All Issues

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Advances in Mathematics of Communications

2009 , Volume 3 , Issue 3

Select all articles


On the Fourier spectra of the infinite families of quadratic APN functions
Carl Bracken and  Zhengbang Zha
2009, 3(3): 219-226 doi: 10.3934/amc.2009.3.219 +[Abstract](33) +[PDF](130.8KB)
It is well known that a quadratic function defined on a finite field of odd degree is almost bent (AB) if and only if it is almost perfect nonlinear (APN). For the even degree case there is no apparent relationship between the values in the Fourier spectrum of a function and the APN property. In this article we compute the Fourier spectrum of the quadrinomial family of APN functions from [5]. With this result, all known infinite families of APN functions now have their Fourier spectra and hence their nonlinearities computed.
Dual generalizations of the concept of cyclicity of codes
Sergio R. López-Permouth , Benigno R. Parra-Avila and  Steve Szabo
2009, 3(3): 227-234 doi: 10.3934/amc.2009.3.227 +[Abstract](40) +[PDF](131.7KB)
In this paper we focus on two generalizations of the notion of cyclicity of codes: polycyclic codes and sequential codes. We establish a duality between these two generalizations and also show connections between them and other well-known generalizations of cyclicity such as the notions of negacyclicity and constacyclicity. In particular, it is shown that a code $C$ is sequential and polycyclic if and only if $C$ and its dual C are both sequential if and only if $C$ and its dual C are both polycyclic. Furthermore, any one of these equivalent statements characterizes the family of constacyclic codes.
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3): 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](73) +[PDF](218.2KB)
We collect the main construction methods for Golomb rulers available in the literature along with their proofs. In particular, we demonstrate that the Bose-Chowla method yields Golomb rulers that appear as the main diagonal of a special subfamily of Golomb Costas arrays. We also show that Golomb rulers can be composed to yield longer Golomb rulers.
Construction of new self-dual codes over $GF(5)$ using skew-Hadamard matrices
Christos Koukouvinos and  Dimitris E. Simos
2009, 3(3): 251-263 doi: 10.3934/amc.2009.3.251 +[Abstract](38) +[PDF](204.9KB)
In this paper, we give optimal self-dual codes over $GF(5)$ for lengths $24$, $40$, $48$ and $56$. In particular, new inequivalent $[48, 24]$ and $[56, 28]$ self-dual codes over $GF(5)$ whose minimum weights are $14$ and $16$, are constructed using skew-Hadamard matrices of order $24$ and $28$, thus improving the only known quadratic double circulant self-dual codes of length $48$ and $56$. Moreover, $[80, 40]$ and $[88, 44]$ self-dual codes whose minimum weights are $17$ and $19$ over $GF(5)$, are constructed for the first time. These codes are derived from skew-Hadamard matrices of order $40$ and $44$, respectively. Finally, a new $[56, 28, 17]$ self-dual code is constructed over $GF(7)$ having the highest minimum weight among $[56, 28]$ self-dual codes. This new optimal code is constructed from a skew-Hadamard-matrix of order $28$, for the first time.
A note on negacyclic and cyclic codes of length $p^s$ over a finite field of characteristic $p$
Hakan Özadam and  Ferruh Özbudak
2009, 3(3): 265-271 doi: 10.3934/amc.2009.3.265 +[Abstract](34) +[PDF](130.9KB)
Recently, the minimum Hamming weights of negacyclic and cyclic codes of length $p^s$ over a finite field of characteristic $p$ are determined in [4]. We show that the minimum Hamming weights of such codes can also be obtained immediately using the results of [1].
Bounds and constructions for key distribution schemes
Yvo Desmedt , Niels Duif , Henk van Tilborg and  Huaxiong Wang
2009, 3(3): 273-293 doi: 10.3934/amc.2009.3.273 +[Abstract](38) +[PDF](955.0KB)
Key distribution schemes play a significant role in key assignment schemes which allow participants in a network to communicate by means of symmetric cryptography in a secure way without the need of a unique key for every pair of participants. It is assumed that an adversary can eavesdrop on all communication and can corrupt up to $t$ vertices in the network. It follows that, in general, the sender needs to transmit at least $t+1$ shares of the message over different paths to the intended receiver and that each participant needs to possess at least $t+1$ encryption keys. We do assume that vertices in the network will forward messages correctly (but only the corrupted vertices will collude with the adversary to retrieve the message).
    We focus on two approaches. In the first approach, the goal is to minimize the number of keys per participant. An almost complete answer is presented. The second approach is to minimize the total number of keys that are needed in the network. The number of communication paths that are needed to guarantee secure communication becomes a relevant parameter. Our security relies on the random oracle model.
On the existence of extended perfect binary codes with trivial symmetry group
Olof Heden , Fabio Pasticci and  Thomas Westerbäck
2009, 3(3): 295-309 doi: 10.3934/amc.2009.3.295 +[Abstract](46) +[PDF](211.3KB)
The set of permutations of the coordinate set that maps a perfect code $C$ into itself is called the symmetry group of $C$ and is denoted by Sym$(C)$. It is proved that for all integers $n=2^m-1$, where $m=4,5,6,...$, and for any integer $r$, where $n-$log$(n+1)+3\leq r\leq n-1$, there are perfect codes of length $n$ and rank $r$ with a trivial symmetry group, i.e. Sym$(C)=${id}. The result is shown to be true, more generally, for the extended perfect codes of length $n+1$.

2016  Impact Factor: 0.8




Email Alert

[Back to Top]