A Class of Three-Weight Cyclic Codes
|
|
|
- Justina McKinney
- 9 years ago
- Views:
Transcription
1 A Class of Three-Weight Cyclic Codes Zhengchun Zhou Cunsheng Ding Abstract arxiv: v [cs.it] 4 Feb 03 Cyclic codes are a subclass of linear codes have alications in consumer electronics, data storage systems, communication systems as they have efficient encoding decoding algorithms. In this aer, a class of threeweight cyclic codes over GF whose duals have two zeros is resented, is an odd rime. The weight distribution of this class of cyclic codes is settled. Some of the cyclic codes are otimal. The duals of a subclass of the cyclic codes are also studied roved to be otimal. Index Terms Cyclic codes, weight distribution, quadratic form, shere acking bound. I. INTRODUCTION Throughout this aer, let m k be ositive integers such that s = m/e is odd s 3, e=gcdm,k. Let be an odd rime q= e. Let π be a rimitive element of the finite field GFq s, q s = m. An [n,l,d] linear code over GF is an l-dimensional subsace of GF n with minimum Hamming distance d. Let A i denote the number of codewords with Hamming weight i in a code C of length n. The weight enumerator of C is defined by +A x+a x + +A n x n. The sequence,a,a,,a n is called the weight distribution of the code C. An [n,l] linear code C over the finite field GF is called cyclic if c 0,c,,c n C imlies c n,c 0,c,,c n C. By identifying the vector c 0,c,,c n GF n with c 0 + c x+c x + +c n x n GF[x]/x n, any code C of length n over GF corresonds to a subset of GF[x]/x n. The linear code C is cyclic if only if the corresonding subset in GF[x]/x n is an ideal of the olynomial residue class ring GF[x]/x n. It is well known that every ideal of GF[x]/x n is rincial. Let C =gx, gx is monic has the least degree. Then gx is called the generator olynomial hx = x n /gx is referred to as the arity-check olynomial of C. A cyclic code is called irreducible if its arity-check olynomial is irreducible over GF. Otherwise, it is called reducible. The weight distributions of both irreducible reducible cyclic codes have been interesting subjects of study for many years. For information on the weight distribution of irreducible cyclic codes, the reader is referred to [8], [3], [9], the recent survey [6]. Information on the weight distribution of reducible cyclic codes could be found in [], [7], [4], [5], [5], [6], []. Let h 0 x, h x, h x be the minimal olynomials of π, π, π k +/ over GF, resectively. It is easy to show that h 0 x, h x, h x are olynomials of degree m are airwise Z. Zhou s research was suorted by the Natural Science Foundation of China, Proj. No C. Ding s research was suorted by The Hong Kong Research Grants Council, Proj. No Z. Zhou is with the School of Mathematics, Southwest Jiaotong University, Chengdu, 6003, China [email protected]. C. Ding is with the Deartment of Comuter Science Engineering, The Hong Kong University of Science Technology, Clear Water Bay, Kowloon, Hong Kong, China [email protected].
2 distinct. The cyclic code over GF with length m arity-check olynomial h 0 xh x has been extensively studied is a three-weight code in the following cases. When k is even e=, this three-weight cyclic code is due to Trachtenberg [0]. When k is odd, e=, =3, the cyclic code is related to some lanar functions is roved to have only three nonzero weights by Yuan, Carlet, Ding [3], []. When k e are odd is any odd rime, Luo Feng [4] roved that the code has only three nonzero weights. The objective of this aer is to study the cyclic code over GFq with length m arity-check olynomial h xh x. It will be shown that this cyclic code has only three nonzero weights when k/e is odd, or k is even e is odd. The weight distribution of the roosed cyclic codes will be determined. Some of the cyclic codes with arity-check olynomials h xh x are otimal. The duals of a subclass of the cyclic codes are also otimal. The three-weight cyclic codes dealt with in this aer may have alications in association schemes [] secret sharing schemes [3]. This aer is organized as follows. Section II introduces necessary results on quadratic forms that will be needed later in this aer. Section III defines the class of cyclic codes determines their weight distributions. Section IV studies the duals of a subclass of the cyclic codes. Section V concludes this aer makes some comments on this toic. II. QUADRATIC FORMS OVER FINITE FIELDS In this section, we give a brief introduction to the theory of quadratic forms over finite fields which is needed to calculate the weight distribution of the cyclic codes in the sequel. Quadratic forms have been well studied see the monograh [7] the references therein, have alications in sequence design [0], [], coding theory [7], [4], [5]. Identifying GFq s with the s-dimensional GFq-vector sace GFq s, a function Q from GFq s to GFq can be regarded as an s-variable olynomial on GFq. The former is called a quadratic form over GFq if the latter is a homogeneous olynomial of degree two in the form Qx,x,,x s = a i j x i x j i j s a i j GFq, we use a basis {β,β,,β s } of GFq s over GFq identify x= s i= x iβ i with the vectorx,x,,x s GFq s. The rank of the quadratic form Qx is defined as the codimension of the GFq-vector sace V ={x GFq s Qx+z Qx Qz=0 for all z GFq s }. That is V =q s r r is the rank of Qx. For a quadratic form fx in s variables over GFq, there exists a symmetric matrix A of order s over GFq such that fx=xax, X =x,,x s GFq s X denotes the transose of X. For a symmetric matrix A of order s over GFq, it is known that there is a nonsingular matrix T of order s such that TAT is a diagonal matrix [7]. Under the nonsingular linear substitution X = ZT with Z =z,z,,z s GFq s, we then have fx=ztat Z = r i= d i z i r is the rank of fx d i GFq. Let = d d d r for r = for r = 0. Let η denote the quadratic multilicative character of GFq. Then η is an invariant of A under the conjugate action of M GL s GFq. The following results are useful in the sequel. Lemma.: [7], [5] With the notations as above, we have ζ Tr q/ fx = x GFq s { η q s r/, if q mod 4, η r q s r/, if q 3 mod 4
3 3 for any quadratic form fx in s variables of rank r over GFq, ζ is a rimitive -th root of unity, Tr q/ x denotes the trace function from GFq to GF. Lemma.: Let fx be a quadratic form in s variables of rank r over GFq. If r is even, then If r e are odd, then y GF x GFq s y GF x GFq s ζ Tr q/y fx =± q s r/. ζ Tr q/y fx = 0. Proof: By a nonsingular linear substitution as in, we have fx= r i= d iz i, d i GFq z,z,,z r GFq r. Note that, for each y GF, y fx ia a quadratic form over GFq with rank r y fx= r i= yd iz i. According to Lemma., we have Thus, when r is even, ζ Tr q/y fx y GF x GFq s y GF x GFq s On the other h, when r e are both odd, = x GFq s ζ Tr q/ fx ζ Tr q/y fx =± q s r/. ζ Tr q/y fx y GF x GFq s = x GFq s = x GFq s = x GFq s = 0 ζ Tr q/ fx ζ Tr q/ fx ζ Tr q/ fx y GF η y r y GF η y y GF η 0 y y GF η y r. η 0 is the quadratic multilicative character of GF in the third identity we used the fact that η 0 x=η x for any x GF since e is odd. III. THE CLASS OF THREE-WEIGHT CYCLIC CODES AND THEIR WEIGHT DISTRIBUTION We follow the notations fixed in Section I. From now on, we always assume that λ is a fixed nonsquare in GFq. Note that s is odd, thus λ is also a nonsquare in GFq s. Let SQ denote the set of all squares in GFq s. Then λx runs through all nonsquares in GFq s as x runs through SQ. The following result is easy to rove is useful in the sequel. Proosition 3.: λ +k / = λ if k/e is even, λ +k / = λ otherwise. By Delsarte s Theorem [4], the code C with the arity-check olynomial h xh x can be exressed as C ={c GFq s }
4 4 c = Tr q s / a π t q + bπ k +t/ s. t=0 In terms of exonential sums, the weight of the codeword c =c 0,c,,c q s in C is given by WTc = #{0 t q s : c t 0} = q s q s t=0 = q s y GF = q s = q s = q s y GF ζ yc t q s 3/ t=0 y GF x SQ y GF x SQ = m m y GF x GFq s ζ Tr q s /yaπ t +ybπ t k +/ + ζ Tr q s / yaππ t +ybππ t k +/ ζ Tr q s /yax+ybx k +/ + ζ Tr q s / yaπx+ybπx k +/ ζ Tr q s /yax+ybx k +/ + ζ Tr q s / yaλx+ybλx k +/ y GF x GFq s ζ Tr q s /yax +ybx k+ + ζ Tr q s / yaλx +ybλ k +/ x k + ζ Tr q s /yax +ybx k + + ζ Tr q s / yaλx +ybλ k +/ x k + in the fifth identity we used the fact that both πx λx run through all nonsquares in GF q s as x runs through SQ. It then follows from Proosition 3. that when k/e is even, when k/e is odd, S= T= y GF x GFq s WTc = m m S y GF x GFq s ζ Tr q s /yax +ybx k + + ζ Tr q s / yaλx +ybλx k + ; 3 WTc = m m T ζ Tr q s /yax +ybx k + + ζ Tr q s / yaλx ybλx k +. 4 Based on the discussions above, the weight distribution of the code C is comletely determined by the value distribution of S T. To calculate the value distribution of S T, we need a series of lemmas. Before introducing them, we define for each GFq s. Q x=tr q s /qax + bx +k, x GFq s. 5
5 5 Lemma 3.: [7], [5] For any GFq s \{0,0}, the function Q of 5 is a quadratic form over GFq with rank s,s, or s. Lemma 3.3: Let k be even e be odd, let S be defined by 3. Then for any 0,0, S takes on only the values from the set {0,± m+e/ }. Proof: According to the definition of S, we have S= y GF x GFq s ζ Tr q/yq x + ζ Tr q/yλq x Q x is given by 5. We now rove that at least one of the quadratic forms Q Q has rank s. When b = 0, it is easy to check that both Q Q have rank s for any nonzero a. When b 0, suose on the contrary that both Q Q have rank less than m. Then there are two nonzero elements x,x GFq s such that Note that Q x + z Q x Q z=0, z GFq s 6 Q x + z Q x Q z=0, z GFq s. 7 Q x+z Q x Q z=tr q s /qzax+bx k + b k x k. It then follows from 6 7, resectively, that b k x k + a k x k + bx = 0 b k x k a k x k + bx = 0. Combining these two equations the first one times x k lus the second one times x k leads to uu k + =0 8 u=bx x x k + x k. Note that x k for any x GFq s since k/e is even s is odd. It then follows that u 0 u k + 0. This is a contradiction with 8. Thus at least one of the quadratic forms Q Q has rank s for any 0,0. On the other h, by Lemma., S 0 only if Q or Q has even rank. Thus, S=± m+e/ if Q has rank s Q has rank s or Q has rank s Q has rank s, otherwise S= 0. This comletes the roof. Theorem 3.4: Let k be even e be odd. Then the value distribution of S in 3 is given by m occurring time m+e/ occurring m e + m e/ m times m+e/ occurring m e m e/ m times 0 occurring m m e + m times. Proof: It is clear that S0,0= m. According to Lemma 3.3, we define N ε = #{ GFq s \0,0 S= ε m+e/ }
6 6 ε=±. Then we have On the other h, it follows from 3 that S= m +N N m+e/ 9 S =4 m +N + N m+e. 0 S= m S = m #S + #S + #S 3 + #S 4 S ={y,y,x,x Γ y x y x = 0, y x k + y x k + S ={y,y,x,x Γ y x + λy x = 0, y x k + λy x k + S 3 ={y,y,x,x Γ λy x y x = 0, λy x k + y x k + S 4 ={y,y,x,x Γ λy x + λy x = 0, λy x k + λy x k + = 0}. Herein, Γ=GF GF GFq s GFq s. It is not hard to rove that Combining Equations 9 4, we get #S = #S 4 = m 3 #S = #S 3 =. 4 N = m e + m e/ m, N = m e m e/ m. Summarizing the discussion above comletes the roof of this theorem. Lemma 3.5: Let k/e be odd T be defined by 4. Then for any GFq s \{0,0}, T takes on only the values from the set {0,± m+e/ }. Proof: According to the definition of T, we have T= y GF x GFq s ζ Tr q/yq x + ζ Tr q/ yλq x Q x is given by 5. By Lemma 3., for any 0,0, the ossible rank of Q x is s, s, or s. Note that, for any y GF, the quadratic forms yq x λyq x have the same rank with Q x. When Q x has even rank s, by Lemma., we have T=± m+e/. When Q x has odd rank s or s, we distinguish between the following two cases to show that T= 0. Case : e is odd. In this case, it follows again from Lemma. that T=0. Case : e
7 7 is even. In this case, is a square in GFq thus λ is a nonsquare in GFq. It then follows from Lemma. that ζ Tr q/yq x + ζ Tr q/ yλq x x GFq s =η y+η yλ ζ Tr q/q x x GFq s = 0 for any y GF. Thus T=0. This comletes the roof. Theorem 3.6: Let k/e be odd. Then the value distribution of T in 4 is given by m occurring time m+e/ occurring m e + m e/ m times m+e/ occurring m e m e/ m times 0 occurring m m e + m times. Proof: It is clear that T0,0= m. According to Lemma 3.5, we define n ε = #{ GFq s \0,0 T=ε m+e/ } ε=±. Then we have T= m + n n m+e/ 5 T =4 m + 4n + n m+e. 6 On the other h, it follows from 4 that T= m 7 T = m #T + #T + #T 3 + #T 4 8 T ={y,y,x,x Γ y x y x = 0, y x k + y x k + T ={y,y,x,x Γ y x + λy x = 0, y x k + + λy x k + T 3 ={y,y,x,x Γ λy x y x = 0, λy x k + y x k + T 4 ={y,y,x,x Γ λy x + λy x = 0, λy x k + + λy x k + = 0}. Herein, Γ=GF GF GFq s GFq s. It is not hard to show that Combining Equations 5 9, we get #T = #T = #T 3 = #T 4 = m. 9 n = m e + m e/ m, n = m e m e/ m.
8 8 TABLE I WEIGHT DISTRIBUTION OF C FOR EVEN k AND ODD e Hamming Weight Frequency 0 m m m+e / m e + m e/ m m m m m e + m m m + m+e / m e m e/ m TABLE II WEIGHT DISTRIBUTION OF C FOR ODD k/e Hamming Weight Frequency 0 m m m+e / m e + m e/ m m m m m e + m m m + m+e / m e m e/ m The value distribution of Ta, b follows from the discussion above. Theorem 3.7: Let k be even e be odd. Then the code C is a three-weight -ary cyclic code with arameters [ m,m, m m m+e / ]. Moreover the weight distribution of C is given in Table I. Proof: The length dimension of C follow directly from its definition. The minimal distance weight distribution of C follow from Equation 3 Theorem 3.4. The following are some examles of the codes. Examle 3.8: Let =3 m=3, k=. Then the code C is a [6,6,5] code over GF3 with the weight enumerator x x. It has the same arameters with the best known cyclic codes in the Database of best linear codes known maintained by Markus Grassl at htt:// It is also otimal since the uer bound is 5. Examle 3.9: Let =3, m=5 k=4. Then the code C is a [4,6,53] code over GF3 with the weight enumerator x x 7. It has the same arameters with the best known cyclic codes in the Database. It is otimal or almost otimal since the uer bound on the minimal distance of any ternary linear code with length 4 dimension 6 is 54. Examle 3.0: Let =5, m=3, k =. Then the code C is a [4,6,90] code over GF5 with the weight enumerator x x 0. The best known linear code over GF5 with length 4 dimension 6 has minimal distance 95. Theorem 3.: Let k/e be odd. Then the code C is a three-weight -ary cyclic code with arameters [ m,m, m m m+e / ]. Moreover the weight distribution of C is given in Table II. Proof: The length dimension of C follow directly from its definition. The minimal distance weight distribution of C follow from Equation 4 Theorem 3.6.
9 9 Examle 3.: Let =3 m=6, k=. Then the code C is a [78,,43] code over GF3 with the weight enumerator x x 540. Examle 3.3: Let =5 m=3, k=. Then the code C is a [4,6,80] code over GF5 with the weight enumerator x x 0. Examle 3.4: Let = 3 m = 9, k = 3. Then the code C is a [968,8,879] code over GF3 with the weight enumerator x x IV. THE DUALS OF A SUBCLASS OF THE CYCLIC CODES In this section, we study the duals of a subclass of the cyclic codes resented in this aer rove that they are otimal ternary linear codes. Theorem 4.: Let =3, k be even e be odd. Then the dual C of the cyclic code C in is an otimal ternary code with arameters [3 m,3 m m,4]. Proof: We only need to rove that C has minimal distance 4. Clearly, the minimal distance d of the dual of C cannot be. Let u= k + /. Then gcdu, m = since k is even m is odd. By the definition of C, the code C has a codeword of Hamming weight if only if there exist two elements c,c GF3 two distinct integers 0 t < t m such that { c π t + c π t = 0 c π ut + c π ut 0 = 0. Note that gcdu, m = t t. It follows from the second equation of 0 that c = c t = t + m /. Then the first equation becomes c π t = 0, which is imossible. Thus the code C does not have a codeword of Hamming weight. We now rove that C has no codeword of weight 3. Otherwise, there exist three elements c,c,c 3 in GF3 three distinct integers 0 t < t < t 3 m such that { c π t +c π t +c 3 π t 3 = 0 c π ut +c π ut +c 3 π ut 3 = 0. Due to symmetry it is sufficient to consider the following two cases. Case A, when c = c = c 3 = : In this case, becomes { π t + π t + π t 3 = 0 π ut +π ut +π ut 3 = 0. Let x i = π t i for i=,,3. Then x,x,x 3 GF3 m are airwise distinct. Without loss of generality, we only need to consider the following two subcases. t is even t,t 3 are odd. In this subcase, we have { x x x 3 = 0 x u + xu + 3 xu 3 = 0 which yields Thus x + x 3 u = x u xu 3. x + x 3 u = x u xu 3
10 0 which leads to x x 3 x k / x k / 3 = 0. 4 It then follows that x 3 /x k =. Note that gcdm,k=, x,x 3 are both nonsquare in GF3 m since t,t 3 are odd. Thus x = x 3. This is a contradiction to the fact that x x 3. t, t, t 3 are even. Similarly, in this subcase, we can arrive at 4 in which x,x 3 are both squares in GF3 m since t,t 3 are even. It then follows from x 3 /x k = that x = x 3. This is again a contradiction. Case B, when c = c = c 3 =. The roof of this case is similar to Case A. We omit the details here. Finally, by the Shere Packing bound, the minimal distance d 4. Hence d = 4. This comletes the roof. This subclass of ternary cyclic codes C are otimal in the sense that the minimum distance is maximal for any ternary linear code with length 3 m dimension 3 m m. Examle 4.: Let = 3 m = 3, k =. Then the code C is an otimal ternary cyclic code with arameters [6,0,4] generator olynomial x 6 + x 5 + x 3 + x+. Examle 4.3: Let = 3 m = 5, k = 4. Then the code C is an otimal ternary cyclic code with arameters [4,0,4] generator olynomial x 0 + x 9 + x 8 + x 7 + x 6 + x +. Examle 4.4: Let = 3 m = 7, k = 6. Then the code C is an otimal ternary cyclic code with arameters [86,4,4] generator olynomial x 4 + x 3 + x + x 0 + x 6 + x 5 +. V. SUMMARY AND CONCLUDING REMARKS In this aer, we resented a class of three-weight cyclic codes determined their weight distributions. Some of the codes are otimal, the duals of a subclass of the cyclic codes are also otimal. While a lot of two-weight codes were discovered see [], [5], [6], [3], [0], [9], only a small number of three-weight codes are known [], [5], [6], [8], [9]. It would be good if more three-weight codes are constructed, in view of their alications in association schemes secret sharing schemes. REFERENCES [] A. R. Calderbank W. M. Kantor, The geometry of two-weight codes, Bull. London Math. Soc., vol. 8,. 97-, 986. [] A. R. Calderbank J. M. Goethals, Three-weight codes association schemes, Philis J. Res., vol. 39,. 43 5, 984. [3] C. Carlet, C. Ding, J. Yuan, Linear codes from highly nonlinear functions their secret sharing schemes, IEEE Trans. Inform. Theory, vol. 5, no. 6, , 005. [4] P. Delsarte, On subfield subcodes of modified Reed-Solomon codes, IEEE Trans. Inform. Theory, vol. IT-, no. 5, , Se [5] C. Ding, Y. Liu, C. Ma, L. Zeng, The weight distributions of the duals of cyclic codes with two zeros, IEEE Trans. Inform. Theory, vol. 57, No., , Dec. 0. [6] C. Ding J. Yang, Hamming weights in irreducible cyclic codes, Discrete Mathematics, vol. 33, no. 4, , 03. [7] K. Feng J. Luo, Weight distribution of some reducible cyclic codes, Finite Fields Al., vol. no., , Ar [8] T. Feng, On cyclic codes of length r with two zeros whose dual codes have three weights, Des. Codes Crytogr., vol. 6, , 0. [9] G. McGuire, On three weights in cyclic codes with two zeros, Finite Fields Al., vol. 0, no., , Jan [0] W. M. Kantor, Exonential numbers of two-weight codes, difference sets symmetric designs, Discrete Mathematics, vol. 46, , 983. [] A. Klaer, Cross-correlations of quadratic form sequences in odd characteristic, Des. Codes Crytogr.,, vol. 3, no. 4, , 997. [] Z. Liu X.-W. Wu, On a class of three-weight codes with crytograhic alications, In: Proc. of the 0 IEEE International Symosium on Information Theory, , 0. [3] Z. Liu X. Zeng, On a kind of two-weight code, Euroean Journal of Combinatorics, vol. 33, no. 6,. 65 7, Aug. 0. [4] J. Luo K. Feng, Cyclic codes sequences from generalized Coulter-Matthews function, IEEE Trans. Inform. Theory vol. 54, no., Dec [5] J. Luo K. Feng, On the weight distributions of two classes of cyclic codes, IEEE Trans. Inform. Theory, vol. 54, no., , Dec. 008.
11 [6] C. Ma, L. Zeng, Y. Liu, D. Feng, C. Ding, The weight enumerator of a class of cyclic codes, IEEE Trans. Inform. Theory, vol. 57, no., , Jan. 0. [7] R. Lidl H. Niederreiter, Finite Fields, Encycloedia of Mathematics, Vol. 0, Cambridge University Press, Cambridge, 983. [8] F. MacWilliams J. Seery, The weight distributions of some minimal cyclic codes, IEEE Trans. Inform. Theory, vol. 7 no. 6, , 98. [9] B. Schmidt C. White, All two-weight irreducible cyclic codes, Finite Fields Al., vol. 8,. 7, 00. [0] H. M. Trachtenberg, On the crosscorrelation functions of maximal linear recurring sequences, Ph.D. dissertation, Univ. South. Calif., Los Angels, 970. [] J. Yuan, C. Carlet, C. Ding, The weight distribution of a class of linear codes from erfect nonlinear functions, IEEE Trans. Inform. Theory, vol. 5, no.,. 7 77, Feb [] B. Wang, C. Tang, Y. Qi, Y. X. Yang, M. Xu, The weight distributions of cyclic codes ellitic curves, IEEE Trans. Inform. Theory, vol. 58, no., , Dec. 0. [3] M. van der Vlugt, On the weight hierarchy of irreducible cyclic codes, J. Comb. Theory Ser. A, vol. 7, no., , July 995.
SECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
As we have seen, there is a close connection between Legendre symbols of the form
Gauss Sums As we have seen, there is a close connection between Legendre symbols of the form 3 and cube roots of unity. Secifically, if is a rimitive cube root of unity, then 2 ± i 3 and hence 2 2 3 In
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts
Two classes of ternary codes and their weight distributions
Two classes of ternary codes and their weight distributions Cunsheng Ding, Torleiv Kløve, and Francesco Sica Abstract In this paper we describe two classes of ternary codes, determine their minimum weight
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS
ON GALOIS REALIZATIONS OF THE 2-COVERABLE SYMMETRIC AND ALTERNATING GROUPS DANIEL RABAYEV AND JACK SONN Abstract. Let f(x) be a monic polynomial in Z[x] with no rational roots but with roots in Q p for
Several Classes of Codes and Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, and Tor Helleseth, Fellow, IEEE
7618 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 11, NOVEMBER 2011 Several Classes of Codes Sequences Derived From a 4 -Valued Quadratic Form Nian Li, Xiaohu Tang, Member, IEEE, Tor Helleseth,
minimal polyonomial Example
Minimal Polynomials Definition Let α be an element in GF(p e ). We call the monic polynomial of smallest degree which has coefficients in GF(p) and α as a root, the minimal polyonomial of α. Example: We
6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In
On the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
Chapter 1. Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes
Chapter 1 Search for Good Linear Codes in the Class of Quasi-Cyclic and Related Codes Nuh Aydin and Tsvetan Asamov Department of Mathematics, Kenyon College Gambier, OH, USA 43022 {aydinn,asamovt}@kenyon.edu
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z
FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction
IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible
The Heat Equation. Lectures INF2320 p. 1/88
The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS
THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear
H/wk 13, Solutions to selected problems
H/wk 13, Solutions to selected problems Ch. 4.1, Problem 5 (a) Find the number of roots of x x in Z 4, Z Z, any integral domain, Z 6. (b) Find a commutative ring in which x x has infinitely many roots.
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain
Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is
PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.
PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include
CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
SECTION 6: FIBER BUNDLES
SECTION 6: FIBER BUNDLES In this section we will introduce the interesting class o ibrations given by iber bundles. Fiber bundles lay an imortant role in many geometric contexts. For examle, the Grassmaniann
RINGS WITH A POLYNOMIAL IDENTITY
RINGS WITH A POLYNOMIAL IDENTITY IRVING KAPLANSKY 1. Introduction. In connection with his investigation of projective planes, M. Hall [2, Theorem 6.2]* proved the following theorem: a division ring D in
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
How To Prove The Dirichlet Unit Theorem
Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
Factoring of Prime Ideals in Galois Extensions
Chater 8 Factoring of Prime Ideals in Galois Extensions 8.1 Decomosition and Inertia Grous We return to the general AKLB setu: A is a Dedekind domain with fraction field K, L is a finite searable extension
Factorization Algorithms for Polynomials over Finite Fields
Degree Project Factorization Algorithms for Polynomials over Finite Fields Sajid Hanif, Muhammad Imran 2011-05-03 Subject: Mathematics Level: Master Course code: 4MA11E Abstract Integer factorization is
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
Number Theory Naoki Sato <[email protected]>
Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material that an
SOLVING QUADRATIC EQUATIONS OVER POLYNOMIAL RINGS OF CHARACTERISTIC TWO
Publicacions Matemàtiques, Vol 42 (1998), 131 142. SOLVING QUADRATIC EQUATIONS OVER POLYNOMIAL RINGS OF CHARACTERISTIC TWO Jørgen Cherly, Luis Gallardo, Leonid Vaserstein and Ethel Wheland Abstract We
Introduction to Algebraic Coding Theory
Introduction to Algebraic Coding Theory Supplementary material for Math 336 Cornell University Sarah A. Spence Contents 1 Introduction 1 2 Basics 2 2.1 Important code parameters..................... 4
= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
Introduction to NP-Completeness Written and copyright c by Jie Wang 1
91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of
The Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,
Introduction to Finite Fields (cont.)
Chapter 6 Introduction to Finite Fields (cont.) 6.1 Recall Theorem. Z m is a field m is a prime number. Theorem (Subfield Isomorphic to Z p ). Every finite field has the order of a power of a prime number
3 1. Note that all cubes solve it; therefore, there are no more
Math 13 Problem set 5 Artin 11.4.7 Factor the following polynomials into irreducible factors in Q[x]: (a) x 3 3x (b) x 3 3x + (c) x 9 6x 6 + 9x 3 3 Solution: The first two polynomials are cubics, so if
Introduction to Algebraic Geometry. Bézout s Theorem and Inflection Points
Introduction to Algebraic Geometry Bézout s Theorem and Inflection Points 1. The resultant. Let K be a field. Then the polynomial ring K[x] is a unique factorisation domain (UFD). Another example of a
Second Order Differential Equations with Hypergeometric Solutions of Degree Three
Second Order Differential Equations with Hypergeometric Solutions of Degree Three Vijay Jung Kunwar, Mark van Hoeij Department of Mathematics, Florida State University Tallahassee, FL 0-07, USA vkunwar@mathfsuedu,
AMBIGUOUS CLASSES IN QUADRATIC FIELDS
MATHEMATICS OF COMPUTATION VOLUME, NUMBER 0 JULY 99, PAGES -0 AMBIGUOUS CLASSES IN QUADRATIC FIELDS R. A. MOLLIN Dedicated to the memory ofd. H. Lehmer Abstract. We provide sufficient conditions for the
CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12
CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.
calculating the result modulo 3, as follows: p(0) = 0 3 + 0 + 1 = 1 0,
Homework #02, due 1/27/10 = 9.4.1, 9.4.2, 9.4.5, 9.4.6, 9.4.7. Additional problems recommended for study: (9.4.3), 9.4.4, 9.4.9, 9.4.11, 9.4.13, (9.4.14), 9.4.17 9.4.1 Determine whether the following polynomials
Sign changes of Hecke eigenvalues of Siegel cusp forms of degree 2
Sign changes of Hecke eigenvalues of Siegel cusp forms of degree 2 Ameya Pitale, Ralf Schmidt 2 Abstract Let µ(n), n > 0, be the sequence of Hecke eigenvalues of a cuspidal Siegel eigenform F of degree
Notes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
ERDŐS SZEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II
ERDŐS SEKERES THEOREM WITH FORBIDDEN ORDER TYPES. II GYULA KÁROLYI Institute of Mathematics, Eötvös University, Pázmány P. sétány /C, Budaest, H 7 Hungary GÉA TÓTH Alfréd Rényi Institute of Mathematics,
SECOND DERIVATIVE TEST FOR CONSTRAINED EXTREMA
SECOND DERIVATIVE TEST FOR CONSTRAINED EXTREMA This handout presents the second derivative test for a local extrema of a Lagrange multiplier problem. The Section 1 presents a geometric motivation for the
Complex Conjugation and Polynomial Factorization
Comlex Conjugation and Polynomial Factorization Dave L. Renfro Summer 2004 Central Michigan University I. The Remainder Theorem Let P (x) be a olynomial with comlex coe cients 1 and r be a comlex number.
ECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
FACTORING AFTER DEDEKIND
FACTORING AFTER DEDEKIND KEITH CONRAD Let K be a number field and p be a prime number. When we factor (p) = po K into prime ideals, say (p) = p e 1 1 peg g, we refer to the data of the e i s, the exponents
A number field is a field of finite degree over Q. By the Primitive Element Theorem, any number
Number Fields Introduction A number field is a field of finite degree over Q. By the Primitive Element Theorem, any number field K = Q(α) for some α K. The minimal polynomial Let K be a number field and
Linear Algebra I. Ronald van Luijk, 2012
Linear Algebra I Ronald van Luijk, 2012 With many parts from Linear Algebra I by Michael Stoll, 2007 Contents 1. Vector spaces 3 1.1. Examples 3 1.2. Fields 4 1.3. The field of complex numbers. 6 1.4.
The van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
Stochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
Factoring of Prime Ideals in Extensions
Chapter 4 Factoring of Prime Ideals in Extensions 4. Lifting of Prime Ideals Recall the basic AKLB setup: A is a Dedekind domain with fraction field K, L is a finite, separable extension of K of degree
A characterization of trace zero symmetric nonnegative 5x5 matrices
A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the
JUST THE MATHS UNIT NUMBER 1.8. ALGEBRA 8 (Polynomials) A.J.Hobson
JUST THE MATHS UNIT NUMBER 1.8 ALGEBRA 8 (Polynomials) by A.J.Hobson 1.8.1 The factor theorem 1.8.2 Application to quadratic and cubic expressions 1.8.3 Cubic equations 1.8.4 Long division of polynomials
QUADRATIC RECIPROCITY IN CHARACTERISTIC 2
QUADRATIC RECIPROCITY IN CHARACTERISTIC 2 KEITH CONRAD 1. Introduction Let F be a finite field. When F has odd characteristic, the quadratic reciprocity law in F[T ] (see [4, Section 3.2.2] or [5]) lets
it is easy to see that α = a
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore
Functional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
BANACH AND HILBERT SPACE REVIEW
BANACH AND HILBET SPACE EVIEW CHISTOPHE HEIL These notes will briefly review some basic concepts related to the theory of Banach and Hilbert spaces. We are not trying to give a complete development, but
Cyclotomic Extensions
Chapter 7 Cyclotomic Extensions A cyclotomic extension Q(ζ n ) of the rationals is formed by adjoining a primitive n th root of unity ζ n. In this chapter, we will find an integral basis and calculate
24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
Inner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2)
Modern Algebra Lecture Notes: Rings and fields set 4 (Revision 2) Kevin Broughan University of Waikato, Hamilton, New Zealand May 13, 2010 Remainder and Factor Theorem 15 Definition of factor If f (x)
Prime Numbers and Irreducible Polynomials
Prime Numbers and Irreducible Polynomials M. Ram Murty The similarity between prime numbers and irreducible polynomials has been a dominant theme in the development of number theory and algebraic geometry.
1 Gambler s Ruin Problem
Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction
COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH ZACHARY ABEL 1. Introduction In this survey we discuss properties of the Higman-Sims graph, which has 100 vertices, 1100 edges, and is 22 regular. In fact
A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS
A SURVEY ON CONTINUOUS ELLIPTICAL VECTOR DISTRIBUTIONS Eusebio GÓMEZ, Miguel A. GÓMEZ-VILLEGAS and J. Miguel MARÍN Abstract In this paper it is taken up a revision and characterization of the class of
ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP. A. K. Das and R. K. Nath
International Electronic Journal of Algebra Volume 7 (2010) 140-151 ON GENERALIZED RELATIVE COMMUTATIVITY DEGREE OF A FINITE GROUP A. K. Das and R. K. Nath Received: 12 October 2009; Revised: 15 December
Number Theory Naoki Sato <[email protected]>
Number Theory Naoki Sato 0 Preface This set of notes on number theory was originally written in 1995 for students at the IMO level. It covers the basic background material
Separation Properties for Locally Convex Cones
Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam
MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued).
MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors Jordan canonical form (continued) Jordan canonical form A Jordan block is a square matrix of the form λ 1 0 0 0 0 λ 1 0 0 0 0 λ 0 0 J = 0
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Labeling outerplanar graphs with maximum degree three
Labeling outerplanar graphs with maximum degree three Xiangwen Li 1 and Sanming Zhou 2 1 Department of Mathematics Huazhong Normal University, Wuhan 430079, China 2 Department of Mathematics and Statistics
F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)
Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p
r + s = i + j (q + t)n; 2 rs = ij (qj + ti)n + qtn.
Chapter 7 Introduction to finite fields This chapter provides an introduction to several kinds of abstract algebraic structures, particularly groups, fields, and polynomials. Our primary interest is in
Congruence properties of binary partition functions
Congruence properties of binary partition functions Katherine Anders, Melissa Dennison, Jennifer Weber Lansing and Bruce Reznick Abstract. Let A be a finite subset of N containing 0, and let f(n) denote
MATH 425, PRACTICE FINAL EXAM SOLUTIONS.
MATH 45, PRACTICE FINAL EXAM SOLUTIONS. Exercise. a Is the operator L defined on smooth functions of x, y by L u := u xx + cosu linear? b Does the answer change if we replace the operator L by the operator
2 When is a 2-Digit Number the Sum of the Squares of its Digits?
When Does a Number Equal the Sum of the Squares or Cubes of its Digits? An Exposition and a Call for a More elegant Proof 1 Introduction We will look at theorems of the following form: by William Gasarch
a 1 x + a 0 =0. (3) ax 2 + bx + c =0. (4)
ROOTS OF POLYNOMIAL EQUATIONS In this unit we discuss polynomial equations. A polynomial in x of degree n, where n 0 is an integer, is an expression of the form P n (x) =a n x n + a n 1 x n 1 + + a 1 x
6 EXTENDING ALGEBRA. 6.0 Introduction. 6.1 The cubic equation. Objectives
6 EXTENDING ALGEBRA Chapter 6 Extending Algebra Objectives After studying this chapter you should understand techniques whereby equations of cubic degree and higher can be solved; be able to factorise
Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients
DOI: 10.2478/auom-2014-0007 An. Şt. Univ. Ovidius Constanţa Vol. 221),2014, 73 84 Irreducibility criteria for compositions and multiplicative convolutions of polynomials with integer coefficients Anca
Lecture 13 Linear quadratic Lyapunov theory
EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time
NON-CANONICAL EXTENSIONS OF ERDŐS-GINZBURG-ZIV THEOREM 1
NON-CANONICAL EXTENSIONS OF ERDŐS-GINZBURG-ZIV THEOREM 1 R. Thangadurai Stat-Math Division, Indian Statistical Institute, 203, B. T. Road, Kolkata 700035, INDIA thanga [email protected] Received: 11/28/01,
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
Integer Factorization using the Quadratic Sieve
Integer Factorization using the Quadratic Sieve Chad Seibert* Division of Science and Mathematics University of Minnesota, Morris Morris, MN 56567 [email protected] March 16, 2011 Abstract We give
SOME PROPERTIES OF SYMBOL ALGEBRAS OF DEGREE THREE
SOME PROPERTIES OF SYMBOL ALGEBRAS OF DEGREE THREE CRISTINA FLAUT and DIANA SAVIN Communicated by the former editorial board In this paper, we study some properties of the matrix representations of the
TRANSCENDENTAL NUMBERS
TRANSCENDENTAL NUMBERS JEREMY BOOHER. Introduction The Greeks tried unsuccessfully to square the circle with a comass and straightedge. In the 9th century, Lindemann showed that this is imossible by demonstrating
Computing divisors and common multiples of quasi-linear ordinary differential equations
Computing divisors and common multiples of quasi-linear ordinary differential equations Dima Grigoriev CNRS, Mathématiques, Université de Lille Villeneuve d Ascq, 59655, France [email protected]
Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected].
Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 [email protected] This paper contains a collection of 31 theorems, lemmas,
A note on companion matrices
Linear Algebra and its Applications 372 (2003) 325 33 www.elsevier.com/locate/laa A note on companion matrices Miroslav Fiedler Academy of Sciences of the Czech Republic Institute of Computer Science Pod
Similarity and Diagonalization. Similar Matrices
MATH022 Linear Algebra Brief lecture notes 48 Similarity and Diagonalization Similar Matrices Let A and B be n n matrices. We say that A is similar to B if there is an invertible n n matrix P such that
Discrete Mathematics: Homework 7 solution. Due: 2011.6.03
EE 2060 Discrete Mathematics spring 2011 Discrete Mathematics: Homework 7 solution Due: 2011.6.03 1. Let a n = 2 n + 5 3 n for n = 0, 1, 2,... (a) (2%) Find a 0, a 1, a 2, a 3 and a 4. (b) (2%) Show that
A Modified Measure of Covert Network Performance
A Modified Measure of Covert Network Performance LYNNE L DOTY Marist College Deartment of Mathematics Poughkeesie, NY UNITED STATES lynnedoty@maristedu Abstract: In a covert network the need for secrecy
Short Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
