Skip to main content
Log in

A-Codes from Rational Functions over Galois Rings

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper, we describe authentication codes via (generalized) Gray images of suitable codes over Galois rings. Exponential sums over these rings help determine—or bound—the parameters of such codes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. G. Bini F. Flamini (2000) Finite Commutative Rings and their Applications Kluwer Academic Publishers Boston

    Google Scholar 

  2. R. Blache, Lifts of points on curves and exponential sums, preprint arXiv:mathNT/0202206.

  3. G. Geer Particlevan der M. Vlugt Particlevan der (1991) ArticleTitleArtin-Schreier curves and codes J. Algebra 139 256–272 Occurrence Handle92i:14020

    MathSciNet  Google Scholar 

  4. M. Greferath S. E. Schmidt (1999) ArticleTitleGray isometries for finite chain rings and a nonlinear ternary (36,312,15) code IEEE trans. Inf. Theory 45 2522–2524 Occurrence Handle2000h:94061

    MathSciNet  Google Scholar 

  5. A.R. Hammons P.V. Kumar A.R. Calderbank N.J.A. Sloane P. Solé (1994) ArticleTitleThe \(\mathbb Z_{4}\)-linearity of Kerdock, Preparata, Goethals, and related codes IEEE Trans. Inf. Theory 40 301–318 Occurrence Handle10.1109/18.312154

    Article  Google Scholar 

  6. T. Helleseth K. V. Kumar A. G. Shanbhag (1996) Exponential sums over Galois rings and their applications, Finite fields and applications (Glasgow, 1995) Cambridge Univ. Press Cambridge 109–128

    Google Scholar 

  7. T. Helleseth T. Johansson (1996) Universal Hash functions from exponential sums over finite fields and Galois rings Springer Berlin 31–44

    Google Scholar 

  8. W. -C. W. Li (1999) ArticleTitleCharacter sums over p-adic fields J. Num. Theory 74 181–229 Occurrence Handle0919.11083

    MATH  Google Scholar 

  9. G. J. Simmons, Authentication theory/coding theory, In (G.R. Blakley and D. Chaum, eds.), Advances in Cryptology, Proceedings of CRYPTO 84, Lecture Notes in Computer Science Vol. 196 (1985) pp. 411–431.

  10. D. R. Stinson (1994) ArticleTitleUniversal hashing and authentication codes Codes, designs and Cryptography 4 337–346

    Google Scholar 

  11. J. F. Voloch J. L. Walker (2003) ArticleTitleHomogeneous weights and exponential sums Finite Fields Appl 9 IssueID3 310–321 Occurrence Handle10.1016/S1071-5797(03)00007-8 Occurrence Handle2004d:11119

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gilberto Bini.

Additional information

Communicated by: T. Helleseth

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bini, G. A-Codes from Rational Functions over Galois Rings. Des Codes Crypt 39, 207–214 (2006). https://doi.org/10.1007/s10623-005-3297-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-005-3297-0

Keywords

Mathematics Subject Classification 2000

Navigation