-
linear error weight. In T. Takagi, editor, Post-Quantum Cryptography, volume 9606
of Lecture Notes in Comput. Sci., pages 144–161. Springer, Berlin, Heidelberg, 2016.
[340] X. Cao and L. Hu. Two Boolean functions with five-valued Walsh spectra and high
nonlinearity. Internat. J. Found. Comput. Sci., 26:537–556, 2015.
[341] Y. Cao, Y. Cao, H. Q. Dinh, F.-W. Fu, J. Gao, and S. Sriboonchitta. Constacyclic
codes of length nps over Fpm + uFpm . Adv. Math. Commun., 12:231–262, 2018.
[342] C. Carlet. A simple description of Kerdock codes. In G. D. Cohen and J. Wolfmann,
editors, Coding Theory and Applications, volume 388 of Lecture Notes in Comput.
Sci., pages 202–208. Springer, Berlin, Heidelberg, 1989.
[343] C. Carlet. Partially-bent functions. In E. F. Brickell, editor, Advances in Cryptology –
CRYPTO ’92, volume 740 of Lecture Notes in Comput. Sci., pages 280–291. Springer,
Berlin, Heidelberg, 1993.
[344] C. Carlet. Partially-bent functions. Des. Codes Cryptogr., 3:135–145, 1993.
[345] C. Carlet. On Kerdock codes. In Finite Fields: Theory, Applications, and Algorithms
(Waterloo, ON, 1997), volume 225 of Contemp. Math., pages 155–163. Amer. Math.
Soc., Providence, Rhode Island, 1999.
[346] C. Carlet. Boolean Functions for Cryptography and Error-Correcting Codes. In
Y. Crama and P. L. Hammer, editors, Boolean Models and Methods in Mathematics,
Computer Science, and Engineering, volume 134 of Encyclopedia of Mathematics and
its Applications, chapter 8, pages 257–397. Cambridge University Press, Cambridge,
UK, 2010.
[347] C. Carlet. Vectorial Boolean Functions for Cryptography. In Y. Crama and P. L.
Hammer, editors, Boolean Models and Methods in Mathematics, Computer Science,
and Engineering, volume 134 of Encyclopedia of Mathematics and its Applications,
chapter 9, pages 398–469. Cambridge University Press, Cambridge, UK, 2010.
[348] C. Carlet. Boolean and vectorial plateaued functions and APN functions. IEEE
Trans. Inform. Theory, 61:6272–6289, 2015.
[349] C. Carlet. Boolean Functions for Cryptography and Coding Theory. Cambridge
University Press, Cambridge, UK, 2020.
[350] C. Carlet, P. Charpin, and V. A. Zinoviev. Codes, bent functions and permutations
suitable for DES-like cryptosystems. Des. Codes Cryptogr., 15:125–156, 1998.
[351] C. Carlet and C. Ding. Highly nonlinear mappings. J. Complexity, 20:205–244, 2004.
[352] C. Carlet, C. Ding, and J. Yuan. Linear codes from perfect nonlinear mappings and
their secret sharing schemes. IEEE Trans. Inform. Theory, 51:2089–2102, 2005.
[353] C. Carlet and S. Guilley. Complementary dual codes for counter-measures to side-
channel attacks. In R. Pinto, P. R. Malonek, and P. Vettori, editors, Coding Theory
and Applications, volume 3 of CIM Ser. Math. Sci., pages 97–105. Springer, Cham,
2015.
[354] C. Carlet, C. Güneri, F. Özbudak, B. Özkaya, and P. Solé. On linear complementary
pairs of codes. IEEE Trans. Inform. Theory, 64:6583–6589, 2018.
[355] C. Carlet and S. Mesnager. Four decades of research on bent functions. Des. Codes
Cryptogr., 78:5–50, 2016.
[356] X. Caruso and J. Le Borgne. A new faster algorithm for factoring skew polynomials
over finite fields. J. Symbolic Comput., 79:411–443, 2017.
[357] I. Cascudo. On squares of cyclic codes. IEEE Trans. Inform. Theory, 65:1034–1047,
2019.
[358] I. Cascudo, H. Chen, R. Cramer, and C. Xing. Asymptotically good ideal linear
secret sharing with strong multiplication over any fixed finite field. In S. Halevi,
editor, Advances in Cryptology—CRYPTO 2009, volume 5677 of Lecture Notes in
Comput. Sci., pages 466–486. Springer, Berlin, Heidelberg, 2009.
[361] I. Cascudo, R. Cramer, and C. Xing. Torsion limits and Riemann-Roch systems for
function fields and applications. IEEE Trans. Inform. Theory, 60:3871–3888, 2014.
[362] I. Cascudo, J. S. Gundersen, and D. Ruano. Squares of matrix-product codes. Finite
Fields Appl., 62:101606, 21, 2020.
[363] L. R. A. Casse and D. G. Glynn. The solution to Beniamino Segre’s problem Ir,q ,
r = 3, q = 2h . Geom. Dedicata, 13:157–163, 1982.
[364] L. R. A. Casse and D. G. Glynn. On the uniqueness of (q + 1)4 -arcs of PG(4, q),
q = 2h , h ≥ 3. Discrete Math., 48:173–186, 1984.
[365] Y. Cassuto and M. Blaum. Codes for symbol-pair read channels. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 988–992, Austin, Texas, June
2010.
[366] Y. Cassuto and M. Blaum. Codes for symbol-pair read channels. IEEE Trans.
Inform. Theory, 57:8011–8020, 2011.
[367] Y. Cassuto and S. Litsyn. Symbol-pair codes: algebraic constructions and asymptotic
bounds. In A. Kuleshov, V. M. Blinovsky, and A. Ephremides, editors, Proc. IEEE
International Symposium on Information Theory, pages 2348–2352, St. Petersburg,
Russia, July-August 2011.
[368] Y. Cassuto and M. A. Shokrollahi. Online fountain codes with low overhead. IEEE
Trans. Inform. Theory, 61:3137–3149, June 2015.
[369] G. Castagnoli, J. L. Massey, P. A. Schoeller, and N. von Seeman. On repeated-root
cyclic codes. IEEE Trans. Inform. Theory, 37:337–342, 1991.
[384] Z. Chang, M. F. Ezerman, S. Ling, and H. Wang. On binary de Bruijn sequences from
LFSRs with arbitrary characteristic polynomials. Des. Codes Cryptogr., 87:1137–
1160, 2019.
[385] P. Charpin. Codes Idéaux de Certaines Algèbres Modulaires, Thèse de 3ième cycle.
Université de Paris VII, 1982.
[390] B. Chen, H. Q. Dinh, H. Liu, and L. Wang. Constacyclic codes of length 2ps over
Fpm + uFpm . Finite Fields Appl., 37:108–130, 2016.
[391] B. Chen, S. Ling, and G. Zhang. Application of constacyclic codes to quantum MDS
codes. IEEE Trans. Inform. Theory, 61:1474–1484, 2015.
[392] B. Chen, S.-T. Xia, J. Hao, and F.-W. Fu. Constructions of optimal cyclic (r, δ)
locally repairable codes. IEEE Trans. Inform. Theory, 64:2499–2511, 2018.
[393] C. L. Chen, W. W. Peterson, and E. J. Weldon, Jr. Some results on quasi-cyclic
codes. Inform. and Control, 15:407–423, 1969.
[394] H. Chen and R. Cramer. Algebraic geometric secret sharing schemes and se-
cure multi-party computations over small fields. In C. Dwork, editor, Advances in
Cryptology—CRYPTO 2006, volume 4117 of Lecture Notes in Comput. Sci., pages
521–536. Springer, Berlin, Heidelberg, 2006.
[395] H. Chen, S. Ling, and C. Xing. Quantum codes from concatenated algebraic-
geometric codes. IEEE Trans. Inform. Theory, 51:2915–2920, 2005.
[430] I. Constaninescu. Lineare Codes über Restklassenringen ganzer Zahlen und ihre
Automorphismen bezüglich einer verallgemeinerten Hamming-Metrik. PhD thesis,
Technische Universität, München, Germany, 1995.
[431] I. Constaninescu and W. Heise. A metric for codes over residue class rings of integers
(in Russian). Problemy Peredači Informacii, 33(3):22–28, 1997. (English translation
in Probl. Inform. Transm., 33(3):208–213, 1997).
[432] I. Constaninescu, W. Heise, and T. Honold. Monomial extensions of isometries
between codes over Zm . In Proc. 5th International Workshop on Algebraic and
Combinatorial Coding Theory, pages 98–104, Sozopol, Bulgaria, June 1996.
[433] S. D. Constantin and T. R. N. Rao. On the theory of binary asymmetric error
correcting codes. Inform. and Control, 40:20–36, 1979.
[438] J. H. Conway, V. S. Pless, and N. J. A. Sloane. Self-dual codes over GF(3) and
GF(4) of length not exceeding 16. IEEE Trans. Inform. Theory, 25:312–322, 1979.
[439] J. H. Conway, V. S. Pless, and N. J. A. Sloane. The binary self-dual codes of length
up to 32: a revised enumeration. J. Combin. Theory Ser. A, 60:183–195, 1992.
[440] J. H. Conway and N. J. A. Sloane. A new upper bound on the minimal distance of
self-dual codes. IEEE Trans. Inform. Theory, 36:1319–1333, 1990.
[441] J. H. Conway and N. J. A. Sloane. Self-dual codes over the integers modulo 4. J.
Combin. Theory Ser. A, 62:30–45, 1993.
[442] J. H. Conway and N. J. A. Sloane. Sphere Packings, Lattices and Groups, volume
290 of Grundlehren der Mathematischen Wissenschaften [Fundamental Principles
of Mathematical Sciences]. Springer-Verlag, New York, 3rd edition, 1999. With
additional contributions by Ei. Bannai, R. E. Borcherds, J. Leech, S. P. Norton, A.
M. Odlyzko, R. A. Parker, L. Queen and B. B. Venkov.
[443] D. Coppersmith and M. Sudan. Reconstructing curves in three (and higher) dimen-
sional spaces from noisy data. In Proc. 35th Annual ACM Symposium on the Theory
of Computing, pages 136–142, San Diego, California, June 2003. ACM Press, New
York.
[444] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms.
MIT Press, Cambridge, Massachusetts; McGraw-Hill Book Co., Boston, 2nd edition,
2001.
[447] A. Cossidente and G. Marino. Veronese embedding and two-character sets. Des.
Codes Cryptogr., 42:103–107, 2007.
[448] A. Cossidente, G. Marino, and F. Pavese. Non-linear maximum rank distance codes.
Des. Codes Cryptogr., 79:597–609, 2016.
[449] A. Cossidente and F. Pavese. On subspace codes. Des. Codes Cryptogr., 78:527–531,
2016.
[450] A. Cossidente and F. Pavese. Veronese subspace codes. Des. Codes Cryptogr., 81:445–
457, 2016.
[461] A. Couvreur, M. Lequesne, and J.-P. Tillich. Recovering short secret keys of RLCE
in polynomial time. In J. Ding and R. Steinwandt, editors, Post-Quantum Cryp-
tography, volume 11505 of Lecture Notes in Comput. Sci., pages 133–152. Springer,
Berlin, Heidelberg, 2019.
[462] A. Couvreur, I. Márquez-Corbella, and R. Pellikaan. Cryptanalysis of McEliece
cryptosystem based on algebraic geometry codes and their subcodes. IEEE Trans.
Inform. Theory, 63:5404–5418, 2017.
[463] A. Couvreur, A. Otmani, and J.-P. Tillich. Polynomial time attack on wild McEliece
over quadratic extensions. In P. Q. Nguyen and E. Oswald, editors, Advances in
Cryptology – EUROCRYPT 2014, volume 8441 of Lecture Notes in Comput. Sci.,
pages 17–39. Springer, Berlin, Heidelberg, 2014.
[464] A. Couvreur, A. Otmani, and J.-P. Tillich. Polynomial time attack on wild McEliece
over quadratic extensions. IEEE Trans. Inform. Theory, 63:404–427, 2017.
[470] L. Creedon and K. Hughes. Derivations on group algebras with coding theory ap-
plications. Finite Fields Appl., 56:247–265, 2019.
[471] H. S. Cronie and S. B. Korada. Lossless source coding with polar codes. In
Proc. IEEE International Symposium on Information Theory, pages 904–908, Austin,
Texas, June 2010.
[472] E. Croot, V. F. Lev, and P. P. Pach. Progression-free sets in Zn4 are exponentially
small. Ann. of Math. (2), 185:331–337, 2017.
[473] A. Cross, G. Smith, J. A. Smolin, and B. Zeng. Codeword stabilized quantum codes.
IEEE Trans. Inform. Theory, 55:433–438, 2009.
[474] B. Csajbók, G. Marino, O. Polverino, and F. Zullo. Maximum scattered linear sets
and MRD-codes. J. Algebraic Combin., 46:517–531, 2017.
[475] B. Csajbók and A. Siciliano. Puncturing maximum rank distance codes. J. Algebraic
Combin., 49:507–534, 2019.
[482] I. B. Damgård and P. Landrock. Ideals and Codes in Group Algebras. Aarhus
Preprint Series, 1986.
[483] L. E. Danielsen and M. G. Parker. Edge local complementation and equivalence of
binary linear codes. Des. Codes Cryptogr., 49:161–170, 2008.
[486] R. N. Daskalov, T. A. Gulliver, and E. Metodieva. New ternary linear codes. IEEE
Trans. Inform. Theory, 45:1687–1688, 1999.
[487] B. K. Dass, N. Sharma, and R. Verma. Perfect codes in poset spaces and poset block
spaces. Finite Fields Appl., 46:90–106, 2017.
[488] A. Datta and F. Oggier. An overview of codes tailor-made for better repairability in
networked distributed storage systems. ACM SIGACT News, 44:89–105, 2013.
[489] H. Dau, I. M. Duursma, H. M. Kiah, and O. Milenkovic. Repairing Reed-Solomon
codes with multiple erasures. IEEE Trans. Inform. Theory, 64:6567–6582, 2018.
[490] M. C. Davey and D. J. C. MacKay. Low density parity check codes over GF(q).
IEEE Commun. Letters, 2:165–167, 1998.
[491] G. Davidoff, P. Sarnak, and A. Valette. Elementary Number Theory, Group Theory,
and Ramanujan Graphs, volume 55 of London Math. Soc. Student Texts. Cambridge
University Press, Cambridge, UK, 2003.
[492] P. J. Davis. Circulant Matrices. John Wiley & Sons, New York-Chichester-Brisbane,
1979.
[493] P. Dayal and M. K. Varanasi. An optimal two transmit antenna space-time code
and its stacked extensions. In Proc. 37th Asilomar Conference on Signals, Systems
and Computers, volume 1, pages 987–991, Pacific Grove, California, November 2003.
IEEE, Piscataway, New Jersey.
[494] P. Dayal and M. K. Varanasi. Distributed QAM-based space-time block codes for
efficient cooperative multiple-access communication. IEEE Trans. Inform. Theory,
54:4342–4354, 2008.
[495] J. De Beule, K. Metsch, and L. Storme. Characterization results on weighted mini-
hypers and on linear codes meeting the Griesmer bound. Adv. Math. Commun.,
2:261–272, 2008.
[496] N. G. de Bruijn. A combinatorial problem. Nederl. Akad. Wetensch., Proc., 49:758–
764, 1946 (See also Indagationes Math., 8:461–467, 1946).
[497] F. De Clerck and M. Delanote. Two-weight codes, partial geometries and Steiner
systems. Des. Codes Cryptogr., 21:87–98, 2000.
[498] E. de Klerk. Aspects of Semidefinite Programming. Kluwer Acad. Publ., Dordrecht,
Netherlands, 2002.
[499] E. de Klerk and F. Vallentin. On the Turing model complexity of interior point
methods for semidefinite programming. SIAM J. Optim., 26:1944–1961, 2016.
[500] J. de la Cruz, E. Gorla, H. Lopez, and A. Ravagnani. Weight distribution of rank-
metric codes. Des. Codes Cryptogr., 86:1–16, 2018.
[501] J. de la Cruz, M. Kiermaier, A. Wassermann, and W. Willems. Algebraic structures
of MRD codes. Adv. Math. Commun., 10:499–510, 2016.
[502] J. de la Cruz and W. Willems. On group codes with complementary duals. Des.
Codes Cryptogr., 86:2065–2073, 2018.
[503] D. de Laat. Moment methods in energy minimization: new bounds for Riesz minimal
energy problems. arXiv:1610.04905 [math.OC], October 2016.
[504] D. de Laat, F. M. de Oliveira Filho, and F. Vallentin. Upper bounds for packings of
spheres of several radii. Forum Math. Sigma, 2, 42 pages, 2014.
[505] D. de Laat, F. C. Machado, F. M. de Oliveira Filho, and F. Vallentin. k-point semidef-
inite programming bounds for equiangular lines. arXiv:1812.06045 [math.OC], De-
cember 2018.
[506] D. de Laat and F. Vallentin. A semidefinite programming hierarchy for packing
problems in discrete geometry. Math. Program. Ser. B, 151:529–553, 2015.
[507] C. L. M. de Lange. Some new cyclotomic strongly regular graphs. J. Algebraic
Combin., 4:329–330, 1995.
[508] F. M. de Oliveira Filho and F. Vallentin. Computing upper bounds for packing
densities of congruent copies of a convex body. In G. Ambrus, I. Bárány, K. J.
Böröczky, G. F. Tóth, and J. Pach, editors, New Trends in Intuitive Geometry,
volume 27 of Bolyai Society Mathematical Studies, pages 155–188. Springer-Verlag,
Berlin, 2018.
[509] M. J. De Resmini. A 35-set of type (2, 5) in PG(2, 9). J. Combin. Theory Ser. A,
45:303–305, 1987.
[510] M. J. De Resmini and G. Migliori. A 78-set of type (2, 6) in PG(2, 16). Ars Combin.,
22:73–75, 1986.
[511] C. de Seguins Pazzis. The classification of large spaces of matrices with bounded
rank. Israel J. Math., 208:219–259, 2015.
[512] A. De Wispelaere and H. Van Maldeghem. Codes from generalized hexagons. Des.
Codes Cryptogr., 37:435–448, 2005.
[513] A. De Wispelaere and H. Van Maldeghem. Some new two-character sets in PG(5, q 2 )
and a distance-2 ovoid in the generalized hexagon H(4). Discrete Math., 308:2976–
2983, 2008.
[514] T. Debris-Alazard, N. Sendrier, and J.-P. Tillich. WAVE: a new family of trapdoor
one-way preimage sampleable functions based on codes. In S. D. Galbraith and
S. Moriai, editors, Advances in Cryptology – ASIACRYPT 2019, Part 1, volume
11921 of Lecture Notes in Comput. Sci., pages 21–51. Springer, Berlin, Heidelberg,
2019.
[515] T. Debris-Alazard and J.-P. Tillich. Two attacks on rank metric code-based schemes:
RankSign and an IBE scheme. In T. Peyrin and S. D. Galbraith, editors, Advances in
Cryptology – ASIACRYPT 2018, Part 1, volume 11272 of Lecture Notes in Comput.
Sci., pages 62–92. Springer, Berlin, Heidelberg, 2018.
[516] L. Decreusefond and G. Zëmor. On the error-correcting capabilities of cycle codes of
graphs. In Proc. IEEE International Symposium on Information Theory, page 307,
Trondheim, Norway, June-July 1994.
[517] P. Delsarte. Bounds for unrestricted codes, by linear programming. Philips Res.
Rep., 27:272–289, 1972.
[518] P. Delsarte. Weights of linear codes and strongly regular normed spaces. Discrete
Math., 3:47–64, 1972.
[519] P. Delsarte. An algebraic approach to the association schemes of coding theory.
Philips Res. Rep. Suppl., 10:vi+97, 1973.
[520] P. Delsarte. An Algebraic Approach to the Association Schemes of Coding Theory.
PhD thesis, Université Catholique de Louvain, 1973.
[521] P. Delsarte. Four fundamental parameters of a code and their combinatorial signifi-
cance. Inform. and Control, 23:407–438, 1973.
[522] P. Delsarte. On subfield subcodes of modified Reed-Solomon codes. IEEE Trans.
Inform. Theory, 21:575–576, 1975.
[523] P. Delsarte. Bilinear forms over a finite field, with applications to coding theory. J.
Combin. Theory Ser. A, 25:226–241, 1978.
[524] P. Delsarte and J.-M. Goethals. Alternating bilinear forms over GF (q). J. Combin.
Theory Ser. A, 19:26–50, 1975.
[525] P. Delsarte and J.-M. Goethals. Unrestricted codes with the Golay parameters are
unique. Discrete Math., 12:211–224, 1975.
[526] P. Delsarte, J.-M. Goethals, and F. J. MacWilliams. On generalized Reed-Muller
codes and their relatives. Inform. and Control, 16:403–442, 1970.
[527] P. Delsarte, J.-M. Goethals, and J. J. Seidel. Spherical codes and designs. Geom.
Dedicata, 6:363–388, 1977.
[528] P. Delsarte and V. I. Levenshtein. Association schemes and coding theory. IEEE
Trans. Inform. Theory, 44:2477–2504, 1998.
[529] J.-C. Deneuville and P. Gaborit. Cryptanalysis of a code-based one-time signature.
Des. Codes Cryptogr., 88:to appear, 2020.
[530] J.-C. Deneuville, P. Gaborit, and G. Zémor. Ouroboros: a simple, secure and efficient
key exchange protocol based on coding theory. In T. Lange and T. Takagi, editors,
Post-Quantum Cryptography, volume 10346 of Lecture Notes in Comput. Sci., pages
18–34. Springer, Berlin, Heidelberg, 2017.
[531] R. H. F. Denniston. Some maximal arcs in finite projective planes. J. Combin.
Theory, 6:317–319, 1969.
[532] M. M. Deza and E. Deza. Encyclopedia of Distances. Springer-Verlag, Berlin, 2009.
[533] A. Dholakia. Introduction to Convolutional Codes with Applications. International
Series in Engineering and Computer Science. Springer Science & Business Media,
New York, 1994.
[536] Q. Diao, Y. Y. Tai, S. Lin, and K. Abdel-Ghaffar. Trapping set structure of finite
geometry LDPC codes. In Proc. IEEE International Symposium on Information
Theory, pages 3088–3092, Cambridge, Massachusetts, July 2012.
[537] L. E. Dickson. The analytic representation of substitutions on a power of a prime
number of letters with a discussion of the linear group. Ann. of Math., 11:65–120,
161–183, 1896/97.
[538] J. F. Dillon. Elementary Hadamard Difference Sets. PhD thesis, University of Mary-
land, 1974.
[539] J. F. Dillon. Multiplicative difference sets via additive characters. Des. Codes Cryp-
togr., 17:225–235, 1999.
[540] J. F. Dillon and H. S. Dobbertin. New cyclic difference sets with Singer parameters.
Finite Fields Appl., 10:342–389, 2004.
[541] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran. Net-
work coding for distributed storage systems. IEEE Trans. Inform. Theory, 56:4539–
4551, 2010.
[542] A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh. A survey on network codes
for distributed storage. Proc. IEEE, 99:476–489, 2011.
[543] B. K. Ding, T. Zhang, and G. N. Ge. Maximum distance separable codes for b-symbol
read channels. Finite Fields Appl., 49:180–197, 2018.
[544] C. Ding. Cyclic codes from APN and planar functions. arXiv:1206.4687 [cs.IT], June
2012.
[545] C. Ding. Cyclic codes from the two-prime sequences. IEEE Trans. Inform. Theory,
58:3881–3891, 2012.
[546] C. Ding. Cyclotomic constructions of cyclic codes with length being the product of
two primes. IEEE Trans. Inform. Theory, 58:2231–2236, 2012.
[547] C. Ding. Cyclic codes from cyclotomic sequences of order four. Finite Fields Appl.,
23:8–34, 2013.
[548] C. Ding. Cyclic codes from some monomials and trinomials. SIAM J. Discrete Math.,
27:1977–1994, 2013.
[549] C. Ding. Codes from Difference Sets. World Scientific Publishing Co. Pte. Ltd.,
Hackensack, New Jersey, 2015.
[550] C. Ding. Linear codes from some 2-designs. IEEE Trans. Inform. Theory, 61:3265–
3275, 2015.
[551] C. Ding. Parameters of several classes of BCH codes. IEEE Trans. Inform. Theory,
61:5322–5330, 2015.
[552] C. Ding. A construction of binary linear codes from Boolean functions. Discrete
Math., 339:2288–2303, 2016.
[553] C. Ding. Cyclic codes from Dickson polynomials. arXiv:1206.4370 [cs.IT], November
2016.
[554] C. Ding. A sequence construction of cyclic codes over finite fields. Cryptogr. Com-
mun., 10:319–341, 2018.
[555] C. Ding, C. Fan, and Z. Zhou. The dimension and minimum distance of two classes
of primitive BCH codes. Finite Fields Appl., 45:237–263, 2017.
[556] C. Ding, Z. Heng, and Z. Zhou. Minimal binary linear codes. IEEE Trans. Inform.
Theory, 64:6536–6545, 2018.
[557] C. Ding, D. Kohel, and S. Ling. Secret sharing with a class of ternary codes. Theoret.
Comput. Sci., 246:285–298, 2000.
[558] C. Ding, T. Laihonen, and A. Renvall. Linear multisecret-sharing schemes and error-
correcting codes. J. Universal Comput. Sci., 3:1023–1036, 1997.
[559] C. Ding, K. Y. Lam, and C. Xing. Construction and enumeration of all binary duadic
codes of length pm . Fund. Inform., 38:149–161, 1999.
[560] C. Ding, C. Li, N. Li, and Z. Zhou. Three-weight cyclic codes and their weight
distributions. Discrete Math., 339:415–427, 2016.
[561] C. Ding, C. Li, and Y. Xia. Another generalisation of the binary Reed-Muller codes
and its applications. Finite Fields Appl., 53:144–174, 2018.
[562] C. Ding and S. Ling. A q-polynomial approach to cyclic codes. Finite Fields Appl.,
20:1–14, 2013.
[563] C. Ding and H. Niederreiter. Cyclotomic linear codes of order 3. IEEE Trans.
Inform. Theory, 53:2274–2277, 2007.
[564] C. Ding, D. Pei, and A. Salomaa. Chinese Remainder Theorem: Applications in
Computing, Coding, Cryptography. World Scientific Publishing Co., Inc., River Edge,
New Jersey, 1996.
[565] C. Ding and V. S. Pless. Cyclotomy and duadic codes of prime lengths. IEEE Trans.
Inform. Theory, 45:453–466, 1999.
[566] C. Ding and A. Salomaa. Secret sharing schemes with nice access structures. Fund.
Inform., 73:51–62, 2006.
[567] C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers, volume
561 of Lecture Notes in Comput. Sci. Springer, Berlin, Heidelberg, 1991.
[568] C. Ding and J. Yang. Hamming weights in irreducible cyclic codes. Discrete Math.,
313:434–446, 2013.
[569] C. Ding, Y. Yang, and X. Tang. Optimal sets of frequency hopping sequences from
linear cyclic codes. IEEE Trans. Inform. Theory, 56:3605–3612, 2010.
[570] C. Ding and J. Yuan. Covering and secret sharing with linear codes. In C. S. Calude,
M. J. Dinneen, and V. Vajnovszki, editors, Discrete Mathematics and Theoretical
Computer Science, volume 2731 of Lecture Notes in Comput. Sci., pages 11–25.
Springer, Berlin, Heidelberg, 2003.
[571] C. Ding and Z. Zhou. Binary cyclic codes from explicit polynomials over GF(2m ).
Discrete Math., 321:76–89, 2014.
[572] K. Ding and C. Ding. A class of two-weight and three-weight codes and their appli-
cations in secret sharing. IEEE Trans. Inform. Theory, 61:5835–5842, 2015.
[573] H. Q. Dinh. Negacyclic codes of length 2s over Galois rings. IEEE Trans. Inform.
Theory, 51:4252–4262, 2005.
[574] H. Q. Dinh. Repeated-root constacyclic codes of length 2s over Z2a . In Algebra and
its Applications, volume 419 of Contemp. Math., pages 95–110. Amer. Math. Soc.,
Providence, Rhode Island, 2006.
[575] H. Q. Dinh. Structure of some classes of repeated-root constacyclic codes over inte-
gers modulo 2m . In A. Giambruno, C. P. Milies, and S. K. Sehgal, editors, Groups,
Rings and Group Rings, volume 248 of Lecture Notes Pure Appl. Math., pages 105–
117. Chapman & Hall/CRC, Boca Raton, Florida, 2006.
[576] H. Q. Dinh. Complete distances of all negacyclic codes of length 2s over Z2a . IEEE
Trans. Inform. Theory, 53:147–161, 2007.
[577] H. Q. Dinh. On the linear ordering of some classes of negacyclic and cyclic codes
and their distance distributions. Finite Fields Appl., 14:22–40, 2008.
[578] H. Q. Dinh. Constacyclic codes of length 2s over Galois extension rings of F2 + uF2 .
IEEE Trans. Inform. Theory, 55:1730–1740, 2009.
[579] H. Q. Dinh. Constacyclic codes of length ps over Fpm + uFpm . J. Algebra, 324:940–
950, 2010.
[580] H. Q. Dinh. On some classes of repeated-root constacyclic codes of length a power
of 2 over Galois rings. In Advances in Ring Theory, Trends Math., pages 131–147.
Birkhäuser/Springer Basel AG, Basel, 2010.
[581] H. Q. Dinh. Repeated-root constacyclic codes of length 2ps . Finite Fields Appl.,
18:133–143, 2012.
[582] H. Q. Dinh, S. Dhompongsa, and S. Sriboonchitta. On constacyclic codes of length
4ps over Fpm + uFpm . Discrete Math., 340:832–849, 2017.
[583] H. Q. Dinh, H. Liu, X.-S. Liu, and S. Sriboonchitta. On structure and distances
of some classes of repeated-root constacyclic codes over Galois rings. Finite Fields
Appl., 43:86–105, 2017.
[584] H. Q. Dinh and S. R. López-Permouth. Cyclic and negacyclic codes over finite chain
rings. IEEE Trans. Inform. Theory, 50:1728–1744, 2004.
[585] H. Q. Dinh, S. R. López-Permouth, and S. Szabo. On the structure of cyclic and
negacyclic codes over finite chain rings. In P. Solé, editor, Codes Over Rings, vol-
ume 6 of Series on Coding Theory and Cryptology, pages 22–59. World Sci. Publ.,
Hackensack, New Jersey, 2009.
[586] H. Q. Dinh, B. T. Nguyen, A. K. Singh, and S. Sriboonchitta. Hamming and symbol-
pair distances of repeated-root constacyclic codes of prime power lengths over Fpm +
uFpm . IEEE Commun. Letters, 22:2400–2403, 2018.
[587] H. Q. Dinh, B. T. Nguyen, A. K. Singh, and S. Sriboonchitta. On the symbol-pair
distance of repeated-root constacyclic codes of prime power lengths. IEEE Trans.
Inform. Theory, 64:2417–2430, 2018.
[588] H. Q. Dinh, B. T. Nguyen, and S. Sriboonchitta. Skew constacyclic codes over finite
fields and finite chain rings. Math. Probl. Eng., Art. ID 3965789, 17 pages, 2016.
[589] H. Q. Dinh, B. T. Nguyen, S. Sriboonchitta, and T. M. Vo. On a class of constacyclic
codes of length 4ps over Fpm + uFpm . J. Algebra Appl., 18(2):1950022, 2019.
[590] H. Q. Dinh, B. T. Nguyen, S. Sriboonchitta, and T. M. Vo. On (α + uβ)-constacyclic
codes of length 4ps over Fpm + uFpm . J. Algebra Appl., 18(2):1950023, 2019.
[591] H. Q. Dinh and H. D. T. Nguyen. On some classes of constacyclic codes over poly-
nomial residue rings. Adv. Math. Commun., 6:175–191, 2012.
[592] H. Q. Dinh, H. D. T. Nguyen, S. Sriboonchitta, and T. M. Vo. Repeated-root
constacyclic codes of prime power lengths over finite chain rings. Finite Fields Appl.,
43:22–41, 2017.
[593] H. Q. Dinh, A. Sharma, S. Rani, and S. Sriboonchitta. Cyclic and negacyclic codes
of length 4ps over Fpm + uFpm . J. Algebra Appl., 17(9):1850173, 22, 2018.
[594] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. On cyclic DNA codes
over the ring Z4 + uZ4 . Unpublished.
[595] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. Cyclic DNA codes over
the ring F2 + uF2 + vF2 + uvF2 + v 2 F2 + uv 2 F2 . Des. Codes Cryptogr., 86:1451–1467,
2018.
[596] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. DNA cyclic codes
over the ring F2 [u, v]/hu2 − 1, v 3 − v, uv − vui. Internat. J. Biomath., 11(3):1850042,
19, 2018.
[597] H. Q. Dinh, A. K. Singh, S. Pattanayak, and S. Sriboonchitta. Construction of cyclic
DNA codes over the ring Z4 [u]/hu2 − 1i based on the deletion distance. Theoret.
Comput. Sci., 773:27–42, 2019.
[598] H. Q. Dinh, L. Wang, and S. Zhu. Negacyclic codes of length 2ps over Fpm + uFpm .
Finite Fields Appl., 31:178–201, 2015.
[599] H. Q. Dinh, X. Wang, H. Liu, and S. Sriboonchitta. On the b-distance of repeated-
root constacyclic codes of prime power lengths. Discrete Math., 343(4):111780, 2020.
[627] S. T. Dougherty, J.-L. Kim, and H. Kulosman. MDS codes over finite principal ideal
rings. Des. Codes Cryptogr., 50:77–92, 2009.
[628] S. T. Dougherty, J.-L. Kim, H. Kulosman, and H. Liu. Self-dual codes over commu-
tative Frobenius rings. Finite Fields Appl., 16:14–26, 2010.
[629] S. T. Dougherty, J.-L. Kim, B. Özkaya, L. Sok, and P. Solé. The combinatorics of
LCD codes: linear programming bound and orthogonal matrices. Internat. J. Inform.
Coding Theory, 4:116–128, 2017.
[630] S. T. Dougherty, J.-L. Kim, and P. Solé. Open problems in coding theory. In S. T.
Dougherty, A. Facchini, A. Leroy, E. Puczylowski, and P. Solé, editors, Noncommu-
tative Rings and Their Applications, volume 634 of Contemp. Math., pages 79–99.
Amer. Math. Soc., Providence, Rhode Island, 2015.
[631] S. T. Dougherty and S. Ling. Cyclic codes over Z4 of even length. Des. Codes
Cryptogr., 39:127–153, 2006.
[632] S. T. Dougherty and H. Liu. Independence of vectors in codes over rings. Des. Codes
Cryptogr., 51:55–68, 2009.
[633] S. T. Dougherty, S. Mesnager, and P. Solé. Secret-sharing schemes based on self-
dual codes. In F. R. Kschischang and E.-H. Yang, editors, Proc. IEEE International
Symposium on Information Theory, pages 338–342, Toronto, Canada, July 2008.
[634] S. T. Dougherty and K. Shiromoto. Maximum distance codes over rings of order 4.
IEEE Trans. Inform. Theory, 47:400–404, 2001.
[635] S. T. Dougherty and K. Shiromoto. Maximum distance codes in Matn,s (Zk ) with
a non-Hamming metric and uniform distributions. Des. Codes Cryptogr., 33:45–61,
2004.
[636] S. T. Dougherty and M. M. Skriganov. MacWilliams duality and the Rosenbloom-
Tsfasman metric. Mosc. Math. J., 2:81–97, 2002.
[644] N. Drucker, S. Gueron, and D. Kostic. QC-MDPC decoders with several shades
of gray. In J. Ding and J.-P. Tillich, editors, Post-Quantum Cryptography, volume
12100 of Lecture Notes in Comput. Sci., pages 35–50. Springer, Berlin, Heidelberg,
2020.
[645] J. Ducoat. Generalized rank weights: a duality statement. In G. Kyureghyan,
G. Mullen, and A. Pott, editors, Topics in Finite Fields, volume 632 of Contemp.
Math., pages 101–109. Amer. Math. Soc., Providence, Rhode Island, 2015.
[646] I. Dumer. Two decoding algorithms for linear codes (in Russian). Problemy Peredači
Informacii, 25(1):24–32, 1989 (English translation in Probl. Inform. Transm.,
25(1):17–23, 1989).
[647] I. Dumer. On minimum distance decoding of linear codes. In Proc. 5th Joint Soviet-
Swedish Workshop on Information Theory, pages 50–52, Moscow, USSR, 1991.
[648] I. Dumer. Concatenated Codes and Their Multilevel Generalizations. In V. S. Pless
and W. C. Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 23,
pages 1911–1988. North-Holland, Amsterdam, 1998.
[649] I. Dumer. Soft-decision decoding of Reed-Muller codes: a simplified algorithm. IEEE
Trans. Inform. Theory, 52:954–963, 2006.
[650] I. Dumer, D. Micciancio, and M. Sudan. Hardness of approximating the minimum
distance of a linear code. IEEE Trans. Inform. Theory, 49:22–37, 2003.
[651] I. Dumer and K. Shabunov. Soft-decision decoding of Reed-Muller codes: recursive
lists. IEEE Trans. Inform. Theory, 52:1260–1266, 2006.
[652] C. F. Dunkl. Discrete quadrature and bounds on t-designs. Michigan Math. J.,
26:81–102, 1979.
[653] N. Durante and A. Siciliano. Non-linear maximum rank distance codes in the cyclic
model for the field reduction of finite geometries. Electron. J. Combin., 24:Paper
2.33, 18, 2017.
[654] I. M. Duursma. Algebraic decoding using special divisors. IEEE Trans. Inform.
Theory, 39:694–698, 1993.
[655] I. M. Duursma and H. Dau. Low bandwidth repair of the RS(10, 4) Reed-Solomon
code. In Proc. Information Theory and Applications Workshop, San Diego, Califor-
nia, 10 pages, February 2017.
[656] I. M. Duursma, R. Kirov, and S. Park. Distance bounds for algebraic geometric
codes. J. Pure Appl. Algebra, 215:1863–1878, 2011.
[657] I. M. Duursma, X. Li, and H. Wang. Multilinear algebra for distributed storage.
arXiv:2006.08911 [cs.IT], June 2020.
[658] I. M. Duursma and S. Park. Coset bounds for algebraic geometric codes. Finite
Fields Appl., 16:36–55, 2010.
[659] Z. Dvir. On the size of Kakeya sets in finite fields. J. Amer. Math. Soc., 22:1093–1097,
2009.
[660] Z. Dvir, S. Kopparty, S. Saraf, and M. Sudan. Extensions to the method of multiplici-
ties, with applications to Kakeya sets and mergers. In Proc. 50th IEEE Symposium on
Foundations of Computer Science, pages 181–190, Atlanta, Georgia, October 2009.
[661] W. Ebeling. Lattices and Codes. Advanced Lectures in Mathematics. Springer Spek-
trum, Wiesbaden, 3rd edition, 2013. A course partially based on lectures by Friedrich
Hirzebruch.
[671] P. Elia, K. R. Kumar, S. A. Pawar, P. V. Kumar, and H.-F. Lu. Explicit space-
time codes achieving the diversity-multiplexing gain tradeoff. IEEE Trans. Inform.
Theory, 52:3869–3884, 2006.
[672] P. Elia, F. Oggier, and P. V. Kumar. Asymptotically optimal cooperative wireless
networks with reduced signaling complexity. IEEE J. Selected Areas Commun.,
25:258–267, 2007.
[673] P. Elia, B. A. Sethuraman, and P. V Kumar. Perfect space-time codes with minimum
and non-minimum delay for any number of antennas. In International Conference
on Wireless Networks, Communications and Mobile Computing, volume 1, pages
722–727. IEEE, Piscataway, New Jersey, 2005.
[674] P. Elias. Coding for noisy channels. IRE Conv. Rec., 4:37–46, 1955.
[675] P. Elias, A. Feinstein, and C. E. Shannon. A note on the maximum flow through a
network. IRE Trans. Inform. Theory, 2:117–119, 1956.
[676] N. D. Elkies. Explicit modular towers. In T. Basar and A. Vardy, editors, Proc.
35th Allerton Conference on Communication, Control, and Computing, pages 23–32,
Monticello, Illinois, September 1997.
[677] N. D. Elkies. Explicit towers of Drinfeld modular curves. In C. Casacuberta,
R. M. Miró-Roig, J. Verdera, and S. Xambó-Descamps, editors, European Congress
of Mathematics, Vol. II (Barcelona, 2000), volume 202 of Progress in Mathematics,
pages 189–198. Birkhäuser, Basel, 2001.
[678] N. D. Elkies. Still better nonlinear codes from modular curves. arXiv:math/0308046
[math.NT], August 2003.
[679] J. S. Ellenberg and D. C. Gijswijt. On large subsets of Fnq with no three-term
arithmetic progression. Ann. of Math. (2), 185:339–343, 2017.
[680] M. Elyasi and S. Mohajer. Determinant coding: a novel framework for exact-repair
regenerating codes. IEEE Trans. Inform. Theory, 62:6683–6697, 2016.
[681] M. Elyasi and S. Mohajer. Cascade codes for distributed storage systems.
arXiv:1901.00911 [cs.IT], January 2019.
[682] K. Engdahl and K. Sh. Zigangirov. To the theory of low-density convolutional codes I
(in Russian). Problemy Peredači Informacii, 35(4):12–28, 1999. (English translation
in Probl. Inform. Transm., 35(4):295–310, 1999).
[683] P. Erdős and Z. Füredi. The greatest angle among n points in the d-dimensional Eu-
clidean space. In Combinatorial Mathematics (Marseille-Luminy, 1981), volume 75
of North-Holland Math. Stud., pages 275–283. North-Holland, Amsterdam, 1983.
[684] T. Ericson and V. A. Zinov’ev. Codes on Euclidean Spheres. North-Holland Mathe-
matical Library. Elsevier Science, Amsterdam, 2001.
[690] T. Etzion, M. Firer, and R. A. Machado. Metrics based on finite directed graphs
and coding invariants. IEEE Trans. Inform. Theory, 64:2398–2409, 2018.
[691] T. Etzion, E. Gorla, A. Ravagnani, and A. Wachter-Zeh. Optimal Ferrers diagram
rank-metric codes. IEEE Trans. Inform. Theory, 62:1616–1630, 2016.
[692] T. Etzion and N. Silberstein. Error-correcting codes in projective spaces via rank-
metric codes and Ferrers diagrams. IEEE Trans. Inform. Theory, 55:2909–2919,
2009.
[693] T. Etzion, A. Trachtenberg, and A. Vardy. Which codes have cycle-free Tanner
graphs? IEEE Trans. Inform. Theory, 45:2173–2181, 1999.
[694] T. Etzion and A. Vardy. Perfect binary codes: constructions, properties and enu-
meration. IEEE Trans. Inform. Theory, 40:754–763, 1994.
[695] T. Etzion and A. Vardy. Error-correcting codes in projective space. IEEE Trans.
Inform. Theory, 57:1165–1173, 2011.
[696] M. F. Ezerman, S. Jitman, H. M. Kiah, and S. Ling. Pure asymmetric quantum MDS
codes from CSS construction: a complete characterization. Internat. J. Quantum Inf.,
11(3):1350027, 2013.
[697] M. F. Ezerman, S. Jitman, S. Ling, and D. V. Pasechnik. CSS-like constructions of
asymmetric quantum codes. IEEE Trans. Inform. Theory, 59:6732–6754, 2013.
[698] M. F. Ezerman, H. T. Lee, S. Ling, K. Nguyen, and H. Wang. A provably secure
group signature scheme from code-based assumptions. In T. Iwata and J. H. Cheon,
editors, Advances in Cryptology – ASIACRYPT 2015, Part 1, volume 9452 of Lecture
Notes in Comput. Sci., pages 260–285. Springer, Berlin, Heidelberg, 2015.
[699] M. F. Ezerman, S. Ling, B. Özkaya, and P. Solé. Good stabilizer codes from quasi-
cyclic codes over F4 and F9 . In Proc. IEEE International Symposium on Information
Theory, pages 2898–2902, Paris, France, July 2019.
[700] M. F. Ezerman, S. Ling, B. Özkaya, and J. Tharnnukhroh. Spectral bounds for quasi-
twisted codes. In Proc. IEEE International Symposium on Information Theory, pages
1922–1926, Paris, France, July 2019.
[701] A. Faldum. Radikalcodes. Diploma Thesis, Mainz, 1993.
[702] G. Falkner, B. Kowol, W. Heise, and E. Zehendner. On the existence of cyclic optimal
codes. Atti Sem. Mat. Fis. Univ. Modena, 28(2):326–341 (1980), 1979.
[703] J. L. Fan. Array codes as low-density parity-check codes. In Proc. 2nd Interna-
tional Symposium on Turbo Codes and Related Topics, pages 543–546, Brest, France,
September 2000.
[704] P. Fan and M. Darnell. Sequence Design for Communications Applications. Commu-
nications Systems, Techniques, and Applications Series. J. Wiley, New York, 1996.
[705] J.-C. Faugère, V. Gauthier-Umaña, A. Otmani, L. Perret, and J.-P. Tillich. A distin-
guisher for high-rate McEliece cryptosystems. IEEE Trans. Inform. Theory, 59:6830–
6844, 2013.
[706] J.-C. Faugère, A. Otmani, L. Perret, and J.-P. Tillich. Algebraic cryptanalysis of
McEliece variants with compact keys. In H. Gilbert, editor, Advances in Cryptology –
EUROCRYPT 2010, volume 6110 of Lecture Notes in Comput. Sci., pages 279–298.
Springer, Berlin, Heidelberg, 2010.
[707] J.-C. Faugère, L. Perret, and F. de Portzamparc. Algebraic attack against variants
of McEliece with Goppa polynomial of a special form. In P. Sarkar and T. Iwata,
editors, Advances in Cryptology – ASIACRYPT 2014, Part 1, volume 8873 of Lecture
Notes in Comput. Sci., pages 21–41. Springer, Berlin, Heidelberg, 2014.
[708] C. Faure and L. Minder. Cryptanalysis of the McEliece cryptosystem over hyperel-
liptic codes. In Proc. 11th International Workshop on Algebraic and Combinatorial
Coding Theory, pages 99–107, Pamporovo, Bulgaria, June 2008.
[709] G. Fazekas and V. I. Levenshtein. On upper bounds for code distance and covering
radius of designs in polynomial metric spaces. J. Combin. Theory Ser. A, 70:267–288,
1995.
[710] J. Feldman. Decoding Error-Correcting Codes via Linear Programming. PhD thesis,
Massachusetts Institute of Technology, 2003.
[715] K. Feng and Z. Ma. A finite Gilbert-Varshamov bound for pure stabilizer quantum
codes. IEEE Trans. Inform. Theory, 50:3323–3325, 2004.
[716] K. Feng, L. Xu, and F. J. Hickernell. Linear error-block codes. Finite Fields Appl.,
12:638–652, 2006.
[717] T. Feng and Q. Xiang. Strongly regular graphs from unions of cyclotomic classes.
J. Combin. Theory Ser. B, 102:982–995, 2012.
[718] C. Fernández-Córdoba, J. Pujol, and M. Villanueva. On rank and kernel of Z4 -
linear codes. In Á. Barbero, editor, Coding Theory and Applications, volume 5228
of Lecture Notes in Comput. Sci., pages 46–55. Springer, Berlin, Heidelberg, 2008.
[723] T. Feulner and G. Nebe. The automorphism group of an extremal [72, 36, 16] code
does not contain Z7 , Z3 × Z3 , or D10 . IEEE Trans. Inform. Theory, 58:6916–6924,
2012.
[724] R. P. Feynman. Simulating physics with computers. Int. J. Theor. Phys., 21:467–488,
1982.
[725] C. M. Fiduccia and Y. Zalcstein. Algebras having linear multiplicative complexities.
J. ACM, 24:311–331, 1977.
[726] F. Fiedler and M. Klin. A strongly regular graph with the parameters
(512, 73, 438, 12, 10) and its dual graph. Preprint MATH-AL-7-1998, Technische Uni-
versität Dresden, 23 pages, July 1998.
[727] J. E. Fields, P. Gaborit, W. C. Huffman, and V. S. Pless. On the classification of
extremal even formally self-dual codes. Des. Codes Cryptogr., 18:125—-148, 1999.
[728] J. E. Fields, P. Gaborit, W. C. Huffman, and V. S. Pless. On the classification of
extremal even formally self-dual codes of lengths 20 and 22. Discrete Appl. Math.,
111:75—-86, 2001.
[729] M. Finiasz, P. Gaborit, and N. Sendrier. Improved fast syndrome based crypto-
graphic hash functions. In V. Rijmen, editor, ECRYPT Hash Workshop, 2007.
[730] M. Finiasz and N. Sendrier. Security bounds for the design of code-based cryptosys-
tems. In M. Matsui, editor, Advances in Cryptology – ASIACRYPT 2009, volume
5912 of Lecture Notes in Comput. Sci., pages 88–105. Springer, Berlin, Heidelberg,
2009.
[731] M. Firer, M. M. S. Alves, J. A. Pinheiro, and L. Panek. Poset Codes: Partial Orders,
Metrics and Coding Theory. SpringerBriefs in Mathematics. Springer, Cham, 2018.
[732] M. Firer and J. L. Walker. Matched metrics and channels. IEEE Trans. Inform.
Theory, 62:1150–1156, 2016.
[733] J.-B. Fischer and J. Stern. An efficient pseudo-random generator provably as secure
as syndrome decoding. In U. Maurer, editor, Advances in Cryptology – EUROCRYPT
’96, volume 1070 of Lecture Notes in Comput. Sci., pages 245–255. Springer, Berlin,
Heidelberg, 1996.
[734] J. L. Fisher and S. K. Sehgal. Principal ideal group rings. Comm. Algebra, 4:319–325,
1976.
[735] N. L. Fogarty. On Skew-Constacyclic Codes. PhD thesis, University of Kentucky,
2016.
[736] N. L. Fogarty and H. Gluesing-Luerssen. A circulant approach to skew-constacyclic
codes. Finite Fields Appl., 35:92–114, 2015.
[737] M. A. Forbes and S. Yekhanin. On the locality of codeword symbols in non-linear
codes. Discrete Math., 324:78–84, 2014.
[738] L. R. Ford, Jr. and D. R. Fulkerson. Maximal flow through a network. Canad. J.
Math., 8:399–404, 1956.
[739] E. Fornasini and G. Marchesini. Structure and properties of two dimensional systems.
In S. G. Tzafestas, editor, Multidimensional Systems, Techniques and Applications,
pages 37–88. CRC Press, Boca Raton, Florida, 1986.
[740] G. D. Forney, Jr. Convolutional codes I: algebraic structure. IEEE Trans. Inform.
Theory, 16:720–738, 1970.
[741] G. D. Forney, Jr. Correction to: “Convolutional codes I: algebraic structure” [IEEE
Trans. Inform. Theory 16:720–738, 1970]. IEEE Trans. Inform. Theory, 17:360,
1971.
[742] G. D. Forney, Jr. Structural analysis of convolutional codes via dual codes. IEEE
Trans. Inform. Theory, 19:512–518, 1973.
[743] G. D. Forney, Jr. Convolutional codes II: maximum-likelihood decoding. Inform.
and Control, 25:222–266, 1974.
[744] G. D. Forney, Jr. Codes on graphs: normal realizations. IEEE Trans. Inform. Theory,
47:520–548, 2001.
[745] G. D. Forney, Jr., R. G. Gallager, G. R. Lang, F. M. Longstaff, and S. U. Qureshi.
Efficient modulation for band-limited channels. IEEE J. Selected Areas Commun.,
2:632–647, 1984.
[746] G. D. Forney, Jr., M. Grassl, and S. Guha. Convolutional and tail-biting quantum
error-correcting codes. IEEE Trans. Inform. Theory, 53:865–880, 2007.
[747] G. D. Forney, Jr. and L.-F. Wei. Multidimensional constellations I: Introduction, fig-
ures of merit, and generalized cross constellations. IEEE J. Selected Areas Commun.,
7:877–892, 1989.
[748] G. J. Foschini and M. J. Gans. On limits of wireless communication in a fading
environment when using multiple antennas. Wireless Personal Communications,
6:311–335, 1998.
[749] D. A. Foulser and M. J. Kallaher. Solvable, flag-transitive, rank 3 collineation groups.
Geom. Dedicata, 7:111–130, 1978.
[750] C. Fragouli and E. Soljanin. Network coding fundamentals. Found. Trends Network-
ing, 2:1–133, 2007.
[751] J. B. Fraleigh. A First Course in Abstract Algebra. Addison-Wesley, New York, 7th
edition, 2003.
[752] P. Frankl and N. Tokushige. Invitation to intersection problems for finite sets. J.
Combin. Theory Ser. A, 144:157–211, 2016.
[753] P. Frankl and R. M. Wilson. The Erdős-Ko-Rado theorem for vector spaces. J.
Combin. Theory Ser. A, 43:228–236, 1986.
[754] H. Fredricksen. Generation of the Ford sequence of length 2n , n large. J. Combina-
torial Theory Ser. A, 12:153–154, 1972.
[755] H. Fredricksen. A survey of full length nonlinear shift register cycle algorithms.
SIAM Rev., 24:195–221, 1982.
[756] H. Fredricksen and I. J. Kessler. An algorithm for generating necklaces of beads in
two colors. Discrete Math., 61:181–188, 1986.
[757] H. Fredricksen and J. Maiorana. Necklaces of beads in k colors and k-ary de Bruijn
sequences. Discrete Math., 23:207–210, 1978.
[758] W. Fulton. Algebraic Curves. Advanced Book Classics. Addison-Wesley Publishing
Company, Advanced Book Program, Redwood City, California, 1989. An introduc-
tion to algebraic geometry. Notes written with the collaboration of Richard Weiss;
reprint of 1969 original.
[759] È. M. Gabidulin. Combinatorial metrics in coding theory. In B. N. Petrov and
F. Csádki, editors, Proc. 2nd IEEE International Symposium on Information The-
ory, Tsahkadsor, Armenia, USSR, September 2-8, 1971, pages 169–176. Akadémiai
Kiadó, Budapest, 1973.
[760] È. M. Gabidulin. Theory of codes with maximum rank distance (in Russian). Prob-
lemy Peredači Informacii, 21(1):3–16, 1985 (English translation in Probl. Inform.
Transm., 21(1):1–12, 1985).
[761] È. M. Gabidulin. Rank q-cyclic and pseudo-q-cyclic codes. In Proc. IEEE Interna-
tional Symposium on Information Theory, pages 2799–2802, Seoul, Korea, June-July
2009.
[762] È. M. Gabidulin. A brief survey of metrics in coding theory. Math. Distances and
Appl., 66:66–84, 2012.
[763] È. M. Gabidulin and M. Bossert. Hard and soft decision decoding of phase ro-
tation invariant block codes. In Proc. International Zurich Seminar on Broadband
Communications: Accessing, Transmission, Networking. (Cat. No.98TH8277), pages
249–251, February 1998.
[764] È. M. Gabidulin and M. Bossert. Codes for network coding. In F. R. Kschischang and
E.-H. Yang, editors, Proc. IEEE International Symposium on Information Theory,
pages 867–870, Toronto, Canada, July 2008.
[765] È. M. Gabidulin and V. A. Obernikhin. Codes in the Vandermonde F-metric and
their application (in Russian). Problemy Peredači Informacii, 39(2):3–14, 2003. (En-
glish translation in Probl. Inform. Transm., 39(2):159–169, 2003).
[766] È. M. Gabidulin, A. V. Paramonov, and O. V. Tretjakov. Ideals over a non-
commutative ring and their application in cryptology. In D. W. Davies, editor,
Advances in Cryptology – EUROCRYPT ’91, volume 547 of Lecture Notes in Com-
put. Sci., pages 482–489. Springer, Berlin, Heidelberg, 1991.
[767] È. M. Gabidulin and J. Simonis. Metrics generated by families of subspaces. IEEE
Trans. Inform. Theory, 44:1336–1341, 1998.
[768] È. M. Gabidulin and J. Simonis. Perfect codes for metrics generated by primitive
2-error-correcting binary BCH codes. In Proc. IEEE International Symposium on
Information Theory, page 68, Cambridge, Massachussets, August 1998.
[769] P. Gaborit. Shorter keys for code based cryptography. In Proc. 4th International
Workshop on Coding and Cryptography, Book of Extended Abstracts, pages 81–91,
Bergen, Norway, March 2005. https://www.unilim.fr/pages\_perso/philippe.
gaborit/shortIC.ps.
[770] P. Gaborit and C. Aguilar-Melchor. Cryptographic method for communicating
confidential information. https://patents.google.com/patent/EP2537284B1/en,
2010.
[771] P. Gaborit and M. Girault. Lightweight code-based identification and signature. In
Proc. IEEE International Symposium on Information Theory, pages 191–195, Nice,
France, June 2007.
[772] P. Gaborit, A. Hauteville, and J.-P. Tillich. RankSynd: a PRNG based on rank
metric. In T. Takagi, editor, Post-Quantum Cryptography, volume 9606 of Lecture
Notes in Comput. Sci., pages 18–28. Springer, Berlin, Heidelberg, 2016.
[773] P. Gaborit, C. Lauradoux, and N. Sendrier. SYND: a fast code-based stream cipher
with a security reduction. In Proc. IEEE International Symposium on Information
Theory, pages 186–190, Nice, France, June 2007.
[774] P. Gaborit, G. Murat, O. Ruatta, and G. Zémor. Low rank parity check codes and
their application to cryptography. In Proc. 8th International Workshop on Coding
and Cryptography, Bergen, Norway, April 2013.
[775] P. Gaborit, O. Ruatta, and J. Schrek. On the complexity of the rank syndrome
decoding problem. IEEE Trans. Inform. Theory, 62:1006–1019, 2016.
[776] P. Gaborit, O. Ruatta, J. Schrek, and G. Zémor. RankSign: an efficient signature
algorithm based on the rank metric. In M. Mosca, editor, Post-Quantum Cryptogra-
phy, volume 8772 of Lecture Notes in Comput. Sci., pages 88–107. Springer, Berlin,
Heidelberg, 2014; extended version at arXiv:1606.00629 [cs.CR].
[777] P. Gaborit and J. Schrek. Efficient code-based one-time signature from automor-
phism groups with syndrome compatibility. In Proc. IEEE International Symposium
on Information Theory, pages 1982–1986, Cambridge, Massachussets, July 2012.
[778] P. Gaborit, J. Schrek, and G. Zémor. Full cryptanalysis of the Chen identification
protocol. In B.-Y. Yang, editor, Post-Quantum Cryptography, volume 7071 of Lecture
Notes in Comput. Sci., pages 35–50. Springer, Berlin, Heidelberg, 2011.
[779] P. Gaborit and G. Zémor. Asymptotic improvement of the Gilbert-Varshamov bound
for linear codes. IEEE Trans. Inform. Theory, 54:3865–3872, 2008.
[780] P. Gaborit and G. Zémor. On the hardness of the decoding and the minimum distance
problems for rank codes. IEEE Trans. Inform. Theory, 62:7245–7252, 2016.
[781] D. Gabric, J. Sawada, A. Williams, and D. Wong. A framework for constructing de
Bruijn sequences via simple successor rules. Discrete Math., 341:2977–2987, 2018.
[782] M. Gadouleau and Z. Yan. MacWilliams identities for the rank metric. In Proc.
IEEE International Symposium on Information Theory, pages 36–40, Nice, France,
June 2007.
[783] M. Gadouleau and Z. Yan. Packing and covering properties of rank metric codes.
IEEE Trans. Inform. Theory, 54:3873–3883, 2008.
[784] C. Galindo, O. Geil, F. Hernando, and D. Ruano. Improved constructions of nested
code pairs. IEEE Trans. Inform. Theory, 64:2444–2459, 2018.
[785] C. Galindo, O. Geil, F. Hernando, and D. Ruano. New binary and ternary LCD
codes. IEEE Trans. Inform. Theory, 65:1008–1016, 2019.
[786] C. Galindo, F. Hernando, and R. Matsumoto. Quasi-cyclic constructions of quantum
codes. Finite Fields Appl., 52:261–280, 2018.
[787] R. G. Gallager. Low Density Parity Check Codes. M.I.T. Press, Cambridge, Mas-
sachusetts, 1963.
[812] I. Gnana Sudha and R. S. Selvaraj. Codes with a pomset metric and constructions.
Des. Codes Cryptogr., 86:875–892, 2018.
[813] C. D. Godsil. Polynomial spaces. Discrete Math., 73:71–88, 1988.
[814] C. D. Godsil. Algebraic Combinatorics. Chapman and Hall Mathematics Series.
Chapman & Hall, New York, 1993.
[815] N. Goela, E. Abbe, and M. Gastpar. Polar codes for broadcast channels. IEEE
Trans. Inform. Theory, 61:758–782, 2015.
[816] J.-M. Goethals. Two dual families of nonlinear binary codes. Electron. Lett., 10:471–
472, 1974.
[817] J.-M. Goethals. The extended Nadler code is unique. IEEE Trans. Information
Theory, 23:132–135, 1977.
[818] J.-M. Goethals and P. Delsarte. On a class of majority-logic decodable cyclic codes.
IEEE Trans. Inform. Theory, 14:182–188, 1968.
[819] J.-M. Goethals and J. J. Seidel. Strongly regular graphs derived from combinatorial
designs. Canad. J. Math., 22:597–614, 1970.
[820] M. J. E. Golay. Notes on digital coding. Proc. IRE, 37:657, 1949. (Also reprinted in
[169] page 13 and [212] page 9).
[821] R. Gold. Optimal binary sequences for spread spectrum multiplexing. IEEE Trans.
Inform. Theory, 13:619–621, 1967.
[822] R. Gold. Maximal recursive sequences with 3-valued recursive cross-correlation func-
tions. IEEE Trans. Inform. Theory, 14:154–156, 1968.
[823] D. Goldin and D. Burshtein. Improved bounds on the finite length scaling of polar
codes. IEEE Trans. Inform. Theory, 60:6966–6978, 2014.
[824] S. W. Golomb. Shift Register Sequences. World Scientific, Hackensack, New Jersey,
3rd edition, 2017.
[825] S. W. Golomb and G. Gong. Signal Design for Good Correlation: For Wireless
Communication, Cryptography, and Radar. Cambridge University Press, Cambridge,
UK, 2005.
[826] S. W. Golomb and E. C. Posner. Rook domains, Latin squares, affine planes, and
error-distributing codes. IEEE Trans. Inform. Theory, 10:196–208, 1964.
[834] V. D. Goppa. A new class of linear correcting codes (in Russian). Problemy
Peredači Informacii, 6(3):24–30, 1970 (English translation in Probl. Inform. Transm.,
6(3):207–212, 1970).
[835] V. D. Goppa. Rational representation of codes and (L, g)-codes (in Russian). Prob-
lemy Peredači Informacii, 7(3):41–49, 1971 (English translation in Probl. Inform.
Transm., 7(3):223–229, 1971).
[836] V. D. Goppa. Codes associated with divisors (in Russian). Problemy Peredači Infor-
macii, 13(1):33–39, 1977 (English translation in Probl. Inform. Transm., 13(1):22–27,
1977).
[837] V. D. Goppa. Codes on algebraic curves (in Russian). Dokl. Akad. Nauk SSSR,
259:1289–1290, 1981.
[838] V. D. Goppa. Algebraic-geometric codes (in Russian). Izv. Akad. Nauk SSSR Ser.
Mat., 46(4):762–781, 896, 1982 (English translation in Mathematics of the USSR-
Izvestiya, 21(1):75–91, 1983).
[839] B. Gordon, W. H. Mills, and L. R. Welch. Some new difference sets. Canadian J.
Math., 14:614–625, 1962.
[840] D. C. Gorenstein and N. Zierler. A class of error-correcting codes in pm symbols. J.
Soc. Indust. Appl. Math., 9:207–214, 1961. (Also reprinted in [169] pages 87–89 and
[212] pages 194–201).
[841] E. Gorla, R. Jurrius, H. H. López, and A. Ravagnani. Rank-metric codes and q-
polymatroids. arXiv:1803.10844 [cs.IT], April 2019.
[842] E. Gorla and A. Ravagnani. Codes Endowed with the Rank Metric. In M. Greferath,
M. Pavčević, N. Silberstein, and M. Vázquez-Castro, editors, Network Coding and
Subspace Designs. Signals and Communication Technology, chapter 1, pages 3–23.
Springer, 2018.
[843] D. E. Gottesman. Stabilizer Codes and Quantum Error Correction. PhD thesis,
California Institute of Technology, 1997.
[844] R. L. Graham and F. J. MacWilliams. On the number of information symbols in
difference-set cyclic codes. Bell System Tech. J., 45:1057–1070, 1966.
[845] M. Grassl. Code tables: Bounds on the parameters of various types of codes. http:
//www.codetables.de.
[846] M. Grassl. Code tables: Bounds on the parameters of various types of codes. http:
//www.codetables.de. Accessed on 2020-07-05.
[847] M. Grassl. Code tables: Bounds on the parameters of various types of codes: Quan-
tum error-correcting codes. http://www.codetables.de. Accessed on 2020-02-20.
[848] M. Grassl. Variations on encoding circuits for stabilizer quantum codes. In Y. M.
Chee, Z. Guo, S. Ling, F. Shao, Y. Tang, H. Wang, and C. Xing, editors, Coding and
Cryptology, volume 6639 of Lecture Notes in Comput. Sci., pages 142–158. Springer,
Berlin, Heidelberg, 2011.
[849] M. Grassl, T. Beth, and M. Rotteler. On optimal quantum codes. Int. J. Quantum
Inform., 2:55–64, 2004.
[850] M. Grassl and M. Rötteler. Quantum MDS codes over small fields. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 1104–1108, Hong Kong, China,
June 2015.
[851] M. Greferath. Cyclic codes over finite rings. Discrete Math., 177:273–277, 1997.
[852] M. Greferath, M. Pavčević, N. Silberstein, and M. Á. Vázquez-Castro, editors.
Network Coding and Subspace Designs. Signals and Communication Technology.
Springer, Cham, 2018.
[853] M. Greferath and S. E. Schmidt. Gray isometries for finite chain rings and a nonlinear
ternary (36, 312 , 15) code. IEEE Trans. Inform. Theory, 45:2522–2524, 1999.
[854] M. Greferath and S. E. Schmidt. Finite-ring combinatorics and MacWilliams’ equiv-
alence theorem. J. Combin. Theory Ser. A, 92:17–28, 2000.
[855] J. H. Griesmer. A bound for error-correcting codes. IBM J. Research Develop.,
4:532–542, 1960.
[856] J. L. Gross and T. W. Tucker. Topological Graph Theory. Dover Publications, Inc.,
Mineola, NY, 2001.
[857] M. Grötschel, L. Lovász, and A. Schrijver. Geometric Algorithms and Combinatorial
Optimization. Springer-Verlag, Berlin, 1988.
[858] L. K. Grover. A fast quantum mechanical algorithm for database search. In Proc. 28th
Annual ACM Symposium on the Theory of Computing, pages 212–219, Phildelphia,
Pennsylvania, May 1996.
[859] K. Guenda, T. A. Gulliver, S. Jitman, and S. Thipworawimon. Linear `-intersection
pairs of codes and their applications. Des. Codes Cryptogr., 88:133–152, 2020.
[860] T. A. Gulliver. A new two-weight code and strongly regular graph. Appl. Math.
Lett., 9(2):17–20, 1996.
[861] T. A. Gulliver. Two new optimal ternary two-weight codes and strongly regular
graphs. Discrete Math., 149:83–92, 1996.
[862] T. A. Gulliver and V. K. Bhargava. Nine good rate (m − 1)/pm quasi-cyclic codes.
IEEE Trans. Inform. Theory, 38:1366–1369, 1992.
[863] T. A. Gulliver and V. K. Bhargava. New good rate (m − 1)/pm ternary and quater-
nary quasi-cyclic codes. Des. Codes Cryptogr., 7:223–233, 1996.
[864] T. A. Gulliver and M. Harada. Classification of extremal double circulant self-dual
codes of lengths 64 to 72. Des. Codes and Cryptogr., 13:257–269, 1998.
[865] T. A. Gulliver and M. Harada. Classification of extremal double circulant self-dual
codes of lengths 74–88. Discrete Math., 306:2064–2072, 2006.
[866] T. A. Gulliver, M. Harada, and H. Miyabayashi. Double circulant and quasi-twisted
self-dual codes over F5 and F7 . Adv. Math. Commun., 1:223–238, 2007.
[867] T. A. Gulliver and P. R. J. Östergård. Binary optimal linear rate 1/2 codes. Discrete
Math., 283:255–261, 2004.
[868] C. Güneri and F. Özbudak. A bound on the minimum distance of quasi-cyclic codes.
SIAM J. Discrete Math., 26:1781–1796, 2012.
[869] C. Güneri and F. Özbudak. The concatenated structure of quasi-cyclic codes and an
improvement of Jensen’s bound. IEEE Trans. Inform. Theory, 59:979–985, 2013.
[870] C. Güneri, B. Özkaya, and S. Sayici. On linear complementary pair of nD cyclic
codes. IEEE Commun. Lett., 22:2404–2406, 2018.
[871] C. Güneri, B. Özkaya, and P. Solé. Quasi-cyclic complementary dual codes. Finite
Fields Appl., 42:67–80, 2016.
[872] C. Güneri, H. Stichtenoth, and İ. Taşkın. Further improvements on the designed
minimum distance of algebraic geometry codes. J. Pure Appl. Algebra, 213:87–97,
2009.
[873] A. Günther and G. Nebe. Automorphisms of doubly even self-dual binary codes.
Bull. Lond. Math. Soc., 41:769–778, 2009.
[874] Q. Guo, T. Johansson, and P. Stankovski. A key recovery attack on MDPC with CCA
security using decoding errors. In J. H. Cheon and T. Takagi, editors, Advances in
Cryptology – ASIACRYPT 2016, Part 1, volume 10031 of Lecture Notes in Comput.
Sci., pages 789–815. Springer, Berlin, Heidelberg, 2009.
[875] Gurobi Optimizer Reference Manual. gurobi.com.
[876] V. Guruswami. List Decoding of Error-Correcting Codes: Winning Thesis of the 2002
ACM Doctoral Dissertation Competition, volume 3282 of Lecture Notes in Comput.
Sci. Springer, Berlin, Heidelberg, 2005.
[877] V. Guruswami and W. Machmouchi. Explicit interleavers for a repeat accumulate
accumulate (RAA) code construction. In F. R. Kschischang and E.-H. Yang, edi-
tors, Proc. IEEE International Symposium on Information Theory, pages 1968–1972,
Toronto, Canada, July 2008.
[878] V. Guruswami and A. Rudra. Explicit codes achieving list decoding capacity: error-
correction with optimal redundancy. IEEE Trans. Inform. Theory, 54:135–150, 2008.
[879] V. Guruswami, A. Rudra, and M. Sudan. Essential Coding Theory. Draft
available at https://cse.buffalo.edu/faculty/atri/courses/coding-theory/
book/web-coding-book.pdf, 2012.
[880] V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraic-
geometry codes. IEEE Trans. Inform. Theory, 45:1757–1767, 1999.
[881] V. Guruswami and C. Wang. Linear-algebraic list decoding for variants of Reed-
Solomon codes. IEEE Trans. Inform. Theory, 59:3257–3268, 2013.
[882] V. Guruswami and M. Wootters. Repairing Reed-Solomon codes. IEEE Trans.
Inform. Theory, 63:5684–5698, 2017.
[883] V. Guruswami and P. Xia. Polar codes: speed of polarization and polynomial gap to
capacity. IEEE Trans. Inform. Theory, 61:3–16, 2015.
[884] L. Guth and N. H. Katz. Algebraic methods in discrete analogs of the Kakeya
problem. Adv. Math., 225:2828–2839, 2010.
[885] L. Guth and N. H. Katz. On the Erdős distinct distances problem in the plane. Ann.
of Math. (2), 181:155–190, 2015.
[886] J. Hagenauer, E. Offer, and L. Papke. Iterative decoding of binary block and con-
volutional codes. IEEE Trans. Inform. Theory, 42:429–445, 1996.
[887] M. Hall, Jr. A survey of difference sets. Proc. Amer. Math. Soc., 7:975–986, 1956.
[888] M. Hall, Jr. Combinatorial Theory. Blaisdell Publishing Company, 1967.
[889] N. Hamada. On the p-rank of the incidence matrix of a balanced or partially balanced
incomplete block design and its application to error correcting codes. Hiroshima
Math. J., 3:154–226, 1973.
[890] N. Hamada and M. Deza. A survey of recent works with respect to a characterization
of an (n, k, d; q)-code meeting the Griesmer bound using a min·hyper in a finite
projective geometry. Discrete Math., 77:75–87, 1989.
[891] N. Hamada and T. Helleseth. Arcs, blocking sets, and minihypers. Comput. Math.
Appl., 39:159–168, 2000.
[892] N. Hamada and H. Ohmori. On the BIB-design having the minimum p-rank. J.
Combin. Theory Ser. A, 18:131–140, 1975.
[893] Y. Hamdaoui and N. Sendrier. A non asymptotic analysis of information set decod-
ing. IACR Cryptology ePrint Archive, Report 2013/162, 2013. https://eprint.
iacr.org/2013/162, 2013.
[894] N. Hamilton. Strongly regular graphs from differences of quadrics. Discrete Math.,
256:465–469, 2002.
[895] R. W. Hamming. Error detecting and error correcting codes. Bell System Tech. J.,
29:10–23, 1950. (Also reprinted in [169] pages 9–12 and [212] pages 10–23).
[896] R. W. Hamming. Coding and Information Theory. Prentice Hall, Englewood Cliffs,
New Jersey, 2nd edition, 1986.
[897] A. R. Hammons and H. El Gamal. On the theory of space-time codes for PSK
modulation. IEEE Trans. Inform. Theory, 46:524–542, 2000.
[898] A. R. Hammons, Jr., P. V. Kumar, A. R. Calderbank, N. J. A. Sloane, and P. Solé.
The Z4 -linearity of Kerdock, Preparata, Goethals, and related codes. IEEE Trans.
Inform. Theory, 40:301–319, 1994.
[899] J. Han and L. A. Lastras-Montano. Reliable memories with subline accesses. In
Proc. IEEE International Symposium on Information Theory, pages 2531–2535, Nice,
France, June 2007.
[900] J. P. Hansen. Codes on the Klein quartic, ideals, and decoding. IEEE Trans. Inform.
Theory, 33:923–925, 1987.
[901] J. P. Hansen. Group Codes on Algebraic Curves. Mathematica Gottingensis, heft 9,
1987.
[902] J. P. Hansen and H. Stichtenoth. Group codes on certain algebraic curves with many
rational points. Appl. Algebra Engrg. Comm. Comput., 1:67–77, 1990.
[903] J. Hao, S. T. Xia, and B. Chen. Some results on optimal locally repairable codes.
In Proc. IEEE International Symposium on Information Theory, pages 440–444,
Barcelona, Spain, July 2016.
[904] M. Harada. The existence of a self-dual [70, 35, 12] code and formally self-dual codes.
Finite Fields Appl., 3:131–139, 1997.
[905] M. Harada, T. A. Gulliver, and H. Kaneta. Classification of extremal double circulant
self-dual codes of length up to 62. Discrete Math., 188:127–136, 1998.
[906] M. Harada, W. H. Holzmann, H. Kharaghani, and M. Khorvash. Extremal ternary
self-dual codes constructed from negacirculant matrices. Graphs Combin., 23:401–
417, 2007.
[907] M. Harada, C. Lam, and V. D. Tonchev. Symmetric (4, 4)-nets and generalized
Hadamard matrices over groups of order 4. Des. Codes Cryptogr., 34:71–87, 2005.
[908] M. Harada and A. Munemasa. Database of self-dual codes. http://www.math.is.
tohoku.ac.jp/~munemasa/selfdualcodes.htm.
[909] M. Harada and A. Munemasa. A quasi-symmetric 2-(49, 9, 6) design. J. Combin.
Des., 10:173–179, 2002.
[910] M. Harada and A. Munemasa. Classification of self-dual codes of length 36. Adv.
Math. Commun., 6:229–235, 2012.
[911] M. Harada, E. Novak, and V. D. Tonchev. The weight distribution of the self-dual
[128, 64] polarity design code. Adv. Math. Commun., 10:643–648, 2016.
[912] M. Harada and P. R. J. Östergård. Classification of extremal formally self-dual even
codes of length 22. Graphs Combin., 18:507–516, 2002.
[913] J. Harshan, E. Viterbo, and J.-C. Belfiore. Practical encoders and decoders for
Euclidean codes from Barnes-Wall lattices. IEEE Trans. Commun., 61:4417–4427,
2013.
[914] C. R. P. Hartmann and K. K. Tzeng. Generalizations of the BCH bound. Inform.
and Control, 20:489–498, 1972.
[915] R. Hartshorne. Algebraic Geometry. Springer-Verlag, New York-Heidelberg, 1977.
Graduate Texts in Mathematics, No. 52.
[916] N. J. A. Harvey, D. R. Karger, and K. Murota. Deterministic network coding by
matrix completion. In Proc. 16th Annual ACM-SIAM Symposium on Discrete Algo-
rithms, pages 489–498, Vancouver, Canada, January 2005.
[917] S. A. Hashemi, C. Condo, and W. J. Gross. Fast and flexible successive-cancellation
list decoders for polar codes. IEEE Trans. Signal Process., 65:5756–5769, 2017.
[918] S. H. Hassani. Polarization and Spatial Coupling: Two Techniques to Boost Perfor-
mance. PhD thesis, École Polytechnique Fédérale de Lausanne, 2013.
[919] S. H. Hassani, K. Alishahi, and R. L. Urbanke. Finite-length scaling for polar codes.
IEEE Trans. Inform. Theory, 60:5875–5898, 2014.
[920] B. Hassibi and B. M. Hochwald. Cayley differential unitary space-time codes. IEEE
Trans. Inform. Theory, 48:1485–1503, 2002.
[921] B. Hassibi and B. M. Hochwald. High-rate codes that are linear in space and time.
IEEE Trans. Inform. Theory, 48:1804–1824, 2002.
[922] B. Hassibi and H. Vikalo. On the sphere decoding algorithm I. Expected complexity.
IEEE Trans. Signal Process., 53:2806–2818, 2005.
[923] J. Håstad. Clique is hard to approximate within n1− . Acta Math., 182:105–142,
1999.
[924] E. R. Hauge and T. Helleseth. De Bruijn sequences, irreducible codes and cyclotomy.
Discrete Math., 159:143–154, 1996.
[925] E. R. Hauge and J. Mykkeltveit. On the classification of de Bruijn sequences. Discrete
Math., 148:65–83, 1996.
[926] K. Haymaker, B. Malmskog, and G. L. Matthews. Locally recoverable codes with
availability t ≥ 2 from fiber products of curves. Adv. Math. Commun., 12:317–336,
2018.
[927] T. Head. Formal language theory and DNA: an analysis of the generative capacity
of specific recombinant behaviors. Bull. Math. Biol., 49:737–759, 1987.
[928] A. S. Hedayat, N. J .A. Sloane, and J. Stufken. Orthogonal Arrays. Springer Nature,
New York, 1999.
[929] O. Heden. A survey of perfect codes. Adv. Math. Commun., 2:223–247, 2008.
[930] O. Heden. On perfect codes over non prime power alphabets. In A. A. Bruen and
D. L. Wehlau, editors, Error-Correcting Codes, Finite Geometries and Cryptography,
volume 523 of Contemp. Math., pages 173–184. Amer. Math. Soc., Providence, Rhode
Island, 2010.
[931] O. Heden and C. Roos. The non-existence of some perfect codes over non-prime
power alphabets. Discrete Math., 311:1344–1348, 2011.
[972] C. Hollanti, J. Lahtonen, and H.-F. Lu. Maximal orders in the design of dense
space-time lattice codes. IEEE Trans. Inform. Theory, 54:4493–4510, 2008.
[973] H. D. L. Hollmann. A relation between Levenshtein-type distances and insertion-and-
deletion correcting capabilities of codes. IEEE Trans. Inform. Theory, 39:1424–1427,
1993.
[974] H. D. L. Hollmann and Q. Xiang. A proof of the Welch and Niho conjectures on
cross-correlations of binary m-sequences. Finite Fields Appl., 7:253–286, 2001.
[975] Y. Hong. On the nonexistence of unknown perfect 6- and 8-codes in Hamming
schemes H(n, q) with q arbitrary. Osaka J. Math., 21:687–700, 1984.
[976] Y. Hong, E. Viterbo, and J.-C. Belfiore. Golden space-time trellis coded modulation.
IEEE Trans. Inform. Theory, 53:1689–1705, 2007.
[977] T. Honold, M. Kiermaier, and S. Kurz. Constructions and bounds for mixed-
dimension subspace codes. Adv. Math. Commun., 10:649–682, 2016.
[978] T. Honold and I. Landjev. Linear representable codes over chain rings. In Proc.
6th International Workshop on Algebraic and Combinatorial Coding Theory, pages
135–141, Pskov, Russia, September 1998.
[979] T. Honold and I. Landjev. Linearly representable codes over chain rings. Abh. Math.
Sem. Univ. Hamburg, 69:187–203, 1999.
[980] T. Honold and I. Landjev. Linear codes over finite chain rings. Electron. J. Combin.,
7:Research Paper 11, 22 pages, 2000.
[981] T. Honold and I. Landjev. Linear codes over finite chain rings and projective Hjelm-
slev geometries. In P. Solé, editor, Codes Over Rings, volume 6 of Series on Coding
Theory and Cryptology, pages 60–123. World Sci. Publ., Hackensack, New Jersey,
2009.
[982] S. Hoory, N. Linial, and A. Wigderson. Expander graphs and their applications.
Bull. Amer. Math. Soc. (N.S.), 43:439–561, 2006.
[983] N. J. Hopper and M. Blum. Secure human identification protocols. In C. Boyd,
editor, Advances in Cryptology – ASIACRYPT 2001, volume 2248 of Lecture Notes
in Comput. Sci., pages 52–66. Springer, Berlin, Heidelberg, 2001.
[984] A.-L. Horlemann-Trautmann and J. Rosenthal. Constructions of constant dimension
codes. In M. Greferath, M. Pavčević, N. Silberstein, and M. Á. Vázquez-Castro, edi-
tors, Network Coding and Subspace Designs. Signals and Communication Technology,
pages 25–42. Springer, Cham, 2018.
[985] A. Hottinen, O. Tirkkonen, and R. Wichman. Multi-Antenna Transceiver Techniques
for 3G and Beyond. John Wiley & Sons, Ltd., Chichester, UK, 2003.
[986] X.-D. Hou. A note on the proof of Niho’s conjecture. SIAM J. Discrete Math.,
18:313–319, 2004.
[987] X.-D. Hou, S. R. López-Permouth, and B. R. Parra-Avila. Rational power series,
sequential codes and periodicity of sequences. J. Pure Appl. Algebra, 213:1157–1169,
2009.
[988] S. K. Houghten. A table of bounds on optimal variable-length binary edit-metric
codes. https://www.cosc.brocku.ca/~houghten/binaryeditvar.html.
[989] S. K. Houghten. A table of bounds on optimal variable-length ternary edit-metric
codes. https://www.cosc.brocku.ca/~houghten/ternaryeditvar.html.
[990] S. K. Houghten, D. Ashlock, and J. Lenarz. Construction of optimal edit met-
ric codes. In Proc. IEEE Information Theory Workshop, pages 259–263, Chengdu,
China, October 2006.
[991] S. K. Houghten, C. W. H. Lam, L. H. Thiel, and J. A. Parker. The extended quadratic
residue code is the only (48, 24, 12) self-dual doubly-even code. IEEE Trans. Inform.
Theory, 49:53–59, 2003.
[992] Y. Hu, Y. Xu, X. Wang, C. Zhan, and P. Li. Cooperative recovery of distributed
storage systems from multiple losses with network coding. IEEE J. Selected Areas
Commun., 28:268–276, 2010.
[993] L. K. Hua. A theorem on matrices over a field and its applications. Acta Math.
Sinica, 1:109–163, 1951.
[994] C. Huang, M. Chen, and J. Li. Pyramid codes: flexible schemes to trade space for
access efficiency in reliable data storage systems. In Proc. 6th IEEE International
Symposium on Network Computing and Applications, pages 79–86, Cambridge, Mas-
sachusetts, July 2007.
[995] C. Huang, H. Simitci, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. Li, and S. Yekhanin.
Erasure coding in Windows Azure Storage. In Proc. USENIX Annual Technical
Conference (ATC), pages 15–26, Boston, Massachusetts, June 2012.
[996] P. Huang, E. Yaakobi, H. Uchikawa, and P. H. Siegel. Cyclic linear binary locally
repairable codes. In Proc. IEEE Information Theory Workshop, pages 259–263,
Jerusalem, Israel, April-May 2015.
[997] K. Huber. Codes over Eisenstein-Jacobi integers. Contemp. Math., 168:165–165,
1994.
[998] K. Huber. Codes over Gaussian integers. IEEE Trans. Inform. Theory, 40:207–216,
1994.
[999] W. C. Huffman. Automorphisms of codes with applications to extremal doubly-even
codes of length 48. IEEE Trans. Inform. Theory, 28:511–521, 1982.
[1000] W. C. Huffman. Decomposing and shortening codes using automorphisms. IEEE
Trans. Inform. Theory, 32:833–836, 1986.
[1001] W. C. Huffman. On extremal self-dual quaternary codes of lengths 18 to 28, I. IEEE
Trans. Inform. Theory, 36:651–660, 1990.
[1002] W. C. Huffman. The automorphism groups of the generalized quadratic residue
codes. IEEE Trans. Inform. Theory, 41:378–386, 1995.
[1007] W. C. Huffman. Self-dual codes over F2 + uF2 with an automorphism of odd order.
Finite Fields Appl., 15:277–293, 2009.
[1008] W. C. Huffman and V. S. Pless. Fundamentals of Error-Correcting Codes. Cambridge
University Press, Cambridge, UK, 2003.
[1009] W. C. Huffman and V. D. Tonchev. The existence of extremal self-dual [50, 25, 10]
codes and quasi-symmetric 2-(49, 9, 6) designs. Des. Codes Cryptogr., 6:97–106, 1995.
[1010] W. C. Huffman and V. Y. Yorgov. A [72, 36, 16] doubly even code does not have an
automorphism of order 11. IEEE Trans. Inform. Theory, 33:749–752, 1987.
[1011] B. L. Hughes. Differential space-time modulation. IEEE Trans. Inform. Theory,
46:2567–2578, 2000.
[1012] G. Hughes. Structure theorems for group ring codes with an application to self-dual
codes. Des. Codes Cryptogr., 24:5–14, 2001.
[1013] B. Huppert and N. Blackburn. Finite Groups II, volume 242 of Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences].
Springer-Verlag, Berlin-New York, 1982.
[1014] R. Hutchinson. The existence of strongly MDS convolutional codes. SIAM J. Control
Optim., 47:2812–2826, 2008.
[1015] R. Hutchinson, J. Rosenthal, and R. Smarandache. Convolutional codes with maxi-
mum distance profile. Systems Control Lett., 54:53–63, 2005.
[1016] J. Y. Hyun and H. K. Kim. The poset structures admitting the extended binary
Hamming code to be a perfect code. Discrete Math., 288:37–47, 2004.
[1017] J. Y. Hyun, H. K. Kim, and J. Rye Park. The weighted poset metrics and directed
graph metrics. arXiv:1703.00139 [math.CO], March 2017.
[1018] J. Y. Hyun, J. Lee, and Y. Lee. Explicit criteria for construction of plateaued
functions. IEEE Trans. Inform. Theory, 62:7555–7565, 2016.
[1019] J. Y. Hyun and Y. Lee. MDS poset-codes satisfying the asymptotic Gilbert-
Varshamov bound in Hamming weights. IEEE Trans. Inform. Theory, 57:8021–8026,
2011.
[1020] IBM ILOG CPLEX Optimization Studio. ibm.com.
[1021] Y. Ihara. Some remarks on the number of rational points of algebraic curves over
finite fields. J. Fac. Sci. Univ. Tokyo Sect. IA Math., 28:721–724 (1982), 1981.
[1022] T. Ikuta and A. Munemasa. A new example of non-amorphous association schemes.
Contrib. Discrete Math., 3(2):31–36, 2008.
[1023] T. Ikuta and A. Munemasa. Pseudocyclic association schemes and strongly regular
graphs. European J. Combin., 31:1513–1519, 2010.
[1024] S. P. Inamdar and N. S. Narasimha Sastry. Codes from Veronese and Segre embed-
dings and Hamada’s formula. J. Combin. Theory Ser. A, 96:20–30, 2001.
[1025] L. Ioffe and M. Mézard. Asymmetric quantum error-correcting codes. Physical
Review A, 75(3):032345, March 2007.
[1026] Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai. Zero-knowledge proofs from
secure multiparty computation. SIAM J. Comput., 39:1121–1152, 2009.
[1027] W. A. Jackson, K. M. Martin, and C. M. O’Keefe. Multi-secret sharing schemes.
In Y. G. Desmedt, editor, Advances in Cryptology – CRYPTO ’94, volume 839 of
Lecture Notes in Comput. Sci., pages 150–163. Springer, Berlin, Heidelberg, 1994.
[1028] N. Jacobson. The Theory of Rings, volume II of Amer. Math. Soc. Mathematical
Surveys. Amer. Math. Soc., New York, 1943.
[1029] N. Jacobson. Finite-Dimensional Division Algebras over Fields. Springer-Verlag,
Berlin, 1996.
[1030] H. Jafarkhani. A quasi-orthogonal space-time block code. IEEE Trans. Commun.,
49:1–4, 2001.
[1031] D. B. Jaffe. Optimal binary linear codes of length ≤ 30. Discrete Math., 223:135–155,
2000.
[1032] D. B. Jaffe and J. Simonis. New binary linear codes which are dual transforms of
good codes. IEEE Trans. Inform. Theory, 45:2136–2137, 1999.
[1033] D. B. Jaffe and V. D. Tonchev. Computing linear codes and unitals. Des. Codes
Cryptogr., 14:39–52, 1998.
[1034] S. Jaggi, P. Sanders, P. A. Chou, M. Effros, S. Egner, K. Jain, and L. M. G. M.
Tolhuizen. Polynomial time algorithms for multicast network code construction.
IEEE Trans. Inform. Theory, 51:1973–1982, 2005.
[1035] Y. Jang and J. Park. On a MacWilliams type identity and a perfectness for a binary
linear (n, n − 1, j)-poset code. Discrete Math., 265:85–104, 2003.
[1036] C. J. A. Jansen, W. G. Franx, and D. E. Boekee. An efficient algorithm for the
generation of de Bruijn cycles. IEEE Trans. Inform. Theory, 37:1475–1478, 1991.
[1037] H. L. Janwa and A. K. Lal. On expander graphs: parameters and applications.
arXiv:cs/0406048 [cs.IT], June 2004.
[1038] H. L. Janwa and O. Moreno. McEliece public key cryptosystems using algebraic-
geometric codes. Des. Codes Cryptogr., 8:293–307, 1996.
[1039] H. L. Janwa and R. M. Wilson. Hyperplane sections of Fermat varieties in P 3
in char. 2 and some applications to cyclic codes. In G. D. Cohen, T. Mora, and
O. Moreno, editors, Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, volume 673 of Lecture Notes in Comput. Sci., pages 180–194. Springer, Berlin,
Heidelberg, 1993.
[1040] J. Jedwab, D. J. Katz, and K.-U. Schmidt. Advances in the merit factor problem
for binary sequences. J. Combin. Theory Ser. A, 120:882–906, 2013.
[1041] S. A. Jennings. The structure of the group ring of a p-group over a modular field.
Trans. Amer. Math. Soc., 50:175–185, 1941.
[1042] J. M. Jensen. The concatenated structure of cyclic and abelian codes. IEEE Trans.
Inform. Theory, 31:788–793, 1985.
[1043] Y. Jia, S. Ling, and C. Xing. On self-dual cyclic codes over finite fields. IEEE Trans.
Inform. Theory, 57:2243–2251, 2011.
[1048] G. R. Jithamitra and B. Sundar Rajan. Minimizing the complexity of fast sphere
decoding of STBCs. In A. Kuleshov, V. M. Blinovsky, and A. Ephremides, editors,
Proc. IEEE International Symposium on Information Theory, pages 1846–1850, St.
Petersburg, Russia, July-August 2011.
[1049] S. Jitman, S. Ling, H. Liu, and X. Xie. Checkable codes from group rings.
arXiv:1012.5498 [cs.IT], December 2010.
[1050] S. Jitman, S. Ling, H. Liu, and X. Xie. Abelian codes in principal ideal group
algebras. IEEE Trans. Inform. Theory, 59:3046–3058, 2013.
[1051] R. Johannesson and K. S. Zigangirov. Fundamentals of Convolutional Coding. IEEE
Series on Digital & Mobile Communication. IEEE Press, New York, 1999.
[1052] S. J. Johnson and S. R. Weller. Regular low-density parity-check codes from combi-
natorial designs. In Proc. IEEE Information Theory Workshop, pages 90–92, Cairns,
Australia, September 2001.
[1053] S. J. Johnson and S. R. Weller. Codes for low-density parity check codes from Kirk-
man triple systems. In Proc. GLOBECOM ’02 – IEEE Global Telecommunications
Conference, volume 2, pages 970–974, Taipei, Taiwan, November 2002.
[1054] S. J. Johnson and S. R. Weller. Codes for iterative decoding from partial geometries.
IEEE Trans. Commun., 52:236–243, 2004.
[1055] G. C. Jorge, A. A. de Andrade, S. I. R. Costa, and J. E. Strapasson. Algebraic
constructions of densest lattices. J. Algebra, 429:218–235, 2015.
[1056] D. Jungnickel. Characterizing geometric designs, II. J. Combin. Theory Ser. A,
118:623–633, 2011.
[1057] D. Jungnickel and A. Pott. Perfect and almost perfect sequences. Discrete Appl.
Math., 95:331–359, 1999.
[1058] D. Jungnickel and V. D. Tonchev. Polarities, quasi-symmetric designs, and Hamada’s
conjecture. Des. Codes Cryptogr., 51:131–140, 2009.
[1059] D. Jungnickel and V. D. Tonchev. The number of designs with geometric parameters
grows exponentially. Des. Codes Cryptogr., 55:131–140, 2010.
[1060] D. Jungnickel and V. D. Tonchev. The classification of antipodal two-weight linear
codes. Finite Fields Appl., 50:372–381, 2018.
[1061] R. Jurrius and R. Pellikaan. On defining generalized rank weights. Adv. Math.
Commun., 11:225–235, 2017.
[1062] R. Jurrius and R. Pellikaan. Defining the q-analogue of a matroid. Electron. J.
Combin., 25(3):Paper 3.2, 32, 2018.
[1063] J. Justesen. A class of constructive asymptotically good algebraic codes. IEEE
Trans. Inform. Theory, 18:652–656, 1972.
[1064] J. Justesen. An algebraic construction of rate 1/v convolutional codes. IEEE Trans.
Inform. Theory, 21:577–580, 1975.
[1065] J. Justesen, K. J. Larsen, H. E. Jensen, A. Havemose, and T. Høholdt. Construction
and decoding of a class of algebraic geometry codes. IEEE Trans. Inform. Theory,
35:811–821, 1989.
[1066] G. A. Kabatianskii, E. A. Krouk, and B. Smeets. A digital signature scheme based
on random error-correcting codes. In M. Darnell, editor, Crytography and Coding,
volume 1355 of Lecture Notes in Comput. Sci., pages 161–167. Springer, Berlin,
Heidelberg, 1997.
[1067] G. A. Kabatianskii and V. I. Levenshtein. On bounds for packings on a sphere
and in space (in Russian). Problemy Peredači Informacii, 14(1):3–25, 1978. (English
translation in Probl. Inform. Transm., 14(1):1–17, 1978).
[1068] G. A. Kabatianskii and V. I. Panchenko. Packings and coverings of the Hamming
space by balls of unit radius (in Russian). Problemy Peredači Informacii, 24(4):3–16,
1988 (English translation in Probl. Inform. Transm., 24(4):261–272, 1988).
[1069] G. Kachigar and J.-P. Tillich. Quantum information set decoding algorithms. In
T. Lange and T. Takagi, editors, Post-Quantum Cryptography, volume 10346 of Lec-
ture Notes in Comput. Sci., pages 69–89. Springer, Berlin, Heidelberg, 2017.
[1070] S. Kadhe and A. R. Calderbank. Rate optimal binary linear locally repairable codes
with small availability. In Proc. IEEE International Symposium on Information
Theory, pages 166–170, Aachen, Germany, June 2017.
[1071] X. Kai, S. Zhu, and P. Li. A construction of new MDS symbol-pair codes. IEEE
Trans. Inform. Theory, 61:5828–5834, 2015.
[1072] X. Kai, S. Zhu, and L. Wang. A family of constacyclic codes over F2 + uF2 + vF2 +
uvF2 . J. Syst. Sci. Complex., 25:1032–1040, 2012.
[1073] T. Kailath. Linear Systems. Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1980.
[1078] W. M. Kantor. Spreads, translation planes and Kerdock sets. II. SIAM J. Algebraic
Discrete Methods, 3:308–318, 1982.
[1079] W. M. Kantor. Exponential numbers of two-weight codes, difference sets and sym-
metric designs. Discrete Math., 46:95–98, 1983.
[1080] W. M. Kantor. On the inequivalence of generalized Preparata codes. IEEE Trans.
Inform. Theory, 29:345–348, 1983.
[1081] P. Kanwar and S. R. López-Permouth. Cyclic codes over the integers modulo pm .
Finite Fields Appl., 3:334–352, 1997.
[1082] A. Karatsuba and Y. Ofman. Multiplication of multi-digit numbers on automata.
Soviet Physics Doklady, 7:595–596, 1963.
[1083] E. D. Karnin, J. W. Greene, and M. E. Hellman. On secret sharing systems. IEEE
Trans. Inform. Theory, 29:35–41, 1983.
[1084] R. Karp, M. G. Luby, and M. A. Shokrollahi. Finite length analysis of LT codes.
In Proc. IEEE International Symposium on Information Theory, page 39, Chicago,
Illinois, June-July 2004.
[1085] M. Karzand and E. E. Telatar. Polar codes for q-ary source coding. In Proc. IEEE In-
ternational Symposium on Information Theory, pages 909–912, Austin, Texas, June
2010.
[1086] T. Kasami. Weight distribution formula for some class of cyclic codes. Technical
Report No. R-285, Coordinated Science Laboratory, University of Illinois at Urbana-
Champaign, 1966.
[1087] T. Kasami. The weight enumerators for several classes of subcodes of the 2nd order
binary Reed-Muller codes. Inform. and Control, 18:369–394, 1971.
[1088] T. Kasami. A Gilbert-Varshamov bound for quasi-cyclic codes of rate 1/2. IEEE
Trans. Inform. Theory, 20:679, 1974.
[1089] T. Kasami, S. Lin, and W. Peterson. New generalizations of the Reed–Muller
codes. Part I: primitive codes. IEEE Trans. Inform. Theory, 14:189–199, 1968. (Also
reprinted in [212] pages 323–333).
[1090] P. Kaski and P. R. J. Östergård. Classification Algorithms for Codes and Designs,
volume 15 of Algorithms and Computation in Mathematics. Springer-Verlag, Berlin,
2006. With 1 DVD-ROM (Windows, Macintosh and UNIX).
[1091] P. Kaski and O. Pottonen. Libexact User’s Guide: Version 1.0. Number 2008-1 in
HIIT technical reports. Helsinki Institute for Information Technology HIIT, Finland,
2008.
[1092] G. L. Katsman and M. A. Tsfasman. A remark on algebraic geometric codes. In
Representation Theory, Group Rings, and Coding Theory, volume 93 of Contemp.
Math., pages 197–199. Amer. Math. Soc., Providence, Rhode Island, 1989.
[1093] D. J. Katz. Sequences with low correlation. In L. Budaghyan and F. Rodrı́guez-
Henrı́quez, editors, Arithmetic of Finite Fields, volume 11321 of Lecture Notes in
Comput. Sci., pages 149–172. Springer, Berlin, Heidelberg, 2018.
[1094] M. L. Kaushik. Necessary and sufficient number of parity checks in codes correcting
random errors and bursts with weight constraints under a new metric. Information
Sciences, 19:81–90, 1979.
[1095] C. A. Kelley. On codes designed via algebraic lifts of graphs. In Proc. 46th Allerton
Conference on Communication, Control, and Computing, pages 1254–1261, Monti-
cello, Illinois, September 2008.
[1096] C. A. Kelley. Minimum distance and pseudodistance lower bound for generalized
LDPC codes. Internat. J. Inform. Coding Theory, 1:313–333, 2010.
[1097] C. A. Kelley. Algebraic design and implementation of protograph codes using non-
commuting permutation matrices. IEEE Trans. Commun., 61:910–918, 2013.
[1103] C. A. Kelley and J. Walker. LDPC codes from voltage graphs. In F. R. Kschischang
and E.-H. Yang, editors, Proc. IEEE International Symposium on Information The-
ory, pages 792–796, Toronto, Canada, July 2008.
[1104] M. G. Kendall. A new measure of rank correlation. Biometrika, 30:81–93, 1938.
[1105] G. Kennedy and V. S. Pless. On designs and formally self-dual codes. Des. Codes
Cryptogr., 4:43—-55, 1994.
[1106] A. Kerber. Applied Finite Group Actions, volume 19 of Algorithms and Combina-
torics. Springer-Verlag, Berlin, 2nd edition, 1999.
[1107] A. M. Kerdock. A class of low-rate nonlinear binary codes. Inform. and Control,
20:182–187, 1972; ibid, 21:395, 1972.
[1108] A. M. Kermarrec, N. L. Scouarnec, and G. Straub. Repairing multiple failures with
coordinated and adaptive regenerating codes. In Proc. International Symposium on
Networking Coding, Beijing, China, 6 pages, July 2011.
[1109] A. Ketkar, A. Klappenecker, S. Kumar, and P. K. Sarvepalli. Nonbinary stabilizer
codes over finite fields. IEEE Trans. Inform. Theory, 52:4892–4914, 2006.
[1110] A. Khaleghi, D. Silva, and F. R. Kschischang. Subspace codes. In M. G. Parker,
editor, Cryptography and Coding, volume 5921 of Lecture Notes in Comput. Sci.,
pages 1–21. Springer, Berlin, Heidelberg, 2009.
[1111] A. Khina, Y. Kochman, and A. Khisti. Decomposing the MIMO wiretap channel.
In Proc. IEEE International Symposium on Information Theory, pages 206–210,
Honolulu, Hawaii, June-July 2014.
[1112] H. M. Kiah, K. H. Leung, and S. Ling. Cyclic codes over GR(p2 , m) of length pk .
Finite Fields Appl., 14:834–846, 2008.
[1113] H. M. Kiah, G. J. Puleo, and O. Milenkovic. Codes for DNA sequence profiles. IEEE
Trans. Inform. Theory, 62:3125–3146, 2016.
[1114] M. Kiermaier, S. Kurz, P. Solé, and A. Wassermann. On strongly walk regular
graphs, triple sum sets and their codes. In preparation, 2020.
[1115] M. Kiermaier and A. Wassermann. Minimum weights and weight enumerators of Z4 -
linear quadratic residue codes. IEEE Trans. Inform. Theory, 58:4870–4883, 2012.
[1116] M. Kiermaier and J. Zwanzger. A Z4 -linear code of high minimum Lee distance
derived from a hyperoval. Adv. Math. Commun., 5:275–286, 2011.
[1117] M. Kiermaier and J. Zwanzger. New ring-linear codes from dualization in projective
Hjelmslev geometries. Des. Codes Cryptogr., 66:39–55, 2013.
[1118] H. K. Kim and D. S. Krotov. The poset metrics that allow binary codes of codi-
mension m to be m, (m − 1), or (m − 2)-perfect. IEEE Trans. Inform. Theory,
54:5241–5246, 2008.
[1119] J.-L. Kim. New extremal self-dual codes of lengths 36, 38 and 58. IEEE Trans.
Inform. Theory, 47:1575–1580, 2001.
[1120] J.-L. Kim and N. Lee. Secret sharing schemes based on additive codes over GF(4).
Appl. Algebra Engrg. Comm. Comput., 28:79–97, 2017.
[1121] J.-L. Kim, U. Peled, I. Perepelitsa, V. S. Pless, and S. Friedland. Explicit construction
of families of LDPC codes with no 4-cycles. IEEE Trans. Inform. Theory, 50:2378–
2388, 2004.
[1122] T. Kiran and B. S. Rajan. STBC-schemes with non-vanishing determinant for certain
number of transmit antennas. IEEE Trans. Inform. Theory, 51:2984–2992, 2005.
[1123] T. Kiran and B. S. Rajan. Distributed space-time codes with reduced decoding
complexity. In Proc. IEEE International Symposium on Information Theory, pages
542–546, Seattle, Washington, July 2006.
[1124] C. Kirfel and R. Pellikaan. The minimum distance of codes in an array coming from
telescopic semigroups. IEEE Trans. Inform. Theory, 41:1720–1732, 1995.
[1125] A. Y. Kitaev. Fault-tolerant quantum computation by anyons. Ann. Physics, 303:2–
30, 2003.
[1126] B. Kitchens. Symbolic dynamics and convolutional codes. In Codes, Systems, and
Graphical Models (Minneapolis, MN, 1999), volume 123 of IMA Vol. Math. Appl.,
pages 347–360. Springer, New York, 2001.
[1127] E. Kleinfeld. Finite Hjelmslev planes. Illinois J. Math., 3:403–407, 1959.
[1128] T. Kløve. Error Correction Codes for the Asymmetric Channel. Department of
Informatics, University of Bergen, Norway, 1983, bibliography updated 1995.
[1129] W. Knapp and P. Schmid. Codes with prescribed permutation group. J. Algebra,
67:415–435, 1980.
[1130] E. Knill and R. Laflamme. Theory of quantum error-correcting codes. Physical
Review A, 55:900–911, February 1997.
[1131] E. Knill, R. Laflamme, and W. H. Zurek. Resilient quantum computation. Science,
279(5349):342–345, 1998.
[1132] D. E. Knuth. The Art of Computer Programming. Volume 4A: Combinatorial Algo-
rithms, Part 1. Addison-Wesley Professional, 2011.
[1133] D. E. Knuth. The Art of Computer Programming. Volume 4. Fascicle 5: Mathemat-
ical Preliminaries Redux; Introduction to Backtracking; Dancing Links. Addison-
Wesley, 2015.
[1134] D. E. Knuth. The Art of Computer Programming. Volume 4: Satisfiability. Addison-
Wesley Professional, 2015.
[1135] A. Kohnert. Update on the extension of good linear codes. In Combinatorics 2006,
volume 26 of Electron. Notes Discrete Math., pages 81–85. Elsevier Sci. B. V., Am-
sterdam, 2006.
[1136] A. Kohnert. Constructing two-weight codes with prescribed groups of automor-
phisms. Discrete Appl. Math., 155:1451–1457, 2007.
[1137] A. Kohnert. Construction of linear codes having prescribed primal-dual minimum
distance with applications in cryptography. Albanian J. Math., 2:221–227, 2008.
[1138] A. Kohnert. (l, s)-extension of linear codes. Discrete Math., 309:412–417, 2009.
[1139] A. Kohnert and S. Kurz. Construction of large constant dimension codes with a
prescribed minimum distance. In J. Calmet, W. Geiselmann, and J. Müller-Quade,
editors, Mathematical Methods in Computer Science: Essays in Memory of Thomas
Beth, volume 5393 of Lecture Notes in Comput. Sci., pages 31–42. Springer, Berlin,
Heidelberg, 2008.
[1140] A. Kohnert and A. Wassermann. Construction of binary and ternary self-orthogonal
linear codes. Discrete Appl. Math., 157:2118–2123, 2009.
[1141] A. Kohnert and J. Zwanzger. New linear codes with prescribed group of automor-
phisms found by heuristic search. Adv. Math. Commun., 3:157–166, 2009.
[1142] J. I. Kokkala, D. S. Krotov, and P. R. J. Östergård. On the classification of MDS
codes. IEEE Trans. Inform. Theory, 61:6485–6492, 2015.
[1143] J. I. Kokkala and P. R. J. Östergård. Further results on the classification of MDS
codes. Adv. Math. Commun., 10:489–498, 2016.
[1144] D. König. Graphok és matrixok. Mat. Fiz. Lapok, 38:115–119, 1931.
[1145] S. Kopparty. List-decoding multiplicity codes. In Electronic Colloquium on Compu-
tational Complexity (ECCC), volume 19, Report No. 44, 26 pages, 2012.
[1146] S. Kopparty, V. F. Lev, S. Saraf, and M. Sudan. Kakeya-type sets in finite vector
spaces. J. Algebraic Combin., 34:337–355, 2011.
[1147] S. Kopparty, N. Ron-Zewi, S. Saraf, and M. Wootters. Improved decoding of folded
Reed-Solomon and multiplicity codes. In M. Thorup, editor, Proc. 59th IEEE Sym-
posium on Foundations of Computer Science, pages 212–223, Paris, France, October
2018.
[1148] S. B. Korada. Polar Codes for Channel and Source Coding. PhD thesis, École
Polytechnique Fédérale de Lausanne, 2009.
[1149] S. B. Korada, E. Şaşoğlu, and R. L. Urbanke. Polar codes: characterization of expo-
nent, bounds, and constructions. arXiv:0901.0536 [cs.IT], January 2009.
[1150] S. B. Korada, E. Şaşoğlu, and R. L. Urbanke. Polar codes: characterization of expo-
nent, bounds, and constructions. IEEE Trans. Inform. Theory, 56:6253–6264, 2010.
[1151] S. B. Korada, A. Montanari, E. Telatar, and R. L. Urbanke. An empirical scaling
law for polar codes. In Proc. IEEE International Symposium on Information Theory,
pages 884–888, Austin, Texas, June 2010.
[1152] S. B. Korada and R. L. Urbanke. Polar codes are optimal for lossy source coding.
IEEE Trans. Inform. Theory, 56:1751–1768, 2010.
[1153] W. Kositwattanarerk and F. Oggier. Connections between Construction D and re-
lated constructions of lattices. Des. Codes Cryptogr., 73:441–455, 2014.
[1154] W. Kositwattanarerk, S. S. Ong, and F. Oggier. Construction A of lattices over
number fields and block fading (wiretap) coding. IEEE Trans. Inform. Theory,
61:2273–2282, 2015.
[1155] R. Kötter. A unified description of an error locating procedure for linear codes. In
D. Yorgov, editor, Proc. 3rd International Workshop on Algebraic and Combinatorial
Coding Theory, pages 113–117, Voneshta Voda, Bulgaria, June 1992. Hermes.
[1156] R. Kötter and F. R. Kschischang. Coding for errors and erasures in random network
coding. IEEE Trans. Inform. Theory, 54:3579–3591, 2008.
[1157] R. Kötter and M. Médard. An algebraic approach to network coding. IEEE/ACM
Trans. Networking, 11:782–795, 2003.
[1158] R. Kötter and P. O. Vontobel. Graph covers and iterative decoding of finite-length
codes. In Proc. 3rd International Symposium on Turbo Codes and Related Topics,
pages 75–82, Brest, France, September 2003.
[1159] Y. Kou, Lin. S., and M. P. C. Fossorier. Low-density parity-check codes based on
finite geometries: a rediscovery and more. IEEE Trans. Inform. Theory, 47:2711–
2736, 2001.
[1160] I. Kra and S. R. Simanca. On circulant matrices. Notices Amer. Math. Soc.,
59(3):368–377, 2012.
[1161] E. S. Kramer and D. M. Mesner. t-designs on hypergraphs. Discrete Math., 15:263–
296, 1976.
[1162] D. L. Kreher and D. R. Stinson. Combinatorial Algorithms: Generation, Enumera-
tion, and Search. CRC Press, Boca Raton, Florida, 1999.
[1163] E. I. Krengel and P. V. Ivanov. Two constructions of binary sequences with optimal
autocorrelation magnitude. Electron. Lett., 52:1457–1459, 2016.
[1164] M. N. Krishnan and P. V. Kumar. On MBR codes with replication. In Proc. IEEE
International Symposium on Information Theory, pages 71–75, Barcelona, Spain,
July 2016.
[1165] M. N. Krishnan, M. Vajha, V. Ramkumar, B. Sasidharan, S. B. Balaji, and P. V.
Kumar. Erasure coding for big data. Advanced Computing and Communications
(ACCS), 3(1):6 pages, 2019.
[1166] D. S. Krotov, P. R. J. Östergård, and O. Pottonen. On optimal binary one-error-
correcting codes of lengths 2m −4 and 2m −3. IEEE Trans. Inform. Theory, 57:6771–
6779, 2011.
[1167] E. A. Krouk. Decoding complexity bound for linear block codes (in Russian). Prob-
lemy Peredači Informacii, 25(3):103–107, 1989 (English translation in Probl. Inform.
Transm., 25(3):251–254, 1989).
[1168] V. Krčadinac. Steiner 2-designs S(2, 4, 28) with nontrivial automorphisms. Glasnik
Matematički, 37:259–268, 2002.
[1169] F. R. Kschischang. An introduction to network coding. In M. Médard and
A. Sprintson, editors, Network Coding: Fundamentals and Applications, chapter 1.
Academic Press, Waltham, Massachusetts, 2012.
[1170] F. R. Kschischang, B. Frey, and H.-A. Loeliger. Factor graphs and the sum-product
algorithm. IEEE Trans. Inform. Theory, 47:498–519, 2001.
[1171] A. Kshevetskiy and È. M. Gabidulin. The new construction of rank codes. In Proc.
IEEE International Symposium on Information Theory, pages 2105–2108, Adelaide,
Australia, September 2005.
[1172] S. Kudekar, T. J. Richardson, and R. L. Urbanke. Threshold saturation via spatial
coupling: why convolutional LDPC ensembles perform so well over the BEC. IEEE
Trans. Inform. Theory, 57:803–834, 2011.
[1173] S. Kudekar, T. J. Richardson, and R. L. Urbanke. Spatially coupled ensembles
universally achieve capacity under belief propagation. IEEE Trans. Inform. Theory,
59:7761–7783, 2013.
[1174] K. R. Kumar and G. Caire. Construction of structured LaST codes. In Proc. IEEE
International Symposium on Information Theory, pages 2834–2838, Seattle, Wash-
ington, July 2006.
[1175] N. Kumar and A. K. Singh. DNA computing over the ring Z4 [v]/hv 2 − vi. Internat.
J. Biomath., 11(7):1850090, 18, 2018.
[1176] P. V. Kumar, R. A. Scholtz, and L. R. Welch. Generalized bent functions and their
properties. J. Combin. Theory Ser. A, 40:90–107, 1985.
[1177] S.-Y. Kung, B. C. Lévy, M. Morf, and T. Kailath. New results in 2-D systems
theory, part II: 2-D state-space models—realization and the notions of controllability,
observability, and minimality. Proc. of IEEE, 65:945–961, 1977.
[1182] G. B. Kyung and C. C. Wang. Finding the exhaustive list of small fully absorbing
sets and designing the corresponding low error-floor decoder. IEEE Trans. Commun.,
60:1487–1498, 2012.
[1183] G. G. La Guardia. Asymmetric quantum codes: new codes from old. Quantum
Inform. Process., 12:2771–2790, 2013.
[1184] G. G. La Guardia. Erratum to: Asymmetric quantum codes: new codes from old.
Quantum Inform. Process., 12:2791, 2013.
[1185] H. Laakso. Nonexistence of nontrivial perfect codes in the case q = pa1 pb2 pc3 , e ≥ 3.
Ann. Univ. Turku. Ser. A I, 177, 43 pages, 1979. Dissertation, University of Turku,
Turku, 1979.
[1227] V. I. Levenshtein. Bounds for packings in metric spaces and certain applications (in
Russian). Probl. Kibernet., 40:44–110, 1983.
[1228] V. I. Levenshtein. Designs as maximum codes in polynomial metric spaces. Acta
Appl. Math., 29:1–82, 1992.
[1229] V. I. Levenshtein. Krawtchouk polynomials and universal bounds for codes and
designs in Hamming spaces. IEEE Trans. Inform. Theory, 41:1303–1321, 1995.
[1230] V. I. Levenshtein. Universal Bounds for Codes and Designs. In V. S. Pless and W. C.
Huffman, editors, Handbook of Coding Theory, Vol. I, II, chapter 6, pages 499–648.
North-Holland, Amsterdam, 1998.
[1231] V. I. Levenshtein. Equivalence of Delsarte’s bounds for codes and designs in sym-
metric association schemes, and some applications. Discrete Math., 197/198:515–536,
1999.
[1232] V. I. Levenshtein. New lower bounds on aperiodic crosscorrelation of binary codes.
IEEE Trans. Inform. Theory, 45:284–288, 1999.
[1233] V. I. Levenshtein. Bounds for deletion/insertion correcting codes. In Proc. IEEE
International Symposium on Information Theory, page 370, Lausanne, Switzerland,
June-July 2002.
[1234] B. C. Lévy. 2-D Polynomial and Rational Matrices, and their Applications for the
Modeling of 2-D Dynamical Systems. PhD thesis, Standford University, 1981.
[1235] B. Li, H. Shen, and D. Tse. An adaptive successive cancellation list decoder for polar
codes with cyclic redundancy check. IEEE Commun. Letters, 16:2044–2047, 2012.
[1236] C. Li, C. Ding, and S. Li. LCD cyclic codes over finite fields. IEEE Trans. Inform.
Theory, 63:4344–4356, 2017.
[1237] C. Li and Q. Yue. The Walsh transform of a class of monomial functions and cyclic
codes. Cryptogr. Commun., 7:217–228, 2015.
[1238] C. Li, X. Zeng, T. Helleseth, C. Li, and L. Hu. The properties of a class of linear
FSRs and their applications to the construction of nonlinear FSRs. IEEE Trans.
Inform. Theory, 60:3052–3061, 2014.
[1239] C. Li, X. Zeng, C. Li, and T. Helleseth. A class of de Bruijn sequences. IEEE Trans.
Inform. Theory, 60:7955–7969, 2014.
[1240] C. Li, X. Zeng, C. Li, T. Helleseth, and M. Li. Construction of de Bruijn sequences
from LFSRs with reducible characteristic polynomials. IEEE Trans. Inform. Theory,
62:610–624, 2016.
[1241] J. Li and B. Li. Erasure coding for cloud storage systems: a survey. Tsinghua Science
and Technology, 18:259–272, 2013.
[1242] J. Li and X. Tang. A systematic construction of MDS codes with small sub-
packetization level and near optimal repair bandwidth. arXiv:1901.08254 [cs.IT],
January 2019.
[1243] J. Li, X. Tang, and C. Tian. A generic transformation to enable optimal repair in
MDS codes for distributed storage systems. IEEE Trans. Inform. Theory, 64:6257–
6267, 2018.
[1244] M. Li and D. Lin. De Bruijn sequences, adjacency graphs, and cyclotomy. IEEE
Trans. Inform. Theory, 64:2941–2952, 2018.
[1244a] N. Li and S. Mesnager. Recent results and problems on constructions of linear codes
from cryptographic functions. Cryptogr. Commun., 12:965–986, 2020.
[1245] S. Li. The minimum distance of some narrow-sense primitive BCH codes. SIAM J.
Discrete Math., 31:2530–2569, 2017.
[1246] S. Li, C. Ding, M. Xiong, and G. Ge. Narrow-sense BCH codes over GF(q) with
m
−1
length n = qq−1 . IEEE Trans. Inform. Theory, 63:7219–7236, 2017.
[1247] S. Li, C. Li, C. Ding, and H. Liu. Two families of LCD BCH codes. IEEE Trans.
Inform. Theory, 63:5699–5717, 2017.
[1248] S.-Y. R. Li, R. W. Yeung, and N. Cai. Linear network coding. IEEE Trans. Inform.
Theory, 49:371–381, 2003.
[1249] X.-B. Liang. Orthogonal designs with maximal rates. IEEE Trans. Inform. Theory,
49:2468–2503, 2003.
[1250] X.-B. Liang and X.-G. Xia. Unitary signal constellations for differential space-time
modulation with two transmit antennas: parametric codes, optimal designs, and
bounds. IEEE Trans. Inform. Theory, 48:2291–2322, 2002.
[1251] H. Liao and X.-G. Xia. Some designs of full rate space-time codes with nonvanishing
determinant. IEEE Trans. Inform. Theory, 53:2898–2908, 2007.
[1252] D. A. Lidar and T. A. Brun, editors. Quantum Error Correction. Cambridge Uni-
versity Press, Cambridge, UK, 2013.
[1253] R. Lidl, G. L. Mullen, and G. Turnwald. Dickson Polynomials, volume 65 of Pitman
Monographs and Surveys in Pure and Applied Mathematics. Longman Scientific &
Technical, Harlow; copublished in the United States with John Wiley & Sons, Inc.,
New York, 1993.
[1256] M. W. Liebeck. The affine permutation groups of rank three. Proc. London Math.
Soc. (3), 54:477–516, 1987.
[1257] D. Liebhold, G. Nebe, and M. Á. Vázquez-Castro. Generalizing subspace codes
to flag codes using group actions. In M. Greferath, M. Pavčević, N. Silberstein,
and M. Á. Vázquez-Castro, editors, Network Coding and Subspace Designs. Signals
and Communication Technology, Signals Commun. Technol., pages 67–89. Springer,
Cham, 2018.
[1258] D. J. Lin and B. Bose. On the maximality of the group theoretic single error correct-
ing and all unidirectional error detecting (SEC-AUED) codes. In R. M. Capocelli,
editor, Sequences: Combinatorics, Compression, Security, and Transmission, pages
506–529. Springer-Verlag, New York, 1990.
[1259] H.-P. Lin, S. Lin, and K. A. S. Abdel-Ghaffar. Linear and nonlinear binary kernels
of polar codes of small dimensions with maximum exponents. IEEE Trans. Inform.
Theory, 61:5253–5270, 2015.
[1260] S. Lin and D. J. Costello, Jr. Error Control Coding: Fundamentals and Applications.
Prentice-Hall, Upper Saddle River, New Jersey, 2nd edition, 2004.
[1261] S. Lin, Q. Diao, and I. F. Blake. Error floors and finite geometries. In Proc. 8th In-
ternational Symposium on Turbo Codes and Iterative Information Processing, pages
42–46, Bremen, Germany, August 2014.
[1262] S. Lin and E. J. Weldon, Jr. Long BCH codes are bad. Inform. and Control, 11:445–
451, 1967.
[1263] S.-J. Lin and W. Chung. Novel repair-by-transfer codes and systematic exact-MBR
codes with lower complexities and smaller field sizes. IEEE Trans. Parallel Distrib.
Syst., 25:3232–3241, 2014.
[1264] D. Lind and B. Marcus. An Introduction to Symbolic Dynamics and Coding. Cam-
bridge University Press, Cambridge, UK, 1995.
[1265] B. Lindström. On group and nongroup perfect codes in q symbols. Math. Scand.,
25:149–158, 1969.
[1266] C. Ling, L. Luzzi, J.-C. Belfiore, and D. Stehlé. Semantically secure lattice codes for
the Gaussian wiretap channel. IEEE Trans. Inform. Theory, 60:6399–6416, 2014.
[1267] S. Ling, J. Luo, and C. Xing. Generalization of Steane’s enlargement construction of
quantum codes and applications. IEEE Trans. Inform. Theory, 56:4080–4084, 2010.
[1268] S. Ling, H. Niederreiter, and P. Solé. On the algebraic structure of quasi-cyclic codes
IV: repeated roots. Des. Codes Cryptogr., 38:337–361, 2006.
[1269] S. Ling and P. Solé. On the algebraic structure of quasi-cyclic codes I: finite fields.
IEEE Trans. Inform. Theory, 47:2751–2760, 2001.
[1270] S. Ling and P. Solé. Good self-dual quasi-cyclic codes exist. IEEE Trans. Inform.
Theory, 49:1052–1053, 2003.
[1271] S. Ling and P. Solé. On the algebraic structure of quasi-cyclic codes II: chain rings.
Des. Codes Cryptogr., 30:113–130, 2003.
[1272] S. Ling and P. Solé. On the algebraic structure of quasi-cyclic codes III: generator
theory. IEEE Trans. Inform. Theory, 51:2692–2700, 2005.
[1273] P. Lisoněk and V. Singh. Quantum codes from nearly self-orthogonal quaternary
linear codes. Des. Codes Cryptogr., 73:417–424, 2014.
[1274] B. Litjens. Semidefinite bounds for mixed binary/ternary codes. Discrete Math.,
341:1740–1748, 2018.
[1275] B. Litjens, S. Polak, and A. Schrijver. Semidefinite bounds for nonbinary codes based
on quadruples. Des. Codes Cryptogr., 84:87–100, 2017.
[1276] J. B. Little. Algebraic geometry codes from higher dimensional varieties. In
E. Martı́nez-Moro, C. Munuera, and D. Ruano, editors, Advances in Algebraic Ge-
ometry Codes, volume 5 of Ser. Coding Theory Cryptol., pages 257–293. World Sci.
Publ., Hackensack, New Jersey, 2008.
[1277] H. Liu, C. Ding, and C. Li. Dimensions of three types of BCH codes over GF(q).
Discrete Math., 340:1910–1927, 2017.
[1278] H. Liu, Y. Li, L. Ma, and J. Chen. On the smallest absorbing sets of LDPC codes
from finite planes. IEEE Trans. Inform. Theory, 58:4014–4020, 2012.
[1279] H. Liu and Y. Maouche. Two or few-weight trace codes over Fq + uFq . IEEE Trans.
Inform. Theory, 65:2696–2703, 2019.
[1280] J. Liu, S. Mesnager, and L. Chen. New constructions of optimal locally recoverable
codes via good polynomials. IEEE Trans. Inform. Theory, 64:889–899, 2018.
[1281] J. Liu, S. Mesnager, and D. Tang. Constructions of optimal locally recoverable codes
via Dickson polynomials. Des. Codes Cryptogr., 88:1759–1780, 2020.
[1282] S. Liu, F. Manganiello, and F. R. Kschischang. Construction and decoding of gen-
eralized skew-evaluation codes. In Proc. 14th Canadian Workshop on Information
Theory, pages 9–13, St. John’s, Canada, July 2015.
[1283] S. Liu and F. Oggier. An overview of coding for distributed storage systems. In
Network Coding and Subspace Designs, Signals Commun. Technol., pages 363–383.
Springer, Cham, 2018.
[1284] Z. Liu and D. A. Pados. LDPC codes from generalized polygons. IEEE Trans.
Inform. Theory, 51:3890–3898, 2005.
[1285] P. Loidreau. Étude et optimisation de cryptosystèmes à clé publique fondés sur la
théorie des codes correcteurs. PhD thesis, École Polytechnique, Paris, 2001.
[1286] B. Long, P. Zhang, and J. Hu. A generalized QS-CDMA system and the design of
new spreading codes. IEEE Trans. Vehicular Tech., 47:1268–1275, 1998.
[1287] S. R. López-Permouth, B. R. Parra-Avila, and S. Szabo. Dual generalizations of the
concept of cyclicity of codes. Adv. Math. Commun., 3:227–234, 2009.
[1288] L. Lovász. On the Shannon capacity of a graph. IEEE Trans. Inform. Theory,
25:1–7, 1979.
[1289] H.-F. Lu and P. V. Kumar. A unified construction of space-time codes with optimal
rate-diversity tradeoff. IEEE Trans. Inform. Theory, 51:1709–1730, 2005.
[1290] J. Lu, J. Harshan, and F. Oggier. Performance of lattice coset codes on Universal
Software Radio Peripherals. Physical Commun., 24:94–102, 2017.
[1291] A. Lubotzky, R. Phillips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8:261–
277, 1988.
[1292] M. G. Luby. LT codes. In Proc. 43rd Annual IEEE Symposium on Foundations of
Computer Science, pages 271–280, Vancouver, Canada, November 2002.
[1293] M. G. Luby and M. Mitzenmacher. Verification-based decoding for packet-based
low-density parity-check codes. IEEE Trans. Inform. Theory, 51:120–127, 2005.
[1294] M. G. Luby, M. Mitzenmacher, and M. A. Shokrollahi. Analysis of random processes
via And-Or tree evaluation. In Proc. 9th Annual ACM-SIAM Symposium on Discrete
Algorithms, pages 364–373, San Francisco, California, January 1998. ACM Press,
New York.
[1295] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Speileman, and V. Stenman.
Practical loss-resilient codes. In Proc. 29th Annual ACM Symposium on the Theory
of Computing, pages 150–159, El Paso, Texas, May 1997. ACM Press, New York.
[1296] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Speilman. Improved
low-density parity-check codes using irregular graphs. IEEE Trans. Inform. Theory,
47:585–598, 2001.
[1297] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Analysis of
low density codes and improved designs using irregular graphs. In Proc. 30th Annual
ACM Symposium on the Theory of Computing, pages 249–258, Dallas, Texas, May
1998. ACM Press, New York.
[1298] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Efficient
erasure correcting codes. IEEE Trans. Inform. Theory, 47:569–584, 2001.
[1299] M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, and D. A. Spielman. Improved
low-density parity-check codes using irregular graphs. IEEE Trans. Inform. Theory,
47:585–598, 2001.
[1300] H. D. Lüke and H. D. Schotten. Odd-perfect, almost binary correlation sequences.
IEEE Trans. Aerospace and Electronic Systems, 31:495–498, 1995.
[1301] H. D. Lüke, H. D. Schotten, and H. Hadinejad-Mahram. Generalised Sidelńikov
sequences with optimal autocorrelation properties. Electron. Lett., 36:525–527, 2000.
[1302] H. D. Lüke, H. D. Schotten, and H. Hadinejad-Mahram. Binary and quadriphase
sequences with optimal autocorrelation properties: a survey. IEEE Trans. Inform.
Theory, 49:3271–3282, 2003.
[1303] G. Lunardon, R. Trombetti, and Y. Zhou. Generalized twisted Gabidulin codes. J.
Combin. Theory Ser. A, 159:79–106, 2018.
[1304] B. Lundell and J. McCullough. A generalized floor bound for the minimum distance
of geometric Goppa codes. J. Pure Appl. Algebra, 207:155–164, 2006.
[1305] H. Lüneburg. Gray-codes. Abh. Math. Sem. Univ. Hamburg, 52:208–227, 1982.
[1306] G. Luo and X. Cao. A construction of linear codes and strongly regular graphs from
q-polynomials. Discrete Math., 340:2262–2274, 2017.
[1307] G. Luo and X. Cao. Five classes of optimal two-weight linear codes. Cryptogr.
Commun., 10:1119–1135, 2018.
[1308] G. Luo, X. Cao, G. Xu, and S. Xu. A new class of optimal linear codes with flexible
parameters. Discrete Appl. Math., 237:126–131, 2018.
[1309] L. Luzzi, G. R.-B. Othman, J.-C. Belfiore, and E. Viterbo. Golden space-time block
coded modulation. IEEE Trans. Inform. Theory, 55:584–597, 2009.
[1310] V. Lyubashevsky. Lattice signatures without trapdoors. In D. Pointcheval and
T. Johansson, editors, Advances in Cryptology – EUROCRYPT 2012, volume 7237
of Lecture Notes in Comput. Sci., pages 738–755. Springer, Berlin, Heidelberg, 2012.
[1311] G. Maatouk and M. A. Shokrollahi. Analysis of the second moment of the LT decoder.
In Proc. IEEE International Symposium on Information Theory, pages 2326–2330,
Seoul, Korea, June-July 2009.
[1312] J. E. MacDonald. Design methods for maximum minimum-distance error-correcting
codes. IBM J. Research Develop., 4:43–57, 1960.
[1313] R. A. Machado, J. A. Pinheiro, and M. Firer. Characterization of metrics induced
by hierarchical posets. IEEE Trans. Inform. Theory, 63:3630–3640, 2017.
[1314] D. J. C. MacKay. Information Theory, Inference, and Learning Algorithms. Cam-
bridge University Press, Cambridge, UK, 2003.
[1315] D. J. C. MacKay and M. C. Davey. Evaluation of Gallager codes for short block
length and high rate applications. In B. Marcus and J. Rosenthal, editors, Codes,
Systems, and Graphical Models (Minneapolis, MN, 1999), volume 123 of IMA Vol.
Math. Appl., pages 113–130. Springer, New York, 2001.
[1316] D. J. C. MacKay and R. M. Neal. Near Shannon limit performance of low density
parity check codes. IEEE Electronic Letters, 32:1645–1646, 1996.
[1317] F. J. MacWilliams. Error-correcting codes for multiple-level transmission. Bell Sys-
tem Tech. J., 40:281–308, 1961.
[1318] F. J. MacWilliams. Combinatorial Problems of Elementary Abelian Groups. PhD
thesis, Harvard University, 1962.
[1319] F. J. MacWilliams. A theorem on the distribution of weights in a systematic code.
Bell System Tech. J., 42:79–94, 1963. (Also reprinted in [169] pages 261–265 and
[212] pages 241–257).
[1320] F. J. MacWilliams. Codes and ideals in group algebras. In R. C. Bose and T. A. Dowl-
ing, editors, Combinatorial Mathematics and its Applications (Proc. Conf., Univ.
North Carolina, Chapel Hill, NC, 1967), pages 317–328. Univ. North Carolina Press,
Chapel Hill, NC, 1969.
[1321] F. J. MacWilliams. Binary codes which are ideals in the group algebra of an abelian
group. Bell System Tech. J., 49:987–1011, 1970.
[1322] F. J. MacWilliams and H. B. Mann. On the p-rank of the design matrix of a difference
set. Inform. and Control, 12:474–488, 1968.
[1323] F. J. MacWilliams and N. J. A. Sloane. The Theory of Error-Correcting Codes.
North-Holland Publishing Co., Amsterdam-New York-Oxford, 1977.
[1324] F. J. MacWilliams, N. J. A. Sloane, and J. G. Thompson. Good self-dual codes exist.
Discrete Math., 3:153–162, 1972.
[1325] H. Maharaj, G. L. Matthews, and G. Pirsic. Riemann-Roch spaces of the Hermitian
function field with applications to algebraic geometry codes and low-discrepancy
sequences. J. Pure Appl. Algebra, 195:261–280, 2005.
[1326] H. Mahdavifar and A. Vardy. Achieving the secrecy capacity of wiretap channels
using polar codes. IEEE Trans. Inform. Theory, 57:6428–6443, 2011.
[1327] E. Maneva and M. A. Shokrollahi. New model for rigorous analysis of LT-codes.
In Proc. IEEE International Symposium on Information Theory, pages 2677–2679,
Seattle, Washington, July 2006.
[1328] F. Manganiello, E. Gorla, and J. Rosenthal. Spread codes and spread decoding in
network coding. In F. R. Kschischang and E.-H. Yang, editors, Proc. IEEE Inter-
national Symposium on Information Theory, pages 881–885, Toronto, Canada, July
2008.
[1329] B. Marcus. Symbolic dynamics and connections to coding theory, automata theory
and system theory. In A. R. Calderbank, editor, Different Aspects of Coding Theory
(San Francisco, CA, 1995), volume 50 of Proc. Sympos. Appl. Math., pages 95–108.
Amer. Math. Soc., Providence, Rhode Island, 1995.
[1330] G. A. Margulis. Explicit construction of graphs without short cycles and low density
codes. Combinatorica, 2:71–78, 1982.
[1331] N. Markin and F. Oggier. Iterated space-time code constructions from cyclic algebras.
IEEE Trans. Inform. Theory, 59:5966–5979, 2013.
[1332] I. Márquez-Corbella, E. Martı́nez-Moro, and R. Pellikaan. Evaluation of public-key
cryptosystems based on algebraic geometry codes. In J. Borges and M. Villanueva,
editors, Proc. 3rd International Castle Meeting on Coding Theory and Applications,
pages 199–204, Cardona Castle in Catalonia, Spain, September 2011.
[1333] M. H. Martin. A problem in arrangements. Bull. Amer. Math. Soc., 40:859–864,
1934.
[1334] W. J. Martin and H. Tanaka. Commutative association schemes. European J. Com-
bin., 30:1497–1525, 2009.
[1335] J. Martinet. Perfect Lattices in Euclidean Spaces, volume 327 of Grundlehren der
Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences].
Springer-Verlag, Berlin, 2003.
[1336] C. Martı́nez, M. Moreto, R. Beivide, and È. M. Gabidulin. A generalization of
perfect Lee codes over Gaussian integers. In Proc. IEEE International Symposium
on Information Theory, pages 1070–1074, Seattle, Washington, July 2006.
[1337] E. Martı́nez-Moro and I. F. Rúa. Multivariable codes over finite chain rings: serial
codes. SIAM J. Discrete Math., 20:947–959, 2006.
[1338] E. Martı́nez-Moro and I. F. Rúa. On repeated-root multivariable codes over a finite
chain ring. Des. Codes Cryptogr., 45:219–227, 2007.
[1339] U. Martı́nez-Peñas. On the roots and minimum rank distance of skew cyclic codes.
Des. Codes Cryptogr., 83:639–660, 2017.
[1340] U. Martı́nez-Peñas. Skew and linearized Reed-Solomon codes and maximum sum
rank distance codes over any division ring. J. Algebra, 504:587–612, 2018.
[1341] U. Martı́nez-Peñas and R. Matsumoto. Relative generalized matrix weights of matrix
codes for universal security on wire-tap networks. IEEE Trans. Inform. Theory,
64:2529–2549, 2018.
[1342] C. Martı́nez-Pérez and W. Willems. Self-dual codes and modules for finite groups
in characteristic two. IEEE Trans. Inform. Theory, 50:1798–1803, 2004.
[1343] M. Martis, J. Bamberg, and S. Morris. An enumeration of certain projective ternary
two-weight codes. J. Combin. Des., 24:21–35, 2016.
[1344] T. Maruta. A characterization of some minihypers and its application to linear codes.
Geom. Dedicata, 74:305–311, 1999.
[1345] A. Maschietti. Difference sets and hyperovals. Des. Codes Cryptogr., 14:89–98, 1998.
[1346] J. L. Massey. Reversible codes. Inform. and Control, 7:369–380, 1964.
[1347] J. L. Massey. Linear codes with complementary duals. Discrete Math., 106/107:337–
342, 1992.
[1348] J. L. Massey. Minimal codewords and secret sharing. In Proc. 6th Joint Swedish-
Russian Workshop on Information Theory, pages 276–279, Molle, Sweden, August
1993.
[1349] J. L. Massey. Some applications of coding theory. In P. G. Ferell, editor, Cryptog-
raphy, Codes and Ciphers: Cryptography and Coding IV, pages 33–47. Formara Ltd,
Essex, 1995.
[1350] J. L. Massey, D. J. Costello, Jr., and J. Justesen. Polynomial weights and code
constructions. IEEE Trans. Inform. Theory, 19:101–110, 1973.
[1351] J. L. Massey and M. K. Sain. Codes, automata, and continuous systems: explicit
interconnections. IEEE Trans. Automat. Control, 12:644–650, 1967.
[1352] É. Mathieu. Mémoire sur l’étude des fonctions de plusieurs quantités, sur la manière
de les former et sur les substitutions qui les laissent invariables. J. de Mathématiques
Pures et Appliquées, 6:241–323, 1861.
[1353] É. Mathieu. Sur la fonction cinq fois transitive de 24 quantités. J. de Mathématiques
Pures et Appliquées, 18:25–46, 1873.
[1354] R. Matsumoto. Two Gilbert-Varshamov-type existential bounds for asymmetric
quantum error-correcting codes. Quantum Inform. Process., 16(12):Paper No. 285,
7 pages, 2017.
[1355] V. C. Mavron, T. P. McDonough, and V. D. Tonchev. On affine designs and
Hadamard designs with line spreads. Discrete Math., 308:2742–2750, 2008.
e 0.054n ).
[1356] A. May, A. Meurer, and E. Thomae. Decoding random linear codes in O(2
In D. H. Lee and X. Wang, editors, Advances in Cryptology – ASIACRYPT 2011,
volume 7073 of Lecture Notes in Comput. Sci., pages 107–124. Springer, Berlin,
Heidelberg, 2011.
[1357] A. May and I. Ozerov. On computing nearest neighbors with applications to decoding
of binary linear codes. In E. Oswald and M. Fischlin, editors, Advances in Cryptology
– EUROCRYPT 2015, volume 9056 of Lecture Notes in Comput. Sci., pages 203–228.
Springer, Berlin, Heidelberg, 2015.
[1358] P. Maymounkov. Online codes. New York University Technical Report TR2002–833,
2002.
[1359] B. R. McDonald. Finite Rings with Identity. Marcel Dekker, Inc., New York, 1974.
Pure and Applied Mathematics, Vol. 28.
[1360] R. J. McEliece. Weight congruences of p-ary cyclic codes. Discrete Math., 3:177–192,
1972.
[1361] R. J. McEliece. A public-key system based on algebraic coding theory. DSN Progress
Report 44, pages 114–116, Jet Propulsion Laboratory, Pasadena, California, 1978.
[1362] R. J. McEliece. Finite Fields for Computer Scientists and Engineers. Kluwer Acad.
Pub., Boston, 1987.
[1365] R. J. McEliece, E. R. Rodemich, H. Rumsey, Jr., and L. Welch. New upper bounds on
the rate of a code via the Delsarte–MacWilliams inequalities. IEEE Trans. Inform.
Theory, 23:157–166, 1977.
[1366] R. J. McEliece and H. Rumsey, Jr. Euler products, cyclotomy, and coding. J. Number
Theory, 4:302–311, 1972.
[1367] R. J. McEliece and D. V. Sarwate. On sharing secrets and Reed-Solomon codes.
Commun. ACM, 24:583–584, 1981.
[1368] G. McGuire, V. D. Tonchev, and H. N. Ward. Characterizing the Hermitian and
Ree unitals on 28 points. Des. Codes Cryptogr., 13:57–61, 1998.
[1399] J. V. S. Morales and H. Tanaka. An Assmus-Mattson theorem for codes over com-
mutative association schemes. Des. Codes Cryptogr., 86:1039–1062, 2018.
[1400] P. Moree. On the divisors of ak + bk . Acta Arith., 80(3):197–212, 1997.
[1401] C. Moreno. Algebraic Curves over Finite Fields, volume 97 of Cambridge Tracts in
Mathematics. Cambridge University Press, Cambridge, UK, 1991.
[1402] M. Morf, B. C. Lévy, and S.-Y. Kung. New results in 2-D systems theory, part I:
2-D polynomial matrices, factorization, and coprimeness. Proc. of IEEE, 65:861–872,
1977.
[1403] R. Mori and T. Tanaka. Performance and construction of polar codes on symmet-
ric binary-input memoryless channels. In Proc. IEEE International Symposium on
Information Theory, pages 1496–1500, Seoul, Korea, June-July 2009.
[1404] R. Mori and T. Tanaka. Performance of polar codes with the construction using
density evolution. IEEE Commun. Letters, 13:519–521, 2009.
[1405] R. Mori and T. Tanaka. Channel polarization on q-ary discrete memoryless channels
by arbitrary kernels. In Proc. IEEE Information Theory Workshop, pages 894–898,
Austin, Texas, June 2010.
[1406] R. Mori and T. Tanaka. Source and channel polarization over finite fields and Reed-
Solomon matrices. IEEE Trans. Inform. Theory, 60:2720–2736, 2014.
[1407] L. Mroueh, S. Rouquette, and J.-C. Belfiore. Application of perfect space time codes:
PEP bounds and some practical insights. IEEE Trans. Commun., 60:747–755, 2012.
[1408] G. L. Mullen and D. Panario, editors. Handbook of Finite Fields. Discrete Mathe-
matics and its Applications. CRC Press, Boca Raton, Florida, 2013.
[1409] D. E. Muller. Application of Boolean algebra to switching circuit design and to error
detection. IEEE Trans. Comput., 3:6–12, 1954. (Also reprinted in [169] pages 20–26
and [212] pages 43–49).
[1410] D. Mumford. Varieties defined by quadratic equations. In E. Marchionna, editor,
Questions on Algebraic Varieties (C.I.M.E., III Ciclo, Varenna, 1969), pages 29–
100. Edizioni Cremonese, Rome, 1970.
[1411] O. R. Musin. The kissing number in four dimensions. Ann. of Math. (2), 168:1–32,
2008.
[1412] D. Napp, C. Perea, and R. Pinto. Input-state-output representations and construc-
tions of finite support 2D convolutional codes. Adv. Math. Commun., 4:533–545,
2010.
[1413] D. Napp and F. Santana. Multi-shot network coding. In M. Greferath, M. Pavčević,
N. Silberstein, and M. Á. Vázquez-Castro, editors, Network Coding and Subspace
Designs. Signals and Communication Technology, Signals Commun. Technol., pages
91–104. Springer, Cham, 2018.
[1414] D. Napp and R. Smarandache. Constructing strongly-MDS convolutional codes with
maximum distance profile. Adv. Math. Commun., 10:275–290, 2016.
[1415] E. L. Năstase and P. A. Sissokho. The maximum size of a partial spread in a finite
projective space. J. Combin. Theory Ser. A, 152:353–362, 2017.
[1416] L. P. Natarajan, Y. Hong, and E. Viterbo. Lattice index coding. IEEE Trans.
Inform. Theory, 61:6505–6525, 2015.
[1417] L. P. Natarajan and B. S. Rajan. Fast group-decodable STBCs via codes over GF(4).
In Proc. IEEE International Symposium on Information Theory, pages 1056–1060,
Austin, Texas, June 2010.
[1418] L. P. Natarajan and B. S. Rajan. Asymptotically-optimal, fast-decodable, full-
diversity STBCs. In Proc. IEEE International Conference on Communications, Ky-
oto, Japan, 6 pages, June 2011.
[1419] L. P. Natarajan and B. S. Rajan. Fast-group-decodable STBCs via codes over GF(4):
further results. In Proc. IEEE International Conference on Communications, Kyoto,
Japan, 6 pages, June 2011.
[1420] I. P. Naydenova. Error Detection and Correction for Symmetric and Asymmetric
Channels. PhD thesis, University of Bergen, 2007.
[1423] G. Nebe, E. Rains, and N. J. A. Sloane. Self-Dual Codes and Invariant Theory.
Springer-Verlag, Berlin, Heidelberg, 2006.
[1424] G. Nebe and A. Schäfer. A nilpotent non abelian group code. Algebra Discrete
Math., 18:268–273, 2014.
[1425] A. A. Nechaev. Trace functions in Galois rings and noise-stable codes. In Proc. 5th
All-Union Symposium on the Theory of Rings, Algebras and Modules, page 97, 1982.
[1426] A. A. Nechaev. Kerdock’s code in cyclic form (in Russian). Diskret. Mat., 1(4):123–
139, 1989. (English translation in Discrete Math. Appl. 1(4):365–384, 1991).
[1427] A. A. Nechaev. Linear recurrence sequences over commutative rings (in Russian).
Diskret. Mat., 3(4):105–127, 1991. (English translation in Discrete Math. Appl.
2(6):659–683, 1992).
[1428] A. A. Nechaev and D. A. Mikhaı̆lov. A canonical system of generators of a unitary
polynomial ideal over a commutative Artinian chain ring (in Russian). Diskret. Mat.,
13(4):3–42, 2001. (English translation in Discrete Math. Appl. 11(6):545–586, 2001).
[1429] A. Nemirovski. Advances in convex optimization: conic programming. In M. Sanz-
Solé, J. Soria, J. L. Varona, and J. Verdera, editors, Proc. International Congress of
Mathematicians (Madrid, 2006), pages 413–444. Eur. Math. Soc., Zürich, 2007.
[1430] S.-L. Ng and M. B. Paterson. Functional repair codes: a view from projective geom-
etry. Des. Codes Cryptogr., 87:2701–2722, 2019.
[1431] X. T. Ngo, S. Bahsin, J.-L. Danger, S. Guilley, and Z. Najim. Linear complemen-
tary dual code improvement to strengthen encoded circuit against hardware Trojan
horses. In Proc. IEEE International Symposium on Hardware Oriented Security and
Trust (HOST), pages 82–87, McLean, Virginia, May 2015.
[1432] H. Niederreiter. Knapsack-type cryptosystems and algebraic coding theory. Problems
Control Inform. Theory/Problemy Upravlen. Teor. Inform., 15(2):159–166, 1986.
[1433] H. Niederreiter. Point sets and sequences with small discrepancy. Monatsh. Math.,
104:273–337, 1987.
[1434] H. Niederreiter. A combinatorial problem for vector spaces over finite fields. Discrete
Math., 96:221–228, 1991.
[1435] H. Niederreiter. Orthogonal arrays and other combinatorial aspects in the theory of
uniform point distributions in unit cubes. Discrete Math., 106/107:361–367, 1992.
[1436] H. Niederreiter and F. Özbudak. Constructive asymptotic codes with an improve-
ment on the Tsfasman-Vlăduţ-Zink and Xing bounds. In K. Feng, H. Niederreiter,
and C. Xing, editors, Coding, Cryptography and Combinatorics, volume 23 of Progr.
Comput. Sci. Appl. Logic, pages 259–275. Birkhäuser Verlag Basel, 2004.
[1437] H. Niederreiter and C. Xing. Rational Points on Curves over Finite Fields: Theory
and Applications, volume 285 of London Math. Soc. Lecture Note Ser. Cambridge
University Press, Cambridge, UK, 2001.
[1438] Y. Niho. Multi-Valued Cross-Correlation Functions Between Two Maximal Linear
Recursive Sequences. PhD thesis, University of Southern California, 1972.
[1439] A. Nijenhuis and H. S. Wilf. Combinatorial Algorithms. Academic Press, Inc. [Har-
court Brace Jovanovich, Publishers], New York-London, 2nd edition, 1978. For com-
puters and calculators, Computer Science and Applied Mathematics.
[1440] S. Nishimura and T. Hiramatsu. A generalization of the Lee distance and error
correcting codes. Discrete Appl. Math., 156:588–595, 2008.
[1441] NIST. Post-quantum cryptography standardization. https:
//csrc.nist.gov/Projects/post-quantum-cryptography/
Post-Quantum-Cryptography-Standardization, 2017.
[1442] K. Niu and K. Chen. CRC-aided decoding of polar codes. IEEE Commun. Letters,
16:1668–1671, 2012.
[1443] K. Niu and K. Chen. Stack decoding of polar codes. Electron. Lett., 48:695–697,
2012.
[1444] J.-S. No, S. W. Golomb, G. Gong, H.-K. Lee, and P. Gaal. Binary pseudorandom
sequences of period 2n − 1 with ideal autocorrelation. IEEE Trans. Inform. Theory,
44:814–817, 1998.
[1445] R. W. Nóbrega and B. F. Uchôa-Filho. Multishot codes for network coding: bounds
and a multilevel construction. In Proc. IEEE International Symposium on Informa-
tion Theory, pages 428–432, Seoul, Korea, June-July 2009.
[1457] F. Oggier and B. Hassibi. An algebraic coding scheme for wireless relay networks
with multiple-antenna nodes. IEEE Trans. Signal Process., 56:2957–2966, 2008.
[1458] F. Oggier, G. Rekaya, J.-C. Belfiore, and E. Viterbo. Perfect space-time block codes.
IEEE Trans. Inform. Theory, 52:3885–3902, 2006.
[1459] F. Oggier and A. Sboui. On the existence of generalized rank weights. In Proc.
IEEE International Symposium on Information Theory and its Applications, pages
406–410, Honolulu, Hawaii, October 2012.
[1460] F. Oggier, P. Solé, and J.-C. Belfiore. Codes over matrix rings for space-time coded
modulations. IEEE Trans. Inform. Theory, 58:734–746, 2012.
[1461] F. Oggier, P. Solé, and J.-C. Belfiore. Lattice codes for the wiretap Gaussian channel:
construction and analysis. IEEE Trans. Inform. Theory, 62:5690–5708, 2016.
[1462] F. Oggier and E. Viterbo. Algebraic number theory and code design for Rayleigh
fading channels. Found. Trends Commun. and Inform. Theory, 1:333–415, 2004.
[1463] C. M. O’Keefe and T. Penttila. A new hyperoval in PG(2, 32). J. Geom., 44:117–139,
1992.
[1464] T. Okuyama and Y. Tsushima. On a conjecture of P. Landrock. J. Algebra, 104:203–
208, 1986.
[1465] O. Olmez and A. Ramamoorthy. Fractional repetition codes with flexible repair from
combinatorial designs. IEEE Trans. Inform. Theory, 62:1565–1591, 2016.
[1466] O. Ore. Theory of non-commutative polynomials. Ann. of Math. (2), 34:480–508,
1933.
[1467] P. R. J. Östergård. Classifying subspaces of Hamming spaces. Des. Codes Cryptogr.,
27:297–305, 2002.
[1468] P. R. J. Östergård. On the size of optimal three-error-correcting binary codes of
length 16. IEEE Trans. Inform. Theory, 57:6824–6826, 2011.
[1469] P. R. J. Östergård. The sextuply shortened binary Golay code is optimal. Des. Codes
Cryptogr., 87:341–347, 2019.
[1470] P. R. J. Östergård and M. K. Kaikkonen. New single-error-correcting codes. IEEE
Trans. Inform. Theory, 42:1261–1262, 1996.
[1471] P. R. J. Östergård and O. Pottonen. There exists no Steiner system S(4, 5, 17). J.
Combin. Theory Ser. A, 115:1570–1573, 2008.
[1472] P. R. J. Östergård and O. Pottonen. The perfect binary one-error-correcting codes of
length 15: Part I—Classification. IEEE Trans. Inform. Theory, 55:4657–4660, 2009.
[1473] P. R. J. Östergård, O. Pottonen, and K. T. Phelps. The perfect binary one-error-
correcting codes of length 15: Part II—Properties. IEEE Trans. Inform. Theory,
56:2571–2582, 2010.
[1474] M. E. O’Sullivan. Decoding of codes on surfaces. In Proc. IEEE Information Theory
Workshop, pages 33–34, Killarney, Ireland, June 1998.
[1475] P. Oswald and M. A. Shokrollahi. Capacity-achieving sequences for the erasure
channel. IEEE Trans. Inform. Theory, 48:3017–3028, 2002.
[1476] K. Otal and F. Özbudak. Cyclic subspace codes via subspace polynomials. Des.
Codes Cryptogr., 85:191–204, 2017.
[1477] A. Otmani and J.-P. Tillich. An efficient attack on all concrete KKS proposals. In
B.-Y. Yang, editor, Post-Quantum Cryptography, volume 7071 of Lecture Notes in
Comput. Sci., pages 98–116. Springer, Berlin, Heidelberg, 2011.
[1478] A. Otmani, J.-P. Tillich, and L. Dallot. Cryptanalysis of two McEliece cryptosystems
based on quasi-cyclic codes. Math. Comput. Sci., 3:129–140, 2010.
[1479] R. Overbeck. A new structural attack for GPT and variants. In E. Dawson and
S. Vaudenay, editors, Progress in Cryptology – Mycrypt 2005, volume 3715 of Lecture
Notes in Comput. Sci., pages 50–63. Springer, Berlin, Heidelberg, 2005.
[1480] M. Özen and I. Şiap. Linear codes over Fq [u]/(us ) with respect to the Rosenbloom-
Tsfasman metric. Des. Codes Cryptogr., 38:17–29, 2006.
[1481] M. Özen and V. Şiap. The MacWilliams identity for m-spotty weight enumerators
of linear codes over finite fields. Comput. Math. Appl., 61:1000–1004, 2011.
[1482] M. Özen and V. Şiap. The MacWilliams identity for m-spotty Rosenbloom-Tsfasman
weight enumerator. J. Franklin Inst., 351:743–750, 2014.
[1483] N. Pace and A. Sonnino. On linear codes admitting large automorphism groups.
Des. Codes Cryptogr., 83:115–143, 2017.
[1484] R. E. A. C. Paley. On orthogonal matrices. J. Mathematics and Physics, 12:311–320,
1933.
[1485] L. Pamies-Juarez, H. D. L. Hollmann, and F. Oggier. Locally repairable codes with
multiple repair alternatives. In Proc. IEEE International Symposium on Information
Theory, pages 892–896, Istanbul, Turkey, July 2013.
[1486] L. Panek, M. Firer, and M. M. S. Alves. Classification of Niederreiter-Rosenbloom-
Tsfasman block codes. IEEE Trans. Inform. Theory, 56:5207–5216, 2010.
[1487] L. Panek, M. Firer, H. K. Kim, and J. Y. Hyun. Groups of linear isometries on poset
structures. Discrete Math., 308:4116–4123, 2008.
[1488] E. Paolini, G. Liva, B. Matuz, and M. Chiani. Maximum likelihood erasure decod-
ing of LDPC codes: pivoting algorithms and code design. IEEE Trans. Commun.,
60:3209–3220, 2012.
[1518] V. S. Pless. More on the uniqueness of the Golay code. Discrete Math., 106/107:391–
398, 1992.
[1519] V. S. Pless. Duadic codes and generalizations. In P. Camion, P. Charpin, and
S. Harari, editors, Proc. International Symposium on Information Theory – EU-
ROCODE 1992, volume 339 of CISM Courses and Lect., pages 3–15. Springer, Vi-
enna, 1993.
[1520] V. S. Pless. Introduction to the Theory of Error-Correcting Codes. J. Wiley & Sons,
New York, 3rd edition, 1998.
[1521] V. S. Pless and W. C. Huffman, editors. Handbook of Coding Theory, Vol. I, II.
North-Holland, Amsterdam, 1998.
[1522] V. S. Pless and Z. Qian. Cyclic codes and quadratic residue codes over Z4 . IEEE
Trans. Inform. Theory, 42:1594–1600, 1996.
[1523] V. S. Pless and N. J. A. Sloane. On the classification and enumeration of self-dual
codes. J. Combin. Theory Ser. A, 18:313–335, 1975.
[1524] V. S. Pless, P. Solé, and Z. Qian. Cyclic self-dual Z4 -codes. Finite Fields Appl.,
3:48–69, 1997.
[1525] V. S. Pless and J. G. Thompson. 17 does not divide the order of the group of a
(72, 36, 16) doubly even code. IEEE Trans. Inform. Theory, 28:537–541, 1982.
[1526] M. Plotkin. Binary Codes with Specified Minimum Distance. Master’s thesis, Moore
School of Electrical Engineering, University of Pennsylvania, 1952.
[1527] M. Plotkin. Binary codes with specified minimum distances. IRE Trans. Inform.
Theory, 6:445–450, 1960. (Also reprinted in [169] pages 238–243).
[1528] D. Pointcheval and J. Stern. Security proofs for signature schemes. In U. Maurer,
editor, Advances in Cryptology – EUROCRYPT ’96, volume 1070 of Lecture Notes
in Comput. Sci., pages 387–398. Springer, Berlin, Heidelberg, 1996.
[1529] S. C. Polak. Semidefinite programming bounds for Lee codes. arXiv:1810.05066
[math.CO], October 2018.
[1530] S. C. Polak. Semidefinite programming bounds for constant weight codes. IEEE
Trans. Inform. Theory, 65:28–39, 2019.
[1531] A. Poli. Important algebraic calculations for n-variables polynomial codes. Discrete
Math., 56:255–263, 1985.
[1532] A. Poli and L. Huguet. Error Correcting Codes. Prentice Hall International, Hemel
Hempstead; Masson, Paris, 1992; Translated from the 1989 French original by Iain
Craig.
[1533] O. Polverino and F. Zullo. Codes arising from incidence matrices of points and
hyperplanes in PG(n, q). J. Combin. Theory Ser. A, 158:1–11, 2018.
[1534] N. Prakash, G. M. Kamath, V. Lalitha, and P. V. Kumar. Optimal linear codes
with a local-error-correction property. In Proc. IEEE International Symposium on
Information Theory, pages 2776–2780, Cambridge, Massachusetts, July 2012.
[1535] N. Prakash, V. Lalitha, S. B. Balaji, and P. V. Kumar. Codes with locality for two
erasures. IEEE Trans. Inform. Theory, 65:7771–7789, 2019.
[1536] E. Prange. Cyclic Error-Correcting Codes in Two Symbols. TN-57-103, Air Force
Cambridge Research Labs, Bedford, Massachusetts, September 1957.
[1537] E. Prange. Some Cyclic Error-Correcting Codes with Simple Decoding Algorithms.
TN-58-156, Air Force Cambridge Research Labs, Bedford, Massachusetts, April 1958.
[1538] E. Prange. An Algorithm for Factoring xn − 1 over a Finite Field. TN-59-175, Air
Force Cambridge Research Labs, Bedford, Massachusetts, October 1959.
[1539] E. Prange. The Use of Coset Equivalence in the Analysis and Decoding of Groups
Codes. TN-59-164, Air Force Cambridge Research Labs, Bedford, Massachusetts,
1959.
[1540] E. Prange. The use of information sets in decoding cyclic codes. IRE Trans. Inform.
Theory, 8:S 5–S 9, 1962.
[1541] F. P. Preparata. A class of optimum nonlinear double-error-correcting codes. Inform.
and Control, 13:378–400, 1968 (Also reprinted in [212] pages 366–388).
[1542] J. Preskill. Fault-tolerant quantum computation. In H.-K. Lo, S. Popescu, and
T. Spiller, editors, Introduction to Quantum Computation and Information, pages
213–269. World Sci. Publ., River Edge, New Jersey, 1998.
[1543] N. Presman. Methods in Polar Coding. PhD thesis, Tel Aviv University, 2015.
[1544] N. Presman and S. Litsyn. Recursive descriptions of polar codes. Adv. Math. Com-
mun., 11:1–65, 2017.
[1545] N. Presman, O. Shapira, and S. Litsyn. Mixed-kernels constructions of polar codes.
IEEE J. Selected Areas Commun., 34:239–253, 2016.
[1582] I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. J. Soc. Indust.
Appl. Math., 8:300–304, 1960. (Also reprinted in [169] pages 70–71 and [212] pages
189–193).
[1583] O. Regev. New lattice based cryptographic constructions. In Proc. 35th Annual ACM
Symposium on the Theory of Computing, pages 407–416, San Diego, California, June
2003. ACM Press, New York.
[1584] G. Regts. Upper Bounds for Ternary Constant Weight Codes from Semidefinite
Programming and Representation Theory. Master’s thesis, University of Amsterdam,
2009.
[1585] S. Reiger. Codes for the correction of “clustered” errors. IRE Trans. Inform. Theory,
6:16–21, 1960.
[1586] O. Reingold, S. Vadhan, and A. Wigderson. Entropy waves, the zig-zag graph prod-
uct, and new constant degree expanders and extractors. In Proc. 41st IEEE Sympo-
sium on Foundations of Computer Science, pages 3–13, Redondo Beach, California,
November 2000.
[1587] A. Renvall and C. Ding. The access structure of some secret-sharing schemes. In
J. Pieprzyk and J. Seberry, editors, Information Security and Privacy, volume 1172
of Lecture Notes in Comput. Sci., pages 67–78. Springer, Berlin, Heidelberg, 1996.
[1588] H. F. H. Reuvers. Some Non-existence Theorems for Perfect Codes over Arbitrary
Alphabets. Technische Hogeschool Eindhoven, Eindhoven, 1977. Written for confer-
ment of a Doctorate in Technical Sciences at the Technische Hogeschool, Eindhoven,
1977.
[1589] T. J. Richardson, M. A. Shokrollahi, and R. L. Urbanke. Design of capacity-
approaching irregular low-density parity-check codes. IEEE Trans. Inform. Theory,
47:619–637, 2001.
[1590] T. J. Richardson and R. L. Urbanke. The capacity of low-density parity-check codes
under message-passing decoding. IEEE Trans. Inform. Theory, 47:599–618, 2001.
[1591] T. J. Richardson and R. L. Urbanke. Modern Coding Theory. Cambridge University
Press, Cambridge, UK, 2008.
[1592] P. Rocha. Structure and Representation of 2-D Systems. PhD thesis, University of
Groningen, 1990.
[1593] B. G. Rodrigues. A projective two-weight code related to the simple group Co1 of
Conway. Graphs Combin., 34:509–521, 2018.
[1594] C. Roos. A new lower bound for the minimum distance of a cyclic code. IEEE Trans.
Inform. Theory, 29:330–332, 1983.
[1595] M. Y. Rosenbloom and M. A. Tsfasman. Codes for the m-metric (in Russian). Prob-
lemy Peredači Informacii, 33(1):55–63, 1997. (English translation in Probl. Inform.
Transm., 33(1):45–52, 1997).
[1596] J. Rosenthal. Connections between linear systems and convolutional codes. In
B. Marcus and J. Rosenthal, editors, Codes, Systems, and Graphical Models (Min-
neapolis, MN, 1999), volume 123 of IMA Vol. Math. Appl., pages 39–66. Springer,
New York, 2001.
[1597] J. Rosenthal, J. M. Schumacher, and E. V. York. On behaviors and convolutional
codes. IEEE Trans. Inform. Theory, 42:1881–1891, 1996.
[1598] J. Rosenthal and R. Smarandache. Maximum distance separable convolutional codes.
Appl. Algebra Engrg. Comm. Comput., 10:15–32, 1999.
[1611] A. Sălăgean. Repeated-root cyclic and negacyclic codes over a finite chain ring.
Discrete Appl. Math., 154:413–419, 2006.
[1612] S. Saraf and M. Sudan. An improved lower bound on the size of Kakeya sets over
finite fields. Anal. PDE, 1:375–379, 2008.
[1613] G. Sarkis, P. Giard, A. Vardy, C. Thibeault, and W. J. Gross. Fast polar decoders:
algorithm and implementation. IEEE J. Selected Areas Commun., 32:946–957, 2014.
[1614] G. Sarkis, I. Tal, P. Giard, A. Vardy, C. Thibeault, and W. J. Gross. Flexible
and low-complexity encoding and decoding of systematic polar codes. IEEE Trans.
Commun., 64:2732–2745, 2016.
[1615] P. K. Sarvepalli, A. Klappenecker, and M Rötteler. Asymmetric quantum codes: con-
structions, bounds and performance. Proc. Roy. Soc. London Ser. A, 465(2105):1645–
1672, 2009.
[1664] S. Shao, T. Liu, C. Tian, and C. Shen. On the tradeoff region of secure exact-repair
regenerating codes. IEEE Trans. Inform. Theory, 63:7253–7266, 2017.
[1665] A. Sharma and A. K. Sharma. MacWilliams identities for m-spotty weight enumer-
ators of codes over rings. Australas. J. Combin., 58:67–105, 2014.
[1668] M. Shi, A. Alahmadi, and P. Solé. Codes and Rings: Theory and Practice. Academic
Press, 2017.
[1669] M. Shi, Y. Guan, and P. Solé. Two new families of two-weight codes. IEEE Trans.
Inform. Theory, 63:6240–6246, 2017.
[1670] M. Shi, Y. Guan, C. Wang, and P. Solé. Few-weight codes from trace codes over Rk .
Bull. Aust. Math. Soc., 98:167–174, 2018.
[1671] M. Shi, D. Huang, and P. Solé. Optimal ternary cubic two-weight codes. Chinese J.
Electronics, 27:734–738, 2018.
[1672] M. Shi, Y. Liu, and P. Solé. Optimal two-weight codes from trace codes over F2 +uF2 .
IEEE Commun. Letters, 20:2346–2349, 2016.
[1673] M. Shi, Y. Liu, and P. Solé. Optimal binary codes from trace codes over a non-chain
ring. Discrete Appl. Math., 219:176–181, 2017.
[1674] M. Shi, Y. Liu, and P. Solé. Two-weight and three-weight codes from trace codes
over Fp + uFp + vFp + uvFp . Discrete Math., 341:350–357, 2018.
[1675] M. Shi, L. Q. Qian, and P. Solé. Few-weight codes from trace codes over a local ring.
Appl. Algebra Engrg. Comm. Comput., 29:335–350, 2018.
[1676] M. Shi, R. S. Wu, Y. Liu, and P. Solé. Two and three weight codes over Fp + uFp .
Cryptogr. Commun., 9:637–646, 2017.
[1677] M. Shi, R. S. Wu, L. Q. Qian, L. Sok, and P. Solé. New classes of p-ary few weight
codes. Bull. Malays. Math. Sci. Soc., 42:1393–1412, 2019.
[1678] M. Shi, R. S. Wu, and P. Solé. Asymptotically good additive cyclic codes exist. IEEE
Commun. Letters, 22:1980–1983, 2018.
[1679] M. Shi, H. Zhu, and P. Solé. Optimal three-weight cubic codes. Appl. Comput.
Math., 17:175–184, 2018.
[1680] M. Shi, S. Zhu, and S. Yang. A class of optimal p-ary codes from one-weight codes
over Fp [u]/(um ). J. Franklin Inst., 350:929–937, 2013.
[1681] K. Shimizu. A parallel LSI architecture for LDPC decoder improving message-
passing schedule. In Proc. IEEE International Symposium on Circuits and Systems,
pages 5099–5102, Island of Kos, Greece, May 2006.
[1682] K. Shiromoto. Singleton bounds for codes over finite rings. J. Algebraic Combin.,
12:95–99, 2000.
[1683] K. Shiromoto. Matroids and codes with the rank metric. arXiv:1803.06041
[math.CO], March 2018.
[1684] M. A. Shokrollahi. New sequences of linear time erasure codes approaching the
channel capacity. In M. Fossorier, H. Imai, S. Shu Lin, and A. Poli, editors, Applied
Algebra, Algebraic Algorithms and Error-Correcting Codes, volume 1719 of Lecture
Notes in Comput. Sci., pages 65–76. Springer, Berlin, Heidelberg, 1999.
[1685] M. A. Shokrollahi. Codes and graphs. In H. Reichel and S. Tison, editors, STACS
2000 – Symposium on Theoretical Aspects of Computer Science, volume 1770 of
Lecture Notes in Comput. Sci., pages 1–12. Springer, Berlin, Heidelberg, 2000.
[1686] M. A. Shokrollahi. Capacity-achieving sequences. In M. Brian and J. Rosenthal,
editors, Codes, Systems, and Graphical Models (Minneapolis, MN 1999), volume 123
of The IMA Volumes in Mathematics and its Applications, pages 153–166. Springer,
New York, 2001.
[1687] M. A. Shokrollahi. Raptor codes. IEEE Trans. Inform. Theory, 52:2551–2567, 2006.
[1688] M. A. Shokrollahi. Theory and applications of Raptor codes. In A. Quarteroni,
editor, MATHKNOW—Mathematics, Applied Sciences and Real Life, volume 3 of
MS&A. Model. Simul. Appl., pages 59–89. Springer-Verlag Italia, Milan, 2009.
[1689] M. A. Shokrollahi, B. Hassibi, B. M. Hochwald, and W. Sweldens. Representation
theory for high-rate multiple-antenna code design. IEEE Trans. Inform. Theory,
47:2335–2367, 2001.
[1690] M. A. Shokrollahi, S. Lassen, and R. Karp. Systems and processes for decoding
chain reaction codes through inactivation. http://www.freepatentsonline.com/
6856263.html, February 2005.
[1691] M. A. Shokrollahi and M. G. Luby. Raptor codes. Found. Trends Commun. and
Inform. Theory, 6:213–322, 2009.
[1692] M. A. Shokrollahi, T. Stockhammer, M. G. Luby, and M. Watson. Raptor Forward
Error Correction Scheme for Object Delivery. RFC 5053, October 2007.
[1693] M. A. Shokrollahi and H. Wasserman. List decoding of algebraic-geometric codes.
IEEE Trans. Inform. Theory, 45:432–437, 1999.
[1694] P. W. Shor. Algorithms for quantum computation: discrete logarithms and factoring.
In S. Goldwasser, editor, Proc. 35th IEEE Symposium on Foundations of Computer
Science, pages 124–134, Santa Fe, New Mexico, 1994. IEEE Comput. Soc. Press, Los
Alamitos, California.
[1695] P. W. Shor. Scheme for reducing decoherence in quantum computer memory. Physical
Review A, 52:R2493–R2496, October 1995.
[1696] P. W. Shor. Polynomial-time algorithms for prime factorization and discrete loga-
rithms on a quantum computer. SIAM J. Comput., 26:1484–1509, 1997.
[1697] I. E. Shparlinski, M. A. Tsfasman, and S. G. Vlădaţ. Curves with many points
and multiplication in finite fields. In H. Stichtenoth and M. A. Tsfasman, editors,
Coding Theory and Algebraic Geometry, volume 1518 of Lecture Notes in Math.,
pages 145–169. Springer, Berlin, Heidelberg, 1992.
[1698] K. W. Shum and Y. Hu. Cooperative regenerating codes. IEEE Trans. Inform.
Theory, 59:7229–7258, 2013.
[1699] I. Şiap. MacWilliams identity for m-spotty Lee weight enumerators. Appl. Math.
Lett., 23:13–16, 2010.
[1700] I. Şiap, T. Abualrub, and A. Ghrayeb. Cyclic DNA codes over the ring F2 [u]/(u2 −1)
based on the deletion distance. J. Franklin Inst., 346:731–740, 2009.
[1701] I. Şiap, N. Aydin, and D. K. Ray-Chaudhuri. New ternary quasi-cyclic codes with
better minimum distances. IEEE Trans. Inform. Theory, 46:1554–1558, 2000.
[1702] V. M. Sidelńikov. Some k-valued pseudo-random sequences and nearly equidistant
codes (in Russian). Problemy Peredači Informacii, 5(1):16–22, 1969 (English trans-
lation in Probl. Inform. Transm., 5(1):12–16, 1969).
[1703] V. M. Sidelńikov. On extremal polynomials used in bounds of code volume (in
Russian). Problemy Peredači Informacii, 16(3):17–30, 1980. (English translation in
Probl. Inform. Transm., 16(3):174–186, 1980).
[1709] D. Silva and F. R. Kschischang. Fast encoding and decoding of Gabidulin codes.
In Proc. IEEE International Symposium on Information Theory, pages 2858–2862,
Seoul, Korea, June-July 2009.
[1710] D. Silva and F. R. Kschischang. On metrics for error correction in network coding.
IEEE Trans. Inform. Theory, 55:5479–5490, 2009.
[1717] R. C. Singleton. Maximum distance q-ary codes. IEEE Trans. Inform. Theory,
10:116–118, 1964.
[1718] M. Sinnokrot, J. R. Barry, , and V. Madisetti. Embedded Alamouti space-time
codes for high rate and low decoding complexity. In Proc. 42nd Asilomar Conference
on Signals, Systems and Computers, pages 1749–1753, Pacific Grove, California,
October 2008.
[1719] M. Sipser and D. Spielman. Expander codes. IEEE Trans. Inform. Theory, 42:1710–
1722, 1996.
[1720] A. N. Skorobogatov and S. G. Vlăduţ. On the decoding of algebraic-geometric codes.
IEEE Trans. Inform. Theory, 36:1051–1060, 1990.
[1721] M. M. Skriganov. Coding theory and uniform distributions. St. Petersburg Math.
J., 13:301–337, 2002.
[1722] D. Slepian. A class of binary signaling alphabets. Bell System Tech. J., 35:203–234,
1956. (Also reprinted in [169] pages 56–65 and [212] pages 83–114).
[1723] D. Slepian. A note on two binary signaling alphabets. IRE Trans. Inform. Theory,
2:84–86, 1956. (Also reprinted in [212] pages 115–117).
[1724] D. Slepian. Some further theory of group codes. Bell System Tech. J., 39:203–234,
1960. (Also reprinted in [212] pages 118–151).
[1725] D. Slepian. Group codes for the Gaussian channel. Bell System Tech. J., 47:575–602,
1968.
[1726] N. J. A. Sloane. Is there a (72, 36) d = 16 self-dual code? IEEE Trans. Inform.
Theory, 19:251, 1973.
[1727] N. J. A. Sloane and J. G. Thompson. Cyclic self-dual codes. IEEE Trans. Inform.
Theory, 29:364–366, 1983.
[1728] R. Smarandache, H. Gluesing-Luerssen, and J. Rosenthal. Constructions of MDS-
convolutional codes. IEEE Trans. Inform. Theory, 47:2045–2049, 2001.
[1729] R. Smarandache and J. Rosenthal. A state space approach for constructing MDS
rate 1/n convolutional codes. In Proc. IEEE Information Theory Workshop, pages
116–117, Killarney, Ireland, June 1998.
[1730] R. Smarandache and P. O. Vontobel. Quasi-cyclic LDPC codes: influence of proto-
and Tanner-graph structure on minimum Hamming distance upper bounds. IEEE
Trans. Inform. Theory, 58:585–607, 2012.
[1731] K. J. C. Smith. On the p-rank of the incidence matrix of points and hyperplanes in
a finite projective geometry. J. Combin. Theory, 7:122–129, 1969.
[1732] S. L. Snover. The Uniqueness of the Nordstrom–Robinson and the Golay Binary
Codes. PhD thesis, Michigan State University, 1973.
[1733] P. Solé. Asymptotic bounds on the covering radius of binary codes. IEEE Trans.
Inform. Theory, 36:1470–1472, 1990.
[1734] P. Solé. The covering radius of spherical designs. European J. Combin., 12:423–431,
1991.
[1735] P. Solé, editor. Codes Over Rings, volume 6 of Series on Coding Theory and Cryp-
tology. World Sci. Publ., Hackensack, New Jersey, 2009.
[1736] G. Solomon and H. C. A. van Tilborg. A connection between block and convolutional
codes. SIAM J. Appl. Math., 37:358–369, 1979.
[1737] W. Song, K. Cai, C. Yuen, K. Cai, and G. Han. On sequential locally repairable
codes. IEEE Trans. Inform. Theory, 64:3513–3527, 2017.
[1738] W. Song, S. H. Dau, C. Yuen, and T. J. Li. Optimal locally repairable linear codes.
IEEE J. Selected Areas Commun., 32:1019–1036, 2014.
[1739] W. Song and C. Yuen. Locally repairable codes with functional repair and multiple
erasure tolerance. arXiv:1507.02796 [cs.IT], 2015.
[1740] Y. Song, Y. Li, Z. Li, and J. Li. A new multi-use multi-secret sharing scheme based
on the duals of minimal linear codes. Security and Commun. Networks, 8:202–211,
2015.
[1774] I. Tamo, Z. Wang, and J. Bruck. Zigzag codes: MDS array codes with optimal
rebuilding. IEEE Trans. Inform. Theory, 59:1597–1616, 2013.
[1775] I. Tamo, Z. Wang, and J. Bruck. Access versus bandwidth in codes for storage. IEEE
Trans. Inform. Theory, 60:2028–2037, 2014.
[1776] I. Tamo, M. Ye, and A. Barg. The repair problem for Reed-Solomon codes: optimal
repair of single and multiple erasures with almost optimal node size. IEEE Trans.
Inform. Theory, 65:2673–2695, 2019.
[1777] H. Tanaka. New proofs of the Assmus-Mattson theorem based on the Terwilliger
algebra. European J. Combin., 30:736–746, 2009.
[1778] C. Tang, N. Li, Y. Qi, Z. Zhou, and T. Helleseth. Linear codes with two or three
weights from weakly regular bent functions. IEEE Trans. Inform. Theory, 62:1166–
1176, 2016.
[1779] C. Tang, Y. Qi, and M. Xu. A note on cyclic codes from APN functions. Appl.
Algebra Engrg. Comm. Comput., 25:21–37, 2014.
[1780] H. Tang, J. Xu, Lin. S., and K. Abdel-Ghaffar. Codes on finite geometries. IEEE
Trans. Inform. Theory, 52:572–596, 2005.
[1781] X. Tang and C. Ding. New classes of balanced quaternary and almost balanced
binary sequences with optimal autocorrelation value. IEEE Trans. Inform. Theory,
56:6398–6405, 2010.
[1782] X. Tang, P. Fan, and S. Matsufuji. Lower bounds on correlation of spreading sequence
set with low or zero correlation zone. Electron. Lett., 36:551–552, 2000.
[1783] X. Tang and G. Gong. New constructions of binary sequences with optimal autocor-
relation value/magnitude. IEEE Trans. Inform. Theory, 56:1278–1286, 2010.
[1784] R. M. Tanner. A recursive approach to low complexity codes. IEEE Trans. Inform.
Theory, 27:533–547, 1981.
[1785] R. M. Tanner. A transform theory for a class of group-invariant codes. IEEE Trans.
Inform. Theory, 34:752–775, 1988.
[1786] R. M. Tanner. On quasi-cyclic repeat accumulate codes. In Proc. 37th Allerton
Conference on Communication, Control, and Computing, pages 249–259, Monticello,
Illinois, September 1999.
[1787] R. M. Tanner. Minimum distance bounds by graph analysis. IEEE Trans. Inform.
Theory, 47:808–821, 2001.
[1788] R. M. Tanner, D. Sridhara, and T. E. Fuja. A class of group structured LDPC codes.
In Proc. 6th International Symposium on Communication Theory and Applications,
pages 365–370, Ambleside, UK, July 2001.
[1789] R. M. Tanner, D. Sridhara, A. Sridharan, D. J. Costello, Jr., and T. E. Fuja. LDPC
block and convolutional codes from circulant matrices. IEEE Trans. Inform. Theory,
50:2966–2984, 2004.
[1790] T. Tao and V. H. Vu. Additive Combinatorics, volume 105 of Cambridge Studies in
Advanced Mathematics. Cambridge University Press, Cambridge, UK, 2006.
[1791] L. F. Tapia Cuitiño and A. L. Tironi. Some properties of skew codes over finite
fields. Des. Codes Cryptogr., 85:359–380, 2017.
[1792] V. Tarokh, H. Jafarkhani, and A. R. Calderbank. Space-time block codes from
orthogonal design. IEEE Trans. Inform. Theory, 45:1456–1466, 1999.
[1793] V. Tarokh, N. Seshadri, and A. R. Calderbank. Space-time codes for high data rate
wireless communication: performance criterion and code construction. IEEE Trans.
Inform. Theory, 44:744–765, 1998.
[1794] O. Taussky and J. Todd. Covering theorems for groups. Ann. Soc. Polon. Math.,
21:303–305, 1948.
[1795] L. Teirlinck. On projective and affine hyperplanes. J. Combin. Theory Ser. A,
28:290–306, 1980.
[1796] E. Telatar. Capacity of multi-antenna Gaussian channels. European Trans. on
Telecommun., 10:585–596, 1999.
[1797] S. Ten Brink. Convergence of iterative decoding. IEEE Electronic Letters, 35:806–
808, 1999.
[1798] S. Ten Brink. Convergence behavior of iteratively decoded parallel concatenated
codes. IEEE Trans. Inform. Theory, 49:1727–1737, 2001.
[1799] A. Thangaraj and S. W. McLaughlin. Quantum codes from cyclic codes over GF(4m ).
IEEE Trans. Inform. Theory, 47:1176–1178, 2001.
[1800] J. G. Thompson. Weighted averages associated to some codes. Scripta Math., 29:449–
452, 1973.
[1801] T. M. Thompson. From Error-Correcting Codes Through Sphere Packings to Simple
Groups, volume 21, Carus Mathematical Monographs. Mathematical Association of
America, Washington DC, 1983.
[1802] J. Thorpe. Low-density parity-check codes constructed from protographs. IPN
Progress Report, pages 42–154, 2003.
[1803] C. Tian. Characterizing the rate region of the (4, 3, 3) exact-repair regenerating
codes. IEEE J. Selected Areas Commun., 32:967–975, 2014.
[1804] C. Tian, B. Sasidharan, V. Aggarwal, V. A. Vaishampayan, and P. V. Kumar. Lay-
ered exact-repair regenerating codes via embedded error correction and block designs.
IEEE Trans. Inform. Theory, 61:1933–1947, 2015.
[1805] A. Tietäväinen. On the nonexistence of perfect codes over finite fields. SIAM J.
Appl. Math., 24:88–96, 1973.
[1806] A. Tietäväinen. Nonexistence of nontrivial perfect codes in case q = pr1 ps2 , e ≥ 3.
Discrete Math., 17:199–205, 1977.
[1807] A. Tietäväinen. An upper bound on the covering radius as a function of the dual
distance. IEEE Trans. Inform. Theory, 36:1472–1474, 1990.
[1808] A. Tietäväinen. Covering radius and dual distance. Des. Codes Cryptogr., 1:31–46,
1991.
[1809] J. Tits. Ovoı̈des à translations. Rend. Mat. e Appl. (5), 21:37–59, 1962.
[1816] V. D. Tonchev. Codes. In C. J. Colbourn and J. H. Dinitz, editors, The CRC Hand-
book of Combinatorial Designs, chapter VII.1, pages 677–702. Chapman & Hall/CRC
Press, 2nd edition, 2007.
[1817] V. D. Tonchev. On resolvable Steiner 2-designs and maximal arcs in projective
planes. Des. Codes Cryptogr., 84:165–172, 2017.
[1818] A.-L. Trautmann, F. Manganiello, M. Braun, and J. Rosenthal. Cyclic orbit codes.
IEEE Trans. Inform. Theory, 59:7386–7404, 2013.
[1819] P. Trifonov. Efficient design and decoding of polar codes. IEEE Trans. Commun.,
60:3221–3227, 2012.
[1820] H. Trinker. The triple distribution of codes and ordered codes. Discrete Math.,
311:2283–2294, 2011.
[1821] M. A. Tsfasman, S. G. Vlăduţ, and D. Nogin. Algebraic Geometric Codes: Basic
Notions, volume 139 of Mathematical Surveys and Monographs. Amer. Math. Soc.,
Providence, Rhode Island, 2007.
[1822] M. A. Tsfasman, S. G. Vlăduţ, and T. Zink. Modular curves, Shimura curves, and
Goppa codes, better than Varshamov-Gilbert bound. Math. Nachr., 109:21–28, 1982.
[1823] L. Tunçel. Polyhedral and Semidefinite Programming Methods in Combinatorial Op-
timization. Amer. Math. Soc., Providence, Rhode Island; Fields Institute for Re-
search in Mathematical Sciences, Toronto, Canada, 2010.
[1824] M. Vajha, S. B. Balaji, and P. V. Kumar. Explicit MSR codes with optimal access,
optimal sub-packetization and small field size for d = k+1, k+2, k+3. In Proc. IEEE
International Symposium on Information Theory, pages 2376–2380, Vail, Colorado,
June 2018.
[1825] M. Vajha, V. Ramkumar, B. Puranik, G. R. Kini, E. Lobo, B. Sasidharan, P. V.
Kumar, A. Barg, M. Ye, S. Narayanamurthy, S. Hussain, and S. Nandi. Clay codes:
moulding MDS codes to yield an MSR code. In Proc. 16th USENIX Conference on
File and Storage Technologies, pages 139–154, Oakland, California, February 2018.
[1832] J. H. van Lint. Recent results on perfect codes and related topics. In M. Hall,
Jr. and J. H. van Lint, editors, Combinatorics. Part 1: Theory of Designs, Finite
Geometry and Coding Theory, volume 55 of Math. Centre Tracts, pages 158–178.
Math. Centrum, Amsterdam, 1974.
[1833] J. H. van Lint. A survey on perfect codes. Rocky Mountain J. Math., 5:199–224,
1975.
[1834] J. H. van Lint. Kerdock codes and Preparata codes. Congr. Numer., 39:25–41, 1983.
[1835] J. H. van Lint. Repeated-root cyclic codes. IEEE Trans. Inform. Theory, 37:343–345,
1991.
[1836] J. H. van Lint. Introduction to Coding Theory. Springer-Verlag, Berlin, Heidelberg,
3rd edition, 1999.
[1837] J. H. van Lint and A. Schrijver. Construction of strongly regular graphs, two-weight
codes and partial geometries by finite fields. Combinatorica, 1:63–73, 1981.
[1838] J. H. van Lint and R. M. Wilson. On the minimum distance of cyclic codes. IEEE
Trans. Inform. Theory, 32:23–40, 1986.
[1839] J. H. van Lint and R. M. Wilson. A Course in Combinatorics. Cambridge University
Press, Cambridge, UK, 2nd edition, 2001.
[1840] J. van Tilburg. On the McEliece public-key cryptosystem. In S. Goldwasser, editor,
Advances in Cryptology – CRYPTO ’88, volume 403 of Lecture Notes in Comput.
Sci., pages 119–131. Springer, Berlin, Heidelberg, 1990.
[1841] J. van Tilburg. Security-Analysis of a Class of Cryptosystems Based on Linear
Error-Correcting Codes. PhD thesis, Technical University Eindhoven, 1994.
[1842] G. J. M. van Wee. On the nonexistence of certain perfect mixed codes. Discrete
Math., 87:323–326, 1991.
[1843] A. Vardy. The intractability of computing the minimum distance of a code. IEEE
Trans. Inform. Theory, 43:1757–1766, 1997.
[1844] R. R. Varshamov. The evaluation of signals in codes with correction of errors (in
Russian). Dokl. Akad. Nauk SSSR, 117:739–741, 1957. (English translation in [212]
pages 68–71).
[1845] R. R. Varshamov. Some features of linear codes that correct asymmetric errors.
Soviet Physics Doklady, 9:538, 1965.
[1846] B. Vasic, S. K. Chilappagari, D. V. Nguyen, and S. K. Planjery. Trapping set ontol-
ogy. In Proc. 47th Allerton Conference on Communication, Control, and Computing,
pages 1–7, Monticello, Illinois, September-October 2009.
[1847] J. L. Vasil’ev. On nongroup close-packed codes (in Russian). Probl. Kibernet., 8:337–
339, 1962. (English translation in [212] pages 351–357).
[1848] G. Vega. A critical review and some remarks about one- and two-weight irreducible
cyclic codes. Finite Fields Appl., 33:1–13, 2015.
[1849] R. Vehkalahti, C. Hollanti, and F. Oggier. Fast-decodable asymmetric space-time
codes from division algebras. IEEE Trans. Inform. Theory, 58:2362–2385, 2012.
[1850] J. M. Velazquez-Gutierrez and C. Vargas-Rosales. Sequence sets in wireless com-
munication systems: a survey. IEEE Commun. Surveys & Tutorials, 19:1225–1248,
2017.
[1851] P. Véron. A fast identification scheme. In Proc. IEEE International Symposium on
Information Theory, page 359, Whistle, British Columbia, Canada, September 1995.
[1852] M. G. Vides. Métricas Sobre Grupos y Anilloscon Aplicaciones a la Teorı́a de
Códigos. PhD thesis, Universidad Nacional de Córdoba, 2018.
[1853] M. Villanueva, F. Zeng, and J. Pujol. Efficient representation of binary nonlinear
codes: constructions and minimum distance computation. Des. Codes Cryptogr.,
76:3–21, 2015.
[1854] A. Viterbi. Error bounds for convolutional codes and an asymptotically optimum
decoding algorithm. IEEE Trans. Inform. Theory, 13:260–269, 1967.
[1855] E. Viterbo and J. Boutros. A universal lattice code decoder for fading channels.
IEEE Trans. Inform. Theory, 45:1639–1642, 1999.
[1856] S. G. Vlăduţ. On the decoding of algebraic-geometric codes over Fq for q ≥ 16. IEEE
Trans. Inform. Theory, 36:1461–1463, 1990.
[1857] S. G. Vlăduţ and V. G. Drinfeld. The number of points of an algebraic curve (in
Russian). Funktsional. Anal. i Prilozhen., 17:68–69, 1983 (English translation in
Funct. Anal. Appl., 17:53–54, 1983).
[1858] A. vom Felde. A new presentation of Cheng-Sloane’s [32, 17, 8]-code. Arch. Math.
(Basel), 60:508–511, 1993.
[1859] P. Vontobel and R. M. Tanner. Construction of codes based on finite generalized
quadrangles for iterative decoding. In Proc. IEEE International Symposium on In-
formation Theory, page 223, Washington, DC, June 2001.
[1860] Z.-X. Wan. A proof of the automorphisms of linear groups over a field of characteristic
2. Scientia Sinica, 11:1183–1194, 1962.
[1861] Z.-X. Wan. Quaternary Codes, volume 8 of Series on Applied Mathematics. World
Scientific Publishing Co., Inc., River Edge, New Jersey, 1997.
[1862] Z.-X. Wan. Cyclic codes over Galois rings. Algebra Colloq., 6:291–304, 1999.
[1863] Z.-X. Wan. The MacWilliams identity for linear codes over Galois rings. In
I. Althöfer, N. Cai, G. Dueck, L. Khachatrian, M. S. Pinsker, A. Sárközy, I. We-
gener, and Z. Zhang, editors, Numbers, Information and Complexity, pages 333–338.
Kluwer Acad. Publ., Boston, 2000.
[1864] Z.-X. Wan. Lectures on Finite Fields and Galois Rings. World Scientific Publishing
Co., Inc., River Edge, New Jersey, 2003.
[1865] A. Wang and Z. Zhang. Exact cooperative regenerating codes with minimum-repair-
bandwidth for distributed storage. In Proc. 32nd IEEE International Conference on
Computer Communications, pages 400–404, Turin, Italy, April 2013.
[1866] A. Wang and Z. Zhang. Repair locality with multiple erasure tolerance. IEEE Trans.
Inform. Theory, 60:6979–6987, 2014.
[1867] A. Wang and Z. Zhang. An integer programming-based bound for locally repairable
codes. IEEE Trans. Inform. Theory, 61:5280–5294, 2015.
[1868] A. Wang, Z. Zhang, and D. Lin. Bounds and constructions for linear locally repairable
codes over binary fields. In Proc. IEEE International Symposium on Information
Theory, pages 2033–2037, Aachen, Germany, June 2017.
[1869] A. Wang, Z. Zhang, and M. Liu. Achieving arbitrary locality and availability in
binary codes. In Proc. IEEE International Symposium on Information Theory, pages
1866–1870, Hong Kong, China, June 2015.
[1870] H. Wang, C. Xing, and R. Safavi-Naini. Linear authentication codes: bounds and
constructions. IEEE Trans. Inform. Theory, 49:866–872, 2003.
[1871] L. Wang, K. Feng, S. Ling, and C. Xing. Asymmetric quantum codes: characteriza-
tion and constructions. IEEE Trans. Inform. Theory, 56:2938–2945, 2010.
[1872] Q. Wang, K. Ding, and R. Xue. Binary linear codes with two weights. IEEE Com-
mun. Letters, 19:1097–1100, 2015.
[1877] H. N. Ward. Divisible codes—a survey. Serdica Math. J., 27:263–278, 2001.
[1878] H. S. Warren. Hacker’s Delight. Addison-Wesley Professional, 2nd edition, 2012.
[1879] A. Wassermann. Finding simple t-designs with enumeration techniques. J. Combin.
Des., 6:79–90, 1998.
[1880] A. Wassermann. Attacking the market split problem with lattice point enumeration.
J. Comb. Optim., 6:5–16, 2002.
[1881] A. Wassermann. Computing the minimum distance of linear codes. In Proc. 8th
International Workshop on Algebraic and Combinatorial Coding Theory, pages 254–
257, Tsarskoe Selo, Russia, September 2002.
[1882] V. K. Wei. Generalized Hamming weights for linear codes. IEEE Trans. Inform.
Theory, 37:1412–1418, 1991.
[1883] P. Weiner. Multidimensional Convolutional Codes. PhD thesis, University of Notre
Dame, 1998.
[1884] L. R. Welch. Lower bounds on the maximum cross correlation of signals. IEEE
Trans. Inform. Theory, 20:397–399, 1974.
[1885] L. R. Welch, R. J. McEliece, and H. Rumsey, Jr. A low-rate improvement on the
Elias bound. IEEE Trans. Inform. Theory, 20:676–678, 1974.
[1886] E. J. Weldon, Jr. Difference-set cyclic codes. Bell System Tech. J., 45:1045–1055,
1966.
[1887] E. J. Weldon, Jr. New generalizations of the Reed–Muller codes. Part II: nonprimitive
codes. IEEE Trans. Inform. Theory, 14:199–205, 1968. (Also reprinted in [212] pages
334–340).
[1888] D. B. West. Introduction to Graph Theory. Prentice Hall, Inc., Upper Saddle River,
New Jersey, 2nd edition, 2001.
[1889] N. Wiberg. Codes and Decoding on General Graphs. PhD thesis, Electrical Engi-
neering, Linköping University, Sweden, 1996.
[1890] C. Wieschebrink. Two NP-complete problems in coding theory with an application
in code based cryptography. In Proc. IEEE International Symposium on Information
Theory, pages 1733–1737, Seattle, Washington, July 2006.
[1891] M. M. Wilde and T. A. Brun. Optimal entanglement formulas for entanglement-
assisted quantum coding. Physical Review A, 77(6):064302, June 2008.
[1892] J. C. Willems. From time series to linear system I: finite-dimensional linear time
invariant systems. Automatica J. IFAC, 22:561–580, 1986.
[1893] W. Willems. A note on self-dual group codes. IEEE Trans. Inform. Theory, 48:3107–
3109, 2002.
[1894] R. A. Wilson. An Atlas of sporadic group representations. In R. T. Curtis and R. A.
Wilson, editors, The Atlas of Finite Groups: Ten Years On (Birmingham, 1995),
volume 249 of London Math. Soc. Lecture Note Ser., pages 261–273. Cambridge
University Press, Cambridge, UK, 1998.
[1895] S. Winograd. Some bilinear forms whose multiplicative complexity depends on the
field of constants. Mathematical Systems Theory, 10:169–180, 1977.
[1896] M. Wirtz. On the parameters of Goppa codes. IEEE Trans. Inform. Theory, 34:1341–
1343, 1988.
[1897] J. K. Wolf. Efficient maximum-likelihood decoding of linear block codes using a
trellis. IEEE Trans. Inform. Theory, 24:76–80, 1978.
[1898] J. Wolfmann. Codes projectifs à deux ou trois poids associés aux hyperquadriques
d’une géométrie finie. Discrete Math., 13:185–211, 1975.
[1899] J. Wolfmann. New bounds on cyclic codes from algebraic curves. In G. D. Cohen
and J. Wolfmann, editors, Coding Theory and Applications, volume 388 of Lecture
Notes in Comput. Sci., pages 47–62. Springer, Berlin, Heidelberg, 1989.
[1900] J. Wolfmann. Bent functions and coding theory. In A. Pott, V. Kumaran, T. Helle-
seth, and D. Jungnickel, editors, Difference Sets, Sequences and Their Correlation
Properties, volume 542 of NATO Adv. Sci. Inst. Ser. C Math. Phys. Sci., pages
393–418. Kluwer Acad. Publ., Dordrecht, Netherlands, 1999.
[1901] J. Wolfmann. Negacyclic and cyclic codes over Z4 . IEEE Trans. Inform. Theory,
45:2527–2532, 1999.
[1902] J. Wolfmann. Binary images of cyclic codes over Z4 . IEEE Trans. Inform. Theory,
47:1773–1779, 2001.
[1903] S. Wolfram. Idea Makers: Personal Perspectives on the Lives & Ideas of Some
Notable People. Wolfram Media, Inc., Champaign, Illinois, 2016.
[1904] H. Wolkowicz, R. Saigal, and L. Vandenberghe, editors. Handbook of Semidefinite
Programming. Kluwer Acad. Pub., Boston, 2000.
[1905] J. A. Wood. Extension theorems for linear codes over finite rings. In T. Mora
and H. F. Mattson, Jr., editors, Applied Algebra, Algebraic Algorithms and Error-
Correcting Codes, volume 1255 of Lecture Notes in Comput. Sci., pages 329–340.
Springer, Berlin, Heidelberg, 1997.
[1906] J. A. Wood. Duality for modules over finite rings and applications to coding theory.
Amer. J. Math., 121:555–575, 1999.
[1907] W. K. Wootters and W. H. Zurek. A single quantum cannot be cloned. Nature,
299:802–803, 1982.
[1908] S. J. Wright. Primal-dual Interior-point Methods. Society for Industrial and Applied
Mathematics (SIAM), Philadelphia, 1997.
[1909] B. Wu and Z. Liu. Linearized polynomials over finite fields revisited. Finite Fields
Appl., 22:79–100, 2013.
[1910] F. Wu. Constructions of strongly regular Cayley graphs using even index Gauss
sums. J. Combin. Des., 21:432–446, 2013.
[1911] Y. Wu, N. Li, and X. Zeng. Linear codes with few weights from cyclotomic classes
and weakly regular bent functions. Des. Codes Cryptogr., 88:1255–1272, 2020.
[1912] S.-T. Xia and F.-W. Fu. On the stopping distance of finite geometry LDPC codes.
IEEE Commun. Letters, 10:381–383, 2006.
[1913] S.-T. Xia and F.-W. Fu. Johnson type bounds on constant dimension codes. Des.
Codes Cryptogr., 50:163–172, 2009.
[1914] C. Xiang. It is indeed a fundamental construction of all linear codes.
arXiv:1610.06355 [cs.IT], October 2016.
[1915] C. Xing. Asymptotic bounds on frameproof codes. IEEE Trans. Inform. Theory,
48:2991–2995, 2002.
[1916] C. Xing. Nonlinear codes from algebraic curves improving the Tsfasman-Vlăduţ-Zink
bound. IEEE Trans. Inform. Theory, 49:1653–1657, 2003.
[1917] E. Yaakobi, J. Bruck, and P. H. Siegel. Decoding of cyclic codes over symbol-pair
read channels. In Proc. IEEE International Symposium on Information Theory,
pages 2891–2895, Cambridge, Massachussets, July 2012.
[1918] E. Yaakobi, J. Bruck, and P. H. Siegel. Constructions and decoding of cyclic codes
over b-symbol read channels. IEEE Trans. Inform. Theory, 62:1541–1551, 2016.
[1919] S. Yang and J.-C. Belfiore. Optimal space-time codes for the MIMO amplify-and-
forward cooperative channel. IEEE Trans. Inform. Theory, 53:647–663, 2007.
[1920] X. Yang and J. L. Massey. The condition for a cyclic code to have a complementary
dual. Discrete Math., 126:391–393, 1994.
[1921] Y. Yang and X. Tang. Generic construction of binary sequences of period 2N with
optimal odd correlation magnitude based on quaternary sequences of odd period N .
IEEE Trans. Inform. Theory, 64:384–392, 2018.
[1922] N. Yankov. A putative doubly even [72, 36, 16] code does not have an automorphism
of order 9. IEEE Trans. Inform. Theory, 58:159–163, 2012.
[1923] H. Yao and G. W. Wornell. Achieving the full MIMO diversity-multiplexing frontier
with rotation-based space-time codes. In Proc. 41st Allerton Conference on Com-
munication, Control, and Computing, pages 400–409, Monticello, Illinois, October
2003.
[1924] F. Ye, K. W. Shum, and R. W. Yeung. The rate region for secure distributed storage
systems. IEEE Trans. Inform. Theory, 63:7038–7051, 2017.
[1925] M. Ye and A. Barg. Explicit constructions of high-rate MDS array codes with optimal
repair bandwidth. IEEE Trans. Inform. Theory, 63:2001–2014, 2017.
[1926] M. Ye and A. Barg. Explicit constructions of optimal-access MDS codes with nearly
optimal sub-packetization. IEEE Trans. Inform. Theory, 63:6307–6317, 2017.
[1927] M. Ye and A. Barg. Cooperative repair: constructions of optimal MDS codes for all
admissible parameters. IEEE Trans. Inform. Theory, 65:1639–1656, 2019.
[1928] V. Y. Yorgov. Binary self-dual codes with an automorphism of odd order (in Rus-
sian). Problemy Peredači Informacii, 19(4):11–24, 1983. (English translation in Probl.
Inform. Transm., 19(4):260–270, 1983).
[1929] V. Y. Yorgov. A method for constructing inequivalent self-dual codes with applica-
tions to length 56. IEEE Trans. Inform. Theory, 33:77–82, 1987.
[1930] V. Y. Yorgov. On the automorphism group of a putative code. IEEE Trans. Inform.
Theory, 52:1724–1726, 2006.
[1931] V. Y. Yorgov and D. Yorgov. The automorphism group of a self-dual [72, 36, 16] code
does not contain Z4 . IEEE Trans. Inform. Theory, 60:3302–3307, 2014.
[1932] E. V. York. Algebraic Description and Construction of Error Correcting Codes: A
Linear Systems Point of View. PhD thesis, University of Notre Dame, 1997.
[1933] D. C. Youla and P. F. Pickel. The Quillen-Suslin theorem and the structure of n-
dimensional elementary polynomial matrices. IEEE Trans. Circuits and Systems,
31:513–518, 1984.
[1934] N. Y. Yu and G. Gong. New binary sequences with optimal autocorrelation magni-
tude. IEEE Trans. Inform. Theory, 54:4771–4779, 2008.
[1935] J. Yuan and C. Ding. Secret sharing schemes from three classes of linear codes. IEEE
Trans. Inform. Theory, 52:206–212, 2006.
[1936] V. A. Yudin. Minimum potential energy of a point system of charges (in Rus-
sian). Diskret. Mat., 4(2):115–121, 1992. (English translation in Discrete Math. Appl.,
3(1):75–81, 1993).
[1937] R. Zamir. Lattices are everywhere. In Proc. Information Theory and Applications
Workshop, pages 392–421, San Diego, California, February 2009.
[1938] R. Zamir. Lattice Coding for Signals and Networks: A Structured Coding Approach to
Quantization, Modulation, and Multiuser Information Theory. Cambridge University
Press, Cambridge, UK, 2014.
[1939] S. K. Zaremba. Covering problems concerning abelian groups. J. London Math. Soc.,
27:242–246, 1952.
[1940] A. Zeh and S. Ling. Decoding of quasi-cyclic codes up to a new lower bound for the
minimum distance. In Proc. IEEE International Symposium on Information Theory,
pages 2584–2588, Honolulu, Hawaii, June-July 2014.
[1941] G. Zémor. Minimum distance bounds by graph analysis. IEEE Trans. Inform.
Theory, 47:835–837, 2001.
[1942] J. Zhang, X. Wang, and G. Ge. Some improvements on locally repairable codes.
arXiv:1506.04822 [cs.IT], June 2015.
[1943] S. Zhang. On the nonexistence of extremal self-dual codes. Discrete Appl. Math.,
91:277–286, 1999.
[1944] D. Zheng, X. Li, and K. Chen. Code-based ring signature scheme. Internat. J.
Network Security, 5:154–157, 2007.
[1945] L. Zheng and D. N. C. Tse. Diversity and multiplexing: a fundamental tradeoff in
multiple-antenna channels. IEEE Trans. Inform. Theory, 49:1073–1096, 2003.
[1946] Z. Zhou and C. Ding. A class of three-weight cyclic codes. Finite Fields Appl.,
25:79–93, 2014.
[1947] Z. Zhou, N. Li, C. Fan, and T. Helleseth. Linear codes with two or three weights
from quadratic bent functions. Des. Codes Cryptogr., 81:283–295, 2016.
[1948] V. A. Zinov’ev. Generalized cascade codes (in Russian). Problemy Peredači Infor-
macii, 12(1):5–15, 1976. (English translation in Probl. Inform. Transm., 12(1):2–9,
1976).
[1949] V. A. Zinov’ev and V. K. Leont’ev. On non-existence of perfect codes over Galois
fields (in Russian). Probl. Control and Inform. Theory, 2:123–132, 1973.