Classification of cosets of the Reed-Muller code R(m−3,m)
نویسندگان
چکیده
منابع مشابه
On Some Cosets of the First-Order Reed-Muller Code with High Minimum Weight
We study a family of particular cosets of the first-order Reed–Muller code R(1;m): those generated by special codewords, the idempotents. Thus we obtain new maximal weight distributions of cosets of R(1; 7) and 84 distinct almost maximal weight distributions of cosets of R(1; 9), that is, with minimum weight 240. This leads to crypotographic applications in the context of stream ciphers.
متن کاملOn Cusick-Cheon's Conjecture About Balanced Boolean Functions in the Cosets of the Binary Reed-Muller Code
It is proved a generalization of Cusick-Cheon’s conjecture on balanced Boolean functions in the cosets of the binary Reed-Muller code RM (k ,m) of order k and length 2m, when k = 1 or k ≥ (m − 1)/2.
متن کاملPunctured Reed-Muller code-based McEliece cryptosystems
The authors propose new McEliece cryptosystems based on punctured Reed–Muller (RM) codes. They successfully show that the commonly known attacks, such as the Minder–Shokrollahi attack, the Chizhov–Borodin attack, and the square code attack, are ineffective against the proposed RM code-based McEliece cryptosystem. We developed an optimal puncturing scheme to prevent the above-mentioned attacks f...
متن کاملOn the weight distributions of optimal cosets of the first-order Reed-Muller codes
We study the weight distributions of cosets of the first-order Reed–Muller code (1 ) for odd , whose minimum weight is greater than or equal to the so-called quadratic bound. Some general restrictions on the weight distribution of a coset of (1 ) are obtained by partitioning its words according to their weight divisibility. Most notably, we show that there are exactly five weight distributions ...
متن کاملSteganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
In this paper, a new steganography scheme with high embedding payload and good visual quality is presented. Before embedding process, secret information is encoded as block using Reed-Muller error correction code. After data encoding and embedding into the low-order bits of host image, modulus function is used to increase visual quality of stego image. Since the proposed method is able to embed...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Discrete Mathematics
سال: 1994
ISSN: 0012-365X
DOI: 10.1016/0012-365x(94)90113-9