Journal ArticleDOI
On the weight structure of Reed-Muller codes
Tadao Kasami,N. Tokura +1 more
TLDR
This theorem completely characterizes the codewords of the \nu th-order Reed-Muller code whose weights are less than twice the minimum weight and leads to the weight enumerators for thosecodewords.Abstract:
The following theorem is proved. Let f(x_1,\cdots, x_m) be a binary nonzero polynomial of m variables of degree \nu . H the number of binary m -tuples (a_1,\cdots, a_m) with f(a_1, \cdots, a_m) = 1 is less than 2^{m-\nu+1} , then f can be reduced by an invertible affme transformation of its variables to one of the following forms. \begin{equation} f = y_1 \cdots y_{\nu - \mu} (y_{\nu-\mu+1} \cdots y_{\nu} + y_{\nu+1} \cdots y_{\nu+\mu}), \end{equation} where m \geq \nu+\mu and \nu \geq \mu \geq 3 . \begin{equation} f = y_1 \cdots y_{\nu-2}(y_{\nu-1} y_{\nu} + y_{\nu+1} y_{\nu+2} + \cdots + y_{\nu+2\mu -3} y_{\nu+2\mu-2}), \end{equation} This theorem completely characterizes the codewords of the \nu th-order Reed-Muller code whose weights are less than twice the minimum weight and leads to the weight enumerators for those codewords. These weight formulas are extensions of Berlekamp and Sloane's results.read more
Citations
More filters
Book ChapterDOI
Boolean Models and Methods in Mathematics, Computer Science, and Engineering: Boolean Functions for Cryptography and Error-Correcting Codes
TL;DR: Encryption-decryption is the most ancient cryptographic activity, but its nature has deeply changed with the invention of computers, because the cryptanalysis (the activity of the third person, the eavesdropper, who aims at recovering the message) can use their power.
Book ChapterDOI
Algebraic Attacks and Decomposition of Boolean Functions
TL;DR: In this paper, it was shown that low-degree relations have been found for several well known constructions of stream ciphers immune to all previously known attacks and that such relations may be derived by multiplying the output function of a stream cipher by a well chosen low degree function such that the product function is again of low degree.
Journal ArticleDOI
Weight distributions of the cosets of the (32,6) Reed-Muller code
Elwyn R. Berlekamp,L. R. Welch +1 more
TL;DR: The weight distribution of all 2^26 cosets of the (32,6) first-order Reed-Muller code is presented, and this equivalent problem: how well are the 2^32 Boolean functions of five variables approximated by the2^5 linear functions and their complements?
Journal ArticleDOI
Reed–Muller Codes Achieve Capacity on Erasure Channels
Shrinivas Kudekar,Santhosh Kumar,Marco Mondelli,Henry D. Pfister,Eren Sasoglu,Rudiger Urbanke +5 more
TL;DR: This work shows that symmetry alone implies near-optimal performance in any sequence of linear codes where the blocklengths are strictly increasing, the code rates converge, and the permutation group of each code is doubly transitive.
Book ChapterDOI
Cryptanalysis of the Sidelnikov Cryptosystem
Lorenz Minder,Amin Shokrollahi +1 more
TL;DR: A structural attack against the Sidelnikov cryptosystem is presented, which creates a private key from a given public key and is effective if the parameters of the Reed-Muller code allow for efficient sampling of minimum weight codewords.
References
More filters
Book
Algebraic Coding Theory
TL;DR: This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory," originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field.
Journal ArticleDOI
Application of Boolean algebra to switching circuit design and to error detection
TL;DR: It is shown that certain parts of the multiple output problem for switching circuits that have more than one output may be reduced to a single output problem whose inputs are equal in number to the sum of the numbers of inputs and outputs in the original problem.
Journal ArticleDOI
New generalizations of the Reed-Muller codes--I: Primitive codes
TL;DR: A natural generalization to the nonbinary case is presented, which also includes the Reed-Muller codes and Reed-Solomon codes as special cases and the generator polynomial is characterized and the minimum weight is established.
Journal ArticleDOI
Some results on cyclic codes which are invariant under the affine group and their applications
TL;DR: A number of results on minimum weights in BCH codes are presented, and exact minimum weights have been established for a number of subclasses of NBCH codes.
Journal ArticleDOI
Power moment identities on weight distributions in error correcting codes
TL;DR: A series of power moment identities from the MacWilliams identities are derived and an earlier result of Assmus and Mattson is shown to be equivalent to the third power moment identity.