Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:4044441

zbMath0292.94011MaRDI QIDQ4044441

Valery Goppa

Publication date: 1970

Full work available at URL: http://mathnet.ru/eng/ppi/v6/i3/p24

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (47)

Constructions of asymmetric quantum alternant codesQuasi-perfect linear codes from planar and APN functionsEquations for point configurations to Lie on a rational normal curveA Summary of McEliece-Type Cryptosystems and their SecurityCyclic Generalized Separable (L, G) CodesNon-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codesWhich extended Goppa codes are cyclic?E-commerce of digital items and the problem of item validation: introducing the concept of reversible degradationDecoding algorithms for Goppa codes with errors and erasuresON DECODING ALGORITHMS FOR GENERALIZED REED — SOLOMON CODES WITH ERRORS AND ERASURES. IIAlgebraic theory of block codes detecting independent errorsBinary generalized \((L,G)\) codes that are perfect in a weighted Hamming metricThe dual geometry of Hermitian two-point codesClass of generalized Goppa codes perfect in weighted Hamming metricTwo classes of cyclic extended double-error-correcting Goppa codesUpper bound on the number of inequivalent extended binary irreducible Goppa codesTwo classes of quasi-cyclic codes via irreducible polynomialsImproving the minimum distance bound of trace Goppa codesLeakage-resilient linear secret-sharing against arbitrary bounded-size leakage familyA Key Recovery Attack on MDPC with CCA Security Using Decoding ErrorsChosen-ciphertext secure code-based threshold public key encryptions with short ciphertextDecoding McEliece with a hint -- secret Goppa key parts reveal everythingMore constructions of lossy and correlation-secure trapdoor functionsNew binary codes from extended Goppa codesGalois hulls of special Goppa codes and related codes with application to EAQECCsAsymptotically good convolutional codesQuantum-assisted QD-CFS signaturesTotally decomposed cumulative Goppa codes with improved estimationsQuasi-cyclic Goppa codes with special Goppa polynomials and matched location setsLower bound of the covering radius of irreducible Goppa codesOn decoding algorithms for Goppa codesPermutation groups, minimal degrees and quantum computing.Lower bound of covering radius of binary irreducible Goppa codesAn improved Bombieri-Weil bound and applications to coding theoryNew bounds on the distance distribution of extended Goppa codesA new subclass of cyclic Goppa codesNew identities relating wild Goppa codesSpecial classes of separable Goppa codes with improved parameter estimatesImplementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded DevicesSimplified High-Speed High-Distance List Decoding for Alternant CodesWild McEliece IncognitoA survey of constructive coding theory, and a table of binary codes of highest known rateOn quaternary Goppa codesUnnamed ItemGoppa codes over the \(p\)-adic integers and integers modulo \(p^e\)The projective geometry of the Gale transform.Further results about the cyclicity of generalized Goppa codes




This page was built for publication: