Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Bounds for the multicovering radii of Reed-Muller codes with applications to stream ciphers - MaRDI portal

Bounds for the multicovering radii of Reed-Muller codes with applications to stream ciphers (Q5937081)

From MaRDI portal





scientific article; zbMATH DE number 1618484
Language Label Description Also known as
English
Bounds for the multicovering radii of Reed-Muller codes with applications to stream ciphers
scientific article; zbMATH DE number 1618484

    Statements

    Bounds for the multicovering radii of Reed-Muller codes with applications to stream ciphers (English)
    0 references
    0 references
    0 references
    19 March 2002
    0 references
    The \(m\)-covering radius of a code \(C\) is the smallest integer \(t\) such that, for every \(m\) vectors of the ambient space, there is a ball of radius \(t\) centred at a codeword of \(C\) containing all of them. Bounds are found for the multicovering radii of first-order Reed-Muller codes \(\text{RM}(1,r)\). In particular, it is shown that if \(m= 2^{2t+1}\), then for all \(s\geq t\geq 0\), the \(m\)-covering radius of \(\text{RM}(1,2s)\) equals \(2^{2s-1}+ 2^{s+t-1}\); and that if \(m= 2^{2t}\), \(t> 0\), and \(s\geq t-1\), then the \(m\)-covering radius of \(\text{RM}(1,2s+ 1)\) equals \(2^{2s}+ 2^{s+ t-1}\). The results of the paper are used to prove the existence of secure families of keystreams against a general class of cryptanalytic attacks. This solves the open question that led to the invention of the notion of multicovering radii.
    0 references
    stream ciphers
    0 references
    bounds
    0 references
    multicovering radii
    0 references
    first-order Reed-Muller codes
    0 references
    secure families of keystreams
    0 references
    cryptanalytic attacks
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references