Is code equivalence easy to decide?

From MaRDI portal
Publication:4371902

DOI10.1109/18.623157zbMath0884.94025OpenAlexW2156052684MaRDI QIDQ4371902

Erez Petrank, Ron M. Roth

Publication date: 13 April 1998

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Full work available at URL: https://semanticscholar.org/paper/5c1624d163a4fb426f8dbf4929628031a1575c08




Related Items

Algorithms for Group Isomorphism via Group Extensions and CohomologyOn the Complexity of Isomorphism Problems for Tensors, Groups, and Polynomials I: Tensor Isomorphism-CompletenessLESS is More: Code-Based Signatures Without SyndromesMinimum Circuit Size, Graph Isomorphism, and Related ProblemsComputing normalisers of intransitive groupsOn isomorphism testing of groups with normal Hall subgroupsZero-Knowledge Interactive Proof Systems for New Lattice ProblemsA Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding TheoryGeneral linear group action on tensors: a candidate for post-quantum cryptographyHulls of cyclic serial codes over a finite chain ringUnnamed ItemTensor Codes and Their InvariantsOn the computational hardness of the code equivalence problem in cryptographyA new algorithm for equivalence of cyclic codes and its applicationsGalois hulls of constacyclic codes over finite fieldsNew binary and ternary quasi-cyclic codes with good propertiesOn the hulls of cyclic codes of oddly even length over \(\mathbb{Z}_4\)A generalization of cyclic code equivalence algorithm to constacyclic codesUnnamed ItemA NP-Complete Problem in Coding Theory with Application to Code Based CryptographyHulls of cyclic and negacyclic codes over finite fieldsMinimum Circuit Size, Graph Isomorphism, and Related ProblemsQuantum algorithms for algebraic problemsSemantic security for the McEliece cryptosystem without random oraclesOn a Gröbner bases structure associated to linear codesOn equivalence of cyclic codes, generalization of a quasi-twisted search algorithm, and new linear codesDetermining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual propertyComputing an Invariant of a Linear CodeHermitian hulls of constacyclic codes and their applications to quantum codes