On quadratic residue codes and hyperelliptic curves

نویسنده

  • David Joyner
چکیده

For an odd prime p and each non-empty subset S ⊂ GF (p), consider the hyperelliptic curve XS defined by y = fS(x), where fS(x) = Q a∈S(x− a). Using a connection between binary quadratic residue codes and hyperelliptic curves over GF (p), this paper investigates how coding theory bounds give rise to bounds such as the following example: for all sufficiently large primes p there exists a subset S ⊂ GF (p) for which the bound |XS(GF (p))| > 1.39p holds. We also use the quasi-quadratic residue codes defined below to construct an example of a formally self-dual optimal code whose zeta function does not satisfy the “Riemann hypothesis.”

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Weight Distribution of Quasi-quadratic Residue Codes

In this paper, we begin by reviewing some of the known properties of QQR codes and proved that $PSL_2(p)$ acts on the extended QQR code when $p \equiv 3 \pmod 4$. Using this discovery, we then showed their weight polynomials satisfy a strong divisibility condition, namely that they are divisible by $(x^2 + y^2)^{d-1}$, where $d$ is the corresponding minimum distance. Using this result, we were ...

متن کامل

The number of rational points of hyperelliptic curves over subsets of finite fields

Abstract. We prove two related concentration inequalities concerning the number of rational points of hyperelliptic curves over subsets of a finite field. In particular, we investigate the probability of a large discrepancy between the numbers of quadratic residues and non-residues in the image of such subsets over uniformly random hyperelliptic curves of given degrees. We find a constant proba...

متن کامل

Explicit Infrastructure for Real Quadratic Function Fields and Real Hyperelliptic Curves

In 1989, Koblitz first proposed the Jacobian of a an imaginary hyperelliptic curve for use in public-key cryptographic protocols. This concept is a generalization of elliptic curve cryptography. It can be used with the same assumed key-per-bit strength for small genus. More recently, real hyperelliptic curves of small genus have been introduced as another source for cryptographic protocols. The...

متن کامل

Long Quadratic Residue Codes

A long standing problem has been to develop “good” binary linear block codes, C, to be used for error-correction. The length of the block is denoted n and the dimension of the code is denoted k. So in this notation C ⊆ GF (2) is a k-dimensional subspace. Another important parameter is the smallest weight of any non-zero codeword, d. This is related to error-correction because C can correct [d−1...

متن کامل

Sieving in Function Fields

We present the rst implementation of sieving techniques in the context of function elds. More precisely, we compute in class groups of quadratic congruence function elds by combining the Algorithm of Hafner and McCurley with sieving ideas known from factoring. We apply our methods to compute generators and relations of the Jacobian variety of hyperelliptic curves over nite elds.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Discrete Mathematics & Theoretical Computer Science

دوره 10  شماره 

صفحات  -

تاریخ انتشار 2008