All Issues

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Areas covered include coding theory, cryptology, combinatorics, finite geometry, algebra and number theory, but are not restricted to these. This journal also aims to cover the algorithmic and computational aspects of these disciplines. Hence, all mathematics and computer science contributions of appropriate depth and relevance to the above mentioned applications in communications technology are welcome.

More detailed indication of the journal's scope is given by the subject interests of the members of the board of editors.

All papers will undergo a thorough peer reviewing process unless the subject matter of the paper does not fit the journal; in this case, the author will be informed promptly. Every effort will be made to secure a decision in three months and to publish accepted papers within six months.

  • AIMS is a member of COPE. All AIMS journals adhere to the publication ethics and malpractice policies outlined by COPE.
  • Publishes 4 issues a year in February, May, August and November.
  • Publishes online only.
  • Indexed in Science Citation Index E, CompuMath Citation Index, Current Contents/Physics, Chemical, & Earth Sciences, INSPEC, Mathematical Reviews, MathSciNet, PASCAL/CNRS, Scopus, Web of Science, Zentralblatt MATH and dblp: computer science bibliography.
  • Archived in Portico and CLOCKSS.
  • Shandong University is a founding institution of AMC.
  • AMC is a publication of the American Institute of Mathematical Sciences. All rights reserved.

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles


Characterization of extended Hamming and Golay codes as perfect codes in poset block spaces
B. K. Dass, Namita Sharma and Rashmi Verma
2018, 12(4) : 629-639 doi: 10.3934/amc.2018037 +[Abstract](157) +[HTML](53) +[PDF](366.18KB)

Alves, Panek and Firer (Error-block codes and poset metrics, Adv. Math. Commun., 2 (2008), 95-111) classified all poset block structures which turn the [8,4,4] extended binary Hamming code into a 1-perfect poset block code. However, the proof needs corrections that are supplied in this paper. We provide a counterexample to show that the extended binary Golay code is not 1-perfect for the proposed poset block structures. All poset block structures turning the extended binary and ternary Golay codes into 1-perfect codes are classified.

$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$-additive cyclic codes
Tingting Wu, Jian Gao, Yun Gao and Fang-Wei Fu
2018, 12(4) : 641-657 doi: 10.3934/amc.2018038 +[Abstract](132) +[HTML](82) +[PDF](409.5KB)

This paper is concerned with \begin{document} ${{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$ \end{document}-additive cyclic codes. These codes can be identified as submodules of the ring \begin{document} ${\mathbb{Z}}_{2}[x]/\langle x^r-1\rangle × {\mathbb{Z}}_{2}[x]/\langle x^s-1\rangle × {\mathbb{Z}}_{4}[x]/\langle x^t-1\rangle$ \end{document}. There are two major ingredients. First, we determine the generator polynomials and minimum generating sets of this kind of codes. Furthermore, we investigate their dual codes. We determine the structure of the dual of separable \begin{document} ${{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$ \end{document}-additive cyclic codes completely. For the dual of non-separable \begin{document} ${{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$ \end{document}-additive cyclic codes, we give their structural properties in a few special cases.

On the dual codes of skew constacyclic codes
Alexis Eduardo Almendras Valdebenito and Andrea Luigi Tironi
2018, 12(4) : 659-679 doi: 10.3934/amc.2018039 +[Abstract](126) +[HTML](44) +[PDF](523.41KB)

Let \begin{document} $\mathbb{F}_q$ \end{document} be a finite field with \begin{document} $q$ \end{document} elements and denote by \begin{document} $\theta : \mathbb{F}_q\to\mathbb{F}_q$ \end{document} an automorphism of \begin{document} $\mathbb{F}_q$ \end{document}. In this paper, we deal with skew constacyclic codes, that is, linear codes of \begin{document} $\mathbb{F}_q^n$ \end{document} which are invariant under the action of a semi-linear map \begin{document} $ \phi _{\alpha,\theta }:\mathbb{F}_q^n\to\mathbb{F}_q^n$ \end{document}, defined by \begin{document} $ \phi _{\alpha,\theta }(a_0,...,a_{n-2}, a_{n-1}): = (\alpha \theta (a_{n-1}),\theta (a_0),...,\theta (a_{n-2}))$ \end{document} for some \begin{document} $\alpha \in \mathbb{F}_q\setminus\{0\}$ \end{document} and \begin{document} $n≥2$ \end{document}. In particular, we study some algebraic and geometric properties of their dual codes and we give some consequences and research results on \begin{document} $1$\end{document}-generator skew quasi-twisted codes and on MDS skew constacyclic codes.

The results on optimal values of some combinatorial batch codes
Yuebo Shen, Dongdong Jia and Gengsheng Zhang
2018, 12(4) : 681-690 doi: 10.3934/amc.2018040 +[Abstract](131) +[HTML](42) +[PDF](344.62KB)

An \begin{document} $(n,N,k,m)$ \end{document}-combinatorial batch code (CBC) was defined by Paterson, Stinson and Wei as a purely combinatorial version of batch codes which were first proposed by Ishai, Kushilevitz, Ostrovsky and Sahai. It is a system consisting of \begin{document} $m$ \end{document} subsets of an \begin{document} $n$ \end{document}-element set such that any \begin{document} $k$ \end{document} distinct elements can be retrieved by reading at most one (or in general, \begin{document} $t$ \end{document}) elements from each subset and the number of total elements in \begin{document} $m$ \end{document} subsets is \begin{document} $N$ \end{document}. For given parameters \begin{document} $n,k,m$ \end{document}, the goal is to determine the minimum \begin{document} $N$ \end{document}, denoted by \begin{document} $N(n,k,m)$ \end{document}.

So far, for \begin{document} $k≥5$ \end{document}, \begin{document} $m+3≤ n< \binom{m}{k-2}$ \end{document}, precise values of \begin{document} $N(n,k,m)$ \end{document} have not been established except for some special parameters. In this paper, we present a lower bound on \begin{document} $N(n,k,k+1)$ \end{document}, which is tight for some \begin{document} $n$ \end{document} and \begin{document} $k$ \end{document}. Based on this lower bound, the monotonicity of optimal values of CBC and several constructions, we obtain \begin{document} $N(m+4,5,m)$ \end{document}, \begin{document} $N(m+4,6,m)$ \end{document} and \begin{document} $N(m+3,7,m)$ \end{document} in different ways.

Bent and vectorial bent functions, partial difference sets, and strongly regular graphs
Ayça Çeşmelioğlu and Wilfried Meidl
2018, 12(4) : 691-705 doi: 10.3934/amc.2018041 +[Abstract](93) +[HTML](53) +[PDF](390.16KB)

Bent and vectorial bent functions have applications in cryptography and coding and are closely related to objects in combinatorics and finite geometry, like difference sets, relative difference sets, designs and divisible designs. Bent functions with certain additional properties yield partial difference sets of which the Cayley graphs are always strongly regular. In this article we continue research on connections between bent functions and partial difference sets respectively strongly regular graphs. For the first time we investigate relations between vectorial bent functions and partial difference sets. Remarkably, properties of the set of the duals of the components play here an important role. Seeing conventional bent functions as 1-dimensional vectorial bent functions, some earlier results on strongly regular graphs from bent functions follow from our more general results. Finally we describe a recursive construction of infinitely many partial difference sets with a secondary construction of p-ary bent functions.

Self-duality of generalized twisted Gabidulin codes
Kamil Otal, Ferruh Özbudak and Wolfgang Willems
2018, 12(4) : 707-721 doi: 10.3934/amc.2018042 +[Abstract](126) +[HTML](44) +[PDF](404.35KB)

Self-duality of Gabidulin codes was investigated in [10] and the authors provided an if and only if condition for a Gabidulin code to be equivalent to a self-dual maximum rank distance (MRD) code. In this paper, we investigate the analog problem for generalized twisted Gabidulin codes (a larger family of linear MRD codes including the family of Gabidulin codes). We observe that the condition presented in [10] still holds for generalized Gabidulin codes (an intermediate family between Gabidulin codes and generalized twisted Gabidulin codes). However, beyond the family of generalized Gabidulin codes we observe that some additional conditions are required depending on the additional parameters. Our tools are similar to those in [10] but we also use linearized polynomials, which leads to further tools and direct proofs.

A class of skew-cyclic codes over $\mathbb{Z}_4+u\mathbb{Z}_4$ with derivation
Amit Sharma and Maheshanand Bhaintwal
2018, 12(4) : 723-739 doi: 10.3934/amc.2018043 +[Abstract](95) +[HTML](120) +[PDF](463.68KB)

In this paper, we study a class of skew-cyclic codes using a skew polynomial ring over \begin{document}$R = \mathbb{Z}_4+u\mathbb{Z}_4;u^2 = 1$ \end{document}, with an automorphism \begin{document}$θ$ \end{document} and a derivation \begin{document}$δ_θ$ \end{document}. We generalize the notion of cyclic codes to skew-cyclic codes with derivation, and call such codes as \begin{document}$δ_θ$ \end{document}-cyclic codes. Some properties of skew polynomial ring \begin{document}$R[x, θ, {δ_θ}]$ \end{document} are presented. A \begin{document}$δ_θ$ \end{document}-cyclic code is proved to be a left \begin{document}$R[x, θ, {δ_θ}]$ \end{document}-submodule of \begin{document}$\frac{R[x, θ, {δ_θ}]}{\langle x^n-1 \rangle}$ \end{document}. The form of a parity-check matrix of a free \begin{document}$δ_θ$ \end{document}-cyclic codes of even length \begin{document}$n$ \end{document} is presented. These codes are further generalized to double \begin{document}$δ_θ$ \end{document}-cyclic codes over \begin{document}$R$ \end{document}. We have obtained some new good codes over \begin{document}$\mathbb{Z}_4$ \end{document} via Gray images and residue codes of these codes. The new codes obtained have been reported and added to the database of \begin{document}$\mathbb{Z}_4$ \end{document}-codes [2].

Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields
Gora Adj, Isaac Canales-Martínez, Nareli Cruz-Cortés, Alfred Menezes, Thomaz Oliveira, Luis Rivera-Zamarripa and Francisco Rodríguez-Henríquez
2018, 12(4) : 741-759 doi: 10.3934/amc.2018044 +[Abstract](109) +[HTML](188) +[PDF](470.17KB)

Since 2013 there have been several developments in algorithms for computing discrete logarithms in small-characteristic finite fields, culminating in a quasi-polynomial algorithm. In this paper, we report on our successful computation of discrete logarithms in the cryptographically-interesting characteristic-three finite field \begin{document}$\mathbb{F}_{3^{6.509}}$\end{document}    using these new algorithms; prior to 2013, it was believed that this field enjoyed a security level of 128 bits. We also show that a recent idea of Guillevic can be used to compute discrete logarithms in the cryptographically-interesting finite field \begin{document}$\mathbb{F}_{3^{6.709}}$\end{document}    using essentially the same resources as we expended on the \begin{document}$\mathbb{F}_{3^{6.509}}$\end{document}    computation. Finally, we argue that discrete logarithms in the finite field \begin{document}$\mathbb{F}_{3^{6.1429}}$\end{document}    can feasibly be computed today; this is significant because this cryptographically-interesting field was previously believed to enjoy a security level of 192 bits.

Higher weights and near-MDR codes over chain rings
Zihui Liu and Dajian Liao
2018, 12(4) : 761-772 doi: 10.3934/amc.2018045 +[Abstract](108) +[HTML](47) +[PDF](332.98KB)

The matrix description of a near-MDR code is given, and some judging criterions are presented for near-MDR codes. We also give the weight distribution of a near-MDR code and the applications of a near-MDR code to secret sharing schemes. Furthermore, we will introduce the chain condition for free codes over finite chain rings, and then present a formula for computing higher weights of tensor product of free codes satisfying the chain condition. We will also find a chain for any near-MDR code, and thus show that any near-MDR code satisfies the chain condition.

Efficient decoding of interleaved subspace and Gabidulin codes beyond their unique decoding radius using Gröbner bases
Hannes Bartz and Antonia Wachter-Zeh
2018, 12(4) : 773-804 doi: 10.3934/amc.2018046 +[Abstract](109) +[HTML](60) +[PDF](679.49KB)

An interpolation-based decoding scheme for \begin{document}$L$\end{document}-interleaved subspace codes is presented. The scheme can be used as a (not necessarily polynomial-time) list decoder as well as a polynomial-time probabilistic unique decoder. Both interpretations allow to decode interleaved subspace codes beyond half the minimum subspace distance. Both schemes can decode \begin{document}$\gamma $\end{document} insertions and \begin{document}$\delta $\end{document} deletions up to \begin{document}$\gamma +L\delta \leq L({{n}_{t}}-k)$\end{document}, where \begin{document}${{n}_{t}}$\end{document} is the dimension of the transmitted subspace and \begin{document}$k$\end{document} is the number of data symbols from the field \begin{document}${{\mathbb{F}}_{{{q}^{m}}}}$\end{document}. Further, a complementary decoding approach is presented which corrects \begin{document}$\gamma $\end{document} insertions and \begin{document}$\delta $\end{document} deletions up to \begin{document}$L\gamma +\delta \leq L({{n}_{t}}-k)$\end{document}. Both schemes use properties of minimal Gröebner bases for the interpolation module that allow predicting the worst-case list size right after the interpolation step. An efficient procedure for constructing the required minimal Gröebner basis using the general Kötter interpolation is presented. A computationally- and memory-efficient root-finding algorithm for the probabilistic unique decoder is proposed. The overall complexity of the decoding algorithm is at most \begin{document}$\mathcal{O}\left( {{L}^{2}}n_{r}^{2} \right)$\end{document} operations in \begin{document}${{\mathbb{F}}_{{{q}^{m}}}}$\end{document} where \begin{document}${{n}_{r}}$\end{document} is the dimension of the received subspace and \begin{document}$L$\end{document} is the interleaving order. The analysis as well as the efficient algorithms can also be applied for accelerating the decoding of interleaved Gabidulin codes.

On $k$-error linear complexity of pseudorandom binary sequences derived from Euler quotients
Zhixiong Chen, Vladimir Edemskiy, Pinhui Ke and Chenhuang Wu
2018, 12(4) : 805-816 doi: 10.3934/amc.2018047 +[Abstract](103) +[HTML](42) +[PDF](383.84KB)

We investigate the \begin{document}$ k$\end{document}-error linear complexity of pseudorandom binary sequences of period \begin{document}$ p^{\mathfrak{r}} $\end{document} derived from the Euler quotients modulo \begin{document}$ p^{\mathfrak{r}-1} $\end{document}, a power of an odd prime \begin{document}$ p $\end{document} for \begin{document}$ \mathfrak{r}≥2 $\end{document}. When \begin{document}$ \mathfrak{r} = 2 $\end{document}, this is just the case of polynomial quotients (including Fermat quotients) modulo \begin{document}$p $\end{document}, which has been studied in an earlier work of Chen, Niu and Wu. In this work, we establish a recursive relation on the \begin{document}$ k $\end{document}-error linear complexity of the sequences for the case of \begin{document}$ \mathfrak{r}≥3 $\end{document}. We also state the exact values of the \begin{document}$ k $\end{document}-error linear complexity for the case of \begin{document}$ \mathfrak{r} = 3 $\end{document}. From the results, we can find that the \begin{document}$ k $\end{document}-error linear complexity of the sequences (of period \begin{document}$ p^{\mathfrak{r}} $\end{document}) does not decrease dramatically for \begin{document}$ k<p^{\mathfrak{r}-2}(p-1)^2/2 $\end{document}.

Binary subspace codes in small ambient spaces
Daniel Heinlein and Sascha Kurz
2018, 12(4) : 817-839 doi: 10.3934/amc.2018048 +[Abstract](107) +[HTML](34) +[PDF](510.77KB)

Codes in finite projective spaces equipped with the subspace distance have been proposed for error control in random linear network coding. Here we collect the present knowledge on lower and upper bounds for binary subspace codes for projective dimensions of at most \begin{document}$ 7 $\end{document}, i.e., affine dimensions of at most \begin{document}$ 8 $\end{document}. We obtain several improvements of the bounds and perform two classifications of optimal subspace codes, which are unknown so far in the literature.

A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](972) +[PDF](288.3KB) Cited By(42)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](909) +[PDF](247.3KB) Cited By(28)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](1065) +[PDF](323.1KB) Cited By(24)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](850) +[PDF](218.2KB) Cited By(22)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](983) +[PDF](248.6KB) Cited By(22)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](1178) +[PDF](390.1KB) Cited By(19)
On the order bounds for one-point AG codes
Olav Geil, Carlos Munuera, Diego Ruano and Fernando Torres
2011, 5(3) : 489-504 doi: 10.3934/amc.2011.5.489 +[Abstract](882) +[PDF](378.6KB) Cited By(18)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](1142) +[PDF](304.4KB) Cited By(17)
Geometric constructions of optimal optical orthogonal codes
T. L. Alderson and K. E. Mellinger
2008, 2(4) : 451-467 doi: 10.3934/amc.2008.2.451 +[Abstract](880) +[PDF](239.2KB) Cited By(16)
Linear nonbinary covering codes and saturating sets in projective spaces
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and Fernanda Pambianco
2011, 5(1) : 119-147 doi: 10.3934/amc.2011.5.119 +[Abstract](1244) +[PDF](566.6KB) Cited By(15)
\begin{document}$np^s$\end{document} over \begin{document}$\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$\end{document}" >Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](764) +[HTML](355) +[PDF](555.31KB) PDF Downloads(180)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](329) +[HTML](152) +[PDF](543.19KB) PDF Downloads(105)
Indiscreet logarithms in finite fields of small characteristic
Robert Granger, Thorsten Kleinjung and Jens Zumbrägel
2018, 12(2) : 263-286 doi: 10.3934/amc.2018017 +[Abstract](784) +[HTML](292) +[PDF](541.54KB) PDF Downloads(98)
New constructions of systematic authentication codes from three classes of cyclic codes
Yunwen Liu, Longjiang Qu and Chao Li
2018, 12(1) : 1-16 doi: 10.3934/amc.2018001 +[Abstract](777) +[HTML](243) +[PDF](422.32KB) PDF Downloads(93)
Reduced access structures with four minimal qualified subsets on six participants
Motahhareh Gharahi and Shahram Khazaei
2018, 12(1) : 199-214 doi: 10.3934/amc.2018014 +[Abstract](749) +[HTML](241) +[PDF](447.58KB) PDF Downloads(86)
The average dimension of the Hermitian hull of constacyclic codes over finite fields of square order
Somphong Jitman and Ekkasit Sangwisut
2018, 12(3) : 451-463 doi: 10.3934/amc.2018027 +[Abstract](219) +[HTML](140) +[PDF](377.03KB) PDF Downloads(83)
Duursma's reduced polynomial
Azniv Kasparian and Ivan Marinov
2017, 11(4) : 647-669 doi: 10.3934/amc.2017048 +[Abstract](753) +[HTML](374) +[PDF](439.95KB) PDF Downloads(83)
On some classes of codes with a few weights
Yiwei Liu and Zihui Liu
2018, 12(2) : 415-428 doi: 10.3934/amc.2018025 +[Abstract](509) +[HTML](239) +[PDF](376.9KB) PDF Downloads(83)
An asymmetric ZCZ sequence set with inter-subset uncorrelated property and flexible ZCZ length
Longye Wang, Gaoyuan Zhang, Hong Wen and Xiaoli Zeng
2018, 12(3) : 541-552 doi: 10.3934/amc.2018032 +[Abstract](247) +[HTML](147) +[PDF](466.09KB) PDF Downloads(79)
New families of strictly optimal frequency hopping sequence sets
Jingjun Bao
2018, 12(2) : 387-413 doi: 10.3934/amc.2018024 +[Abstract](502) +[HTML](238) +[PDF](613.0KB) PDF Downloads(72)

2017  Impact Factor: 0.564




Email Alert

[Back to Top]