scispace - formally typeset
Journal ArticleDOI

On the weight structure of Reed-Muller codes

Tadao Kasami, +1 more
- 01 Nov 1970 - 
- Vol. 16, Iss: 6, pp 752-759
TLDR
This theorem completely characterizes the codewords of the \nu th-order Reed-Muller code whose weights are less than twice the minimum weight and leads to the weight enumerators for thosecodewords.
Abstract
The following theorem is proved. Let f(x_1,\cdots, x_m) be a binary nonzero polynomial of m variables of degree \nu . H the number of binary m -tuples (a_1,\cdots, a_m) with f(a_1, \cdots, a_m) = 1 is less than 2^{m-\nu+1} , then f can be reduced by an invertible affme transformation of its variables to one of the following forms. \begin{equation} f = y_1 \cdots y_{\nu - \mu} (y_{\nu-\mu+1} \cdots y_{\nu} + y_{\nu+1} \cdots y_{\nu+\mu}), \end{equation} where m \geq \nu+\mu and \nu \geq \mu \geq 3 . \begin{equation} f = y_1 \cdots y_{\nu-2}(y_{\nu-1} y_{\nu} + y_{\nu+1} y_{\nu+2} + \cdots + y_{\nu+2\mu -3} y_{\nu+2\mu-2}), \end{equation} This theorem completely characterizes the codewords of the \nu th-order Reed-Muller code whose weights are less than twice the minimum weight and leads to the weight enumerators for those codewords. These weight formulas are extensions of Berlekamp and Sloane's results.

read more

Citations
More filters
Book ChapterDOI

Boolean Models and Methods in Mathematics, Computer Science, and Engineering: Boolean Functions for Cryptography and Error-Correcting Codes

TL;DR: Encryption-decryption is the most ancient cryptographic activity, but its nature has deeply changed with the invention of computers, because the cryptanalysis (the activity of the third person, the eavesdropper, who aims at recovering the message) can use their power.
Book ChapterDOI

Algebraic Attacks and Decomposition of Boolean Functions

TL;DR: In this paper, it was shown that low-degree relations have been found for several well known constructions of stream ciphers immune to all previously known attacks and that such relations may be derived by multiplying the output function of a stream cipher by a well chosen low degree function such that the product function is again of low degree.
Journal ArticleDOI

Weight distributions of the cosets of the (32,6) Reed-Muller code

TL;DR: The weight distribution of all 2^26 cosets of the (32,6) first-order Reed-Muller code is presented, and this equivalent problem: how well are the 2^32 Boolean functions of five variables approximated by the2^5 linear functions and their complements?
Journal ArticleDOI

Reed–Muller Codes Achieve Capacity on Erasure Channels

TL;DR: This work shows that symmetry alone implies near-optimal performance in any sequence of linear codes where the blocklengths are strictly increasing, the code rates converge, and the permutation group of each code is doubly transitive.
Book ChapterDOI

Cryptanalysis of the Sidelnikov Cryptosystem

TL;DR: A structural attack against the Sidelnikov cryptosystem is presented, which creates a private key from a given public key and is effective if the parameters of the Reed-Muller code allow for efficient sampling of minimum weight codewords.
References
More filters
Book

Algebraic Coding Theory

TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Journal ArticleDOI

Application of Boolean algebra to switching circuit design and to error detection

TL;DR: It is shown that certain parts of the multiple output problem for switching circuits that have more than one output may be reduced to a single output problem whose inputs are equal in number to the sum of the numbers of inputs and outputs in the original problem.
Journal ArticleDOI

New generalizations of the Reed-Muller codes--I: Primitive codes

TL;DR: A natural generalization to the nonbinary case is presented, which also includes the Reed-Muller codes and Reed-Solomon codes as special cases and the generator polynomial is characterized and the minimum weight is established.
Journal ArticleDOI

Some results on cyclic codes which are invariant under the affine group and their applications

TL;DR: A number of results on minimum weights in BCH codes are presented, and exact minimum weights have been established for a number of subclasses of NBCH codes.
Journal ArticleDOI

Power moment identities on weight distributions in error correcting codes

TL;DR: A series of power moment identities from the MacWilliams identities are derived and an earlier result of Assmus and Mattson is shown to be equivalent to the third power moment identity.