Polynomial Codes Over Certain Finite Fields

From MaRDI portal
Revision as of 11:22, 4 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3280459

DOI10.1137/0108018zbMath0099.34403OpenAlexW2148575324WikidataQ56081991 ScholiaQ56081991MaRDI QIDQ3280459

Gustave Solomon, Irving S. Reed

Publication date: 1960

Published in: Journal of the Society for Industrial and Applied Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/0108018




Related Items (97)

Duality of constacyclic codes of prime power length over the finite non-commutative chain ring \(\frac{ \mathbb{F}_{p^m} [ u , \theta }{ \langle u^2 \rangle} \)] ⋮ A characterization of MDS codes that have an error correcting pairOn algorithms to find \(p\)-orderingComparison of error protection methods for audio-video broadcast over DVB-HA New Algorithm for Decoding Reed-Solomon CodesAN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALSPrivate Stream Search at Almost the Same Communication Cost as a Regular SearchInteractive communication with unknown noise ratePolynomial representation is tricky: maliciously secure private set intersection revisitedScalable and systolic architecture for computing double exponentiation over \(\text{GF}(2^m)\)Skew and linearized Reed-Solomon codes and maximum sum rank distance codes over any division ringNegacyclic codes of prime power length over the finite non-commutative chain ring 𝔽pm[u,𝜃 〈u2〉] ⋮ Simple algorithms for decoding systematic Reed-Solomon codesOptimal extension protocols for Byzantine broadcast and agreementSecure multi-party computation in large networksNew Galois hulls of generalized Reed-Solomon codesZigzag decodable codes: linear-time erasure codes with applications to data storageReal-valued group testing for quantitative molecular assaysMDS coding is better than replication for job completion timesE-commerce of digital items and the problem of item validation: introducing the concept of reversible degradationA Decoding Approach to Reed–Solomon Codes from Their DefinitionNP-Hardness of Reed--Solomon Decoding, and the Prouhet--Tarry--Escott ProblemAlgebraic theory of block codes detecting independent errorsTechnique for authenticating H.264/SVC and its performance evaluation over wireless mobile networksA General Family of MSRD Codes and PMDS Codes with Smaller Field Sizes from Extended Moore MatricesThe truncated and supplemented Pascal matrix and applicationsGraph reconstruction in the congested cliqueOn multiple burst-correcting MDS codesMeasure-resend authenticated semi-quantum key distribution with single photonsInterpolation for Brill–Noether curvesKeyword-Based Delegable Proofs of StorageDensities of codes of various linearity degrees in translation-invariant metric spacesImproved List-Decodability and List-Recoverability of Reed–Solomon Codes via Tree PackingsEfficient NIZKs from LWE via polynomial reconstruction and ``MPC in the headConnections between the extreme points for Vandermonde determinants and minimizing risk measure in financial mathematicsGeneralized Singleton Bound and List-Decoding Reed–Solomon Codes Beyond the Johnson RadiusMontgomery Residue Representation Fault-Tolerant Computation in GF(2 k )Exact recording of Metropolis-Hastings-class Monte Carlo simulations using one bit per sampleOn black-box constructions of time and space efficient sublinear arguments from symmetric-key primitivesCombinatorics, probability and computing. Abstracts from the workshop held April 24--30, 2022Unnamed ItemBounds in the Lee metric and optimal codesNetwork-agnostic security comes (almost) for free in DKG and MPCSingleton-type bounds for list-decoding and list-recovery, and related resultsA subclass of \(q^m\)-ary Reed-Solomon codes and decoding of some rational GAG-codesSome new classes of additive MDS and almost MDS codes over finite fieldsDistributed CONGEST Algorithms against Mobile AdversariesA new hybrid coding scheme: homomorphic minimum bandwidth repairing codesAdaptively secure inner product encryption from LWEKVaC: key-value commitments for blockchains and beyondThe basics of basesPacked multiplication: how to amortize the cost of side-channel masking?Optimal quantum error correcting codes from absolutely maximally entangled statesSelf-stabilizing and private distributed shared atomic memory in seldomly fair message passing networksA library for formalization of linear error-correcting codesClique-Based Neural Associative Memories with Local Coding and PrecodingA new bound on the minimum distance of cyclic codes using small-minimum-distance cyclic codesOptimistic Erasure-Coded Distributed StorageFault-Tolerant Finite Field Computation in the Public Key CryptosystemsSubcodes of Reed-Solomon Codes Suitable for Soft DecodingInferring Sparse Preference Lists from Partial InformationTwo-dimensional generalized discrete Fourier transform and related quasi-cyclic Reed--Solomon codesFast Reed-Solomon Interactive Oracle Proofs of ProximityLinear system security -- detection and correction of adversarial sensor attacks in the noise-free caseA coded shared atomic memory algorithm for message passing architecturesBinding cryptographic keys into biometric data: optimizationAn application of information theory and error-correcting codes to fractional factorial experimentsToy models of holographic duality between local HamiltoniansPrivate information retrieval from locally repairable databases with colluding serversSymmetric threshold multipath (STM): an online symmetric key management schemeOptimal Las Vegas reduction from one-way set reconciliation to error correctionA coding scheme that increases the code rateReal-time optimized error protection assignment for scalable image and video over wireless channelsBilinear forms over a finite field, with applications to coding theoryA new minimize matrix computation coding method for distributed storage systemsAn improved analysis of least squares superposition codes with Bernoulli dictionaryRevisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing SchemeBetter Preprocessing for Secure Multiparty ComputationOn Closest Pair in Euclidean Metric: Monochromatic is as Hard as BichromaticSystematic encoders for generalized Gabidulin codes and the \(q\)-analogue of Cauchy matricesSimplified High-Speed High-Distance List Decoding for Alternant CodesGallager error-correcting codes for binary asymmetric channelsA note on good permutation codes from Reed-Solomon codesSelf-repairing codesSimultaneous rational function reconstruction with errors: handling multiplicities and polesFeynman graphs and the large dimensional limit of multipartite entanglementNon-malleability against polynomial tamperingCodes for Distributed StorageCodes in the Sum-Rank Metric: Fundamentals and ApplicationsNoisy beeping networksMaximum Distance Separable Codes Based on Circulant Cauchy MatricesEfficient sampling of non-strict turnstile data streamsA new approach for computing the inverse of confluent Vandermonde matrices via Taylor's expansionComputational Integrity with a Public Random String from Quasi-Linear PCPsFractal mathematical over extended finite fields Fp[x/(f(x))] ⋮ Recovering erasures by using MDS codes over extension alphabetsTesting equality under the local broadcast model







This page was built for publication: Polynomial Codes Over Certain Finite Fields