期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Binary Cyclic Codes and Minimal Codewords
1
作者 selda calkavur 《Computer Technology and Application》 2013年第9期486-489,共4页
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal... Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes. 展开更多
关键词 Linear code cyclic code binary cyclic code generator polynomial minimal codeword secret sharing.
在线阅读 下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
2
作者 selda calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
在线阅读 下载PDF
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
3
作者 selda calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct... Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design. 展开更多
关键词 Linear code the code of a symmetric design secret sharing scheme minimal access set.
在线阅读 下载PDF
Some Secret Sharing Schemes Based on the Finite Fields
4
作者 selda calkavur 《Computer Technology and Application》 2016年第6期269-272,共4页
A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes base... A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes based on the finite fields. 展开更多
关键词 Secret sharing threshold secret sharing scheme finite field.
在线阅读 下载PDF
A Study on Minimal Codewords in the Hamming Codes
5
作者 selda calkavur 《Journal of Mathematics and System Science》 2013年第6期279-281,共3页
In this paper, we show that if Wmax 〈 6 for the Hamming code Ham (r, 2), then all of the nonzero codewords of Ham (r, 2) are minimal and if Wrnax 〈 8 for the extended Hamming code Hfim (r, 2), then all of the ... In this paper, we show that if Wmax 〈 6 for the Hamming code Ham (r, 2), then all of the nonzero codewords of Ham (r, 2) are minimal and if Wrnax 〈 8 for the extended Hamming code Hfim (r, 2), then all of the nonzero codewords ofHfim (r, 2) are minimal, where Wmax is the maximum nonzero weight in Ham (r, 2) and Hfim (r, 2). 展开更多
关键词 Linear code hamming code extended hamming code minimal codeword.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部